Information Technology Support Test: Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Pavel
P
Pavel
Community Contributor
Quizzes Created: 1 | Total Attempts: 448
Questions: 21 | Attempts: 448

SettingsSettingsSettings
Information Technology Support Test: Quiz! - Quiz

Below is an Information Technology Support Test! Since computers are used in almost every industry and hold data for a lot of time, which is accessible to different people, it is important to ensure that the system is well maintained and not changed without authorization. Take this quiz and see just how good you are at ensuring this happens.


Questions and Answers
  • 1. 

    Which of the following is NOT a type of motherboard expansion slot?

    • A.

      ISA

    • B.

      PCI

    • C.

      AGP

    • D.

      ATX

    Correct Answer
    D. ATX
    Explanation
    ATX is not a type of motherboard expansion slot. It is actually a form factor specification that defines the physical dimensions, layout, and power supply placement of a motherboard. It determines the compatibility and size of the motherboard, but it does not refer to a specific type of expansion slot. Expansion slots are connectors on the motherboard that allow the installation of additional components such as graphics cards, sound cards, or network cards. ISA, PCI, and AGP are all examples of motherboard expansion slots.

    Rate this question:

  • 2. 

    Which of the following is NOT a type of RAM?  

    • A.

      DIMM

    • B.

      EPROM

    • C.

      DDR2

    • D.

      RIMM

    Correct Answer
    B. EPROM
    Explanation
    EPROM stands for Erasable Programmable Read-Only Memory, which is a type of non-volatile memory that can be electrically erased and reprogrammed. It is different from RAM (Random Access Memory) because it is not volatile and retains its data even when the power is turned off. Therefore, EPROM is not a type of RAM.

    Rate this question:

  • 3. 

    What does FDISK do? 

    • A.

      Performs low-level formatting of the hard drive

    • B.

      Fixes bad sectors on the hard drive

    • C.

      Recovers lost clusters on the hard drive

    • D.

      Creates partitions on the hard drive

    Correct Answer
    D. Creates partitions on the hard drive
    Explanation
    FDISK is a utility that is used to create partitions on a hard drive. It allows users to divide the hard drive into separate sections, each of which can be used to store data independently. By creating partitions, users can organize and manage their data more efficiently, as well as install multiple operating systems on the same hard drive. Therefore, FDISK is primarily used for partitioning purposes rather than performing low-level formatting, fixing bad sectors, or recovering lost clusters on the hard drive.

    Rate this question:

  • 4. 

    What type of connector is used to plug a telephone line into a modem?

    • A.

      RJ-45

    • B.

      RJ-11

    • C.

      RJ-10

    • D.

      RS-232

    Correct Answer
    B. RJ-11
    Explanation
    The correct answer is RJ-11. RJ-11 is the type of connector used to plug a telephone line into a modem. RJ-11 connectors are commonly used in telephone systems and have four wires. They are smaller in size compared to RJ-45 connectors, which are used for Ethernet connections. RJ-10 is not a commonly used connector type, and RS-232 is a serial communication standard used for connecting devices like printers and modems to a computer.

    Rate this question:

  • 5. 

    Toner cartridge is used in?

    • A.

      Inkjet Plotter

    • B.

      Laser Printer

    • C.

      Thermal Printer

    • D.

      Dot Matrix printer

    • E.

      InkJet Printer

    Correct Answer
    B. Laser Printer
    Explanation
    A toner cartridge is used in a laser printer. Laser printers use a toner cartridge to hold and dispense the toner, which is a fine powder used to create the images and text on the paper. The toner is transferred onto the paper electrostatically and then fused onto the paper using heat and pressure. This process is different from inkjet printers, thermal printers, and dot matrix printers, which use different mechanisms to create printed output.

    Rate this question:

  • 6. 

    Identify the tab in Task Manager that enables you to start a program that is not running on your system.

    • A.

      Processes tab

    • B.

      Performance tab

    • C.

      Applications tab

    • D.

      Networking tab

    Correct Answer
    C. Applications tab
    Explanation
    The Applications tab in Task Manager enables you to start a program that is not running on your system. This tab displays a list of all the applications that are currently running on your computer. From this tab, you can select a program and click on the "New Task" button to start a new program that is not already running.

    Rate this question:

  • 7. 

    Which are examples of wireless encryption? 

    • A.

      VPN

    • B.

      PPP

    • C.

      WEP

    • D.

      MAC

    • E.

      WPA

    • F.

      WPA2

    • G.

      TCP

    • H.

      WEP2

    Correct Answer(s)
    C. WEP
    E. WPA
    F. WPA2
    Explanation
    WEP, WPA, and WPA2 are examples of wireless encryption. WEP (Wired Equivalent Privacy) was one of the earliest encryption protocols used to secure wireless networks, but it is now considered weak and easily crackable. WPA (Wi-Fi Protected Access) was introduced as a more secure replacement for WEP, and WPA2 is an enhanced version of WPA. Both WPA and WPA2 use stronger encryption algorithms and provide better security for wireless networks. VPN (Virtual Private Network), PPP (Point-to-Point Protocol), MAC (Media Access Control), and TCP (Transmission Control Protocol) are not examples of wireless encryption.

    Rate this question:

  • 8. 

    Which wireless standard is faster?

    • A.

      IEEE 802.11b

    • B.

      IEEE 802.11g

    • C.

      IEEE 802.6

    • D.

      IEEE 802.11a

    • E.

      IEEE 802.11n

    Correct Answer
    E. IEEE 802.11n
    Explanation
    IEEE 802.11n is faster than the other wireless standards mentioned. This is because IEEE 802.11n supports higher data transfer rates and has a wider bandwidth compared to IEEE 802.11b, IEEE 802.11g, and IEEE 802.11a. It also incorporates multiple-input multiple-output (MIMO) technology, which allows for improved signal quality and increased throughput. IEEE 802.6 is not a wireless standard, but rather a standard for metropolitan area networks (MANs), so it is not relevant to the question.

    Rate this question:

  • 9. 

    Which command will reveal your Windows XP computer IP address?

    • A.

      Ipconfig

    • B.

      Xpconfig

    • C.

      Configsys

    • D.

      Sysconfig

    Correct Answer
    A. Ipconfig
    Explanation
    The correct answer is "ipconfig". The ipconfig command is used in Windows XP to reveal the computer's IP address. It is a command-line utility that displays the current IP configuration of the system, including the IP address, subnet mask, and default gateway. This information is helpful for troubleshooting network connectivity issues and managing network settings on the Windows XP computer.

    Rate this question:

  • 10. 

    What does the term "Map Network Drive" mean?

    • A.

      Divide the host HDD into memory locations.

    • B.

      Create a shortcut to a network location.

    • C.

      Trace the path to the local area network gateway.

    • D.

      Send instructions to a user to access the remote local area network.

    • E.

      A schematic drawing of all network adapter locations on the network system.

    Correct Answer
    B. Create a shortcut to a network location.
    Explanation
    The term "Map Network Drive" refers to creating a shortcut to a network location. This allows the user to easily access files and folders on a remote network location as if they were stored on their own computer. By mapping a network drive, the user can quickly and conveniently access and work with files on the network without having to manually navigate through the network folder structure each time.

    Rate this question:

  • 11. 

    Which item is an example of a physical network address?

    • A.

      IP address

    • B.

      Workstation name

    • C.

      MAC address

    • D.

      Www.rezolvit.ro

    • E.
    Correct Answer
    C. MAC address
    Explanation
    A MAC address is an example of a physical network address. MAC stands for Media Access Control, and it is a unique identifier assigned to a network interface controller (NIC) by the manufacturer. It is used to identify devices on a local network and is embedded in the hardware of the network interface. Unlike IP addresses, which can change and are assigned by the network administrator, MAC addresses are permanent and cannot be changed. Therefore, a MAC address is a physical network address that is used to identify and communicate with devices on a local network.

    Rate this question:

  • 12. 

    Which are the default settings for a Windows XP computer network adapter?

    • A.

      DHCP and configured as part of a workgroup.

    • B.

      DHCP and configured as a part of a domain.

    • C.

      Static IP address and configured as part of a workgroup.

    • D.

      Static IP address and configured as part of a domain.

    • E.

      There are no default settings for a Windows XP network adapter card.

    Correct Answer
    A. DHCP and configured as part of a workgroup.
    Explanation
    The default settings for a Windows XP computer network adapter are DHCP and configured as part of a workgroup. DHCP (Dynamic Host Configuration Protocol) allows the computer to automatically obtain an IP address, subnet mask, default gateway, and DNS server addresses from a DHCP server. Configuring the computer as part of a workgroup means that it is not joined to a domain, but rather connected to a local network where resources are shared among other computers in the workgroup.

    Rate this question:

  • 13. 

    What is the purpose of a DNS server?

    • A.

      To resolve MAC addresses to NetBIOS names.

    • B.

      To resolve IP addresses to domain names

    • C.

      To resolve IP addresses to MAC address

    • D.

      To resolve domain names to IP addresses.

    Correct Answer
    D. To resolve domain names to IP addresses.
    Explanation
    The purpose of a DNS server is to resolve domain names to IP addresses. When a user enters a domain name in their web browser, the DNS server translates that domain name into the corresponding IP address of the server hosting the website. This allows the user's device to connect to the correct server and retrieve the requested web page.

    Rate this question:

  • 14. 

    What is the default port number for SMTP?

    • A.

      21

    • B.

      22

    • C.

      25

    • D.

      28

    Correct Answer
    C. 25
    Explanation
    SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages between servers. The default port number for SMTP is 25. This means that when an email client or server wants to send an email, it will connect to the recipient's mail server on port 25 to initiate the transfer. By default, SMTP servers listen on port 25 for incoming connections, allowing them to receive and process incoming email messages.

    Rate this question:

  • 15. 

    Most garbage prints are the result of using _____________

    • A.

      Obsolete firmware

    • B.

      Old toner cartridges

    • C.

      Incorrect drivers

    • D.

      Incorrect printer settings

    Correct Answer
    C. Incorrect drivers
    Explanation
    Garbage prints often occur when incorrect drivers are used for a printer. Drivers are software programs that enable communication between the printer and the computer. If the wrong drivers are installed or outdated drivers are used, it can lead to printing issues such as distorted or unreadable prints. Therefore, using incorrect drivers is a common cause of garbage prints.

    Rate this question:

  • 16. 

    What is the difference between the Bcc field and the CC field?

    • A.

      Recipients specified in the Cc field are not displayed to other recipients.

    • B.

      Recipients specified in the Bcc field are not displayed to other recipients.

    • C.

      The Bcc field can only use addresses that are stored in a distribution list.

    • D.

      The Bcc field can only use addresses that are stored in your address book.

    Correct Answer
    B. Recipients specified in the Bcc field are not displayed to other recipients.
    Explanation
    The correct answer is that recipients specified in the Bcc field are not displayed to other recipients. This means that when an email is sent using the Bcc field, the recipients in the Bcc field will not be able to see who else received the email. This is useful for maintaining privacy and confidentiality when sending emails to multiple recipients. The other options provided in the question are incorrect as they do not accurately describe the difference between the Bcc field and the CC field.

    Rate this question:

  • 17. 

    In Windows XP, how do you access advanced startup options?

    • A.

      By pressing the spacebar when prompted to do so

    • B.

      By holding down Ctrl+Alt+Del after the Windows logo displays for the first time

    • C.

      By pressing Esc after the OS menu displays

    • D.

      By pressing F8 during the first phase of the boot process

    Correct Answer
    D. By pressing F8 during the first pHase of the boot process
    Explanation
    Pressing F8 during the first phase of the boot process in Windows XP allows access to the advanced startup options. This key combination triggers the Windows Advanced Options Menu, which provides various troubleshooting and recovery options such as Safe Mode, Last Known Good Configuration, and others.

    Rate this question:

  • 18. 

    What is the first step in the troubleshooting process?

    • A.

      Talk to the customer

    • B.

      Gather technical information

    • C.

      Eliminate possibilities

    • D.

      Document your work

    Correct Answer
    A. Talk to the customer
    Explanation
    The first step in the troubleshooting process is to talk to the customer. This is important because the customer can provide valuable information about the issue they are experiencing, such as when it started and any error messages they have encountered. By gathering this information from the customer, the technician can gain a better understanding of the problem and begin troubleshooting more effectively.

    Rate this question:

  • 19. 

    Windows XP includes a feature called a ______________, which is a copy of your system configuration that can be used to roll back the system to a previous state if a configuration error occurs.

    • A.

      Restore point

    • B.

      Repair point

    • C.

      Rollback point

    • D.

      Registry

    Correct Answer
    A. Restore point
    Explanation
    Windows XP includes a feature called a restore point, which is a copy of your system configuration that can be used to roll back the system to a previous state if a configuration error occurs. This allows users to revert any changes made to the system settings and return to a stable state before the error occurred. By using a restore point, users can effectively undo any harmful changes and restore the system's functionality.

    Rate this question:

  • 20. 

    You are using MS Outlook 2003 or MS Outlook 2007. What is the file type that contains the autocomplete cache?

    • A.

      .nk2

    • B.

      .pst

    • C.

      .nk1

    • D.

      .dat

    Correct Answer
    A. .nk2
    Explanation
    The file type that contains the autocomplete cache in MS Outlook 2003 or MS Outlook 2007 is .nk2.

    Rate this question:

  • 21. 

    If you are using an IMAP account and Outlook Express mail client, where are the messages stored?

    • A.

      In a local folder in Outlook Express

    • B.

      On the email server

    • C.

      On another computer in the local network

    Correct Answer
    B. On the email server
    Explanation
    When using an IMAP account and Outlook Express mail client, the messages are stored on the email server. This means that the messages are not downloaded or stored locally on the computer running Outlook Express. Instead, Outlook Express connects to the email server to retrieve and display the messages. This allows users to access their emails from multiple devices and locations, as the messages are stored centrally on the server rather than being tied to a specific computer or device.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 18, 2018
    Quiz Created by
    Pavel
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.