Introduction to Information Technology Questions and Answers Part 2
Introduction to Information Technology Questions and Answers Part 2
1. Scenario: A company uses computers, servers, and routers to store and process data. These
physical devices are examples of ______.
✓ Answer: Hardware
✓ Explanation: Operating systems like Windows and macOS are software that manage
hardware and software resources.
3. Scenario: To connect multiple devices in an office, a company uses routers and switches.
This is an example of ______.
✓ Answer: Networking
4. Scenario: A company uses antivirus software and firewalls to protect its systems from cyber
threats. This is part of ______.
✓ Answer: Cybersecurity
5. Scenario: A hospital uses IT to manage patient records and enable remote consultations.
This is an example of IT in ______.
✓ Answer: Healthcare
✓ Explanation: Web applications are interactive and allow users to perform tasks
online.
7. Scenario: A web app adapts to different screen sizes, providing a seamless experience on
both mobile and desktop. This is called ______ design.
✓ Answer: Responsive
✓ Explanation: Responsive design ensures that web apps work well on various devices.
8. Scenario: A web app allows users to access certain features even without an internet
connection. This is a feature of ______.
9. Scenario: A web app uses HTML, CSS, and JavaScript to create its structure, style, and
interactivity. These are the core ______ technologies.
✓ Answer: Frontend
10. Scenario: A web app connects to a server-side database to retrieve and store user data. This
is an example of ______ connectivity.
✓ Answer: Backend
✓ Explanation: Backend connectivity allows web apps to interact with databases and
servers.
11. Scenario: The internet is a global network of interconnected computers that communicate
using ______.
✓ Answer: Protocols
✓ Explanation: Protocols like TCP/IP govern data transfer over the internet.
12. Scenario: A company uses a CDN to distribute content globally, reducing latency. CDN stands
for ______.
13. Scenario: A user accesses a website by typing a domain name, which is translated into an IP
address by the ______.
✓ Answer: DNS (Domain Name System)
14. Scenario: A social media platform allows users to share photos and videos. This is an
example of a ______ platform.
✓ Explanation: Media sharing platforms focus on visual content like photos and
videos.
15. Scenario: A user creates a profile on a social media platform to connect with others. This is
an example of ______.
✓ Answer: Networking
16. Scenario: A user shares false information on social media, which spreads quickly. This is an
example of ______.
o Answer: Misinformation
17. Scenario: A user posts a false statement that damages someone’s reputation. This is an
example of ______.
o Answer: Libel
18. Scenario: A user copies someone else’s work and presents it as their own. This is an example
of ______.
o Answer: Plagiarism
19. Scenario: A user shares a copyrighted image without permission. This is an example of
______ infringement.
o Answer: Copyright
20. Scenario: A user uses a fake identity to deceive others online. This is an example of ______
theft.
o Answer: Identity
o Explanation: Identity theft involves using someone else’s identity for fraudulent
purposes.
21. Scenario: A computer system that can perform tasks requiring human intelligence, like
speech recognition, is an example of ______.
22. Scenario: A machine learning model is trained on labeled data to predict outcomes. This is
an example of ______ learning.
o Answer: Supervised
23. Scenario: A machine learning model identifies patterns in unlabeled data. This is an example
of ______ learning.
o Answer: Unsupervised
24. Scenario: A machine learning model improves its performance by interacting with an
environment and receiving rewards. This is an example of ______ learning.
o Answer: Reinforcement
25. Scenario: A machine learning model is trained on one task and then applied to a related
task. This is an example of ______ learning.
o Answer: Transfer
Additional Questions
26. Scenario: A company uses IT to manage customer relationships through CRM software. CRM
stands for ______.
27. Scenario: A company uses IT to analyze large datasets for decision-making. This is an
example of ______ analytics.
o Answer: Data
28. Scenario: A company uses IT to automate repetitive tasks, increasing efficiency. This is an
example of ______.
o Answer: Automation
29. Scenario: A company uses IT to store and manage large amounts of data. This is an example
of ______ management.
o Answer: Database
30. Scenario: A company uses IT to protect its systems from cyber threats. This is an example of
______.
o Answer: Cybersecurity
31. Scenario: A company uses IT to enable remote work through tools like Zoom. This is an
example of ______ communication.
o Answer: Virtual
32. Scenario: A company uses IT to create and manage its website. This is an example of ______
development.
o Answer: Web
33. Scenario: A company uses IT to track changes in its codebase. This is an example of ______
control.
o Answer: Version
34. Scenario: A company uses IT to deploy its applications to the cloud. This is an example of
______ computing.
o Answer: Cloud
35. Scenario: A company uses IT to analyze user behavior on its website. This is an example of
______ analytics.
o Answer: Web
o Explanation: Web analytics involves analyzing user behavior on websites.
36. Scenario: A company uses IT to create interactive web pages. This is an example of ______
development.
o Answer: Frontend
37. Scenario: A company uses IT to manage its servers and network infrastructure. This is an
example of ______ administration.
o Answer: Systems
38. Scenario: A company uses IT to create a mobile app. This is an example of ______
development.
o Answer: Mobile
39. Scenario: A company uses IT to analyze customer feedback. This is an example of ______
analysis.
o Answer: Sentiment
40. Scenario: A company uses IT to create a chatbot for customer service. This is an example of
______ processing.
41. Scenario: A company uses IT to predict future sales based on historical data. This is an
example of ______ analytics.
o Answer: Predictive
42. Scenario: A company uses IT to create a virtual reality experience. This is an example of
______ reality.
o Answer: Virtual
43. Scenario: A company uses IT to create a 3D model of a product. This is an example of ______
design.
o Answer: 3D
o Explanation: 3D design involves creating three-dimensional models.
44. Scenario: A company uses IT to create a digital twin of a physical product. This is an example
of ______ modeling.
o Answer: Digital
45. Scenario: A company uses IT to create a recommendation system for its e-commerce
platform. This is an example of ______ learning.
o Answer: Machine
46. Scenario: A company uses IT to create a fraud detection system. This is an example of
______ learning.
o Answer: Machine
o Answer: Artificial
48. Scenario: A company uses IT to create a self-driving car. This is an example of ______
learning.
o Answer: Reinforcement
49. Scenario: A company uses IT to create a system that can recognize faces. This is an example
of ______ recognition.
o Answer: Facial
50. Scenario: A company uses IT to create a system that can translate languages. This is an
example of ______ processing.
11. Question: What is a common use of the Domain Name System (DNS)?
o A) Encrypting data
o B) Translating domain names to IP addresses
o C) Blocking malicious websites
o D) Managing social media accounts
o Answer: B) Translating domain names to IP addresses
o Explanation: DNS translates human-readable domain names into IP addresses
that computers use to locate websites.
12. Question: Which of the following is a key function of Internet Service Providers
(ISPs)?
o A) Developing web applications
o B) Providing internet access to users
o C) Creating social media platforms
o D) Designing computer hardware
o Answer: B) Providing internet access to users
o Explanation: ISPs provide internet access to users, enabling them to connect
to the global network.
13. Question: What is a practical application of Content Delivery Networks (CDNs)?
o A) Reducing latency for global users
o B) Encrypting sensitive data
o C) Blocking cyber threats
o D) Managing social media content
o Answer: A) Reducing latency for global users
o Explanation: CDNs reduce latency by distributing content to servers located
closer to users.
14. Question: Which of the following is a common use of social media platforms?
o A) Online banking
o B) Sharing user-generated content
o C) Hardware diagnostics
o D) Network configuration
o Answer: B) Sharing user-generated content
o Explanation: Social media platforms are used for sharing user-generated
content like photos, videos, and posts.
15. Question: What is a key ethical concern related to social media?
o A) Data privacy
o B) Hardware compatibility
o C) Network speed
o D) Software licensing
o Answer: A) Data privacy
o Explanation: Data privacy is a major ethical concern on social media, as user
data can be misused.
16. Question: What is a common ethical issue related to social media content?
o A) Hardware failure
o B) Spread of misinformation
o C) Network congestion
o D) Software bugs
o Answer: B) Spread of misinformation
o Explanation: The spread of misinformation is a major ethical issue on social
media platforms.
17. Question: Which of the following is an example of unethical behavior on social
media?
o A) Sharing educational content
o B) Cyberbullying
o C) Posting original artwork
o D) Engaging in positive discussions
o Answer: B) Cyberbullying
o Explanation: Cyberbullying is an unethical behavior that involves harassing
or threatening others online.
18. Question: What is a key principle of digital citizenship?
o A) Sharing personal information publicly
o B) Respecting others' privacy
o C) Ignoring online etiquette
o D) Avoiding online interactions
o Answer: B) Respecting others' privacy
o Explanation: Respecting others' privacy is a key principle of digital
citizenship.
19. Question: Which of the following is a best practice for managing social media
profiles?
o A) Sharing sensitive personal information
o B) Using strong passwords
o C) Ignoring privacy settings
o D) Posting without reviewing content
o Answer: B) Using strong passwords
o Explanation: Using strong passwords is a best practice for securing social
media profiles.
20. Question: What is a key ethical consideration when using social media for
marketing?
o A) Ignoring customer feedback
o B) Transparency in advertising
o C) Posting irrelevant content
o D) Avoiding engagement with followers
o Answer: B) Transparency in advertising
o Explanation: Transparency in advertising is an ethical consideration to ensure
honesty in marketing.
Additional Questions