Information Technology Trivia Questions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Alcurnow
A
Alcurnow
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,411
Questions: 13 | Attempts: 1,411

SettingsSettingsSettings
Information Technology Trivia Questions - Quiz

This quiz is to test your knowledge of IT terminology. Remember the terms' definitions will be IT related, soem words may have another regular meaning. And don't forget to share your scores by posting them back on the Room of Infinite Diligence.


Questions and Answers
  • 1. 

    What does 'alias' refer to?

    • A.

      Another name, an assumed name.

    • B.

      An alternative name for a person or group using e-mail.

    • C.

      An extra-terrestrial

    Correct Answer
    B. An alternative name for a person or group using e-mail.
    Explanation
    The term 'alias' refers to an alternative name that is used by a person or group when sending or receiving emails. It is a way to use a different name instead of the original name for privacy or personal preference reasons.

    Rate this question:

  • 2. 

    What is a 'bandwith junkie'?

    • A.

      Someone who is addicted to being on the internet all the time.

    • B.

      Someone who is addicted to playing online internet games

    • C.

      Someone who is obsessed with the speed of their Internet connections.

    Correct Answer
    C. Someone who is obsessed with the speed of their Internet connections.
    Explanation
    A 'bandwidth junkie' refers to someone who is obsessed with the speed of their Internet connections. This person constantly seeks faster and more efficient ways to access the internet, and is always looking for ways to enhance their online experience. They prioritize the speed and performance of their internet connection above other aspects of their online activities.

    Rate this question:

  • 3. 

    What is a 'crisis blog'?

    • A.

      A slang term used to describe a blog that is created only to handle a business public relations crisis

    • B.

      A slang term used to describe a really bad blog

    • C.

      A slang term that describes the use of blogging to push an event or subject to mainstream news.

    Correct Answer
    A. A slang term used to describe a blog that is created only to handle a business public relations crisis
    Explanation
    A crisis blog refers to a slang term used to describe a blog that is specifically created to manage and handle a business's public relations crisis. This type of blog is designed to address and mitigate any negative publicity or issues that may arise, allowing the business to control the narrative and provide timely updates and information to the public. It serves as a crisis management tool to protect the reputation and image of the business during times of crisis.

    Rate this question:

  • 4. 

    What does DHCP stand for?

    • A.

      Dynamic Host Communication Protocol

    • B.

      Dynamic Host Configuration Protocol

    • C.

      Dynamic Header Configuration Printing

    Correct Answer
    B. Dynamic Host Configuration Protocol
    Explanation
    DHCP stands for Dynamic Host Configuration Protocol. This protocol is used to automatically assign IP addresses and other network configuration settings to devices on a network. It allows devices to join a network and obtain the necessary information to communicate with other devices and access network resources.

    Rate this question:

  • 5. 

    What is an e-book reader?

    • A.

      A hardware device which is posited to replace the conventional book.

    • B.

      An electronic version of a book.

    Correct Answer
    A. A hardware device which is posited to replace the conventional book.
    Explanation
    The correct answer is "A hardware device which is posited to replace the conventional book." This answer accurately describes an e-book reader as a physical device that is designed to replace traditional books. It implies that an e-book reader is not just an electronic version of a book, but a specific device with the purpose of replacing physical books.

    Rate this question:

  • 6. 

    What is firmware?

    • A.

      System software that is held in read-only memory

    • B.

      The solid parts of a computer

    • C.

      Software (machine instructions) stored more-or-less permanently in a ROM, PROM, EPROM, etc

    Correct Answer
    A. System software that is held in read-only memory
    Explanation
    Firmware refers to system software that is held in read-only memory (ROM). It is a type of software that is permanently stored in a computer's memory and is responsible for controlling the hardware and providing the necessary instructions for the system to function properly. Unlike other software that can be modified or updated, firmware remains unchanged unless specifically updated by the manufacturer. It plays a crucial role in the operation of various devices, such as computer hardware, smartphones, and embedded systems.

    Rate this question:

  • 7. 

    What is a 'geek'?

    • A.

      A person who knowledgeable about and talented at developing or working with computer systems, but to an excessive and often unworldly degree.

    • B.

      Someone who spends excessive time using a computer, often with unreasonable enthusiasm.

    Correct Answer
    A. A person who knowledgeable about and talented at developing or working with computer systems, but to an excessive and often unworldly degree.
    Explanation
    A geek is defined as a person who is highly knowledgeable and skilled in developing or working with computer systems. They possess a deep understanding of technology and often display exceptional talent in this field. However, their dedication and enthusiasm for computers can sometimes be excessive and disconnected from the real world.

    Rate this question:

  • 8. 

    What is 'hactivism'?  

    • A.

      Individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data.

    • B.

      The concept of hacking into a Web site or computer system in order to communicate a politically or socially motivated message.

    Correct Answer
    B. The concept of hacking into a Web site or computer system in order to communicate a politically or socially motivated message.
    Explanation
    Hactivism refers to the concept of hacking into a website or computer system with the intention of conveying a politically or socially motivated message. It involves unauthorized access to these systems, but the main objective is not to steal or corrupt data, but rather to use the access as a platform for expressing a specific message or advocating for a cause.

    Rate this question:

  • 9. 

    What is the Internet?

    • A.

      The global informal network that now links a very substantial fraction of the world's computer networks.

    • B.

      A collection of websites

    • C.

      The act or process of transferring a file from one computer system to another, usually but not necessarily across a network.

    Correct Answer
    A. The global informal network that now links a very substantial fraction of the world's computer networks.
    Explanation
    The correct answer is the global informal network that now links a very substantial fraction of the world's computer networks. This answer accurately describes the Internet as a network that connects computer networks worldwide. It highlights the global nature of the Internet and its ability to link a significant portion of computer networks globally.

    Rate this question:

  • 10. 

    What is JavaScript?

    • A.

      A scripting language designed to add features to web pages.

    • B.

      The coding of messages so as to render them unintelligible to other than authorized recipients.

    • C.

      A programming language

    Correct Answer
    A. A scripting language designed to add features to web pages.
    Explanation
    JavaScript is a scripting language that was specifically designed to enhance the functionality of web pages. It allows developers to add interactive elements, manipulate content, and create dynamic effects on websites. Unlike programming languages that are used to build applications, JavaScript primarily focuses on client-side scripting, meaning it runs directly in the browser and can be used to modify the behavior and appearance of web pages. Therefore, the statement "A scripting language designed to add features to web pages" accurately describes JavaScript's purpose and functionality.

    Rate this question:

  • 11. 

    What is a killer app?

    • A.

      Short for killer application: a virus designed to damage a computer's operating system

    • B.

      Short for killer application: a program which is so successful that it drives a huge demand for hardware to support it and peripheral software to interact with it

    Correct Answer
    B. Short for killer application: a program which is so successful that it drives a huge demand for hardware to support it and peripHeral software to interact with it
    Explanation
    A killer app refers to a program that is exceptionally successful and popular, leading to a significant increase in demand for the necessary hardware to run it and additional software to work with it. It is not related to a virus designed to harm a computer's operating system.

    Rate this question:

  • 12. 

    What is 'load balancing'?

    • A.

      The process whereby a system administrator specifies that whenever a server load exceeds a certain number it processes no more requests for its service

    • B.

      A technology whereby data is transmitted to users on an ongoing basis without them explicitly asking for it

    • C.

      Administering a network so that the traffic across it is spread as evenly as possible across the transmission lines.

    Correct Answer
    C. Administering a network so that the traffic across it is spread as evenly as possible across the transmission lines.
    Explanation
    Load balancing refers to the process of distributing network traffic evenly across multiple transmission lines in order to optimize performance and prevent any single line from becoming overwhelmed. This ensures that all servers or resources in the network are utilized efficiently, minimizing downtime and maximizing throughput. By evenly distributing the workload, load balancing helps to improve response times, increase availability, and enhance overall system reliability.

    Rate this question:

  • 13. 

    What is a 'mail bomb'?

    • A.

      The mailing of a large number of email messages to a recipient who has annoyed others, usually carried out by a number of users.

    • B.

      An email containing a computer virus that infects the user's computer.

    Correct Answer
    A. The mailing of a large number of email messages to a recipient who has annoyed others, usually carried out by a number of users.
    Explanation
    A mail bomb refers to the act of sending a significant volume of email messages to a specific recipient who has caused annoyance to others. This is typically done by multiple users as a form of retaliation or to overwhelm the recipient's inbox, causing disruption and inconvenience. It is a deliberate and malicious act aimed at causing frustration and inconvenience to the targeted individual.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 23, 2011
    Quiz Created by
    Alcurnow
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.