IT Essentials Chapter 1 - 10 Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Colin2712
C
Colin2712
Community Contributor
Quizzes Created: 1 | Total Attempts: 638
Questions: 25 | Attempts: 639

SettingsSettingsSettings
IT Essentials Quizzes & Trivia

IT Essentials chapters 1 - 10 test quiz.


Questions and Answers
  • 1. 

    Which two of the following are common motherboard form factors? (Choose 2)

    • A.

      ATX

    • B.

      OCR

    • C.

      NLX

    • D.

      PSU

    Correct Answer(s)
    A. ATX
    C. NLX
    Explanation
    ATX and NLX are the common motherboard form factors. ATX (Advanced Technology eXtended) is a widely used motherboard form factor that provides a standard size and layout for computer components. NLX (New Low eXtended) is another common form factor that was popular in the 1990s. Both ATX and NLX provide standardized dimensions and mounting hole placements, allowing for compatibility with various computer cases and components. OCR and PSU are not motherboard form factors.

    Rate this question:

  • 2. 

    A _________ can be erased without removing the chip. (1 or 6 words)

    Correct Answer(s)
    EEPROM
    Electronically Erasable Programmable Read Only Memory
    electronically erasable programmable read only memory
    Explanation
    EEPROM stands for Electronically Erasable Programmable Read Only Memory. This type of memory can be erased electronically without removing the chip. It allows for data to be written and erased multiple times, making it a versatile and reusable memory storage solution.

    Rate this question:

  • 3. 

    How many devices can be attached to a single Firewire port?

    • A.

      1

    • B.

      9

    • C.

      63

    • D.

      51

    • E.

      127

    Correct Answer
    C. 63
    Explanation
    The correct answer is 63 because Firewire ports have the ability to support up to 63 devices connected to a single port. This is possible due to the daisy-chaining capability of Firewire, where multiple devices can be connected in a series using a single port. Each device in the chain acts as a node, allowing for a large number of devices to be connected to a single port.

    Rate this question:

  • 4. 

    A _________ summarises about material identification, including hazardous ingredients etc. (1 or 4 words)

    Correct Answer
    MSDS
    msds
    Material Safety Data Sheet
    material safety data sheet
    Explanation
    The correct answer for this question is "MSDS, msds, Material Safety Data Sheet, material safety data sheet." An MSDS, also known as a Material Safety Data Sheet, provides a summary of information about material identification, including hazardous ingredients and other important safety information. It is a document that provides crucial details about the physical and chemical properties of a substance, as well as its potential hazards and precautions for safe handling and use.

    Rate this question:

  • 5. 

    Scandisk is an example of a disk management tool. (True or False)

    Correct Answer
    True
    true
    Explanation
    Scandisk is indeed an example of a disk management tool. It is a utility program used to check the integrity of a computer's hard disk drive for errors and fix them if necessary. Scandisk can also help to optimize the disk's performance by identifying and repairing bad sectors, cross-linked files, and other issues that may affect the disk's functionality. Therefore, the statement is true.

    Rate this question:

  • 6. 

    There are two different types of user interface, which of the following are correct?  (Choose 2)

    • A.

      DOS

    • B.

      CLI

    • C.

      API

    • D.

      GUI

    • E.

      PnP

    Correct Answer(s)
    B. CLI
    D. GUI
    Explanation
    CLI and GUI are the correct types of user interfaces. CLI stands for Command Line Interface, which allows users to interact with a computer system by typing commands into a text-based interface. GUI stands for Graphical User Interface, which uses visual elements such as icons, menus, and windows to allow users to interact with a computer system. Both CLI and GUI are widely used in different operating systems and software applications to provide different levels of interaction and usability for users.

    Rate this question:

  • 7. 

    Look at the list below and decide what is the correct boot sequence.a. POST is runb. NTLDR reads the boot.ini filec. BIOS reads the MBRd. NTLDR loads ntoskrnl.exe and hal.dlle. ntoskrnl.exe starts winlogon.exe

    • A.

      A, c, e, d, b

    • B.

      E, c, d, b, a

    • C.

      A, c, b, d, e

    • D.

      D, b, e, a, c

    Correct Answer
    C. A, c, b, d, e
    Explanation
    The correct boot sequence is a, c, b, d, e. First, the POST (Power-On Self Test) is run to check the hardware. Then, the BIOS reads the MBR (Master Boot Record) which contains the boot loader. Next, the boot loader (NTLDR) reads the boot.ini file to determine the operating system to load. After that, NTLDR loads the necessary files ntoskrnl.exe and hal.dll. Finally, ntoskrnl.exe starts winlogon.exe, which initializes the Windows login process.

    Rate this question:

  • 8. 

    Which registry key contains all information relating to hardware and software in the system?

    • A.

      HKEY_CURRENT_USER

    • B.

      HKEY_CURRENT_CONFIG

    • C.

      HKEY_LOCAL_MACHINE

    • D.

      HKEY_USERS

    • E.

      HKEY_CLASSES_ROOT

    Correct Answer
    C. HKEY_LOCAL_MACHINE
    Explanation
    HKEY_LOCAL_MACHINE is the correct answer because it is the registry key that contains all information relating to hardware and software in the system. This key stores configuration settings for the entire system, including information about installed hardware devices, software settings, and system preferences. It is a crucial part of the Windows operating system and is used by various applications and services to access and modify system settings.

    Rate this question:

  • 9. 

    _______ is a type of Token Ring network. It runs on fibre-optic cable and is often used to connect several buildings in a office complex or university campus. (1 or 4 words)

    Correct Answer
    FDDI
    Fiber Distributed Data Interface
    Explanation
    FDDI, which stands for Fiber Distributed Data Interface, is a type of Token Ring network. It utilizes fiber-optic cable and is commonly employed to establish connections between multiple buildings in an office complex or university campus.

    Rate this question:

  • 10. 

    Which layer of the OSI model establishes, manages and terminates the connections between the local and remote applications.

    • A.

      Presentation

    • B.

      Physical

    • C.

      Transport

    • D.

      Session

    • E.

      Data Link

    Correct Answer
    D. Session
    Explanation
    The Session layer of the OSI model is responsible for establishing, managing, and terminating the connections between the local and remote applications. It sets up and maintains the session between the two communicating devices, allowing them to exchange data. This layer handles tasks such as session establishment, synchronization, and session termination, ensuring reliable communication between applications.

    Rate this question:

  • 11. 

    _______ dynamically assigns an IP address to network devices. (1 or 4 words)

    Correct Answer
    DHCP
    Dynamic Host Conficuration Protocol
    Explanation
    DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that dynamically assigns IP addresses to network devices. DHCP allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration settings from a DHCP server. By using DHCP, network administrators can easily manage and allocate IP addresses to devices on their network, eliminating the need for manual configuration.

    Rate this question:

  • 12. 

    Which partion of a hard drive is the operating system booted from?

    • A.

      Extended

    • B.

      Active

    • C.

      Primary

    • D.

      Logical

    Correct Answer
    C. Primary
    Explanation
    The operating system is booted from the primary partition of a hard drive. The primary partition is the main partition on the hard drive that contains the necessary files for the operating system to start up and run. It is the partition that is typically set as active and is the first partition that the computer looks for when booting up. The other options, extended and logical partitions, are used for storing data and creating additional partitions within the primary partition.

    Rate this question:

  • 13. 

    Which IEEE wireless standard allows transfer rates up to 54Mbps @ 5GHz?

    • A.

      802.11g

    • B.

      802.11b

    • C.

      802.11a

    • D.

      802.11n

    Correct Answer
    C. 802.11a
    Explanation
    The correct answer is 802.11a. This IEEE wireless standard allows transfer rates up to 54Mbps at 5GHz.

    Rate this question:

  • 14. 

    ________ is a transport protocol that offers a connectionless service for delivery of data. Network management applications, network file systems and simple file transport use _______.

    Correct Answer
    User Datagram Protocol
    UDP
    Explanation
    User Datagram Protocol (UDP) is a transport protocol that offers a connectionless service for delivery of data. It is commonly used by network management applications, network file systems, and simple file transport. UDP does not provide reliable delivery or error checking, making it suitable for applications that prioritize speed over accuracy, or where occasional data loss is acceptable.

    Rate this question:

  • 15. 

    Which two modes of operation within the IEEE 1284 standard allow bi-directional communication? (Choose 2)

    • A.

      EPP

    • B.

      DLP

    • C.

      DPI

    • D.

      ECP

    • E.

      PPM

    Correct Answer(s)
    A. EPP
    D. ECP
    Explanation
    EPP and ECP are the two modes of operation within the IEEE 1284 standard that allow bi-directional communication. EPP stands for Enhanced Parallel Port and ECP stands for Extended Capabilities Port. Both modes support two-way communication between the computer and the peripheral device, allowing data to be transferred in both directions. This enables functions such as printing, scanning, and data exchange between the computer and the peripheral device.

    Rate this question:

  • 16. 

    A _______ is one complete circle of data on a hard drive platter.

    Correct Answer(s)
    Track
    Explanation
    A track is one complete circle of data on a hard drive platter. It is a concentric ring on the surface of the platter where data is stored. Each track is divided into sectors, which are the smallest units of data storage on a hard drive. The read/write head of the hard drive moves along the tracks to access and retrieve data.

    Rate this question:

  • 17. 

    This is also know as a file allocation table and is the smallest unit of space used for storing data. (Choose 1)

    • A.

      Track

    • B.

      Sector

    • C.

      Cluster

    • D.

      FAT

    Correct Answer
    C. Cluster
    Explanation
    A cluster is the smallest unit of space used for storing data in a file allocation table (FAT). The FAT is also known as a file allocation table and is responsible for keeping track of which clusters are allocated to each file on a storage device. Therefore, a cluster is the correct answer as it is the unit of space used for storing data in the FAT.

    Rate this question:

  • 18. 

    During the POST process, how many beeps indicates an error with the processor? (Choose 1)

    • A.

      7 Beeps

    • B.

      2 Beeps

    • C.

      5 Beeps

    • D.

      11 Beeps

    • E.

      6 Beeps

    Correct Answer
    C. 5 Beeps
    Explanation
    During the POST process, the system performs a series of tests to check the hardware components. The number of beeps produced by the system speaker indicates the type of error encountered. In this case, 5 beeps indicate an error with the processor. This could be due to a faulty or improperly installed processor, or a problem with the motherboard's connection to the processor.

    Rate this question:

  • 19. 

    ____________ is a type of social engineering, where the attacker pretends to represent a legitimate organisation. (1 word)

    Correct Answer
    Phishing
    phishing
    Explanation
    Phishing is a type of social engineering where the attacker pretends to represent a legitimate organization. They typically use deceptive tactics such as email or messaging to trick individuals into providing sensitive information or clicking on malicious links. This can lead to identity theft, financial loss, or unauthorized access to personal accounts.

    Rate this question:

  • 20. 

    Which of the following are not TCP/IP attacks? (Choose 2)

    • A.

      Replay

    • B.

      SYN Flood

    • C.

      Worm

    • D.

      DDoS

    • E.

      Spam

    Correct Answer(s)
    C. Worm
    E. Spam
    Explanation
    Worm and Spam are not TCP/IP attacks because they do not exploit vulnerabilities in the TCP/IP protocol stack or target specific TCP/IP protocols. Worms are self-replicating malware that spread through networks, while Spam refers to unsolicited bulk emails. On the other hand, Replay, SYN Flood, and DDoS attacks are all TCP/IP attacks. Replay attacks involve the interception and retransmission of network data, SYN Flood attacks exploit the TCP three-way handshake process, and DDoS attacks overwhelm a target system with a flood of traffic.

    Rate this question:

  • 21. 

    What benefits does NTFS provide over FAT32? (Choose 2)

    • A.

      File and folder level permissions

    • B.

      Limit of 4GB files

    • C.

      Smaller clusters use more of the available space

    • D.

      Compatible with Windows 95/98/Me

    • E.

      Supports 4.17 million files per volume

    Correct Answer(s)
    A. File and folder level permissions
    C. Smaller clusters use more of the available space
    Explanation
    NTFS provides file and folder level permissions, which means that users can have different levels of access and control over specific files and folders. This allows for better security and privacy control. Additionally, NTFS uses smaller clusters, which means that it can make more efficient use of the available storage space on a disk compared to FAT32. Smaller clusters reduce wasted space and allow for more efficient storage allocation.

    Rate this question:

  • 22. 

    This wireless security protocol was created by Cisco to address weaknesses in WEP & WPA. ____________ is a good choice when using Cisco equipment in a Windows or Linux environment.  (1, 2 or 4 words)

    Correct Answer(s)
    LEAP
    Lightweight Extensible Authentication Protocol
    EAP-Cisco
    Explanation
    LEAP, also known as Lightweight Extensible Authentication Protocol, is a wireless security protocol created by Cisco to improve upon the weaknesses of WEP and WPA. It is a good choice when using Cisco equipment in both Windows and Linux environments.

    Rate this question:

  • 23. 

    Which wireless security protocol is used by devices that employ Wireless Application Protocol? (Choose 1)

    • A.

      WPA

    • B.

      WEP 128

    • C.

      WTLS

    • D.

      LEAP

    • E.

      SSID

    Correct Answer
    C. WTLS
    Explanation
    WTLS (Wireless Transport Layer Security) is the correct answer because it is specifically designed for securing wireless communication in devices that use the Wireless Application Protocol (WAP). WTLS provides encryption, authentication, and integrity protection for data transmitted over wireless networks. It is a lightweight security protocol that is optimized for the constraints of wireless devices, making it suitable for mobile applications. WPA (Wi-Fi Protected Access) and WEP 128 (Wired Equivalent Privacy) are wireless security protocols used in Wi-Fi networks, but they are not specifically associated with WAP. LEAP (Lightweight Extensible Authentication Protocol) and SSID (Service Set Identifier) are not security protocols but rather authentication methods and network identifiers, respectively.

    Rate this question:

  • 24. 

    A ________ _______ is a type of TCP/IP attack that randomly opens TCP ports tying up the network resources. (2 words)

    Correct Answer
    SYN flood
    Explanation
    A SYN flood is a type of TCP/IP attack where the attacker sends a large number of SYN requests to a target server, but does not complete the handshake process. This causes the server to keep waiting for a response, tying up its resources and preventing it from servicing legitimate requests. By opening TCP ports randomly, the attacker can overwhelm the network and disrupt its normal functioning.

    Rate this question:

  • 25. 

    What is the 4th step in the Laser printing process? (Choose 1)

    • A.

      Fusing

    • B.

      Developing

    • C.

      Cleaning

    • D.

      Transferring

    • E.

      Conditioning

    Correct Answer
    B. Developing
    Explanation
    The 4th step in the Laser printing process is "Developing." Developing involves applying toner to the electrostatically charged drum, which creates the image or text that needs to be printed. The toner is attracted to the charged areas on the drum, forming the desired image. This step is crucial in transferring the image onto the paper during the subsequent steps of the printing process.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 21, 2009
    Quiz Created by
    Colin2712
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.