Fundamentals Of Information Technology! Trivia

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jamez292
J
Jamez292
Community Contributor
Quizzes Created: 2 | Total Attempts: 46,611
Questions: 20 | Attempts: 1,924

SettingsSettingsSettings
Fundamentals Of Information Technology! Trivia - Quiz


As far as information technology goes, there are basic facts which we all know to be true. For example, most people know that mp3 is a music file, and many people know file size from the smallest to largest. With this quiz, you must also answer questions like what one benefit of online file storage is and the result of compressing a file. This quiz will determine your information on technology intelligence.


Questions and Answers
  • 1. 

    Which one of the following file types is a music file?

    • A.

      .zip

    • B.

      .png

    • C.

      .odt

    • D.

      .mp3

    Correct Answer
    D. .mp3
    Explanation
    The correct answer is .mp3. This file type is commonly used for storing audio files, specifically music files. It is a compressed format that allows for high-quality sound while minimizing file size. Other file types listed (.zip, .png, .odt) are not specifically associated with music and serve different purposes such as compression, image storage, and document storage respectively.

    Rate this question:

  • 2. 

    Which one of the following best describes the type of file system structure being shown below?

    • A.

      Flat File.

    • B.

      Sequential.

    • C.

      Hierarchical.

    • D.

      Random.

    Correct Answer
    C. Hierarchical.
    Explanation
    The file system structure being shown below is hierarchical because it follows a tree-like structure where files and directories are organized in a parent-child relationship. In this structure, there is a single root directory, and each directory can contain multiple subdirectories and files. This type of file system allows for organizing and categorizing files in a hierarchical manner, making it easier to navigate and manage the file system.

    Rate this question:

  • 3. 

    Which one of the following is a result of compressing a file?

    • A.

      The file is deleted.

    • B.

      The file size is smaller.

    • C.

      The 3 character extension is hidden.

    • D.

      All file properties are lost.

    Correct Answer
    B. The file size is smaller.
    Explanation
    When a file is compressed, it undergoes a process in which redundant or unnecessary data is removed, resulting in a smaller file size. This reduction in size is achieved by various compression algorithms that eliminate repetitive patterns or encode data in a more efficient manner. However, compressing a file does not involve deleting the file, hiding its extension, or losing any file properties.

    Rate this question:

  • 4. 

    Which one of the following is a benefit of online file storage?

    • A.

      Files can be shared safely with friends and family with Internet access.

    • B.

      Only text files can be stored online.

    • C.

      The data is publicly available to anyone with Internet access.

    • D.

      Only you can access files you have stored on line.

    Correct Answer
    D. Only you can access files you have stored on line.
    Explanation
    Online file storage provides the benefit of ensuring that only the user who has stored the files can access them. This means that the files are kept private and secure, preventing unauthorized access or sharing. This allows individuals to have full control over their files and ensures their confidentiality.

    Rate this question:

  • 5. 

    Which one of the following is an appropriate routine to shut down a non-responding application?

    • A.

      Close all open documents and press the power button until the computer automatically switches off.

    • B.

      Press Ctrl + Alt + Delete, select the application in the Task Manager window and click End Task.

    • C.

      Pull out the power cable from the back of the computer.

    • D.

      Click Shut Down on the Start menu and choose Shut down from the Shut Down Windows drop-down list.

    Correct Answer
    B. Press Ctrl + Alt + Delete, select the application in the Task Manager window and click End Task.
    Explanation
    Pressing Ctrl + Alt + Delete, selecting the application in the Task Manager window, and clicking End Task is an appropriate routine to shut down a non-responding application. This key combination opens the Task Manager, which allows the user to view and manage running applications. By selecting the non-responding application and clicking End Task, the user can forcefully terminate the application, allowing them to regain control of their computer.

    Rate this question:

  • 6. 

    Which one of the following shows file size from smallest to largest?

    • A.

      Gigabyte, Megabyte, Kilobyte, Byte.

    • B.

      Megabyte, Gigabyte, Kilobyte, Byte.

    • C.

      Byte, Kilobyte, Megabyte, Gigabyte.

    • D.

      Byte, Megabyte, Kilobyte, Gigabyte.

    Correct Answer
    C. Byte, Kilobyte, Megabyte, Gigabyte.
    Explanation
    The correct answer is "Byte, Kilobyte, Megabyte, Gigabyte." This is because the byte is the smallest unit of digital information storage, followed by the kilobyte (which is 1024 bytes), the megabyte (which is 1024 kilobytes), and finally the gigabyte (which is 1024 megabytes).

    Rate this question:

  • 7. 

    Which one of the following statements about computer viruses isTRUE?

    • A.

      Files can be damaged by computer viruses.

    • B.

      Text files are the only files to be corrupted by viruses.

    • C.

      Files are always permanently damaged by viruses.

    • D.

      Compressed files can never be damaged by viruses.

    Correct Answer
    A. Files can be damaged by computer viruses.
    Explanation
    Computer viruses can indeed damage files. When a computer virus infects a file, it can cause various types of damage, such as corrupting the file's contents, deleting or modifying data, or rendering the file completely inaccessible. This can occur with different types of files, including text files, as well as other file formats like documents, spreadsheets, images, videos, and more. Therefore, the statement "Files can be damaged by computer viruses" is true.

    Rate this question:

  • 8. 

    Which one of the following file names complies with good practice in naming a file containing trading figures for the Greenway company for the third quarter of 2008?

    • A.

      Company 456C.xls

    • B.

      Greenway figures.xls

    • C.

      Q3 Trading.xls

    • D.

      Greenway 2008Q3 Trading.xls

    Correct Answer
    D. Greenway 2008Q3 Trading.xls
    Explanation
    The file name "Greenway 2008Q3 Trading.xls" complies with good practice in naming a file containing trading figures for the Greenway company for the third quarter of 2008. It includes the name of the company, the specific time period (2008Q3), and a description of the content (Trading). This naming convention provides clear and relevant information about the file's contents and makes it easier to identify and organize.

    Rate this question:

  • 9. 

    Which one of the following is safe to post on a social networking website?

    • A.

      A personal telephone number.

    • B.

      Hobbies.

    • C.

      A home address.

    • D.

      A school or work-place address.

    Correct Answer
    B. Hobbies.
    Explanation
    Posting hobbies on a social networking website is safe because it does not reveal personal information such as a telephone number, home address, or school/workplace address. Hobbies are generally harmless and can be shared publicly without compromising privacy or security.

    Rate this question:

  • 10. 

    Which one of the following is most likely to cause repetitive strain injury (RSI)?

    • A.

      Viewing a monitor that has a lot of glare and reflections.

    • B.

      Working where there is inadequate lighting and ventilation.

    • C.

      Typing for a long period of time without breaks.

    • D.

      Using a chair without arms.

    Correct Answer
    C. Typing for a long period of time without breaks.
    Explanation
    Typing for a long period of time without breaks is most likely to cause repetitive strain injury (RSI) because it puts a continuous strain on the muscles and tendons in the hands, wrists, and arms. Without breaks, the muscles do not have a chance to rest and recover, leading to overuse and potential injury. The repetitive motions involved in typing can also lead to inflammation and irritation of the affected areas, further increasing the risk of developing RSI.

    Rate this question:

  • 11. 

    Which one of the following statements about software copyright is TRUE?

    • A.

      Copyright promotes the illegal use of software.

    • B.

      Copyright is the exclusive legal right of software authors to produce copies of their own software.

    • C.

      Copyright is designed to protect a disk against computer viruses.

    • D.

      Copyright will prevent a CD-ROM from being duplicated.

    Correct Answer
    B. Copyright is the exclusive legal right of software authors to produce copies of their own software.
    Explanation
    Software copyright grants the exclusive legal right to software authors to reproduce copies of their own software. This means that the creators of software have the sole authority to make copies of their work and distribute them. This protection ensures that others cannot reproduce or distribute the software without the permission of the copyright holder.

    Rate this question:

  • 12. 

    Which one of the following best describes the purpose of Data protection legislation?

    • A.

      To give computer owners the right to protect themselves against computer fraud.

    • B.

      To give software owners the right to promote software copyright.

    • C.

      To give governments the right to control data access on the Internet.

    • D.

      To give a right to individuals to establish the existence of personal data.

    Correct Answer
    D. To give a right to individuals to establish the existence of personal data.
    Explanation
    Data protection legislation is designed to give individuals the right to establish the existence of personal data. This means that individuals have the right to know what personal data is being collected, stored, and processed by organizations. It also allows individuals to have control over their personal data and ensures that organizations handle it responsibly and securely. This legislation aims to protect individuals' privacy and give them the power to make informed decisions regarding their personal information.

    Rate this question:

  • 13. 

    Which one of the following tasks could you perform in order to improvethe performance of your computer?

    • A.

      Add a password to your user account.

    • B.

      Set up parental controls.

    • C.

      Turn off your firewall.

    • D.

      Defragment the file system.

    Correct Answer
    D. Defragment the file system.
    Explanation
    Defragmenting the file system is a task that can help improve the performance of a computer. Over time, files on a computer can become fragmented, meaning they are stored in multiple locations on the hard drive. This can slow down the computer's performance as it takes longer to access and retrieve the fragmented files. By defragmenting the file system, these files are rearranged and stored in contiguous blocks, making it faster and more efficient for the computer to access them. This can result in improved overall performance and faster file access times.

    Rate this question:

  • 14. 

    Which one of the following commands will NOT open the taskmanager?

    • A.

      Press Ctrl + Shift + Esc.

    • B.

      Right click the start icon.

    • C.

      Right click an empty area on the taskbar and select from the menu.

    • D.

      Press Ctrl + Alt + Delete and select from the menu.

    Correct Answer
    B. Right click the start icon.
    Explanation
    Right-clicking the start icon does not open the task manager. The start icon is typically used to access the start menu, not the task manager. The other options listed, such as pressing Ctrl + Shift + Esc and pressing Ctrl + Alt + Delete, are common methods to open the task manager in different operating systems. Right-clicking an empty area on the taskbar and selecting from the menu is also a valid way to open the task manager in some versions of Windows.

    Rate this question:

  • 15. 

    Which one of the following actions is the most appropriate step toresolve a lost network connection?

    • A.

      Check the router and modem are turned on.

    • B.

      Check the printer is turned on.

    • C.

      Update the device drivers.

    • D.

      Defragment the hard drive.

    Correct Answer
    A. Check the router and modem are turned on.
    Explanation
    The most appropriate step to resolve a lost network connection is to check if the router and modem are turned on. This is because the router and modem are responsible for providing the network connection, so if they are not turned on, there will be no connection. Checking the printer or updating device drivers may be relevant for other issues, but they are not directly related to resolving a lost network connection. Defragmenting the hard drive is also unrelated to network connectivity.

    Rate this question:

  • 16. 

    Which one of the following is NOT appropriate within an organisation?

    • A.

      Going to lunch with a colleague.

    • B.

      Sharing files.

    • C.

      Sharing your user name and password.

    • D.

      Sharing your calendar.

    Correct Answer
    C. Sharing your user name and password.
    Explanation
    Sharing your user name and password is not appropriate within an organization because it compromises security and confidentiality. User names and passwords are meant to be personal and should not be shared with others, as it can lead to unauthorized access to sensitive information and systems. It is important to keep login credentials private to maintain data integrity and protect against potential security breaches.

    Rate this question:

  • 17. 

    Which of these images is a Folder?

    • A.

      1st image

    • B.

      2nd image

    • C.

      3rd image

    • D.

      4th image

    Correct Answer
    B. 2nd image
    Explanation
    The 2nd image is a folder because it displays a familiar icon that is commonly used to represent folders in computer systems. The icon consists of a rectangular shape with a tab on the top, resembling a physical folder. This icon is widely recognized and used to organize and store files and documents in a hierarchical structure.

    Rate this question:

  • 18. 

    Find and open the ecdltest folder on your Learner Drive.Use the most suitable tool to search for ALL files that have a namebeginning with the letters FA in the ecdltest folder and subfolders.Enter the number of files as your answer.

    Correct Answer
    3
  • 19. 

    Use the most suitable tool to search for ALL files with the extension .rtfin the ecdltest folder and subfolders.Enter the number of files as your answer

    Correct Answer
    4
    Explanation
    The correct answer is 4 because the question asks for the number of files with the extension .rtf in the ecdltest folder and its subfolders. The most suitable tool to search for these files is likely a file search utility or command line tool that supports searching for files based on their extension. By using this tool, it was determined that there are a total of 4 files with the .rtf extension in the specified folder and its subfolders.

    Rate this question:

  • 20. 

    Organise the files in decending order of size (largest to the top, smallest to the bottom)How big is the largest file?Write your answer by typing the number, then the size group. follow the example below."123 GB"

    Correct Answer
    200 KB
    Explanation
    This answer may differ depending on the size of the file created at Q25. This will be taken into account when I mark Q21 onwards.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.