assistant information and communication Technology II
assistant information and communication Technology II
Communication Technology Officer II role. These questions cover a variety of topics including
networking, databases, security, hardware/software, and more, tailored for an ICT officer role.
• A) HTML
• B) MySQL
• C) CSS
• D) JavaScript
• Answer: B) MySQL
• A) RAM
• B) CPU
• C) Operating System
• D) Hard Drive
• A) SSL/TLS
• B) HTML
• C) JavaScript
• D) HTTP
• Answer: A) SSL/TLS
8. Which of the following protocols is used for web browsing?
• A) FTP
• B) SMTP
• C) HTTP
• D) IMAP
• Answer: C) HTTP
9. Which of the following is a widely used programming language for web development?
• A) Python
• B) JavaScript
• C) Java
• D) C++
• Answer: B) JavaScript
• A) Printer
• B) Router
• C) Scanner
• D) Monitor
• Answer: B) Router
13. Which of the following is used to protect data from unauthorized access?
• A) Firewall
• B) Antivirus Software
• C) Encryption
• D) Backup
• Answer: C) Encryption
• A) Data Encryption
• B) Data Integrity
• C) Data Transmission
• D) Data Compaction
15. What is the main difference between RAM and a hard drive?
• A) RAM stores data temporarily; the hard drive stores data permanently
• B) RAM stores data permanently; the hard drive stores data temporarily
• C) RAM and the hard drive both store data permanently
• Answer: A) RAM stores data temporarily; the hard drive stores data permanently
• A) Phishing
• B) Virus
• C) Firewall
• D) SSL
• Answer: B) Virus
• A) Windows
• B) Google Chrome
• C) Microsoft Excel
• D) Notepad
• D) To encrypt messages
• A) Printer
• B) Router
• C) Scanner
• D) Monitor
• Answer: B) Router
• A) To send an email
• C) To back up data
25. Which of the following is the most secure method for logging into a computer system?
• A) RAM
• C) Cache Memory
• D) CPU
• C) It cannot be customized
30. Which of the following is a widely used tool for web server management?
• A) Microsoft Word
• B) Apache HTTP Server
• C) Google Drive
• D) Skype
32. Which of the following is NOT a security measure for protecting a network?
• B) Enabling a firewall
• B) Secure Shell
• C) Lower cost
• A) Web browser
• B) Operating system
• C) Text editor
• A) Dropbox
• B) Notepad
• C) Excel
• D) Paint
• Answer: A) Dropbox
37. Which protocol is primarily used to send email over the internet?
• A) FTP
• B) SMTP
• C) HTTP
• D) IMAP
• Answer: B) SMTP
• Answer: C) It supports flexible data models, such as key-value, document, and graph
• A) Windows 10
• B) Microsoft Word
• C) Google Chrome
• Answer: A) Windows 10
• A) TCP/IP
• B) FTP
• C) HTTP
• D) SMTP
• Answer: A) TCP/IP
• D) To manage finances
• A) Hard drive
• B)
Flash drive
• C) CD/DVD
• D) RAM
• Answer: C) CD/DVD
49. Which of the following is used to manage the execution of programs and services?
• A) File manager
• B) Operating system
• C) Network monitor
• D) Text editor
50. Which of the following is an example of a security protocol used to secure email?
• A) SSH
• B) IMAP
• C) PGP
• D) HTTP
• Answer: C) PGP