Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Test Your Computer Vocabulary: Choose the Word That Completes Each Sentence

Ready to complete the sentences with the correct words? Take the quiz and find out!

Difficulty: Moderate
2-5mins
Learning OutcomesCheat Sheet
Paper art style computers keyboards chat bubbles vocabulary quiz icons on golden yellow background.

This computer quiz helps you choose the word that completes each sentence, so you practice real computer vocabulary in context. Use it to spot gaps before a quiz or exam and build speed with common tech terms. Take a few minutes and see where you're strong - and what to review next.

The CPU is often referred to as the computer's ______.
eye
brain
calculator
memory
The CPU executes instructions and performs calculations, functioning as the 'brain' of the computer. It interprets and processes most of the data and commands necessary for operations. Without the CPU, the system cannot run programs or manage tasks.
Volatile memory used by the CPU to store data temporarily is called ______.
RAM
SSD
HDD
ROM
RAM (Random Access Memory) is volatile memory that the CPU uses for temporary data storage and quick access. Data in RAM is lost when the system powers down. It provides much faster read/write speeds compared to permanent storage.
The primary permanent storage device in a computer is the hard ______.
partition
drive
disk
file
A hard disk is the main non-volatile storage medium in many computers, holding the operating system, software, and user data. It retains information even when the power is off. Modern systems may use SSDs, but hard disks remain common.
The main circuit board of a computer is the ______.
CPU
chipset
GPU
motherboard
The motherboard is the primary printed circuit board (PCB) that connects all components, including the CPU, memory, and peripherals. It provides sockets, slots, and connectors for devices. It also distributes power and data signals across the system.
The screen that displays graphical output is known as a ______.
scanner
projector
printer
monitor
A monitor is an output device that visually displays text, images, and video from the computer. It connects via VGA, HDMI, DisplayPort, or other interfaces. Monitors come in various resolutions and panel types.
The input device used to type text is a ______.
keyboard
joystick
mouse
scanner
A keyboard is an input device comprised of keys that allow users to enter text and commands into a computer. It maps each keypress to specific characters or functions. Keyboards can be wired or wireless.
A small handheld device that controls the cursor is a ______.
touchpad
trackball
mouse
keyboard
A mouse is a pointing device that detects two-dimensional motion relative to a surface. It moves the on-screen cursor and allows users to interact with graphical elements. Variants include optical, laser, and wireless mice.
Software that enables users to perform specific tasks is called an ______.
operating system
application
protocol
firmware
Application software is designed to help users perform particular tasks such as word processing or web browsing. It runs on top of the operating system. Unlike system software, applications serve end-user objectives.
An abbreviation for Solid State Drive is ______.
SSD
CPU
USB
HDD
SSD stands for Solid State Drive, a storage device that uses flash memory to store data. It has no moving parts, offering faster performance and greater durability compared to HDDs. SSDs are common in modern laptops and desktops.
The low-level software that directly manages hardware is the ______.
utility
operating system
application
driver
The operating system is system software that controls hardware resources and provides services to applications. It manages processes, memory, devices, and file systems. Drivers are part of the OS that communicate with specific hardware.
A unique series of instructions that performs a task is known as an ______.
algorithm
application
architecture
arrangement
An algorithm is a step-by-step set of instructions for solving a problem or performing a task. In computing, algorithms are implemented in code to manipulate data and control flow. They are fundamental to computer science.
The published standards that allow computers to communicate are called ______.
processors
protocols
drivers
packets
Protocols define rules and conventions for data exchange between network devices. They ensure interoperability and reliable communication across diverse systems. Examples include TCP/IP, HTTP, and FTP.
Temporary storage used by a CPU is called cache or ______.
stacks
heaps
buffers
registers
Registers are small, fast storage locations within the CPU used to hold data or instructions during processing. They are faster than cache and RAM. Cache bridges the speed gap between registers and main memory.
A malicious program that replicates itself is called a computer ______.
worm
spyware
firewall
virus
A computer virus attaches itself to legitimate files and replicates when those files are executed. Unlike worms, viruses require user action to spread. They can corrupt data and impair system performance.
A pointer to data stored elsewhere is known as a ______.
variable
statement
reference
definition
A reference is an address or pointer that refers to data located in another memory area. References allow functions and objects to access shared data without copying. They are widely used in programming languages like C++ and Java.
A small section of code that performs a specific task and can be called by name is called a ______.
thread
socket
buffer
function
In programming, a function is a block of code designed to perform a particular operation and can be invoked by its name. Functions improve modularity and code reuse. Many languages also support procedures and methods as similar constructs.
The practice of masking IP addresses in a network is known as ______.
NAT
tunneling
proxying
bridging
Network Address Translation (NAT) allows multiple devices on a private network to share a single public IP address. It modifies IP address information in packet headers. NAT helps conserve IPv4 addresses and provides a basic level of security.
The architecture that separates application layers into client and server is ______.
peer-to-peer
monolithic
distributed
client-server
Client-server architecture divides tasks between service providers (servers) and requesters (clients). Clients request services, and servers respond. This model underpins most web and network applications.
The process of converting source code into executable code is called ______.
debugging
linking
compiling
interpreting
Compiling transforms high-level source code into machine code or an intermediate form before execution. The compiler checks syntax and semantics during this process. Interpreters perform translations at runtime instead.
A security technique to scramble data is known as ______.
buffering
encryption
hashing
authentication
Encryption transforms plaintext into ciphertext using algorithms and keys, making data unreadable without the correct decryption key. It is fundamental for confidentiality in communications and storage. Hashing is one-way, while encryption is reversible with the proper key.
A hardware component that connects computers within a LAN is a ______.
switch
modem
router
hub
A network switch connects multiple devices on a LAN and forwards data only to the device with the matching MAC address. It reduces collisions compared to hubs. Switches operate at Layer 2 of the OSI model.
A storage solution that combines multiple drives for redundancy is called RAID ______.
5
0
10
1
RAID 1 mirrors data across two or more disks, providing redundancy if one drive fails. Reads can be faster, but write speed and usable capacity are limited to the size of one drive. Other RAID levels offer different performance and redundancy balances.
The indirection layer that allows instruction sets from one architecture to run on another is called a ______.
scheduler
compiler
hypervisor
emulator
An emulator mimics the hardware or software environment of one system on another, translating instructions so programs run as if on the original architecture. This differs from virtualization, which shares physical resources. Emulators are used for legacy software support.
The process scheduling algorithm that gives each process a fixed time slice in a rotating order is ______.
LIFO
priority scheduling
round robin
FIFO
Round robin scheduling assigns each ready process a time quantum in circular order, preempting the process when its slice expires. It ensures fairness and is simple to implement. It is commonly used in time-sharing systems.
A computing model that partitions datasets across nodes for parallel processing is ______.
grid computing
virtualization
cloud computing
MapReduce
MapReduce is a programming model that divides tasks into map and reduce functions, distributing data processing across multiple nodes. It handles large-scale datasets in parallel and is fundamental to big data frameworks like Hadoop.
0
{"name":"The CPU is often referred to as the computer's ______.", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"The CPU is often referred to as the computer's ______., Volatile memory used by the CPU to store data temporarily is called ______., The primary permanent storage device in a computer is the hard ______.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Study Outcomes

  1. Identify key computer vocabulary -

    Pinpoint and define essential tech terms by choosing the word that best completes each sentence.

  2. Apply context clues -

    Use surrounding sentence information to select the correct words to complete the sentence accurately.

  3. Differentiate similar tech terms -

    Distinguish between closely related computer words through targeted sentence-completion exercises.

  4. Reinforce technical language recall -

    Strengthen your memory of computer terminology by repeatedly choosing the correct words in varied contexts.

  5. Expand your tech lexicon -

    Discover and integrate new computer-related words into your vocabulary for improved communication.

  6. Evaluate your proficiency -

    Receive a scored challenge that helps you assess and track your mastery of computer vocabulary.

Cheat Sheet

  1. Leverage Contextual Clues -

    Scan surrounding words and phrases to infer meaning; context often points directly to which words complete the sentence correctly. For example, if a sentence mentions "downloading files," you'll know "uploading" is unlikely to fit (Purdue OWL).

  2. Master Common Collocations -

    Familiarity with word pairs like "compile code" or "install software" helps you choose the correct words to complete the sentence with confidence. Use resources such as the Cambridge Dictionary's collocation finder to practice these frequent tech term combinations.

  3. Analyze Word Structure -

    Break complex terms into prefixes, roots, and suffixes (e.g., "re-" means "again," "-able" means "capable of") to deduce meaning and pick the best option. This morphological strategy is backed by research from the University of Victoria's Writing Department.

  4. Identify Part of Speech -

    Determine if you need a noun, verb, adjective, or adverb by examining the sentence's grammatical framework before choosing the word that best completes the sentence. Oxford Learner's Dictionaries stress that POS recognition cuts down on guesswork and speeds up accurate selection.

  5. Use the Elimination Technique -

    Cross out obviously wrong options first, then compare remaining choices based on nuance and fit; this method sharpens your skills in choosing the correct word under time pressure. It's a proven approach featured in official ETS test-prep materials to boost accuracy and confidence.

Powered by: Quiz Maker