IT Work Sheet
IT Work Sheet
(a) Google
(b) Archie
(c) Altavista
(d) WAIS
Answer: (b) Archie
Number of bit used by the IPv6 address
(a) 32 bit
(b) 64 bit
(c) 128 bit
(d) 256 bit
Answer: (c) 128 bit
Which one is the first web browser invented in 1990
(a) Internet Explorer
(b) Mosaic
(c) Mozilla
(d) Nexus
Answer: (d) Nexus
Which of the following programming language is used to create programs like applets?
(a) COBOL
(b) C Language
(c) Java
(d) BASIC
Answer: (c) Java
First computer virus is known as
(a) Rabbit
(b) Creeper Virus
(c) Elk Cloner
(d) SCA Virus
Answer: (b) Creeper Virus
Which one programming language is exclusively used for artificial intelligence
(a) C
(b) Java
(c) J2EE
(d) Prolog
Answer: (d) Prolog
Firewall in computer is used for
(a) Security
(b) Data Transmission
(c) Authentication
(d) Monitoring
Answer: (a) Security
A dual layer Blue-ray Disc can store data upto
(a) 20GB
(b) 35 GB
(c) 12 GB
(d) 50 GB
Answer: (d) 50 GB
Which of the following is not an operating system
(a) DOS
(b) Mac
(c) C
(d) Linux
Answer: (c) C
Which of the following is not a database management software
(a) MySQL
(b) Oracle
(c) Sybase
(d) COBOL
Answer: (d) COBOL
Number of layers in the OSI (Open Systems Interconnection) Model
(a) 9
(b) 3
(c) 7
(d) 11
Answer: (c) 7
1024 bit is equal to how many byte
(a) 1 Byte
(b) 128 Byte
(c) 32 Byte
(d) 64 Byte
Answer: (b) 128 Byte
Mac Operating System is developed by which company
(a) IBM
(b) Apple
(c) Microsoft
(d) Samsung
Answer: (b) Apple
Where is the headquter of Microsoft office located
(a) Texas
(b) NewYork
(c) California
(d) Washington
Answer: (d) Washington
.gif is an extension of
(a) Image file
(b) Video file
(c) Audio file
(d) Word file
Answer: (a) Image file
1.
Which cable is used to connect a hard drive to a
motherboard?
A.
A SATA Cable
B.
An IDE Cable
o
C.
A USB Cable
D.
A PS2 Cable
Correct Answer
A. A SATA Cable
Explanation
SATA (Serial ATA) cables are commonly used to connect hard drives,
SSDs, and optical drives to the motherboard. They have largely
replaced the older IDE (Integrated Drive Electronics) cables, which were
bulkier and slower. USB cables are used for external devices, and PS2
cables are used for older keyboard and mouse connections.
Rate this question:
162
2.
What type of device is a keyboard?
A.
Input
o
B.
Output
C.
Both
D.
Correct Answer
A. Input
Explanation
A keyboard is an input device. It is used to enter data and commands
into a computer or other electronic devices. By pressing the keys on a
keyboard, users can input text, numbers, and various commands, which
the computer then processes. The keyboard translates these keystrokes
into signals that the computer's processor can understand. This
functionality makes the keyboard an essential tool for interacting with a
computer, allowing users to perform a wide range of tasks, from typing
documents to executing complex commands. Understanding the role of
input devices like keyboards is fundamental to using and operating
computers effectively.
Rate this question:
78
3.
What is the full form of 'URL'?
A.
B.
C.
D.
Correct Answer
B. Uniform Resource Locator
Explanation
A URL stands for Uniform Resource Locator. It is a string of characters
that is used to address and locate resources on the internet. It provides
a way to identify and access specific web pages, documents, images, or
any other type of file. The URL consists of different components such as
the protocol (http, https, ftp), the domain name (www.example.com),
and the specific path or location of the resource. The correct answer is
"Uniform Resource Locator" because it accurately defines what a URL
is.
Rate this question:
69
4.
Which of these is a free operating system?
A.
Ubuntu
B.
Windows 7
C.
Windows Xp
D.
Mac OSX
Correct Answer
A. Ubuntu
Explanation
Ubuntu is a free operating system because it is an open source
software, meaning that its source code is freely available for anyone to
view, modify, and distribute. This allows users to use Ubuntu without
any cost and also gives them the freedom to customize and adapt the
operating system to their needs. Unlike Windows 7, Windows XP, and
Mac OSX, which are proprietary operating systems, Ubuntu is free to
use and promotes the principles of open-source software.
Rate this question:
58
5.
What is RAM?
A.
B.
Random Memory
C.
Run Memory
o
D.
Correct Answer
A. Random Access Memory
Explanation
RAM, also known as Random Access Memory, is a type of computer
memory that allows data to be read from and written to in any order,
regardless of the physical location of the data. It is a volatile memory,
meaning that its contents are lost when the power is turned off. RAM is
an essential component of a computer system as it provides temporary
storage for data and instructions that are actively being used by the
CPU. It allows for fast access to data, enabling efficient multitasking and
overall system performance.
Rate this question:
41
6.
Which of these is a type of RAM/DRAM?
A.
DDR3
B.
DDR79-9-8
o
C.
DRR3-PC2700
D.
Correct Answer
A. DDR3
Explanation
DDR3 (Double Data Rate 3) is a type of RAM (Random Access
Memory) or DRAM (Dynamic Random Access Memory). It is a common
type of memory used in computers and other electronic devices. The
other options, "DDR79-9-8" and "DRR3-PC2700," do not represent valid
types of RAM. DDR3 is known for its faster data transfer rates
compared to its predecessors, DDR2 and DDR. It is often used in older
computers and laptops due to its affordability and compatibility with
older hardware.
Rate this question:
47
7.
What is a Universal Serial Bus?
A.
B.
SATA Port
C.
HDMI Port
D.
Correct Answer
A. A connection interface for computers and devices
Explanation
A Universal Serial Bus (USB) is a standardized technology for
connecting various devices to a computer. It defines the cables,
connectors, and communication protocols used to transfer data and
provide power. USB has become the most common method for
connecting peripherals like keyboards, mice, printers, and external
drives.
Rate this question:
44
8.
What would you use this cable for?
A.
B.
C.
D.
Correct Answer
A. Connecting a computer to a monitor
Explanation
A VGA (Video Graphics Array) cable is specifically designed to transmit
analog video signals. It's that cable with the 15-pin connector, often
blue, that you used to see connecting computers to monitors. While
newer digital interfaces like HDMI and DisplayPort are more common
now, VGA was the standard for many years. It's important to note that
VGA only carries video signals, not audio or data. So, it can't be used
for internet connections, which require Ethernet cables, or for
connecting USB flash drives, which have their own dedicated ports.
Rate this question:
38
9.
Examples of peripheral devices are
A.
Monitor
B.
Keyboard
C.
Mouse
D.
Explanation
The correct answer is "All of the above" because all the mentioned
options, including the monitor, keyboard, and mouse, are examples of
peripheral devices. Peripheral devices are external hardware
components that connect to a computer and provide input/output
capabilities, enhancing the functionality of the computer system. These
devices are not essential for the basic operation of the computer but are
used to perform specific tasks and interact with the user.
Rate this question:
40
10.
What would you use a USB Flash Drive for?
A.
Saving Files
B.
Creating Music
C.
Format system
o
D.
Listening music
Correct Answer
A. Saving Files
Explanation
A USB flash drive is a portable storage device that can be used to save
files. It allows users to transfer and store data, such as documents,
photos, videos, and more. Unlike traditional storage options, like hard
drives or CDs, a USB flash drive is small, lightweight, and easy to carry
around. It provides a convenient way to backup important files, transfer
data between devices, and access files on the go. Therefore, using a
USB flash drive for saving files is a practical and common application.
Rate this question:
36
11.
What part of the computer system can one physically
touch?
A.
Software
B.
Hardware
C.
OS
D.
Programs
Correct Answer
B. Hardware
Explanation
Hardware refers to the physical components of a computer system that
can be touched, such as the monitor, keyboard, mouse, and CPU.
Software, on the other hand, refers to the programs and applications
that run on the hardware. The OS (Operating System) is a type of
software that manages the computer's hardware and software
resources. While programs are also a type of software that perform
specific tasks. Therefore, out of the given options, only hardware can be
physically touched.
Rate this question:
27
12.
What are IC chips most commonly made of?
o
A.
Silicon
B.
Chromium
C.
Lead
D.
Gold
Correct Answer
A. Silicon
Explanation
IC chips, also known as integrated circuits, are made of silicon. Silicon
is a semiconductor material that is widely used in the electronics
industry due to its ability to conduct electricity under certain conditions.
It is a crucial component in the manufacturing of IC chips as it allows for
the miniaturization and integration of various electronic components
onto a single chip. Silicon's properties, such as its high melting point,
low electrical resistance, and ability to handle high temperatures, make
it an ideal material for IC chip production.
Rate this question:
24
13.
Which is not an Operating System?
A.
Microsoft Office XP
B.
C.
BSD Unix
D.
Windows 98
Correct Answer
A. Microsoft Office XP
Explanation
Microsoft Office XP is not an operating system. It is a suite of
productivity applications developed by Microsoft. Operating systems, on
the other hand, are software that manage computer hardware and
software resources and provide services for computer programs.
Examples of operating systems include Red Hat Linux, BSD Unix, and
Windows 98.
Rate this question:
23
14.
1 GB is equal to how many MB?
A.
1024 MB
B.
1028 MB
C.
256 MB
D.
1012 MB
Correct Answer
A. 1024 MB
Explanation
1 GB (gigabyte) is equal to 1024 MB (megabytes). In computing, data
storage is commonly measured in binary units, where each unit is a
power of 2. A gigabyte is defined as 210 megabytes, which equals 1024
megabytes. This binary measurement system is based on the binary
numeral system used by computers, where each increase in unit size
represents an exponential increase in the amount of data storage.
Understanding these conversions is essential for managing and
understanding data storage capacities in computers and other digital
devices.
Rate this question:
32
15.
What is an example of non-volatile memory?
A.
ROM
B.
RAM
o
C.
Cache Memory
D.
Correct Answer
A. ROM
Explanation
ROM (Read-Only Memory) is an example of non-volatile memory. Non-
volatile memory retains its data even when the power is turned off,
making it ideal for storing firmware and important system instructions
that must persist across reboots. RAM (Random Access Memory) and
Cache Memory, on the other hand, are volatile types of memory, which
means they lose their data when the power is turned off. ROM is used in
various applications within a computer, such as storing the BIOS, which
is essential for booting up the system and performing initial hardware
checks and configurations. Understanding the difference between
volatile and non-volatile memory is crucial for comprehending how
computer systems manage and retain data.
B. 1024
B. 1048
B. Drinks
C. Books
Click to see the correct answer
B. Information Technology
C. Internet Technology
Click to see the correct answer
4. Which of the following is the first high level
programming language created in the 1950s?
A. FORTRAN
B. C++
C. COBOL
Click to see the correct answer
B. Microsoft Office XP
C. Windows Vista
Click to see the correct answer
B. An audio file
C. A movie file
Click to see the correct answer
B. Bing
C. Archie
Click to see the correct answer
B. CPU
C. Chip
Click to see the correct answer
9. Opera and Safari are types of what?
A. Web browser
B. Anti-virus software
C. Operating system
Click to see the correct answer
B. Silicon Valley
C. Disruptive Valley
Click to see the correct answer
B. Alan Turing
C. Charles Babbage
Click to see the correct answer
B. A waterwall
C. A metalwall
Click to see the correct answer
B. Bytecoin
C. Ripple
Click to see the correct answer
14. Which animal is the official mascot of the Linux
operating system?
A. Rabbit
B. Dog
C. Penguin
Click to see the correct answer
B. Nokia
C. Apple
Click to see the correct answer
B. Virtual address
C. Online address
Click to see the correct answer
B. Write only
B. 140
C. 400
Click to see the correct answer
B. Extranet
C. Internet
Click to see the correct answer
C. Germany
Click to see the correct answer
22. You can press the “Ctrl” key plus which alphabet
letter for the “Paste” command on the computer?
A. P
B. V
C. C
Click to see the correct answer
B. Bluetooth
C. 3G
Click to see the correct answer
24. Which technical term is often used for data centres
available over the Internet to many users?
A. Sun computing
B. Sky computing
C. Cloud computing
Click to see the correct answer
B. Czech
C. Polish
Click to see the correct answer
B. TSMC (Taiwan)
C. Samsung (South Korea)
Click to see the correct answer
B. Siri by Apple
B. Google
B. Male
C. Unisex
Click to see the correct answer
B. Happy Birthday
B. MySpace
C. Six Degrees
Click to see the correct answer
B. Senior surfers
C. White surfers
Click to see the correct answer
B. Viral
C. Creeper
Click to see the correct answer
B. Bus
C. Break
These trivia IT quiz questions and answers are not simple. We hope you can learn a few
interesting facts and useful knowledge. For more challenges, check out the following data
mining quiz.
1.
What does BIOS stand for?
A.
B.
Basic Input Output System
C.
D.
Correct Answer
B. Basic Input Output System
Explanation
BIOS stands for Basic Input Output System. It is a firmware that
is embedded on a computer's motherboard. BIOS provides the
necessary instructions for the computer to start up and
initialize the hardware components. It also performs various
tasks such as controlling the boot process, managing system
configuration settings, and providing a platform for the
operating system to communicate with the hardware.
Rate this question:
4
2.
What is the protocol used for the majority of
network/internet traffic?
o
A.
TCP/IP
B.
IPX/SPX
C.
OSX
D.
64-Bit
Correct Answer
A. TCP/IP
Explanation
TCP/IP is the correct answer because it is the most widely used
protocol for network and internet traffic. TCP/IP stands for
Transmission Control Protocol/Internet Protocol and it is a suite
of protocols that allows for reliable and secure communication
between devices on a network. It provides the rules and
procedures for breaking data into packets, addressing, routing,
and reassembling at the destination. TCP/IP is used by the
majority of devices and applications on the internet, making it
the standard protocol for network communication.
Rate this question:
5
3.
What is the most popular wired network topology?
A.
Bus
B.
Star
C.
Mesh
D.
Ring
Correct Answer
B. Star
Explanation
The most popular wired network topology is the star topology.
In a star topology, all devices are connected to a central hub or
switch, forming a star-like structure. This topology offers
several advantages such as easy troubleshooting, scalability,
and high reliability. Each device has its own dedicated
connection to the central hub, which allows for independent
communication and reduces the chances of network failure.
Additionally, the star topology allows for easy addition or
removal of devices without disrupting the entire network.
Rate this question:
6
4.
What registered jack is used to terminate the standard
network patch cable?
A.
RJ-99
B.
RJ-2
C.
RJ-11
o
D.
RJ-45
Correct Answer
D. RJ-45
Explanation
The correct answer is RJ-45. RJ-45 is the registered jack that is
commonly used to terminate the standard network patch
cable. It has 8 pins and is widely used for Ethernet
connections. RJ-99 and RJ-2 are not commonly used registered
jacks, while RJ-11 is used for telephone connections.
Rate this question:
5
5.
In a simple home wired network what device would
you use to provide more
unmanaged/routed Ethernet ports?
A.
Switch
B.
Hub
o
C.
Router
D.
KVM
Correct Answer
A. Switch
Explanation
A switch is the correct answer because it is a device used to
connect multiple devices in a network, allowing them to
communicate with each other. It provides more Ethernet ports,
which can be used to connect additional devices to the
network. Unlike a hub, a switch can intelligently direct network
traffic to the appropriate device, improving efficiency and
performance. A router, on the other hand, is used to connect
multiple networks together and manage the flow of data
between them. A KVM (Keyboard, Video, Mouse) is a device
used to control multiple computers using a single set of
peripherals.
Rate this question:
7
6.
Which file extension is an image file?
o
A.
MPG
B.
JPG
C.
MA4
D.
MOV
Correct Answer
B. JPG
Explanation
JPG is the correct answer because it is a commonly used file
extension for image files. JPG stands for Joint Photographic
Experts Group, which is the organization that developed the
file format. JPG files use a lossy compression method to reduce
file size while maintaining a good level of image quality. They
are widely supported by various devices and software
applications, making them a popular choice for storing and
sharing digital images.
Rate this question:
7
7.
What is a Codec most commonly used for?
A.
Decoding Passwords
B.
C.
Encrypting Data
D.
Correct Answer
B. Decoding Audio/Video Stream
Explanation
A codec is a technology used to compress and decompress
audio and video data. It is commonly used for decoding
audio/video streams. Codecs enable efficient transmission and
storage of multimedia content by reducing the file size without
significantly compromising the quality. By decoding the
compressed data, codecs allow the audio and video content to
be played or viewed on various devices and platforms.
Rate this question:
8
8.
Can 32-bit programs run on a 64-bit version of
Windows 7?
A.
Yes
B.
No
Correct Answer
A. Yes
Explanation
32-bit programs can run on a 64-bit version of Windows 7
because Windows 7 64-bit includes a compatibility layer called
Windows on Windows 64 (WoW64) that allows 32-bit programs
to run seamlessly. This compatibility layer enables the
operating system to run 32-bit applications by redirecting the
necessary system files and resources. Therefore, users can run
their existing 32-bit programs on a 64-bit version of Windows 7
without any issues.
Rate this question:
5
9.
RDP stands for?
A.
B.
C.
D.
Explanation
RDP stands for Remote Desktop Protocol. This is a network
protocol that allows users to remotely access and control a
computer or virtual machine over a network connection. It
enables users to connect to a remote computer and use its
resources as if they were sitting in front of it. RDP is commonly
used for remote administration, technical support, and
accessing files and applications on remote computers.
Rate this question:
8
10.
Is a BSOD a hardware or software problem?
A.
Hardware
B.
Software
C.
Mostly Hardware
o
D.
Mostly Software
E.
Correct Answer
E. Either Is Equally Possible
Explanation
The answer "Either Is Equally Possible" is correct because a
BSOD (Blue Screen of Death) can be caused by both hardware
and software issues. Hardware problems such as faulty RAM,
overheating, or incompatible hardware drivers can trigger a
BSOD. Similarly, software issues like incompatible or corrupted
software, driver conflicts, or malware can also lead to a BSOD.
Therefore, it is not possible to determine whether a BSOD is
solely a hardware or software problem without further
investigation.
Rate this question:
3
11.
What tool do you use to analyze BSOD crashes?
A.
None Reinstall Windows
B.
Windbg
C.
D.
Norton
Correct Answer
B. Windbg
Explanation
Windbg is the correct answer because it is a powerful
debugging tool provided by Microsoft that is specifically
designed for analyzing Blue Screen of Death (BSOD) crashes. It
allows users to examine crash dump files and provides detailed
information about the cause of the crash, including the stack
trace, memory contents, and register values. Windbg is widely
used by developers and system administrators to troubleshoot
and diagnose BSOD errors.
Rate this question:
7
12.
In the field of cybersecurity, what does the term
"phishing" specifically refer to?
A.
B.
Correct Answer
A. The practice of sending emails that appear to be from
reputable sources with the goal of gaining personal
information.
Explanation
Phishing is a type of social engineering attack often used to
steal user data, including login credentials and credit card
numbers. It occurs when an attacker, masquerading as a
trusted entity, dupes a victim into opening an email, instant
message, or text message. The recipient is then tricked into
clicking a malicious link, which can lead to the installation of
malware, the freezing of the system as part of a ransomware
attack, or the revealing of sensitive information. This method is
distinct from other attacks like denial-of-service attacks or
vulnerability scanning, making it a unique and common threat
in the field of cybersecurity.
Rate this question:
20
13.
What file is a Word 2007 or newer document?
A.
.xls
B.
.doc
C.
.rtf
D.
.dox
o
E.
.docx
Correct Answer
E. .docx
Explanation
A Word 2007 or newer document is typically saved with
the .docx file extension. This file format was introduced in
Word 2007 and is used to store documents created in newer
versions of Microsoft Word. The .docx format allows for more
advanced features and improved compatibility with other
software applications. Therefore, the correct answer is .docx.
Rate this question:
9
14.
If you wanted to add a user to a Domain where would
you add them?
A.
Domain List
B.
Registry
o
C.
Active Directory
D.
Directory
Correct Answer
C. Active Directory
Explanation
The correct answer is Active Directory because Active
Directory is a centralized database that stores and manages
information about network resources, including user accounts.
It provides a way to organize and manage users, computers,
and other network objects within a domain. By adding a user to
the Active Directory, they will be granted access to the
resources and services available within the domain.
Rate this question:
2
15.
If you can get to a website via direct IP but are unable
to via web url what is most likely the problem?
A.
Website is down
o
B.
C.
DNS problem
D.
Correct Answer
C. DNS problem
Explanation
If you are able to access a website using its direct IP address
but not through its web URL, the most likely problem is a DNS
(Domain Name System) issue. DNS is responsible for
translating human-readable domain names into IP addresses
that computers can understand. If the DNS is not functioning
properly, it may not be able to resolve the web URL to the
correct IP address, resulting in the inability to access the
website through the URL.
Rate this question:
3
16.
What would you use to connect 2 sites to each other
so they can access files/printers as if they were in the
local building/location?
A.
VPN
B.
Tracert
C.
Ping
D.
CMD
Correct Answer
A. VPN
Explanation
A VPN, or Virtual Private Network, is used to securely connect
two sites together over the internet. It creates a private
network connection between the two sites, allowing them to
access files and printers as if they were in the same local
building or location. This is done by encrypting the data that is
transmitted between the two sites, ensuring that it remains
secure and private. VPNs are commonly used by businesses to
connect remote offices or enable remote workers to access
resources on the company's network.
Rate this question:
7
17.
What is SMART?
A.
Winning Jeopardy
B.
C.
o
D.
Nothing
Correct Answer
B. A hard drive diagnosis built into the drive
Explanation
The correct answer is "A hard drive diagnosis built into the
drive." SMART stands for Self-Monitoring, Analysis, and
Reporting Technology. It is a system built into hard drives that
monitors various attributes of the drive's performance and
health. It can detect potential issues or failures before they
occur, allowing users to take preventative measures such as
backing up data or replacing the drive.
Rate this question:
5
18.
What Does RAID Stand for?
A.
B.
o
C.
D.
Correct Answer
B. Redundant Array of Inexpensive Disks
Explanation
RAID stands for Redundant Array of Inexpensive Disks. This
technology combines multiple physical disk drives into a single
logical unit to improve performance, reliability, and capacity.
By using redundancy, RAID allows for data to be stored across
multiple disks, providing fault tolerance in case of a disk
failure. The term "inexpensive" refers to the fact that RAID can
be implemented using relatively low-cost disk drives, making it
a cost-effective solution for data storage.
Rate this question:
9
19.
Is Windows 7 A whole new OS?
A.
Yes
o
B.
No
Correct Answer
B. No
Explanation
No, Windows 7 is not considered a "whole new OS" in the sense
that it was a completely unique invention separate from all
previous operating systems. It was an evolution of its
predecessor, Windows Vista, introducing improvements in
performance, user interface, and security. However, it brought
significant enhancements that made it stand out and be well-
received compared to Vista.
Rate this question:
4
20.
4u is an indication of how _________________
A.
B.
C.
D.
Nothing
Correct Answer
A. Tall a server is in a rack
Explanation
The term "4u" is an indication of how tall a server is in a rack.
The "u" stands for "unit" and is a standard measurement used
to determine the height of rack-mounted equipment. In this
case, "4u" indicates that the server takes up four units of
space in the rack.
Rate this question:
7
21.
SAS stands for
A.
B.
C.
D.
Correct Answer
C. Serial Attached Storage
Explanation
SAS stands for Serial Attached Storage. This term refers to a
computer bus technology that is used to transfer data between
computer systems and storage devices, such as hard drives or
solid-state drives. It provides a high-speed, point-to-point
connection that allows for fast data transfer rates and
increased reliability. The other options, Special Array Storage,
Secret Area Storage, and Super Access Speeds, do not
accurately represent the acronym SAS in the context of
computer storage technology.
Rate this question:
2
22.
SAS Drives are usually found in what type of systems?
A.
Desktops
B.
Notebooks
C.
Netbooks
D.
Servers
E.
Gaming systems
Correct Answer
D. Servers
Explanation
SAS drives are usually found in servers because they are
designed to handle heavy workloads and provide high
performance and reliability. Servers require fast and efficient
storage systems to handle large amounts of data and support
multiple users simultaneously. SAS drives offer faster data
transfer rates, higher capacities, and better error correction
capabilities compared to other types of drives. Therefore, they
are the preferred choice for server environments where data
accessibility and reliability are crucial.
Rate this question:
5
23.
What technology is primarily used to create
decentralized applications that run on a blockchain?
A.
Artificial Intelligence
B.
Virtual Reality
o
C.
Smart Contracts
D.
Quantum Computing
Correct Answer
C. Smart Contracts
Explanation
Smart contracts are self-executing contracts with the terms of
the agreement directly written into lines of code. They are a
fundamental technology used in the development of
decentralized applications (dApps) on blockchain platforms like
Ethereum. Smart contracts automatically execute, control, or
document legally relevant events and actions according to the
terms of a contract or an agreement. This technology enables
decentralized apps to run precisely as programmed without
any downtime, fraud, or interference from third parties, which
is why it is pivotal in the blockchain ecosystem.
Rate this question:
4
24.
Which of the following is NOT a core component of a
typical IT infrastructure?
A.
Hardware
B.
Software
C.
Data
D.
Marketing
Correct Answer
D. Marketing
Explanation
While marketing is essential for many organizations, it's not
considered a core component of the IT infrastructure itself. IT
infrastructure primarily focuses on the technological foundation
that supports an organization's operations. This includes the
hardware (physical components like servers and computers),
software (applications and operating systems), and data
(information stored and processed).
Ques. Which of the following is not a programming language?
a) Python
b) Java
c) HTML
d) SQL
Answer: c) HTML
a) Microsoft Word
b) Linux
c) Google Chrome
d) Adobe Photoshop
Answer: b) Linux
a) Google
b) Bing
c) Firefox
d) Yahoo
Answer: c) Firefox
Explanation: Firefox is a web browser, while Google, Bing, and Yahoo are
search engines.
a) Apple
b) Microsoft
c) IBM
d) Google
Answer: b) Microsoft
a) Monitor
b) Keyboard
c) Hard Drive
d) Mouse
a) Dropbox
b) SSD
Answer: a) Dropbox
Explanation: HTTP is the protocol used for transmitting web pages over the
internet.
a) Printer
b) Monitor
c) Keyboard
d) Speaker
Answer: c) Keyboard
a) Python
b) JavaScript
c) C++
d) Assembly
Answer: b) JavaScript
a) Apple
b) Microsoft
c) Google
d) IBM
Answer: c) Google
c) A type of malware
d) A network protocol
a) Windows
b) macOS
c) Linux
d) Oracle
Answer: d) Oracle
a) Python
b) Swift
c) Java
d) C#
Answer: c) Java
a) To store data
b) To process data
a) Virus
b) Excel
c) Firefox
d) Android
Answer: a) Virus
a) Microsoft Excel
b) Microsoft Access
c) Adobe Photoshop
d) Mozilla Firefox
a) MySQL
b) PostgreSQL
c) MongoDB
d) Oracle
Answer: c) MongoDB
a) C
b) Python
c) Java
d) COBOL
Answer: a) C
a) Star
b) Bus
c) Ring
d) Node
Answer: d) Node
a) Internet Protocol
b) Internet Process
c) Internet Program
d) Internet Port
a) Microsoft Office
b) Adobe Photoshop
c) Linux
d) iOS
Answer: c) Linux
c) To design websites
d) To create databases
a) Functions
d) Conditions
a) Git
b) HTML
c) Java
d) CSS
Answer: a) Git
a) C++
b) Java
c) Python
d) Assembly
Answer: c) Python
a) .docx
b) .zip
c) .exe
d) .html
Answer: b) .zip
Explanation: The .zip format is used for compressing files, reducing their
size for storage or transmission.
b) Creating databases
c) Writing HTML code
d) Installing software
a) FTP
b) HTTP
c) SMTP
d) SNMP
Answer: c) SMTP
a) Assembly
b) Python
c) Machine Language
d) Binary
Answer: b) Python
d) To organize files
a) MongoDB
b) Cassandra
c) MySQL
d) Hadoop
Answer: c) MySQL
a) NTFS
b) EXT4
c) FAT32
d) HFS+
Answer: a) NTFS
a) TCP
b) IP
c) FTP
d) HTTP
Answer: c) FTP
Explanation: FTP (File Transfer Protocol) is used for transferring files, while
TCP, IP, and HTTP are protocols that govern how data is transmitted over the
internet.
a) C++
b) JavaScript
c) Java
d) SQL
Answer: b) JavaScript
a) IP address
b) Domain name
c) URL
d) Email address
Answer: a) IP address
a) Internet of Things
b) Internet of Technology
c) Interconnected Objects Technology
d) Internet of Tomorrow
a) Queue
b) Stack
c) Array
d) Linked List
Answer: b) Stack
7. 1 KB =?
Answer: 1024 Byte.
8. 1 GB = how many MB?
Answer: 1024 MB.
70. Which are the main parts of the central processing unit?
Answer: Control unit (CU) and Arithmetic logic unit (ALU).
Here are 50 common MS Word shortcut keys that can help improve your
productivity while using the software:
58. Q :
59. Highest capacity of the storage are -
60. (A) Terabyte
61. (B) Yottabyte
62. (C) Zettabyte
63. (D) Exabyte
64. Hide Answer
65.
Correct Answer : B
66. Q :
67. 1 Kilobyte is equal to -
68. (A) 8000 Bits
69. (B) 1024 Bits
70. (C) 512 Bits
71. (D) None of the above
72. Hide Answer
73.
Correct Answer : A
74. Q :
75. Multimedia contains?
76. (A) Audio
77. (B) Video
78. (C) Both 1 and 2
79. (D) none of the above
80. Hide Answer
81.
Correct Answer : C
82. Q :
83. Which key of the keyboard is mainly used to cancel the
program?
84. (A) Del Key
85. (B) Enter Key
86. (C) Ins Key
87. (D) Esc Key
88. Hide Answer
89.
Correct Answer : D
90. Q :
91. A translator for the assembly language to machine language is
92. (A) Assembler
93. (B) Compiler
94. (C) Linker
95. (D) Interpreter
96. Hide Answer
97.
Correct Answer : A
98. Q :
99. Computer language FORTRAN is useful in which field?
100. (A) business
101. (B) Drawing
102. (C) Science
103. (D) Commerce
104. Hide Answer
105.
Correct Answer : C
Explanation :
116. Q:
117. The performance of a hard drive or other storage devices,
meaning how long it takes to locate a file is called?
118. (A) Access Time
119. (B) Quick Time
120. (C) Response Time
121. (D) None of these
122. Hide Answer
123.
Correct Answer : A
124. Q:
125. Which of the following is not a type OS bus?
126. (A) Control bus
127. (B) Software bus
128. (C) Data bus
129. (D) Address bus
130. Hide Answer
Correct Answer : B
Q:
What is the function of a MODEM?
Correct Answer : A
Q:
What is the full form of OMR?
Hide Answer
Correct Answer : B
Q:
Which of the following is 3rd layer of OSI Model?
Hide Answer
Correct Answer : A
Q:
Which command allows you to reduce fragments of file and optimize
the performance of disk?
(A) Chkdsk
(B) Diskcomp
(C) Scandisk
(D) Defrag
Hide Answer
Correct Answer : D
Q:
In which of these memory access schemes, separate Read / Write
heads are required?
Hide Answer
Correct Answer : D
Q:
_____are the fastest and the most expensive computers.
(B) Laptop
Hide Answer
Correct Answer : A
Q:
CDMA stands for _____________.
Hide Answer
Correct Answer : C
Q:
In which is the clock speed of the computer calculated?
(A) Bit
(B) Megabyte
(C) Gigabyte
Hide Answer
Correct Answer : A
Q:
Using what were the first computers programmed?
Hide Answer
Correct Answer : A
Q:
When was the development of BASIC computer language?
(A) 1955
(B) 1968
(C) 1964
(D) 1975
Hide Answer
Correct Answer : C
Q:
Which method is used to connect a remote computer?
(A) Device
(B) Dialup
(C) Diagnostic
Hide Answer
Correct Answer : B
Q:
ROM is an example of which of the following?
Hide Answer
Correct Answer : C
Q:
To correct error in a program:
(A) Debugging
(C) bugging
(D) Delete
(E) Coding
Hide Answer
Correct Answer : A
Q:
Writing set of instruction to run a software
(A) Coding
(B) Buffering
(C) Decoding
(D) Amplifying
(E) Debugging
Hide Answer
Correct Answer : A
Q:
Bridge works in _________ of the OSI model.
Hide Answer
Correct Answer : D
Q:
‘SIM’ stands for _________ .
Hide Answer
Correct Answer : A
Q:
Which of the following is an examples of Word processing
spreadsheet and photo-editing?
(A) System software
Hide Answer
Correct Answer : C
Q:
Red triangle at the top right corner of a cell indicates that _________ .
Hide Answer
Correct Answer : E
Q:
_________ is a popular DOS based package.
(D) Paint
(E) None of these
Hide Answer
Correct Answer : B
Q:
C Programming language was developed by ___________.
Hide Answer
Correct Answer : D
Q:
Which of the following is a scientific computing language?
(A) COBOL
(B) Basic
(C) Pascal
(D) FORTRAN
Hide Answer
Correct Answer : D
Q:
What is the high-level computer language similar to the English
language?
(A) C++
(B) COBOL
(C) Pascal
(D) FORTRAN
Hide Answer
Correct Answer : B
Q:
Which language is applicable to all computers?
Hide Answer
Correct Answer : C
Q:
What is the operating system called Unix specially used for?
Hide Answer
Correct Answer : D
Q:
Which of the following is a machine-independent program?
Hide Answer
Correct Answer : B
Q:
What does machine language use?
Hide Answer
Correct Answer : B
Q:
Which of the following is the largest unit of storage?
(A) KB
(B) TB
(C) MB
(D) GB
Hide Answer
Correct Answer : B
Q:
How many options are there in one byte?
(A) 64
(B) 16
(C) 8
(D) 512
Hide Answer
Correct Answer : C
Q:
How many bytes makeup one kilobyte?
(A) 4096
(B) 1024
(C) 612
Hide Answer
Correct Answer : B
Q:
What is the method of storing letters and symbols in bytes called?
Hide Answer
Correct Answer : D
Q:
Which of the following is a scientific computing language?
(A) COBOL
(B) Basic
(C) Pascal
(D) FORTRAN
Hide Answer
Correct Answer : D
Q:
What is the high-level computer language similar to the English
language?
(A) C++
(B) COBOL
(C) Pascal
(D) FORTRAN
Hide Answer
Correct Answer : B
Q:
Which language is applicable to all computers?
Hide Answer
Correct Answer : C
Q:
What is the operating system called Unix specially used for?
Hide Answer
Correct Answer : D
Q:
Which of the following is a machine-independent program?
Hide Answer
Correct Answer : B
Q:
What does machine language use?
Hide Answer
Correct Answer : B
Q:
Which of the following is the largest unit of storage?
(A) KB
(B) TB
(C) MB
(D) GB
Hide Answer
Correct Answer : B
Q:
How many options are there in one byte?
(A) 64
(B) 16
(C) 8
(D) 512
Hide Answer
Correct Answer : C
Q:
How many bytes makeup one kilobyte?
(A) 4096
(B) 1024
(C) 612
Hide Answer
Correct Answer : B
Q:
What is the method of storing letters and symbols in bytes called?
Hide Answer
Correct Answer : D
Q:
What is Logic Gate?
(A) Special CD
(B) Software
Hide Answer
Correct Answer : C
Q:
Which one is the program which makes the computer easy to use?
(A) Application
(C) Network
(D) Utility
Hide Answer
Correct Answer : D
Q:
Who is the exponent of software technology?
(A) A. A. lumsden
(B) B. F. skinner
(C) Brunner
(D) Ausubel
Hide Answer
Correct Answer : B
Q:
Which of the following is the full form of MOOC?
Hide Answer
Correct Answer : B
Explanation :
1. Massive Open Online Courses (MOOC) are changing the world of education
by providing free online courses.
3. It offers free online courses for higher education, executive education and
employee development.
Q:
The Indian medium for 'Massive Open Online Courses' is-
(A) self
(B) blackboard
(C) Moodle
(D) Edex
Hide Answer
Correct Answer : A
Q:
The father of soft approach to educational technology was-
(A) Lumsden
(B) Morrison
(C) Bloom
Hide Answer
Correct Answer : D
Q:
Mainly educational computer is used for -
Hide Answer
Correct Answer : D
Q:
ICT means -
Hide Answer
Correct Answer : C
Q:
Whose invention was the beginning of the information technology
era?
(A) Telephone
(B) Television
(C) Computer
(D) Watch
Hide Answer
Correct Answer : C
Q:
With respect to the basic PC keyboard, the ‘Break’ key is shared
with the ........ key.
(A) insert
(B) pause
(C) home
(D) end
Hide Answer
Correct Answer : B
1. What is a commonly used word processing software?
a) Microsoft Word
b) Adobe Photoshop
c) Google Chrome
d) Microsoft Excel
Answer: a) Microsoft Word