IT Essentials Chapter Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Kcoates
K
Kcoates
Community Contributor
Quizzes Created: 1 | Total Attempts: 738
Questions: 25 | Attempts: 738

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

IT Essentials, chapter 1 - 9 test.


Questions and Answers
  • 1. 

    Four ROM types are:

    • A.

      ROM, PROM, EPROM, EEPROM

    • B.

      ROM, PROM, EEPROM, EPPROM

    • C.

      RAM, EEPROM, EPROM, ROM

    • D.

      ROM, RAM, EPROM, EPROOM

    Correct Answer
    A. ROM, PROM, EPROM, EEPROM
    Explanation
    The correct answer is ROM, PROM, EPROM, EEPROM. ROM stands for Read-Only Memory, which is a type of memory that can only be read from and not written to. PROM stands for Programmable Read-Only Memory, which can be programmed once to store data permanently. EPROM stands for Erasable Programmable Read-Only Memory, which can be erased and reprogrammed using UV light. EEPROM stands for Electrically Erasable Programmable Read-Only Memory, which can be erased and reprogrammed electronically. These four types of memory differ in terms of their permanence and ability to be reprogrammed.

    Rate this question:

  • 2. 

    Two major CPU architectures are related to instructions sets are ......... and ......... (2 words)

    Correct Answer
    RISC CISC
    Explanation
    The two major CPU architectures related to instruction sets are RISC (Reduced Instruction Set Computing) and CISC (Complex Instruction Set Computing). RISC architecture focuses on simplicity and efficiency by using a smaller set of instructions that can be executed quickly. CISC architecture, on the other hand, emphasizes a larger set of complex instructions that can perform more tasks in a single instruction. Both architectures have their advantages and disadvantages, and their usage depends on specific requirements and applications.

    Rate this question:

  • 3. 

    How many devices can run off one USB port?

    • A.

      27

    • B.

      127

    • C.

      227

    • D.

      128

    • E.

      129

    Correct Answer
    B. 127
    Explanation
    One USB port can support up to 127 devices. This is because USB uses a system called "USB hub" which allows multiple devices to be connected to a single USB port. The USB hub acts as a multiplier, allowing the connection of multiple devices to the port. Therefore, the correct answer is 127.

    Rate this question:

  • 4. 

    Which of the following describes what Fdisk does?

    • A.

      Create and delete operating systems

    • B.

      Prepare HDD prior to use

    • C.

      Check for physical erors on disk surface

    • D.

      Remove unused files

    • E.

      Create and delete disk partitions

    Correct Answer
    E. Create and delete disk partitions
    Explanation
    Fdisk is a utility that allows users to create and delete disk partitions on a hard drive. It is used to divide the hard drive into separate sections, which can then be formatted and used to store data. By creating and deleting disk partitions, users can allocate space for different operating systems or separate data storage areas. Fdisk does not prepare the HDD prior to use, check for physical errors on the disk surface, or remove unused files.

    Rate this question:

  • 5. 

    ......... alcohol and lint free swabs should be used to clean RAM (one word)

    Correct Answer
    Isopropyl
    Explanation
    Isopropyl alcohol is a commonly used solvent for cleaning electronic components, including RAM. It is effective in removing dirt, dust, and other contaminants without leaving any residue. Lint-free swabs are recommended to avoid leaving fibers behind that could potentially damage the RAM. Therefore, isopropyl alcohol and lint-free swabs are the appropriate tools for cleaning RAM.

    Rate this question:

  • 6. 

    The laser printing 6 step process is:

    • A.

      Cleaning, Conditioning, Writing, Dating, Transfering and fusing

    • B.

      Cleaning, Conditioning, Writing, Developing, Transfering and fusing

    • C.

      Cleaning, Conditioning, Writing, Dating, Traction and fusing

    • D.

      Cleaning, Conditioning, Wisdom, Dating, Transfering and fusing

    Correct Answer
    B. Cleaning, Conditioning, Writing, Developing, Transfering and fusing
    Explanation
    The correct answer is "Cleaning, Conditioning, Writing, Developing, Transferring, and Fusing." This answer accurately describes the step-by-step process of laser printing. Cleaning refers to removing any debris or toner residue from the previous print job. Conditioning involves preparing the drum or imaging unit for the next printing cycle. Writing refers to the laser beam creating an electrostatic image on the drum. Developing involves applying toner to the electrostatic image. Transferring refers to transferring the toner from the drum to the paper. Fusing involves using heat and pressure to permanently bond the toner to the paper.

    Rate this question:

  • 7. 

    Two types of Inkjet printer, ...... and ...... (2 words)

    Correct Answer
    Thermal Pieroelectric
    Explanation
    The given answer "Thermal Pieroelectric" suggests that there are two types of inkjet printers: thermal inkjet printers and piezoelectric inkjet printers. Thermal inkjet printers use heat to create tiny bubbles in the ink, which then get expelled onto the paper. On the other hand, piezoelectric inkjet printers use a piezoelectric crystal to create pressure, which forces the ink out of the nozzle onto the paper.

    Rate this question:

  • 8. 

    The accepted code of conduct for communications used for over any form ICT is known as ...... (one word)

    Correct Answer
    Netiquette
    Explanation
    Netiquette refers to the accepted code of conduct for communication over any form of ICT (Information and Communication Technology). It encompasses the rules and guidelines that govern online behavior, including being respectful, using proper grammar and punctuation, and avoiding spam or offensive content. Netiquette ensures effective and polite communication in the digital world, promoting positive interactions and maintaining a harmonious online environment.

    Rate this question:

  • 9. 

    Which description best describes, multi-user

    • A.

      Two or more users can work with programs and share prephiral devices at the same time

    • B.

      One user can work with programs and share prephiral devices at the same time

    • C.

      The computer is capable of operating multiple application at the same time

    • D.

      A program can be broken up into smaller parts that can be loaded as needed by the os

    Correct Answer
    A. Two or more users can work with programs and share prephiral devices at the same time
    Explanation
    The description "Two or more users can work with programs and share peripheral devices at the same time" best describes multi-user. This means that multiple individuals can access and use programs on the computer simultaneously, as well as share peripheral devices such as printers or scanners.

    Rate this question:

  • 10. 

    Which description best describes, mulit-tasking

    • A.

      Computer can have two or more CPUs that programs share

    • B.

      Two or more users can work with programs and share devices at the same time

    • C.

      The computer is capable of operating multiple applications at the same time

    Correct Answer
    C. The computer is capable of operating multiple applications at the same time
    Explanation
    The correct answer is that mulit-tasking refers to the computer's capability of operating multiple applications at the same time. This means that the computer can handle and execute multiple tasks simultaneously, allowing users to switch between different applications without having to wait for one task to finish before starting another. This improves efficiency and productivity by maximizing the use of the computer's resources.

    Rate this question:

  • 11. 

    What is the first step of the boot sequence? (one or four words)

    Correct Answer
    POST
    Power on self test
    Explanation
    The first step of the boot sequence is the Power on self test (POST). This test is performed by the computer's firmware to check the hardware components and ensure they are functioning properly. It checks the CPU, memory, storage devices, and other peripherals. The POST is essential for identifying any potential issues or errors that may prevent the computer from booting up successfully.

    Rate this question:

  • 12. 

    NTFS can be converted back to FAT 32. True or False?

    Correct Answer
    False
    Explanation
    NTFS (New Technology File System) cannot be directly converted back to FAT32 (File Allocation Table) without reformatting the entire disk. The conversion process involves backing up all the data on the NTFS partition, reformatting it as FAT32, and then restoring the data. Therefore, the statement is false.

    Rate this question:

  • 13. 

    PC Express cards have .... and .... pins. (Choose two)

    • A.

      34

    • B.

      44

    • C.

      54

    • D.

      64

    • E.

      74

    Correct Answer(s)
    A. 34
    C. 54
    Explanation
    PC Express cards have 34 and 54 pins. These pins are used for connecting the card to the motherboard or other devices. The 34-pin connector is typically used for ExpressCard/34 cards, which are smaller in size. The 54-pin connector is used for ExpressCard/54 cards, which are larger and provide more functionality. These pins allow for data transfer, power supply, and other communication between the card and the system.

    Rate this question:

  • 14. 

    The troubleshooting process is

    • A.

      1.Gather data from customer. 2. Verify obvious issues. 3. Try quick solutions first. 4. Tell the customer to wait. 5. Evaluate problem and implement solution. 6. Close with the customer.

    • B.

      1.Gather data from customer. 2. Verify obvious issues. 3. Try quick solutions first. 4. Gather data from customer. 5. Evaluate problem and implement solution. 6. Have a social conversation and make sure the customer is alright.

    • C.

      1.Catch up on what you did at the weekend. 2. Verify obvious issues. 3. Try quick solutions first. 4. Gather data from customer. 5. Evaluate problem and implement solution. 6. Close with the customer.

    • D.

      1.Gather data from customer. 2. Verify obvious issues. 3. Try quick solutions first. 4. Gather data from customer. 5. Evaluate problem and implement solution. 6. Close with the customer.

    Correct Answer
    D. 1.Gather data from customer. 2. Verify obvious issues. 3. Try quick solutions first. 4. Gather data from customer. 5. Evaluate problem and implement solution. 6. Close with the customer.
    Explanation
    The correct answer is the one that follows the correct sequence of steps in the troubleshooting process. In this case, the steps are: 1. Gather data from customer, 2. Verify obvious issues, 3. Try quick solutions first, 4. Gather data from customer, 5. Evaluate problem and implement solution, and 6. Close with the customer. This sequence ensures that all necessary information is gathered, potential simple fixes are attempted, and a thorough evaluation of the problem is conducted before implementing a solution. Finally, the process concludes with a proper closure with the customer.

    Rate this question:

  • 15. 

    What is a WAN?

    • A.

      Group of connected PCs under the same admin control.

    • B.

      Connects LAN in geographically seperated locations.

    • C.

      Connects to a access point within a specified area

    Correct Answer
    B. Connects LAN in geographically seperated locations.
    Explanation
    A WAN (Wide Area Network) is a network that connects LANs (Local Area Networks) in geographically separated locations. This allows different offices or branches of an organization to communicate and share resources over a wide area. A WAN typically uses public or private telecommunication services to connect the LANs, such as leased lines, satellite links, or virtual private networks (VPNs). This enables efficient and secure data transfer between different locations, facilitating collaboration and centralized management.

    Rate this question:

  • 16. 

    The three modes of transmission are ......, ...... and ...... (5 words)

    Correct Answer
    Simplex Half Duplex Full Duplex
    Explanation
    The three modes of transmission are simplex, half duplex, and full duplex. Simplex mode allows data to be transmitted in only one direction at a time, like a one-way street. Half duplex mode allows data to be transmitted in both directions, but not simultaneously, like a walkie-talkie where only one person can speak at a time. Full duplex mode allows data to be transmitted in both directions simultaneously, like a telephone conversation where both parties can talk and listen at the same time.

    Rate this question:

  • 17. 

    The DHCP assigns the computer with

    • A.

      Default Gateway

    • B.

      Subnet Mask

    • C.

      IP

    • D.

      Domain Name System (DNS) Server Address

    • E.

      All the above

    Correct Answer
    E. All the above
    Explanation
    The DHCP (Dynamic Host Configuration Protocol) is responsible for assigning various network settings to computers, including the default gateway, subnet mask, IP address, and DNS server address. Therefore, the correct answer is "All the above."

    Rate this question:

  • 18. 

    The seven layers of the OSI model are:

    • A.

      Physical, Data link, Network, Transport, Session, Presentation and Application

    • B.

      Physical, Data link, Network, Transparent, Session, Presentation and Access.

    • C.

      Process, Data link, Network, Transport, Session, Presentation and Application

    • D.

      Physical, Data link, Netiquette, Transport, Season, Presentation and Application

    Correct Answer
    A. Physical, Data link, Network, Transport, Session, Presentation and Application
    Explanation
    The correct answer is Physical, Data link, Network, Transport, Session, Presentation and Application. This sequence represents the seven layers of the OSI model, which is a conceptual framework used to understand and describe how different network protocols and technologies interact with each other. The layers are organized in a hierarchical manner, with each layer performing specific functions and providing services to the layer above it. The Physical layer deals with the physical transmission of data, the Data link layer handles the reliable transmission of data frames between two nodes, the Network layer manages the routing of data packets across different networks, the Transport layer ensures reliable delivery of data between end systems, the Session layer establishes and manages communication sessions, the Presentation layer handles data formatting and encryption, and the Application layer provides network services to end-user applications.

    Rate this question:

  • 19. 

    A virus is...

    • A.

      Software that can be delibretely created by an attacker

    • B.

      Selp replicating program that uses the network to duplicate its code

    • C.

      Technically a worm, method of getting past computer defences by pretending to be something useful

    Correct Answer
    A. Software that can be delibretely created by an attacker
    Explanation
    A virus is a type of software that is intentionally created by an attacker. It is designed to replicate itself and spread through a network by duplicating its code. Although technically a worm, a virus can also deceive computer defenses by masquerading as something useful.

    Rate this question:

  • 20. 

    What is a worm?

    • A.

      Software that can be delibretely created by an attacker

    • B.

      Technically a virus, method of getting past computer defences by pretending to be something useful

    • C.

      Selp replicating program that uses the network to duplicate its code

    Correct Answer
    C. Selp replicating program that uses the network to duplicate its code
    Explanation
    A worm is a self-replicating program that can duplicate its code by using the network. Unlike viruses, worms do not need to attach themselves to a host program and can spread independently. They can exploit vulnerabilities in computer systems and use the network to propagate themselves to other computers. This explanation aligns with the given answer choice.

    Rate this question:

  • 21. 

    Which registry key relates to information relating to hardware and software?

    • A.

      HKEY_LOCAL_MACHINE

    • B.

      KEY_LOCAL_MACHINE

    • C.

      HKEY_USER

    • D.

      HKEY_HARDWARE_SOFTWARE

    • E.

      HKEY_CURRENT_CONFIG

    Correct Answer
    A. HKEY_LOCAL_MACHINE
    Explanation
    The correct answer is HKEY_LOCAL_MACHINE. This registry key is used to store information about hardware and software configurations on a Windows operating system. It contains subkeys and values that provide details about the installed hardware components, device drivers, and software settings on the computer. It is a crucial key for system administrators and developers to access and modify system-level settings and configurations.

    Rate this question:

  • 22. 

    The registry key relation to information about which file extensions map to a particular user is

    • A.

      HKEY_USERS

    • B.

      HKEY_CLASSES_ROOT

    • C.

      HKEY_LOCAL_MACHINE

    • D.

      HKEY_CURRENT_CONFIG

    Correct Answer
    B. HKEY_CLASSES_ROOT
    Explanation
    HKEY_CLASSES_ROOT is the correct registry key that contains information about which file extensions map to a particular user. This registry key stores information about file associations, including the default programs associated with specific file types. It is a merged view of the user-specific HKEY_CURRENT_USER\Software\Classes key and the system-wide HKEY_LOCAL_MACHINE\Software\Classes key. Therefore, it provides a comprehensive view of the file associations for all users on the system.

    Rate this question:

  • 23. 

    Two types of user interface are ...... and ...... (two words)

    Correct Answer
    GUI CLI
    Explanation
    The correct answer is GUI CLI because GUI stands for Graphical User Interface, which is a visual interface that allows users to interact with electronic devices through graphical icons and visual indicators. CLI stands for Command Line Interface, which is a text-based interface that allows users to interact with electronic devices by typing commands. These two types of user interfaces are commonly used in different applications and systems to provide different ways for users to interact with the technology.

    Rate this question:

  • 24. 

    What are the four modes of operation?

    • A.

      Real Mode, Protected Mode, Virtual Real Mode and Compatible Mode.

    • B.

      Real Mode, Provisional Mode, Virtual Reality Mode and Comparison Mode.

    • C.

      Ready Mode, Protected Mode, Virtual Real Mode and Compatible Mode.

    • D.

      Real Mode, Proselective Mode, Virtual Real Mode and Compatible Mode.

    • E.

      False Mode, Protected Mode, Virtual False Mode and Compatible Mode.

    Correct Answer
    A. Real Mode, Protected Mode, Virtual Real Mode and Compatible Mode.
    Explanation
    The correct answer is Real Mode, Protected Mode, Virtual Real Mode, and Compatible Mode. These four modes of operation are commonly used in computer systems. Real Mode is the initial mode of operation in x86 processors, where the CPU can directly access the entire memory. Protected Mode provides memory protection and multitasking capabilities. Virtual Real Mode combines the features of Real Mode and Protected Mode, allowing the system to run both real mode and protected mode applications simultaneously. Compatible Mode is a mode that allows older software to run on newer computer systems.

    Rate this question:

  • 25. 

    Which type of memory is used in laptops?

    • A.

      DIMMSODIMM

    • B.

      RIMM

    • C.

      DIMM

    • D.

      SODIMM

    • E.

      SIMM

    Correct Answer
    D. SODIMM
    Explanation
    SODIMM stands for Small Outline Dual In-Line Memory Module. It is a type of memory module that is specifically designed for use in laptops and other small form factor computers. SODIMMs are smaller in size compared to regular DIMMs, making them suitable for compact devices like laptops. They provide the same functionality as DIMMs, but in a smaller package. Therefore, SODIMM is the correct answer for the type of memory used in laptops.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 10, 2009
    Quiz Created by
    Kcoates
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.