Information technology test - Part 3
Information technology test has answers.
- Question 1. Components: RAM, CPU, input device is?
- Computer hardware
- Software
- Storage device
-
Network equipment and communication
-
- Question 2. The term 'RAM' is the acronym for the phrase?
- Recent Access Memory
- Read Access Memory
- Random Access Memory
- Read And Modify
-
- Question 3. Which of the following utilities can protect your computer from virus attacks?
- Antivirus Software - Antivirus software
- Disk Compression - Disk compression
- Disk Defragmemtation- Defragment the drive
- Disk - Check the drive
-
- Question 4. CPU is an acronym for
- Center Progress of Universal
- Central Processing Unit
- Control Processing Unit
- Control Protocol Uniform
-
- Question 5. Which of the following statements is incorrect about the central processor (CPU)?
- Is the computer box, including arithmetic - logic and memory
- Can calculate and control the running of the program
- Is the central device of the computer
- Very fast working speed
-
- Question 6. The electronic and mechanical devices of computers are called:
- Software
- Hardware
- Data
- Resource
-
- Question 7. Computer hardware includes:
- Devices that import and export data
- Parts contained in the computer case
- Complete electronic and mechanical devices that make up the computer
- Programs run on the computer
-
- Question 8. Which of the following memory is read-only memory and which information is written by the manufacturer?
- RAM
- ROM
- Hard disk
- Memory Stick
-
- Question 9. What is computer hardware?
- The physical construction of the computer
- The structure of the software is logical
- The structure of the software is physically
- Biological computer construction
-
- Question 10. To avoid unauthorized access to information, what do people usually do?
- Install antivirus software
- Disconnect power
- Limit access to users with access names and passwords
- All 3 are right
-
- Question 11. In the following devices, which device is a portable mobile device?
- Mobile phones, tablets
- Laptops, personal computers
- Mobile phones, Personal computers
- Mobile phone, TV
-
- Question 12. In Vietnam's Law on Information Security and Safety, how many levels of information system security are available:
- 4
- 5
- 6
- 7
-
- Question 13. Computers in the computer network:
- Only receive and process information sent by other machines
- Only receive information for other machines
- Receive and send information to each other
- A and B are correct
-
- Question 14. Where is an example of a good password policy?
- Choose a password with less than 6 letters
- Password must be the same as user history (date of birth)
- Never give your password to others
- Only change the password after a long time
-
- Question 15. Input device to provide data for computer processing, the most commonly used input device is
- Keyboard, live camera, mouse, photo scanner (scaner)
- Mic speaker, monitor, keyboard
- Scanner (scaner), tablet
- Projectors, tablets, smartphones.
-
5 ★ | 1 Vote
You should read it
- Your understanding of information technology - Part 2
- Information technology test P5
- Testing about P2 system maintenance
- Test on maintenance of P3 system
- Information technology testing - Part 4
- Testing of system maintenance
- Test on system maintenance P1
- What you need to know about an information security analyst
- Multiple choice questions on network security implementation have P3 answers
- Multiple choice questions about network security implementation have P2 answers
- Information security test?
- Test of knowledge about Security
May be interested
Are you knowledgeable about smartphones?
What do you know about technology king Sundar Pichai
What do you know about software technology?
Are you confident with your Network Administration knowledge?
What do you understand about computer architecture?
What do you understand about Windows operating system?