Engineering Set-2: IT Literacy & Safety
Engineering Set-2: IT Literacy & Safety
Question 1
What is the full form of IT?
(1) Information Technology
(2) Internet Technology
(3) Integrated Technology
(4) Internal Technology
Show Answer
Answer: (1)
Solution: IT stands for Information Technology, which involves the use of computers and telecommunications to store, retrieve, transmit, and manipulate data.
Question 2
Which of the following is a type of software?
(1) Operating System
(2) Hardware
(3) Printer
(4) Monitor
Show Answer
Answer: (1)
Solution: Operating System is a type of software that manages computer hardware and provides services for software applications.
Question 3
What is the primary function of antivirus software?
(1) To speed up the computer
(2) To protect against malware
(3) To manage files
(4) To create backups
Show Answer
Answer: (2)
Solution: Antivirus software is designed to detect, prevent, and remove malicious software (malware) from a computer system.
Question 4
Which of the following is not a web browser?
(1) Chrome
(2) Firefox
(3) Edge
(4) Notepad
Show Answer
Answer: (4)
Solution: Notepad is a text editor, not a web browser. Common web browsers include Chrome, Firefox, and Edge.
Question 5
What is the purpose of a firewall?
(1) To speed up internet connection
(2) To block unauthorized access to a network
(3) To store data securely
(4) To manage printer connections
Show Answer
Answer: (2)
Solution: A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Question 6
Which of the following is a type of input device?
(1) Monitor
(2) Speaker
(3) Keyboard
(4) Printer
Show Answer
Answer: (3)
Solution: A keyboard is an input device used to enter data into a computer. Monitor and printer are output devices, while speaker is an output device.
Question 7
What is the full form of LAN?
(1) Local Area Network
(2) Large Area Network
(3) Long Area Network
(4) Live Area Network
Show Answer
Answer: (1)
Solution: LAN stands for Local Area Network, which is a network that connects computers within a limited area such as a home, office, or school.
Question 8
Which of the following is a type of cloud computing service?
(1) SaaS
(2) PaaS
(3) IaaS
(4) All of the above
Show Answer
Answer: (4)
Solution: SaaS (Software as a Service), PaaS (Platform as a Service), and IaaS (Infrastructure as a Service) are all types of cloud computing services.
Question 9
What is the primary function of an operating system?
(1) To manage hardware and software resources
(2) To create websites
(3) To store data
(4) To print documents
Show Answer
Answer: (1)
Solution: The operating system manages hardware and software resources, providing a platform for application software to run.
Question 10
Which of the following is a valid email address format?
(1) user@domain.com
(2) user@domain
(3) user.domain.com
(4) user@domain.com.in
Show Answer
Answer: (1)
Solution: A valid email address format is user@domain.com, where “user” is the username and “domain.com” is the domain.
Question 11
What is the purpose of the Ctrl + Z key combination in most applications?
(1) To copy text
(2) To paste text
(3) To undo the last action
(4) To save the document
Show Answer
Answer: (3)
Solution: Ctrl + Z is used to undo the last action in most applications such as word processors and graphic design tools.
Question 12
Which of the following is a type of cybercrime?
(1) Phishing
(2) Hacking
(3) Identity theft
(4) All of the above
Show Answer
Answer: (4)
Solution: Phishing, hacking, and identity theft are all types of cybercrime that involve unauthorized access to personal or organizational data.
Question 13
What is the primary function of a router?
(1) To connect a computer to the internet
(2) To manage data traffic between networks
(3) To store data
(4) To print documents
Show Answer
Answer: (2)
Solution: A router is a networking device that connects multiple devices on a network and manages data traffic between them.
Question 14
Which of the following is a type of malware?
(1) Virus
(2) Worm
(3) Trojan
(4) All of the above
Show Answer
Answer: (4)
Solution: Virus, worm, and Trojan are all types of malware that can harm computer systems and data.
Question 15
What is the full form of USB?
(1) Universal Serial Bus
(2) Universal Storage Bus
(3) Universal System Bus
(4) Universal Security Bus
Show Answer
Answer: (1)
Solution: USB stands for Universal Serial Bus, which is a standard for connecting devices to computers.
Question 16
Which of the following is a type of network topology?
(1) Star
(2) Bus
(3) Ring
(4) All of the above
Show Answer
Answer: (4)
Solution: Star, bus, and ring are all types of network topologies used to connect devices in a network.
Question 17
What is the purpose of a password?
(1) To speed up data transfer
(2) To verify user identity
(3) To store data securely
(4) To manage printers
Show Answer
Answer: (2)
Solution: A password is used to verify the identity of a user before granting access to a system or account.
Question 18
Which of the following is a type of open-source software?
(1) Microsoft Word
(2) Adobe Photoshop
(3) LibreOffice
(4) All of the above
Show Answer
Answer: (3)
Solution: LibreOffice is an open-source software suite, while Microsoft Word and Adobe Photoshop are proprietary software.
Question 19
What is the primary function of a firewall in a computer network?
(1) To block unauthorized access
(2) To speed up internet connection
(3) To store data securely
(4) To manage printer connections
Show Answer
Answer: (1)
Solution: A firewall is primarily used to block unauthorized access to a network and protect against potential threats.
Question 20
Which of the following is a type of cybersecurity threat?
(1) Phishing
(2) Malware
(3) Social engineering
(4) All of the above
Show Answer
Answer: (4)
Solution: Phishing, malware, and social engineering are all types of cybersecurity threats that can be used to exploit users or systems.
Question 21
What is the purpose of the Ctrl + C key combination?
(1) To copy text
(2) To paste text
(3) To undo the last action
(4) To save the document
Show Answer
Answer: (1)
Solution: Ctrl + C is used to copy selected text or data in most applications.
Question 22
Which of the following is a type of software license?
(1) Open-source
(2) Proprietary
(3) Freeware
(4) All of the above
Show Answer
Answer: (4)
Solution: Open-source, proprietary, and freeware are all types of software licenses that define how software can be used and distributed.
Question 23
What is the full form of RAM?
(1) Random Access Memory
(2) Read Access Memory
(3) Random Access Module
(4) Random Access Machine
Show Answer
Answer: (1)
Solution: RAM stands for Random Access Memory, which is a type of volatile memory used by computers to store data temporarily.
Question 24
Which of the following is a type of network protocol?
(1) HTTP
(2) FTP
(3) TCP/IP
(4) All of the above
Show Answer
Answer: (4)
Solution: HTTP, FTP, and TCP/IP are all types of network protocols used for communication over the internet.
Question 25
What is the purpose of a digital certificate?
(1) To speed up internet connection
(2) To verify the authenticity of a website
(3) To store data securely
(4) To manage printer connections