0% found this document useful (0 votes)
148 views13 pages

Introduction to Information Technology Questions and Answers Part 2

The document contains practice questions and answers related to various aspects of Information Technology, including hardware, software, networking, cybersecurity, web applications, social media ethics, and artificial intelligence. Each question is accompanied by a scenario, the correct answer, and an explanation of the concept. The content is structured in parts, covering topics from basic IT concepts to advanced applications in different fields.

Uploaded by

victoriajune178
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views13 pages

Introduction to Information Technology Questions and Answers Part 2

The document contains practice questions and answers related to various aspects of Information Technology, including hardware, software, networking, cybersecurity, web applications, social media ethics, and artificial intelligence. Each question is accompanied by a scenario, the correct answer, and an explanation of the concept. The content is structured in parts, covering topics from basic IT concepts to advanced applications in different fields.

Uploaded by

victoriajune178
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

CTC 101 PRACTISE QUESTIONS

Part 1: Introduction to Information Technology

1. Scenario: A company uses computers, servers, and routers to store and process data. These
physical devices are examples of ______.

✓ Answer: Hardware

✓ Explanation: Hardware refers to the physical components of IT systems, such as


computers, servers, and routers.

2. Scenario: A software like Windows or macOS that manages computer operations is an


example of an ______.

✓ Answer: Operating System

✓ Explanation: Operating systems like Windows and macOS are software that manage
hardware and software resources.

3. Scenario: To connect multiple devices in an office, a company uses routers and switches.
This is an example of ______.

✓ Answer: Networking

✓ Explanation: Networking involves connecting devices to enable communication and


data exchange.

4. Scenario: A company uses antivirus software and firewalls to protect its systems from cyber
threats. This is part of ______.

✓ Answer: Cybersecurity

✓ Explanation: Cybersecurity focuses on protecting systems and data from cyber


threats like hacking and malware.

5. Scenario: A hospital uses IT to manage patient records and enable remote consultations.
This is an example of IT in ______.

✓ Answer: Healthcare

✓ Explanation: IT plays a crucial role in healthcare by managing patient records and


enabling telemedicine.

Part 2: Web Applications and Usage


6. Scenario: A web app allows users to interact with dynamic content and perform tasks like
online shopping. This is an example of a ______.

✓ Answer: Web Application

✓ Explanation: Web applications are interactive and allow users to perform tasks
online.

7. Scenario: A web app adapts to different screen sizes, providing a seamless experience on
both mobile and desktop. This is called ______ design.

✓ Answer: Responsive

✓ Explanation: Responsive design ensures that web apps work well on various devices.

8. Scenario: A web app allows users to access certain features even without an internet
connection. This is a feature of ______.

✓ Answer: PWAs (Progressive Web Apps)

✓ Explanation: Progressive Web Apps (PWAs) offer offline capabilities.

9. Scenario: A web app uses HTML, CSS, and JavaScript to create its structure, style, and
interactivity. These are the core ______ technologies.

✓ Answer: Frontend

✓ Explanation: HTML, CSS, and JavaScript are fundamental frontend technologies.

10. Scenario: A web app connects to a server-side database to retrieve and store user data. This
is an example of ______ connectivity.

✓ Answer: Backend

✓ Explanation: Backend connectivity allows web apps to interact with databases and
servers.

Part 3: Internet, Social Media Abuse, and Practices

11. Scenario: The internet is a global network of interconnected computers that communicate
using ______.

✓ Answer: Protocols

✓ Explanation: Protocols like TCP/IP govern data transfer over the internet.

12. Scenario: A company uses a CDN to distribute content globally, reducing latency. CDN stands
for ______.

✓ Answer: Content Delivery Network

✓ Explanation: CDNs distribute content to servers worldwide to improve access speed.

13. Scenario: A user accesses a website by typing a domain name, which is translated into an IP
address by the ______.
✓ Answer: DNS (Domain Name System)

✓ Explanation: DNS translates human-readable domain names into IP addresses.

14. Scenario: A social media platform allows users to share photos and videos. This is an
example of a ______ platform.

✓ Answer: Media Sharing

✓ Explanation: Media sharing platforms focus on visual content like photos and
videos.

15. Scenario: A user creates a profile on a social media platform to connect with others. This is
an example of ______.

✓ Answer: Networking

✓ Explanation: Social media platforms facilitate networking and connections.

Part 4: Social Media Ethics

16. Scenario: A user shares false information on social media, which spreads quickly. This is an
example of ______.

o Answer: Misinformation

o Explanation: Misinformation refers to the spread of false or misleading information.

17. Scenario: A user posts a false statement that damages someone’s reputation. This is an
example of ______.

o Answer: Libel

o Explanation: Libel is the publication of a false statement that harms someone’s


reputation.

18. Scenario: A user copies someone else’s work and presents it as their own. This is an example
of ______.

o Answer: Plagiarism

o Explanation: Plagiarism involves using someone else’s work without proper


attribution.

19. Scenario: A user shares a copyrighted image without permission. This is an example of
______ infringement.

o Answer: Copyright

o Explanation: Copyright infringement occurs when someone uses copyrighted


material without authorization.

20. Scenario: A user uses a fake identity to deceive others online. This is an example of ______
theft.

o Answer: Identity
o Explanation: Identity theft involves using someone else’s identity for fraudulent
purposes.

Part 5: Artificial Intelligence

21. Scenario: A computer system that can perform tasks requiring human intelligence, like
speech recognition, is an example of ______.

o Answer: AI (Artificial Intelligence)

o Explanation: AI refers to systems that mimic human intelligence.

22. Scenario: A machine learning model is trained on labeled data to predict outcomes. This is
an example of ______ learning.

o Answer: Supervised

o Explanation: Supervised learning uses labeled data to train models.

23. Scenario: A machine learning model identifies patterns in unlabeled data. This is an example
of ______ learning.

o Answer: Unsupervised

o Explanation: Unsupervised learning works with unlabeled data to find patterns.

24. Scenario: A machine learning model improves its performance by interacting with an
environment and receiving rewards. This is an example of ______ learning.

o Answer: Reinforcement

o Explanation: Reinforcement learning involves learning through rewards and


punishments.

25. Scenario: A machine learning model is trained on one task and then applied to a related
task. This is an example of ______ learning.

o Answer: Transfer

o Explanation: Transfer learning involves applying knowledge from one task to


another.

Additional Questions

26. Scenario: A company uses IT to manage customer relationships through CRM software. CRM
stands for ______.

o Answer: Customer Relationship Management

o Explanation: CRM software helps businesses manage customer interactions.

27. Scenario: A company uses IT to analyze large datasets for decision-making. This is an
example of ______ analytics.
o Answer: Data

o Explanation: Data analytics involves analyzing data to gain insights.

28. Scenario: A company uses IT to automate repetitive tasks, increasing efficiency. This is an
example of ______.

o Answer: Automation

o Explanation: Automation involves using technology to perform tasks without human


intervention.

29. Scenario: A company uses IT to store and manage large amounts of data. This is an example
of ______ management.

o Answer: Database

o Explanation: Database management involves organizing and storing data.

30. Scenario: A company uses IT to protect its systems from cyber threats. This is an example of
______.

o Answer: Cybersecurity

o Explanation: Cybersecurity focuses on protecting systems from cyber threats.

31. Scenario: A company uses IT to enable remote work through tools like Zoom. This is an
example of ______ communication.

o Answer: Virtual

o Explanation: Virtual communication tools enable remote collaboration.

32. Scenario: A company uses IT to create and manage its website. This is an example of ______
development.

o Answer: Web

o Explanation: Web development involves creating and managing websites.

33. Scenario: A company uses IT to track changes in its codebase. This is an example of ______
control.

o Answer: Version

o Explanation: Version control systems track changes in code.

34. Scenario: A company uses IT to deploy its applications to the cloud. This is an example of
______ computing.

o Answer: Cloud

o Explanation: Cloud computing involves deploying applications over the internet.

35. Scenario: A company uses IT to analyze user behavior on its website. This is an example of
______ analytics.

o Answer: Web
o Explanation: Web analytics involves analyzing user behavior on websites.

36. Scenario: A company uses IT to create interactive web pages. This is an example of ______
development.

o Answer: Frontend

o Explanation: Frontend development focuses on creating interactive web pages.

37. Scenario: A company uses IT to manage its servers and network infrastructure. This is an
example of ______ administration.

o Answer: Systems

o Explanation: Systems administration involves managing servers and networks.

38. Scenario: A company uses IT to create a mobile app. This is an example of ______
development.

o Answer: Mobile

o Explanation: Mobile development involves creating apps for mobile devices.

39. Scenario: A company uses IT to analyze customer feedback. This is an example of ______
analysis.

o Answer: Sentiment

o Explanation: Sentiment analysis involves analyzing customer feedback to


understand emotions.

40. Scenario: A company uses IT to create a chatbot for customer service. This is an example of
______ processing.

o Answer: Natural Language

o Explanation: Natural Language Processing (NLP) enables chatbots to understand and


respond to human language.

41. Scenario: A company uses IT to predict future sales based on historical data. This is an
example of ______ analytics.

o Answer: Predictive

o Explanation: Predictive analytics involves using data to predict future outcomes.

42. Scenario: A company uses IT to create a virtual reality experience. This is an example of
______ reality.

o Answer: Virtual

o Explanation: Virtual reality (VR) creates immersive digital experiences.

43. Scenario: A company uses IT to create a 3D model of a product. This is an example of ______
design.

o Answer: 3D
o Explanation: 3D design involves creating three-dimensional models.

44. Scenario: A company uses IT to create a digital twin of a physical product. This is an example
of ______ modeling.

o Answer: Digital

o Explanation: Digital modeling involves creating digital replicas of physical objects.

45. Scenario: A company uses IT to create a recommendation system for its e-commerce
platform. This is an example of ______ learning.

o Answer: Machine

o Explanation: Machine learning is used to create recommendation systems.

46. Scenario: A company uses IT to create a fraud detection system. This is an example of
______ learning.

o Answer: Machine

o Explanation: Machine learning is used to detect fraudulent activities.

47. Scenario: A company uses IT to create a voice-activated assistant. This is an example of


______ intelligence.

o Answer: Artificial

o Explanation: Artificial intelligence enables voice-activated assistants.

48. Scenario: A company uses IT to create a self-driving car. This is an example of ______
learning.

o Answer: Reinforcement

o Explanation: Reinforcement learning is used in autonomous systems like self-driving


cars.

49. Scenario: A company uses IT to create a system that can recognize faces. This is an example
of ______ recognition.

o Answer: Facial

o Explanation: Facial recognition is a technology that identifies individuals based on


facial features.

50. Scenario: A company uses IT to create a system that can translate languages. This is an
example of ______ processing.

o Answer: Natural Language

o Explanation: Natural Language Processing (NLP) enables language translation.

Part 2: Introduction to Information Technology


1. Question: Which of the following is a practical application of IT in healthcare?
o A) Online shopping
o B) Telemedicine
o C) Social media marketing
o D) Video gaming
o Answer: B) Telemedicine
o Explanation: Telemedicine is a practical application of IT in healthcare,
enabling remote consultations and patient care.
2. Question: What is a common use of IT in the education sector?
o A) Online banking
o B) E-learning platforms
o C) Stock trading
o D) Video streaming
o Answer: B) E-learning platforms
o Explanation: E-learning platforms are widely used in education to provide
online courses and virtual classrooms.
3. Question: Which IT component is essential for managing customer relationships in
businesses?
o A) CRM software
o B) Antivirus software
o C) Video editing software
o D) Gaming software
o Answer: A) CRM software
o Explanation: CRM (Customer Relationship Management) software helps
businesses manage customer interactions and data.
4. Question: What is a key application of IT in the entertainment industry?
o A) Online banking
o B) Streaming services like Netflix
o C) Inventory management
o D) Email services
o Answer: B) Streaming services like Netflix
o Explanation: Streaming services like Netflix are a key application of IT in the
entertainment industry.
5. Question: Which of the following is an example of IT in communication?
o A) Video conferencing tools like Zoom
o B) Online shopping platforms
o C) Inventory management systems
o D) Accounting software
o Answer: A) Video conferencing tools like Zoom
o Explanation: Video conferencing tools like Zoom are used for
communication, making them a key IT application.

Part 2: Web Applications and Usage

6. Question: What is a practical use of a Progressive Web App (PWA)?


o A) Offline access to certain features
o B) High-speed data processing
o C) Hardware diagnostics
o D) Network configuration
o Answer: A) Offline access to certain features
o Explanation: PWAs allow users to access certain features even without an
internet connection.
7. Question: Which technology is used to make web pages interactive?
o A) HTML
o B) CSS
o C) JavaScript
o D) SQL
o Answer: C) JavaScript
o Explanation: JavaScript is used to add interactivity to web pages, such as
dynamic content and user interactions.
8. Question: What is a key feature of responsive web design?
o A) High-speed data transfer
o B) Adaptability to different screen sizes
o C) Offline functionality
o D) Data encryption
o Answer: B) Adaptability to different screen sizes
o Explanation: Responsive web design ensures that web pages adapt to
different screen sizes, such as mobile and desktop.
9. Question: Which of the following is a common use of web applications?
o A) Online shopping
o B) Hardware repair
o C) Network cabling
o D) Power supply management
o Answer: A) Online shopping
o Explanation: Web applications are commonly used for online shopping,
allowing users to browse and purchase products.
10. Question: What is a key benefit of using web applications over traditional software?
o A) Requires installation on each device
o B) Accessible through a web browser
o C) Limited to specific operating systems
o D) Requires physical distribution
o Answer: B) Accessible through a web browser
o Explanation: Web applications are accessible through web browsers,
eliminating the need for installation on each device.

Part 3: Internet, Social Media Abuse, and Practices

11. Question: What is a common use of the Domain Name System (DNS)?
o A) Encrypting data
o B) Translating domain names to IP addresses
o C) Blocking malicious websites
o D) Managing social media accounts
o Answer: B) Translating domain names to IP addresses
o Explanation: DNS translates human-readable domain names into IP addresses
that computers use to locate websites.
12. Question: Which of the following is a key function of Internet Service Providers
(ISPs)?
o A) Developing web applications
o B) Providing internet access to users
o C) Creating social media platforms
o D) Designing computer hardware
o Answer: B) Providing internet access to users
o Explanation: ISPs provide internet access to users, enabling them to connect
to the global network.
13. Question: What is a practical application of Content Delivery Networks (CDNs)?
o A) Reducing latency for global users
o B) Encrypting sensitive data
o C) Blocking cyber threats
o D) Managing social media content
o Answer: A) Reducing latency for global users
o Explanation: CDNs reduce latency by distributing content to servers located
closer to users.
14. Question: Which of the following is a common use of social media platforms?
o A) Online banking
o B) Sharing user-generated content
o C) Hardware diagnostics
o D) Network configuration
o Answer: B) Sharing user-generated content
o Explanation: Social media platforms are used for sharing user-generated
content like photos, videos, and posts.
15. Question: What is a key ethical concern related to social media?
o A) Data privacy
o B) Hardware compatibility
o C) Network speed
o D) Software licensing
o Answer: A) Data privacy
o Explanation: Data privacy is a major ethical concern on social media, as user
data can be misused.

Part 4: Social Media Ethics

16. Question: What is a common ethical issue related to social media content?
o A) Hardware failure
o B) Spread of misinformation
o C) Network congestion
o D) Software bugs
o Answer: B) Spread of misinformation
o Explanation: The spread of misinformation is a major ethical issue on social
media platforms.
17. Question: Which of the following is an example of unethical behavior on social
media?
o A) Sharing educational content
o B) Cyberbullying
o C) Posting original artwork
o D) Engaging in positive discussions
o Answer: B) Cyberbullying
o Explanation: Cyberbullying is an unethical behavior that involves harassing
or threatening others online.
18. Question: What is a key principle of digital citizenship?
o A) Sharing personal information publicly
o B) Respecting others' privacy
o C) Ignoring online etiquette
o D) Avoiding online interactions
o Answer: B) Respecting others' privacy
o Explanation: Respecting others' privacy is a key principle of digital
citizenship.
19. Question: Which of the following is a best practice for managing social media
profiles?
o A) Sharing sensitive personal information
o B) Using strong passwords
o C) Ignoring privacy settings
o D) Posting without reviewing content
o Answer: B) Using strong passwords
o Explanation: Using strong passwords is a best practice for securing social
media profiles.
20. Question: What is a key ethical consideration when using social media for
marketing?
o A) Ignoring customer feedback
o B) Transparency in advertising
o C) Posting irrelevant content
o D) Avoiding engagement with followers
o Answer: B) Transparency in advertising
o Explanation: Transparency in advertising is an ethical consideration to ensure
honesty in marketing.

Part 5: Artificial Intelligence

21. Question: What is a practical application of AI in healthcare?


o A) Online shopping
o B) Disease diagnosis
o C) Social media management
o D) Video editing
o Answer: B) Disease diagnosis
o Explanation: AI is used in healthcare for disease diagnosis by analyzing
medical data.
22. Question: Which of the following is an example of AI in finance?
o A) Fraud detection
o B) Video streaming
o C) Social media posting
o D) Hardware repair
o Answer: A) Fraud detection
o Explanation: AI is used in finance to detect fraudulent transactions by
analyzing patterns.
23. Question: What is a common use of AI in retail?
o A) Recommendation systems
o B) Network configuration
o C) Hardware diagnostics
o D) Power supply management
o Answer: A) Recommendation systems
o Explanation: AI-powered recommendation systems suggest products to users
based on their behavior.
24. Question: Which of the following is an example of AI in autonomous vehicles?
o A) Object recognition
o B) Social media integration
o C) Email management
o D) Network cabling
o Answer: A) Object recognition
o Explanation: AI is used in autonomous vehicles for object recognition to
navigate safely.
25. Question: What is a key application of AI in natural language processing (NLP)?
o A) Chatbots
o B) Hardware repair
o C) Network configuration
o D) Power supply management
o Answer: A) Chatbots
o Explanation: AI-powered chatbots use NLP to understand and respond to
human language.

Additional Questions

26. Question: What is a practical use of IT in business operations?


o A) Inventory management
o B) Video gaming
o C) Social media posting
o D) Hardware repair
o Answer: A) Inventory management
o Explanation: IT is used in businesses for inventory management to track and
manage stock levels.
27. Question: Which of the following is a key application of IT in scientific research?
o A) Data analysis
o B) Social media marketing
o C) Video editing
o D) Hardware diagnostics
o Answer: A) Data analysis
o Explanation: IT is used in scientific research for data analysis, modeling, and
simulations.
28. Question: What is a practical use of IT in the transportation industry?
o A) Route optimization
o B) Social media management
o C) Video streaming
o D) Hardware repair
o Answer: A) Route optimization
o Explanation: IT is used in transportation for route optimization to improve
efficiency.
29. Question: Which of the following is an example of IT in agriculture?
o A) Precision farming
o B) Social media marketing
o C) Video editing
o D) Hardware diagnostics
o Answer: A) Precision farming
o Explanation: IT is used in agriculture for precision farming, optimizing crop
yields.
30. Question: What is a key application of IT in the energy sector?
o A) Smart grid management
o B) Social media posting
o C) Video gaming
o D) Hardware repair
o Answer: A) Smart grid management
o Explanation: IT is used in the energy sector for smart grid management to
optimize energy distribution.

You might also like