VERY SIMPLE
MEDIUM
HARD
VERY HARD
GENERAL KNOWLEDGE
100

What does "IT" stand for?

Information technology

100

Which key combination is commonly used to copy selected text?

A) Ctrl + C
B) Ctrl + V
C) Ctrl + Z
D) Ctrl + X

A) Ctrl + C

100

How does DNS work, and what role does it play in Internet functionality?

 managing the mapping between names and numbers

100

1. Which of the following best explains the abstraction layers in computer systems from an IT architectural perspective?

A. Hardware → Operating System → Application Software → User Interface
B. User Interface → Application Software → Operating System → Hardware
C. Application Software → User Interface → Hardware → Operating System
D. Operating System → User Interface → Application Software → Hardware

A. Hardware → Operating System → Application Software → User Interface

100

Which protocol is primarily responsible for securing web traffic via encryption?

A. HTTP
B. SSL
C. FTP
D. SMTP

B. SSL

200

What is the primary function of the keyboard on a computer?
A) Display images

B) Input data
C) Store files
D) Connect to the internet

B) Input data

200

What are the main differences between system software and application software?

System software manages hardware operations and provides a platform for applications, facilitating user interaction and resource management. Application software performs specific tasks like word processing, data analysis, and multimedia management, directly serving user needs across various functions.

200

Which of the following keyboard shortcuts locks a Windows computer screen?

A) Ctrl + Alt + Delete
B) Windows Key + L
C) Alt + F4
D) Ctrl + Shift + Esc

B) Windows Key + L

200

In IT service management, which framework emphasizes continual service improvement using a service lifecycle approach?

A. COBIT
B. ITIL
C. ISO/IEC 27001
D. TOGAF

B. ITIL

200

In computer networking, what does the term “latency” specifically refer to?

A. The bandwidth of a data channel
B. The number of devices in a subnet
C. The delay between request and response in data transmission
D. The total data transmitted over a period

C. The delay between request and response in data transmission

300

Name one common use of computers in daily life.

 play a fun game, 

300

What is a spreadsheet used for?
A) Writing emails B) Drawing pictures
C) Playing music D)Organizinh and analyzing data

D)Organizinh and analyzing data

300

2. What type of data is typically stored in a relational database?

A) Unstructured data
B) Audio and video data
C) Structured data
D) Binary data

C) Structured data

300

Which keyboard layout was specifically designed to reduce finger movement and increase typing efficiency compared to QWERTY?

A. Dvorak Simplified Keyboard
B. Colemak Layout
C. AZERTY Keyboard
D. ANSI QWERTY Keyboard

A. Dvorak Simplified Keyboard

300

Which of the following is a key feature of a NoSQL database compared to a traditional RDBMS?

A. Supports only structured data
B. Enforces strict schema definitions
C. Optimized for horizontal scalability and unstructured data
D. Requires JOIN operations for querying related data

C. Optimized for horizontal scalability and unstructured data

400

Which key is used to delete text to the left of the cursor?
A) Enter
B) Shift

C) Backspace
D) Spacebar

C) Backspace

400

Explain the purpose of a network switch versus a router.

a switch connects multiple devices to create a network, a router connects multiple switches, and their respective networks, to form an even larger network

400

Which keyboard shortcut is used to open the Task Manager in Windows?

Ctrl + Shift + Esc

400

What is the primary function of a hypervisor in enterprise IT environments?

A. Providing a user-friendly interface for server applications
B. Managing and allocating hardware resources to virtual machines
C. Encrypting data at rest and in transit across networks
D. Acting as a firewall between internal and external traffic

B. Managing and allocating hardware resources to virtual machines

400

In software development, what does the principle of “separation of concerns” promote?

A. Combining user interface and business logic into one module
B. Using a single function to handle all application processes
C. Avoiding the use of object-oriented design
D.  Dividing a program into distinct sections with specific responsibilities

D.  Dividing a program into distinct sections with specific responsibilities

500

What is software?

Software is a generic term used to refer to applications, scripts and programs that run on a device.

500

Which key combination is used to select all the text in a document?

Ctrl + A

500

In data management, what is the difference between 'structured' and 'unstructured' data?
 

Structured data is organized in a fixed format like tables (e.g., spreadsheets or databases), while unstructured data

500

In data entry, what is the primary purpose of using data validation rules in spreadsheet software?

A. To automatically correct spelling mistakes
B. To filter visible rows based on conditions
C. To ensure only acceptable and accurate values are entered
D. To reduce file size for faster processing

C. To ensure only acceptable and accurate values are entered

500

 Which of the following best describes “edge computing”?

A. Using only mobile devices for computation
B. Storing data exclusively in data centers
C. Processing data near the source of generation to reduce latency
D.  Centralizing all computing power in the cloud

A. Using only mobile devices for computation

M
e
n
u