Information technology test - Part 3
Information technology test has answers.
- Question 1. Components: RAM, CPU, input device is?
- Computer hardware
- Software
- Storage device
-
Network equipment and communication
-
- Question 2. The term 'RAM' is the acronym for the phrase?
- Recent Access Memory
- Read Access Memory
- Random Access Memory
- Read And Modify
-
- Question 3. Which of the following utilities can protect your computer from virus attacks?
- Antivirus Software - Antivirus software
- Disk Compression - Disk compression
- Disk Defragmemtation- Defragment the drive
- Disk - Check the drive
-
- Question 4. CPU is an acronym for
- Center Progress of Universal
- Central Processing Unit
- Control Processing Unit
- Control Protocol Uniform
-
- Question 5. Which of the following statements is incorrect about the central processor (CPU)?
- Is the computer box, including arithmetic - logic and memory
- Can calculate and control the running of the program
- Is the central device of the computer
- Very fast working speed
-
- Question 6. The electronic and mechanical devices of computers are called:
- Software
- Hardware
- Data
- Resource
-
- Question 7. Computer hardware includes:
- Devices that import and export data
- Parts contained in the computer case
- Complete electronic and mechanical devices that make up the computer
- Programs run on the computer
-
- Question 8. Which of the following memory is read-only memory and which information is written by the manufacturer?
- RAM
- ROM
- Hard disk
- Memory Stick
-
- Question 9. What is computer hardware?
- The physical construction of the computer
- The structure of the software is logical
- The structure of the software is physically
- Biological computer construction
-
- Question 10. To avoid unauthorized access to information, what do people usually do?
- Install antivirus software
- Disconnect power
- Limit access to users with access names and passwords
- All 3 are right
-
- Question 11. In the following devices, which device is a portable mobile device?
- Mobile phones, tablets
- Laptops, personal computers
- Mobile phones, Personal computers
- Mobile phone, TV
-
- Question 12. In Vietnam's Law on Information Security and Safety, how many levels of information system security are available:
- 4
- 5
- 6
- 7
-
- Question 13. Computers in the computer network:
- Only receive and process information sent by other machines
- Only receive information for other machines
- Receive and send information to each other
- A and B are correct
-
- Question 14. Where is an example of a good password policy?
- Choose a password with less than 6 letters
- Password must be the same as user history (date of birth)
- Never give your password to others
- Only change the password after a long time
-
- Question 15. Input device to provide data for computer processing, the most commonly used input device is
- Keyboard, live camera, mouse, photo scanner (scaner)
- Mic speaker, monitor, keyboard
- Scanner (scaner), tablet
- Projectors, tablets, smartphones.
-
5 ★ | 1 Vote
You should read it
- Your understanding of information technology - Part 2
- Information technology test P5
- Testing about P2 system maintenance
- Test on maintenance of P3 system
- Information technology testing - Part 4
- Testing of system maintenance
- Test on system maintenance P1
- What you need to know about an information security analyst
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network security implementation have P2 answers
- Information security test?
- Test of knowledge about Security
Maybe you are interested
Learn about Phind: The app that answers questions about coding with the power of AI
24 basic level C++ programming interview questions and answers
20 intermediate level C++ programming interview questions and answers
15 expert-level C++ programming interview questions and answers
Answering questions about the reasons for using a keyboard wrist rest
How to add branches or nested questions in Google Forms