Information technology test - Part 3

Information technology test has answers.

  1. Question 1. Components: RAM, CPU, input device is?
    1. Computer hardware
    2. Software
    3. Storage device
    4. Network equipment and communication

  2. Question 2. The term 'RAM' is the acronym for the phrase?
    1. Recent Access Memory
    2. Read Access Memory
    3. Random Access Memory
    4. Read And Modify
  3. Question 3. Which of the following utilities can protect your computer from virus attacks?
    1. Antivirus Software - Antivirus software
    2. Disk Compression - Disk compression
    3. Disk Defragmemtation- Defragment the drive
    4. Disk - Check the drive
  4. Question 4. CPU is an acronym for
    1. Center Progress of Universal
    2. Central Processing Unit
    3. Control Processing Unit
    4. Control Protocol Uniform
  5. Question 5. Which of the following statements is incorrect about the central processor (CPU)?
    1. Is the computer box, including arithmetic - logic and memory
    2. Can calculate and control the running of the program
    3. Is the central device of the computer
    4. Very fast working speed
  6. Question 6. The electronic and mechanical devices of computers are called:
    1. Software
    2. Hardware
    3. Data
    4. Resource
  7. Question 7. Computer hardware includes:
    1. Devices that import and export data
    2. Parts contained in the computer case
    3. Complete electronic and mechanical devices that make up the computer
    4. Programs run on the computer
  8. Question 8. Which of the following memory is read-only memory and which information is written by the manufacturer?
    1. RAM
    2. ROM
    3. Hard disk
    4. Memory Stick
  9. Question 9. What is computer hardware?
    1. The physical construction of the computer
    2. The structure of the software is logical
    3. The structure of the software is physically
    4. Biological computer construction
  10. Question 10. To avoid unauthorized access to information, what do people usually do?
    1. Install antivirus software
    2. Disconnect power
    3. Limit access to users with access names and passwords
    4. All 3 are right
  11. Question 11. In the following devices, which device is a portable mobile device?
    1. Mobile phones, tablets
    2. Laptops, personal computers
    3. Mobile phones, Personal computers
    4. Mobile phone, TV
  12. Question 12. In Vietnam's Law on Information Security and Safety, how many levels of information system security are available:
    1. 4
    2. 5
    3. 6
    4. 7
  13. Question 13. Computers in the computer network:
    1. Only receive and process information sent by other machines
    2. Only receive information for other machines
    3. Receive and send information to each other
    4. A and B are correct
  14. Question 14. Where is an example of a good password policy?
    1. Choose a password with less than 6 letters
    2. Password must be the same as user history (date of birth)
    3. Never give your password to others
    4. Only change the password after a long time
  15. Question 15. Input device to provide data for computer processing, the most commonly used input device is
    1. Keyboard, live camera, mouse, photo scanner (scaner)
    2. Mic speaker, monitor, keyboard
    3. Scanner (scaner), tablet
    4. Projectors, tablets, smartphones.
Update 24 May 2019
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile