Information Technology Awareness

10 Questions | Total Attempts: 157

Settings
Please wait...
Information Technology Awareness

Due to their immense power, a lot of people out there seem to be fairly trusting when it comes to putting their personal information into a computer and expecting it not to be shared to undesirable locations. What is actually going on when we try to block people from accessing private information online, however? You tell us! Take the following quiz on Information Security to see how aware you are when it comes to IT!


Questions and Answers
  • 1. 
    This holds instructions that the computer needs to operate
    • A. 

      Random Access Memory

    • B. 

      Permanent Memory

    • C. 

      Storage

    • D. 

      Read Only Memory

  • 2. 
    This is the critical processing component in any computer
    • A. 

      Keyboard

    • B. 

      Mouse

    • C. 

      Joystick

    • D. 

      Memory

  • 3. 
    TCP stands for
    • A. 

      Total Control Program

    • B. 

      Transmission Control Protocol

    • C. 

      The Control Process

    • D. 

      None of the above

  • 4. 
    This type of technology lets computers use light as source of input
    • A. 

      Optative

    • B. 

      Optical

    • C. 

      Optimal

    • D. 

      Optional

  • 5. 
    A computer program is a collection of _________________ that are carried out by the computers CPU
    • A. 

      Instructions

    • B. 

      Loops

    • C. 

      Steps

    • D. 

      Algorithms

  • 6. 
    The order in which program statements are executed is called
    • A. 

      Program Execution

    • B. 

      Programming Language

    • C. 

      Program Syntax

    • D. 

      Program Contol Flow

  • 7. 
    The 1s and the 0s that CPU can understand is called its____________ 
    • A. 

      Syntax

    • B. 

      Interrupt

    • C. 

      Interpreter

    • D. 

      Machine Language

  • 8. 
    This converts all the source code into machine code creating an executable file
    • A. 

      Assembler

    • B. 

      Interpreter

    • C. 

      Compiler

    • D. 

      Converter

  • 9. 
    If a server stores data files for users to access,it is commonly called _____________
    • A. 

      Store House

    • B. 

      Application Server

    • C. 

      Folder Server

    • D. 

      File Server

  • 10. 
    The mail purpose for the following is to prevent unauthorised access
    • A. 

      Keyboard

    • B. 

      Mouse

    • C. 

      Monitor

    • D. 

      Firewall