Computer Fundamentals
English
Intermediate
Computer Basics Quiz to test and improve your computer Knowledge 👨‍💻
Description
30
Questions
30 sec
Per question
4:49
Average time
3.0
Contest Score
4.8
Community Rating
811
Participants
30 comments
I didn't know some questions but I performed not so bad
Posh Chicken author
I hope you learnt something
Ssaku Solomon
I loved this coz i wanted to remind my self of the basics but am not badly off
Posh Chicken author
Thanks for the feedback! I think it has polished your computer basics
Fremixx
I'm not badly off but I have learned more.
Posh Chicken author
Thanks for the feedback! That's great to hear that you learnt something
Collo
50perc
Posh Chicken author
Thanks for the feedback! I know with the explanations provided, you can learn what you failed in the first place.
Mannotti Jerad
Thanks so much for the quiz... It has opened my mind in this field of technology
Posh Chicken author
Thanks for the feedback! It's good to hear that it has impacted you positively.
KSHITIJ TIWARI
Very good quiz 👍
Hope next time u come with more interesting questions
Posh Chicken author
Sure, that motivates to come up with more similar quizzes in this field. Thanks for the feedback!
Akash
63%
Posh Chicken author
That's a good score. Well done!
Night Lemur
This was a nice quiz with good questions on a conceptual level, but there are a few problems regarding the accuracy of the questions:
1. Question 6: This is very misleading. If a flash drive doesn't work, you clearly don't just reinstall your entire Operating System -- apart from the huge cost of the reinstallation for the comparably small benefit of troubleshooting your flash drive, the approach wouldn't work in the overwhelming majority of cases: If a flash drive doesn't work, the problem lies most likely within the flash drive, not the computer it is put into. There are several programs (such as Windows' CHKDSK[1]) which can help detect problems in flash drives, and if nothing helps repair the drive a usual course of action would be reformatting the drive in case there are bad sectors or similar problems.
2. Question 7: Confusingly, the explanation directly contradicts the answer. Some explanation on the terms:
- A "Kibibyte" consists of exactly 1024 bits[2].
- A "Kilobyte" is usually defined as 1000 bits, but can sometimes also refer to 1024 bits[3].
So in the end, both "1000 bits" or "1024 bits" can be correct, although "1000" bits is the much more common definition. These issues could most easily be fixed if "kilobyte" were simply changed to "kibibyte".
3. Question 16: Antivirus software is certainly used against hacker intrusion as well, not just Firewalls. The purpose of Antivirus software is to remove Malware from the computer it is installed on[4], such as Trojans (which are classified as "hacker intrusions"). So ideally, either "Firewall" or "Antivirus" should be replaced with something different to disambiguate this question.
(4. Question 21: This is just a small nitpick, but technically Malware can be installed from a Joystick. There are two possible ways to do this, one is to have the joystick contain a hidden flash drive somewhere within its hardware which the computer then reads once the Joystick is connected, and another is to hide Malware in the Joystick's drivers. Hiding Malware in drivers is actually an attack vector that's sometimes used[5], because driver's often have higher administrative rights in the system than a normal user has.)

[1]: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/chkdsk
[2]: https://en.wikipedia.org/wiki/Kibibyte
[3]: https://en.wikipedia.org/wiki/Kilobyte
[4]: https://en.wikipedia.org/wiki/Antivirus_software
[5]: https://www.fortinet.com/blog/threat-research/deep-analysis-of-driver-based-mitm-malware-itranslator
Posh Chicken author
Thanks for the feedback. Let me start answering you one by one:
1. The question clearly states "one of the following measures" and I think you would agree that it was only one answer provided which could solve the problem. The most common cause of the problem in question are missing/ incorrectly installed USB drivers and to my understanding, most operating systems come prepackaged with USB drivers and thus reinstalling the OS installs the USB drivers. Or you can take a more technical approach of looking for the missing drivers and install them, which can be more of a try and error. Also, take note that the question says "cannot be read by the computer" which makes me wonder how you would run commands on hardware not read by the computer or even format it as you suggest! Its literally like not plugged in. From your explanation, I presume you are talking about the typical windows OS message "USB Flash Drive not Recognized". For your information, CHKDSK works for Windows OS. How about macOS users, Amiga OS users or Linux users, etc!

2. I admit I made a mistake on the correct answer. The correct answer should have been 1000 bytes. However, the explanation is correct but it's a wrong option marked as the correct answer. Very sorry about that.

3. An Antivirus protects your system from malware intrusion but a firewall protects your system from hacker intrusions. A hacker intrusion and malware intrusion into your system are two different terms in relation to computer security which I think confuse you.

4. When you talk about drivers, then I suppose you are talking about downloading the Joystick drivers - this is categorized as "internet downloads" but not part of the Joystick hardware. When you talk about a "joystick contain a hidden flash drive somewhere within its hardware" then I suppose that's something to do with more on the manufacturing side as it would require redesigning the circuit and not only that but also reprogramming its firmware so that one: the flash disk can be detected without interfering with joystick operations acting more like a USB hub and two: data can flow in both directions (read & write operations) which would now lead to the emergence of a new computer device altogether!
Night Lemur
Posh Chicken Thanks for your reply, I agree about points 2 and 4. As for the others:
1. The question talks about a flash drive which cannot be read by the computer. The cause for this is often incompatible file systems (such as trying to open an ext4 drive in Windows), which can be fixed by reformatting it, so this is indeed a viable option. Another cause of this could be hardware problems or something similar, but the fault is almost *never* with the drivers in modern Operating Systems.
This is because for simple mass storage devices (i.e. flash drives), no driver is necessary because the interface is standardized enough to work out of the box, so reinstalling the Operating System wouldn't change anything. For sources, simply Google "flash drive not recognized" and you'll see none of them suggesting to reinstall the OS[1][2].
As for your concern that CHKDSK is only available in Windows, this was just an example, of course there are other such tools for MacOS or Linux systems (e.g. fsck[3]).

3. Actually, a "hacker intrusion" has no official definition in the field of Information Security, so this can be simply understood as "a hacker gaining unwanted access to your system".
This is clearly the case with Trojans[4], because after a hacker manages to install such a software they have intruded into your system and can control it. For another source, we can reference the fact that HIDS (Host-based Intrusion Detection System, Antivirus is one type of this system) defends against "intruders (hackers)."[5]
I would have agreed with you if the question said "Network hacker intrusion" or something similar, but it says "Computer hacker intrusion" instead -- and a defense against that would also be Antivirus, which scans files the computer receives to prevent a hacker gaining access (i.e. intrusion) to the system.

[1]: https://www.howtogeek.com/howto/22251/find-your-missing-usb-drive-in-windows-7-vista/
[2]: https://helpdeskgeek.com/help-desk/what-to-do-when-your-usb-drive-is-not-showing-up/
[3]: https://en.wikipedia.org/wiki/Fsck
[4]: https://en.wikipedia.org/wiki/Trojan_horse_(computing)
[5]: https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system#Monitoring_state
Posh Chicken author
Night Lemur Thanks for the feedback. To answer you:
1. For your Information; if a flash disk has an incompatible file system, it asks for a format and take note that, to "ask for a format" means the computer is reading it. Secondly, every computer peripheral needs drivers, so if you don't install USB drivers doesn't mean they are not there as you claim but they are pre-packaged in the operating system. In the case that the operating system wasn't installed properly, there could be things which could possibly go wrong and for an example could be the USB drivers. Also, please try to understand the technicalities before you go deeper into the topic because, in both references you provided, they talk about drivers problem. And as far as I remember, I have been talking about the essence of reinstalling the operating system which is that since it comes prepackaged with the necessary USB drivers, reinstalling it will fix the USB driver problem incase they were incorrectly installed. So, when an article mentions "Troubleshoot drivers" there are a couple of ways you could do that!

2. Please mention two antivirus softwares which claim to be Host-based Intrusion Detection Systems and also claim to be antivirus programs? You have also mentioned that you would agree if the question said network hacker intrusion instead of computer hacker intrusion - so what do you understand by the term network?
Night Lemur
Posh Chicken 1. Note that the question asks how we can troubleshoot "a flash drive not being read", not "all flash drives not being read" or "the computer doesn't detect any flash drives".
If a flash drive doesn't work, you simply wouldn't reinstall the entire OS just because of that, due to the many reasons I've listed as well as all sources I can find about USB drive problems never suggesting this, not even Microsoft's official support website for Windows[1] as well as every other guide. In fact, virtually all of them suggest formatting the USB drive instead[4][5][6][7][8]. Reinstalling the OS is just the wrong course of action to take here, and every source I can find online seems to agree.

2. About the Intrusion Detection System, I was actually wrong, the purpose of an IDS is to *detect* intruders while anti-virus software is used to *prevent* intruders in the first place, sorry about that. The rest of the argument still holds water though (like a Trojan being a hacker intrusion).
A network is defined as "a group of two or more computers linked together."[2][3] In that regard, a "Computer hacker intrusion" usually refers to a single system being infiltrated while a "Network hacker intrusion" means that a whole network (i.e. a set of multiple computers which are linked together) has been infiltrated.

[1]: https://support.microsoft.com/en-us/help/2654149/error-usb-device-not-recognized-when-you-try-to-access-a-usb-external
[2]: https://en.wikipedia.org/wiki/Computer_network
[3]: https://www.webopedia.com/TERM/N/network.html
[4]: https://www.online-tech-tips.com/computer-tips/usb-device-not-recognized/
[5]: https://www.drivereasy.com/knowledge/solved-usb-device-not-recognized-in-windows-10-2/
[6]: https://helpdeskgeek.com/help-desk/what-to-do-when-your-usb-drive-is-not-showing-up/
[7]: https://www.diskpart.com/windows-10/windows-10-not-detecting-usb.html
[8]: https://recoverit.wondershare.com/flashdrive-recovery/flash-drive-not-recognized.html
Posh Chicken author
1. How would you format a flash drive not read by the computer literally not plugged in? Secondly, on your listed references point out one which doesn't talk about updating/ reinstalling USB drivers? From that point of view - tell me whether if I reinstall the operating system won't reinstall the USB drivers?

2. No worries about that, learning never stops! So since you agree that installing a firewall prevents a network hacker intrusion but not a computer hacker intrusion yet a network is a collection of two or more interlinked computers so what happens when a hacker intrudes into a single computer on a network? To bring it into perspective, when an internet connected device is infiltrated, does that imply the entire network which is the internet is infiltrated as in your network hacker intrusion definition?
Take the quiz to leave a comment