Library Assistant - Information Technology

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Burdsjm
B
Burdsjm
Community Contributor
Quizzes Created: 1 | Total Attempts: 293
| Attempts: 293 | Questions: 60
Please wait...
Question 1 / 60
0 %
0/100
Score 0/100
1. CTRL +  V will paste copied text. CTRL + A will _____________.

Explanation

CTRL + A is a keyboard shortcut that is commonly used to select all the text in a document or a specific area. This shortcut is often used when you want to quickly highlight or select all the content in a document or a text field. By pressing CTRL + A, you can easily select all the text in order to perform various actions such as copying, cutting, deleting, or formatting the selected text.

Submit
Please wait...
About This Quiz
Library Assistant - Information Technology - Quiz

A library assistant is there to help in curating, preparing of the materials. The librarian has enough on their plate as it is, so it always comes in handy to have somebody at your side doing the heavy lifting. Do you think you have what it takes to become a... see morelibrary assistant? Take the following quiz from an information technology perspective to find out!
see less

Personalize your quiz and earn a certificate with your name on it!
2. What is Downloading?

Explanation

Downloading refers to the process of retrieving or transferring a file from a remote server or another computer system to one's own device, typically through the internet. This can involve various types of files such as documents, images, videos, or software. It is a common practice for users to download files from the internet onto their devices for various purposes like accessing information, entertainment, or using specific applications.

Submit
3. Which of the below power line issues can cause problems with your computer?

Explanation

Line sag, line surge, and line noise can all cause problems with a computer. Line sag refers to a decrease in voltage levels, which can lead to the computer not receiving enough power to function properly. Line surge, on the other hand, is an increase in voltage levels that can damage the computer's components. Lastly, line noise refers to electrical disturbances or interference that can disrupt the computer's performance. Therefore, all of these power line issues have the potential to cause problems with a computer.

Submit
4. Which of the below file extensions is not an audio file format?  

Explanation

The file extension "COM" is not an audio file format. MP3, AIF, and WAV are all common audio file formats used to store and play audio data. However, "COM" is typically associated with executable files in the Windows operating system, not audio files.

Submit
5. How many bits in a byte?

Explanation

A byte consists of 8 bits. Each bit can represent a 0 or a 1, and when combined, these bits can represent a larger range of values. Therefore, the correct answer is 8.

Submit
6. To send an email to multiple parties with none of them knowing the other recipients.  What email field would you use?

Explanation

Bcc stands for "Blind Carbon Copy". When sending an email to multiple recipients using the Bcc field, none of the recipients can see the other recipients' email addresses. This ensures the privacy of each recipient's contact information and prevents them from knowing who else received the email.

Submit
7. What is the standard interactive and programming language for getting information from a database?

Explanation

SQL is the standard interactive and programming language for getting information from a database. It stands for Structured Query Language and is widely used in relational database management systems. SQL allows users to retrieve, manipulate, and manage data stored in a database. It provides a standardized way to interact with databases, making it the most commonly used language for database management and querying. DCOM, PL/1, and DASD are not programming languages specifically designed for database interaction, making SQL the correct answer.

Submit
8. What does SMTP stand for?

Explanation

SMTP stands for Simple Mail Transport Protocol. It is a standard communication protocol used for sending and receiving email messages between servers. SMTP is responsible for the transmission of email messages over the internet, ensuring that they are properly routed and delivered to the intended recipients. It is a widely used protocol that enables the efficient and reliable exchange of emails across different email systems and networks.

Submit
9. What is a cookie?

Explanation

A cookie is a small text file that is stored on a user's computer by a website. It contains information about the user's browsing activity on that website, such as login credentials, preferences, and shopping cart items. This information is used by the website to personalize the user's experience and remember their preferences for future visits. Cookies are not cooking software, a web site, or a hacker file, but rather they are internet information files that help websites track and store user data.

Submit
10. Which of the below formulas add cells a1 through a5 in Microsoft Excel?

Explanation

The correct answer is =sum(A1:A5). This formula uses the SUM function in Excel to add the values in cells A1 through A5. The colon (:) is used to indicate a range of cells, so A1:A5 represents all the cells from A1 to A5. The SUM function then calculates the sum of these cells, resulting in the total value.

Submit
11. Which of the following is not an anti-virus company?

Explanation

Xargon is not an anti-virus company because it is not a well-known or recognized name in the field of cybersecurity. AVG, McAfee, and Symantec are all established and reputable companies that specialize in developing and providing anti-virus software and solutions to protect against malware and other online threats. On the other hand, Xargon does not have a presence or reputation in the anti-virus industry, indicating that it is not an anti-virus company.

Submit
12. Which of the below options is not an iPod Apple has released?

Explanation

The correct answer is iPod Vision because it is not a model of iPod that Apple has released. Apple has released the iPod Mini, iPod Nano, and iPod Shuffle, but there is no iPod Vision in their lineup.

Submit
13. Which of the below has the most capacity?

Explanation

The given answer, 100TB, has the most capacity compared to the other options. The unit "TB" stands for terabytes, which is larger than gigabytes (GB), megabytes (MB), and kilobytes (KB). Therefore, 100TB represents a larger amount of storage space than 100GB, 100MB, or 100KB.

Submit
14. Which of the following is not an image file?

Explanation

TMP is not an image file format. JPEG, GIF, and BMP are all common image file formats used to store and display images. TMP typically refers to temporary files that are created and used by various software programs for temporary storage or caching purposes, but it is not specifically used for storing images.

Submit
15. Which of the below is not a network device?  

Explanation

A core is not a network device. In networking, a core refers to the central or main part of a network that connects multiple switches, routers, and other devices. It is responsible for routing and forwarding data within the network. However, it is not a physical device itself, but rather a concept or term used to describe the central infrastructure of a network.

Submit
16. What is the name of the below image? Which is a protection scheme that requires visitors to enter the letters and numbers when filling out a form on the Internet.

Explanation

The correct answer is "Captcha." Captcha is a protection scheme that requires visitors to enter letters and numbers when filling out a form on the Internet. It is commonly used to prevent automated bots from spamming or submitting malicious data on websites.

Submit
17. Which below IP address would be used for a local, Non-Routable network?

Explanation

The IP address 192.168.1.100 would be used for a local, Non-Routable network. This is because it falls within the range of private IP addresses reserved for use within a local network. These addresses are not routable on the internet and are commonly used for internal networks in homes, offices, or other private settings.

Submit
18. Which of the below media types hold the most information?

Explanation

Blu-ray holds the most information compared to the other media types listed. This is because Blu-ray discs have a higher storage capacity than CDs, DVDs, and floppy diskettes. Blu-ray discs can hold up to 25GB or 50GB of data, depending on the type, while CDs typically hold around 700MB, DVDs hold around 4.7GB or 8.5GB, and floppy diskettes hold only 1.44MB. Therefore, Blu-ray discs can store more data, making them capable of holding the most information.

Submit
19. This is a network point that acts as an entrance to another network.

Explanation

A gateway is a network point that acts as an entrance to another network. It is responsible for connecting different networks and facilitating communication between them. It acts as a bridge between two networks with different protocols, allowing data to flow between them. A gateway can be a hardware device or a software program. It is commonly used in computer networks to connect local area networks (LANs) to wide area networks (WANs) or the internet.

Submit
20. Which part of the computer does an EIDE cable connect to?

Explanation

An EIDE cable connects to the hard disk drive. EIDE stands for Enhanced Integrated Drive Electronics, and it is a type of interface used to connect storage devices like hard drives and optical drives to the motherboard of a computer. The EIDE cable allows for data transfer between the hard disk drive and the computer, enabling the computer to read and write data to the hard drive.

Submit
21. Which of the below will not help your computers security?

Explanation

A VLAN (Virtual Local Area Network) is a network technology that allows for the segmentation of a physical network into multiple virtual networks. While VLANs can provide benefits such as improved network performance and increased security by separating traffic, they do not directly contribute to computer security. Computer security is typically enhanced through measures such as firewalls, which monitor and control network traffic, good passwords that protect against unauthorized access, and updated software that patches vulnerabilities. VLANs are more focused on network management and organization rather than computer security.

Submit
22. What is the input device primarily used with a PDA?

Explanation

A stylus is the input device primarily used with a PDA. PDAs, also known as Personal Digital Assistants, are handheld devices that are used for various functions such as note-taking, scheduling, and accessing the internet. A stylus is a pen-like device that allows users to interact with the PDA's touchscreen, enabling them to navigate through menus, input text, and select options. It provides a precise and accurate input method, making it ideal for the small screens and limited space of a PDA.

Submit
23. How to determine how much memory a program is using?

Explanation

To determine how much memory a program is using, you can use the Windows Task Manager. The Task Manager provides real-time information about the processes and resources being utilized by various programs running on your computer. By accessing the Task Manager, you can navigate to the "Processes" tab and locate the specific program you are interested in. The "Memory" column will display the amount of memory (RAM) being used by each program, allowing you to determine the memory usage of the desired program.

Submit
24. What is the .tbz file extension?

Explanation

The .tbz file extension is commonly used for compressed tar files. Tar files are archive files that contain multiple files and directories, while the .tbz extension indicates that the tar file has been further compressed using bzip2 compression. This compression method helps reduce the file size and makes it easier to transfer or store the file. Therefore, the correct answer is "Compressed tar file."

Submit
25. What MS-DOS command can display hidden files?

Explanation

The MS-DOS command "attrib" can display hidden files. This command is used to view or change the attributes of files or directories in MS-DOS. By using the "attrib" command with the appropriate parameters, users can reveal hidden files and folders that are not normally visible in the file explorer.

Submit
26. What software would you use to convert a scanned image to text?

Explanation

OCR stands for Optical Character Recognition, which is a software technology used to convert scanned images or printed text into editable and searchable data. It analyzes the shapes and patterns of the characters in the scanned image and translates them into machine-readable text. OCR is commonly used in various applications such as document management, data entry, and automated data extraction. Therefore, OCR is the correct answer for converting a scanned image to text.

Submit
27. What server would you check on if you were able to reach a website by IP address by not by the name?

Explanation

If you are able to reach a website by its IP address but not by its name, it suggests that there may be an issue with the Domain Name System (DNS). DNS is responsible for translating domain names into IP addresses. In this case, the DNS server would be the one to check as it is responsible for resolving domain names to their corresponding IP addresses.

Submit
28. What is the free Microsoft program used to remotely administer computers and servers?

Explanation

Remote Desktop Connection is the correct answer because it is a free Microsoft program that allows users to remotely administer computers and servers. With Remote Desktop Connection, users can connect to another computer or server over a network and access its desktop, files, and applications as if they were sitting in front of it. This program is commonly used for remote troubleshooting, software installations, and remote support.

Submit
29. If I wanted to modify the registry of a computer what command would I use?

Explanation

To modify the registry of a computer, the command that would be used is "regedit". The "regedit" command is a built-in Windows utility that allows users to view, modify, and configure the Windows registry, which is a hierarchical database that stores settings and configurations for the operating system and installed applications. By using "regedit", users can make changes to the registry, such as adding, deleting, or modifying registry keys and values, which can affect various aspects of the computer's functionality and behavior.

Submit
30. Which of the below is not a type of computer memory?

Explanation

DIMM, RIMM, and SIMM are all types of computer memory modules. However, MIMM is not a recognized type of computer memory.

Submit
31. What is the name of the port in the below picture?

Explanation

The correct answer is PS/2. This is because the picture shows a port that is commonly known as a PS/2 port. PS/2 ports are used to connect keyboards and mice to computers. They are round in shape and have either a purple or green color coding. Other options mentioned in the question, such as AT, Mouse, and USB, are not relevant to the picture and do not match the port shown.

Submit
32. Which of the below is a PC video file extension?

Explanation

The correct answer is .avi. This is a commonly used video file extension for PC. It stands for Audio Video Interleave and is widely supported by various media players and video editing software.

Submit
33. A DNS translates a domain name into what?

Explanation

A DNS (Domain Name System) translates a domain name into an IP (Internet Protocol) address. This is necessary because domain names are easier for humans to remember and use, while IP addresses are used by computers to identify and communicate with each other on the internet. Therefore, when a user types a domain name into a web browser, the DNS system translates that domain name into the corresponding IP address, allowing the browser to connect to the correct web server and retrieve the requested webpage.

Submit
34. HTML Tags are case sensitive.

Explanation

HTML tags are not case sensitive. This means that whether you write a tag in uppercase or lowercase, it will be interpreted the same way by the browser. For example,

and

are both valid paragraph tags in HTML. This flexibility allows developers to write tags in a way that is easier to read and understand.

Submit
35. What is Apache?

Explanation

Apache is a web server software that allows websites to be hosted on the internet. It is not a browser, computer, or operating system. Apache is widely used due to its reliability, security, and flexibility. It supports various features and protocols, making it a popular choice for hosting websites and serving web content.

Submit
36. What is SSL short for?

Explanation

SSL is short for Secure Socket Layer. It is a protocol that provides secure communication over the internet. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted or tampered with by unauthorized individuals. It establishes a secure connection by encrypting the data and verifying the identity of the server. SSL is commonly used for secure online transactions, such as online banking, e-commerce, and sensitive data transfers.

Submit
37. What is the standard HTTP port number?

Explanation

The standard HTTP port number is 80. When a client sends an HTTP request to a server, it typically uses port 80 to establish the connection. This is the default port for HTTP communication and is widely supported by web servers and browsers.

Submit
38. What is another common name for a motherboard?  

Explanation

The correct answer is "System board". A motherboard is also commonly referred to as a system board. It is the main circuit board in a computer that holds and connects all the crucial components such as the CPU, memory, and other peripherals.

Submit
39. What is the original capacity of a standard CD?

Explanation

The original capacity of a standard CD is 650MB. This means that the CD can hold up to 650 megabytes of data.

Submit
40. Which command lists files in MS-DOS?

Explanation

The correct answer is "dir" because in MS-DOS, the "dir" command is used to list the files and directories in the current directory. The "cd" command is used to change the current directory, "ls" is a command used in Unix-based systems, and "list" is not a valid command in MS-DOS.

Submit
41. What is the capacity of a standard formatted PC floppy?

Explanation

The capacity of a standard formatted PC floppy is 1.44MB. Floppy disks were commonly used as a portable storage medium in the past. They were capable of storing a small amount of data, usually text files, images, or small programs. The 1.44MB capacity refers to the maximum amount of data that could be stored on a single floppy disk. This capacity was sufficient for many basic computing tasks at the time, but it is now considered extremely small compared to modern storage options.

Submit
42. Which of the below Windows utilities allow you to view a drives partition information?

Explanation

Disk Management is a Windows utility that allows users to view a drive's partition information. It provides a graphical interface to manage disks, partitions, and volumes on a computer. With Disk Management, users can view the layout and properties of their hard drives, including the partition style, file system, and available space. They can also create, delete, resize, and format partitions as needed. This utility is particularly useful for managing storage devices and organizing data on a computer system.

Submit
43. Which network protocol is used to send e-mail from server to server?

Explanation

SMTP (Simple Mail Transfer Protocol) is the correct answer. It is a network protocol used to send email messages from one server to another. SMTP is responsible for the transmission and delivery of email over the internet. It works in conjunction with other protocols like POP3 and IMAP to handle the sending, receiving, and storage of email messages. FTP (File Transfer Protocol) is used for transferring files, SSH (Secure Shell) is used for secure remote login, and POP3 (Post Office Protocol version 3) is used for retrieving email from a mail server.

Submit
44. Which of the below is not a type of computer battery?

Explanation

The correct answer is BIOS. BIOS stands for Basic Input/Output System and it is a firmware that is responsible for initializing the hardware of a computer during the boot process. It is not a type of computer battery. CMOS (Complementary Metal-Oxide-Semiconductor), Li-ion (Lithium-ion), and NiMH (Nickel Metal Hydride) are all types of computer batteries commonly used in laptops and other portable devices.

Submit
45. Email uses communication protocol:

Explanation

SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used for sending and receiving email messages between servers. SMTP is responsible for the transmission of email messages from the sender's email client to the recipient's mail server. It works in conjunction with other protocols such as POP (Post Office Protocol) or IMAP (Internet Message Access Protocol) for email retrieval. SMTP is widely used across the internet for email communication and is an essential component of the email infrastructure.

Submit
46. You are working in Linux when a program hits a flaw and stops running.  Which command can be used to end the process?

Explanation

The kill command in Linux is used to terminate a process. When a program hits a flaw and stops running, the kill command can be used to forcefully end the process. It sends a signal to the process, instructing it to terminate immediately. This allows the user to regain control over the system and free up system resources that were being used by the faulty program.

Submit
47. What is the basic program used to verify that an IP address is online and accepting requests?

Explanation

Ping is the correct answer because it is a basic program used to verify if an IP address is online and accepting requests. It sends a small packet of data to the IP address and waits for a response. If a response is received, it confirms that the IP address is online and functioning properly. Ping is commonly used for troubleshooting network connectivity issues and to measure the response time between devices on a network.

Submit
48. What is IRC short for?

Explanation

IRC is short for Internet Relay Chat. IRC is a protocol that enables real-time text communication between users over the internet. It allows users to join chat rooms, send messages, and participate in group discussions. The term "chat" in the correct answer indicates that IRC is primarily used for online chatting and communication purposes.

Submit
49. Which Linux command sets a files permission?  

Explanation

The Linux command "chmod" is used to set permissions for files. It allows the user to change the read, write, and execute permissions for the owner, group, and others. By using the "chmod" command followed by the appropriate permission codes, users can control who can access and modify a file.

Submit
50. Where are the device drivers settings for Windows stored?

Explanation

The device drivers settings for Windows are stored in the Registry. The Registry is a hierarchical database that contains configuration settings and options for the operating system, hardware devices, and installed software. It stores information about device drivers, including their settings, configurations, and parameters. By storing these settings in the Registry, Windows can easily access and manage the drivers, allowing for efficient and effective operation of hardware devices on the system.

Submit
51. What software is used to provide an online point, at which multiple users may enter and store information in a database?

Explanation

A wiki is a software that allows multiple users to enter and store information in a database online. It provides a collaborative platform where users can create, edit, and link content together. It is commonly used for knowledge sharing, documentation, and project management purposes.

Submit
52. Which of the below is not an e-mail client?

Explanation

Opera is not an e-mail client. It is a web browser developed by Opera Software. While Opera does have some email capabilities, it is primarily known and used as a web browser rather than an email client like Eudora, Outlook, and Thunderbird.

Submit
53. What is the name of the section of Microsoft Windows shown in the below picture?

Explanation

The section of Microsoft Windows shown in the picture is called the "Notification area". It is located on the right side of the taskbar and displays icons for system notifications, such as network connectivity, volume control, and battery status. Users can also customize the notification area to show or hide specific icons and access additional settings and features.

Submit
54. What command comments out a line in a batch file?

Explanation

The correct answer is "Rem". In batch files, the "Rem" command is used to add comments. It allows users to add explanatory notes or disable specific lines of code without affecting the functionality of the batch file. By using "Rem" followed by a space, anything after it on the same line is considered a comment and is ignored by the computer when executing the batch file.

Submit
55. Which file does Linux use to resolve hostnames?

Explanation

Linux uses the /etc/host.conf file to resolve hostnames. This file contains configuration settings for the hostname resolution process. It specifies the order in which different methods, such as DNS or hosts file, are used to resolve hostnames. The /etc/host.conf file allows users to customize the hostname resolution behavior according to their needs.

Submit
56. Where in Windows 7 would I find the Startup and Recovery settings and information?

Explanation

In Windows 7, the Startup and Recovery settings and information can be found in the System Properties under Advanced. This option allows users to configure settings related to system startup and recovery, such as the default operating system, time to display the list of operating systems, and the location of the startup and recovery files. By accessing the System Properties and navigating to the Advanced tab, users can easily manage these settings and information.

Submit
57. A user is logged into a Linux workstation, what is the best way to login to root from a shell prompt?

Explanation

The "su" command is the best way to login to root from a shell prompt in Linux. "su" stands for "switch user" and allows the user to switch to another user account, in this case, the root account. By typing "su" followed by the root password, the user can gain root privileges and access the root account.

Submit
58. What is shown in the below picture?

Explanation

The correct answer is "jumpers". Jumpers are small connectors that can be placed on a set of pins to configure or modify the behavior of a device. They are commonly used in computer hardware to set parameters such as memory speed, device ID, or enable/disable certain features. In the picture, the image shows a set of small connectors placed on pins, indicating the presence of jumpers.

Submit
59. Which of the following is not a DOS network command?

Explanation

The three commands "ping," "winipcfg," and "tracert" are all valid DOS network commands used for different purposes. However, "netcfg" is not a valid DOS network command. It is actually a Windows command used to configure network settings on Windows operating systems.

Submit
60. Which below file extensions is not a compressed file?  

Explanation

The file extension .tar is not a compressed file. It is a file format used for archiving multiple files into a single file, but it does not compress the files. Compressed file extensions such as .rar and .z are used to reduce the file size by compressing the data. .bin is a binary file format and can also be compressed, but it is not primarily used for compression purposes.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 29, 2011
    Quiz Created by
    Burdsjm
Cancel
  • All
    All (60)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
CTRL +  V will paste copied text. CTRL + A will _____________.
What is Downloading?
Which of the below power line issues can cause problems with your...
Which of the below file extensions is not an audio file format?...
How many bits in a byte?
To send an email to multiple parties with none of them knowing the...
What is the standard interactive and programming language for getting...
What does SMTP stand for?
What is a cookie?
Which of the below formulas add cells a1 through a5 in Microsoft...
Which of the following is not an anti-virus company?
Which of the below options is not an iPod Apple has released?
Which of the below has the most capacity?
Which of the following is not an image file?
Which of the below is not a network device?  
What is the name of the below image? Which is a protection scheme that...
Which below IP address would be used for a local, Non-Routable...
Which of the below media types hold the most information?
This is a network point that acts as an entrance to another network.
Which part of the computer does an EIDE cable connect to?
Which of the below will not help your computers security?
What is the input device primarily used with a PDA?
How to determine how much memory a program is using?
What is the .tbz file extension?
What MS-DOS command can display hidden files?
What software would you use to convert a scanned image to text?
What server would you check on if you were able to reach a website by...
What is the free Microsoft program used to remotely administer...
If I wanted to modify the registry of a computer what command would I...
Which of the below is not a type of computer memory?
What is the name of the port in the below picture?
Which of the below is a PC video file extension?
A DNS translates a domain name into what?
HTML Tags are case sensitive.
What is Apache?
What is SSL short for?
What is the standard HTTP port number?
What is another common name for a motherboard?  
What is the original capacity of a standard CD?
Which command lists files in MS-DOS?
What is the capacity of a standard formatted PC floppy?
Which of the below Windows utilities allow you to view a drives...
Which network protocol is used to send e-mail from server to server?
Which of the below is not a type of computer battery?
Email uses communication protocol:
You are working in Linux when a program hits a flaw and stops running....
What is the basic program used to verify that an IP address is online...
What is IRC short for?
Which Linux command sets a files permission?  
Where are the device drivers settings for Windows stored?
What software is used to provide an online point, at which multiple...
Which of the below is not an e-mail client?
What is the name of the section of Microsoft Windows shown in the...
What command comments out a line in a batch file?
Which file does Linux use to resolve hostnames?
Where in Windows 7 would I find the Startup and Recovery settings and...
A user is logged into a Linux workstation, what is the best way to...
What is shown in the below picture?
Which of the following is not a DOS network command?
Which below file extensions is not a compressed file?  
Alert!

Advertisement