Library Assistant - Information Technology

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Burdsjm
B
Burdsjm
Community Contributor
Quizzes Created: 1 | Total Attempts: 281
| Attempts: 283
SettingsSettings
Please wait...
  • 1/60 Questions

    CTRL +  V will paste copied text. CTRL + A will _____________.

    • Copy Text
    • Select All Text
    • Cut Text
    • Clear Copied Text
Please wait...
About This Quiz

A library assistant is there to help in curating, preparing of the materials. The librarian has enough on their plate as it is, so it always comes in handy to have somebody at your side doing the heavy lifting. Do you think you have what it takes to become a library assistant? Take the following quiz from an information technology perspective to find out!

Library Assistant - Information Technology - Quiz

Quiz Preview

  • 2. 

    What is Downloading?

    • Sending a file on the internet

    • Retrieving a file on the internet

    • Moving a file from a floppy

    • Scanning a Picture

    Correct Answer
    A. Retrieving a file on the internet
    Explanation
    Downloading refers to the process of retrieving or transferring a file from a remote server or another computer system to one's own device, typically through the internet. This can involve various types of files such as documents, images, videos, or software. It is a common practice for users to download files from the internet onto their devices for various purposes like accessing information, entertainment, or using specific applications.

    Rate this question:

  • 3. 

    Which of the below power line issues can cause problems with your computer?

    • Line sag

    • Line surge

    • Line noise

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    Line sag, line surge, and line noise can all cause problems with a computer. Line sag refers to a decrease in voltage levels, which can lead to the computer not receiving enough power to function properly. Line surge, on the other hand, is an increase in voltage levels that can damage the computer's components. Lastly, line noise refers to electrical disturbances or interference that can disrupt the computer's performance. Therefore, all of these power line issues have the potential to cause problems with a computer.

    Rate this question:

  • 4. 

    Which of the below file extensions is not an audio file format?

    • MP3

    • AIF

    • WAV

    • COM

    Correct Answer
    A. COM
    Explanation
    The file extension "COM" is not an audio file format. MP3, AIF, and WAV are all common audio file formats used to store and play audio data. However, "COM" is typically associated with executable files in the Windows operating system, not audio files.

    Rate this question:

  • 5. 

    How many bits in a byte?

    • 1

    • 2

    • 4

    • 8

    Correct Answer
    A. 8
    Explanation
    A byte consists of 8 bits. Each bit can represent a 0 or a 1, and when combined, these bits can represent a larger range of values. Therefore, the correct answer is 8.

    Rate this question:

  • 6. 

    What is the standard interactive and programming language for getting information from a database?

    • SQL

    • DCOM

    • PL/1

    • DASD

    Correct Answer
    A. SQL
    Explanation
    SQL is the standard interactive and programming language for getting information from a database. It stands for Structured Query Language and is widely used in relational database management systems. SQL allows users to retrieve, manipulate, and manage data stored in a database. It provides a standardized way to interact with databases, making it the most commonly used language for database management and querying. DCOM, PL/1, and DASD are not programming languages specifically designed for database interaction, making SQL the correct answer.

    Rate this question:

  • 7. 

    To send an email to multiple parties with none of them knowing the other recipients.  What email field would you use?

    • Cc:

    • To:

    • Bcc:

    • From:

    Correct Answer
    A. Bcc:
    Explanation
    Bcc stands for "Blind Carbon Copy". When sending an email to multiple recipients using the Bcc field, none of the recipients can see the other recipients' email addresses. This ensures the privacy of each recipient's contact information and prevents them from knowing who else received the email.

    Rate this question:

  • 8. 

    What does SMTP stand for?

    • Simple Mailer Transport Protocol

    • Simple Mail Transport Protocol

    • Single Mail Transport Protocol

    Correct Answer
    A. Simple Mail Transport Protocol
    Explanation
    SMTP stands for Simple Mail Transport Protocol. It is a standard communication protocol used for sending and receiving email messages between servers. SMTP is responsible for the transmission of email messages over the internet, ensuring that they are properly routed and delivered to the intended recipients. It is a widely used protocol that enables the efficient and reliable exchange of emails across different email systems and networks.

    Rate this question:

  • 9. 

    What is a cookie?

    • Cooking Software

    • Web Site

    • Internet information File

    • Hacker File

    Correct Answer
    A. Internet information File
    Explanation
    A cookie is a small text file that is stored on a user's computer by a website. It contains information about the user's browsing activity on that website, such as login credentials, preferences, and shopping cart items. This information is used by the website to personalize the user's experience and remember their preferences for future visits. Cookies are not cooking software, a web site, or a hacker file, but rather they are internet information files that help websites track and store user data.

    Rate this question:

  • 10. 

    Which of the below formulas add cells a1 through a5 in Microsoft Excel?

    • =sum(A1+A5)

    • =sum(A1:A5)

    • =add(A1+A5)

    • =total(A1:A5)

    Correct Answer
    A. =sum(A1:A5)
    Explanation
    The correct answer is =sum(A1:A5). This formula uses the SUM function in Excel to add the values in cells A1 through A5. The colon (:) is used to indicate a range of cells, so A1:A5 represents all the cells from A1 to A5. The SUM function then calculates the sum of these cells, resulting in the total value.

    Rate this question:

  • 11. 

    Which of the following is not an anti-virus company?

    • AVG

    • McAfee

    • Symantec

    • Xargon

    Correct Answer
    A. Xargon
    Explanation
    Xargon is not an anti-virus company because it is not a well-known or recognized name in the field of cybersecurity. AVG, McAfee, and Symantec are all established and reputable companies that specialize in developing and providing anti-virus software and solutions to protect against malware and other online threats. On the other hand, Xargon does not have a presence or reputation in the anti-virus industry, indicating that it is not an anti-virus company.

    Rate this question:

  • 12. 

    Which of the below options is not an iPod Apple has released?

    • IPod Mini

    • IPod Nano

    • IPod Shuffle

    • IPod Vision

    Correct Answer
    A. IPod Vision
    Explanation
    The correct answer is iPod Vision because it is not a model of iPod that Apple has released. Apple has released the iPod Mini, iPod Nano, and iPod Shuffle, but there is no iPod Vision in their lineup.

    Rate this question:

  • 13. 

    Which of the below is not a network device?

    • Core

    • Switch

    • Hub

    • Router

    Correct Answer
    A. Core
    Explanation
    A core is not a network device. In networking, a core refers to the central or main part of a network that connects multiple switches, routers, and other devices. It is responsible for routing and forwarding data within the network. However, it is not a physical device itself, but rather a concept or term used to describe the central infrastructure of a network.

    Rate this question:

  • 14. 

    Which of the below has the most capacity?

    • 100GB

    • 100KB

    • 100MB

    • 100TB

    Correct Answer
    A. 100TB
    Explanation
    The given answer, 100TB, has the most capacity compared to the other options. The unit "TB" stands for terabytes, which is larger than gigabytes (GB), megabytes (MB), and kilobytes (KB). Therefore, 100TB represents a larger amount of storage space than 100GB, 100MB, or 100KB.

    Rate this question:

  • 15. 

    Which of the following is not an image file?

    • JPEG

    • GIF

    • TMP

    • BMP

    Correct Answer
    A. TMP
    Explanation
    TMP is not an image file format. JPEG, GIF, and BMP are all common image file formats used to store and display images. TMP typically refers to temporary files that are created and used by various software programs for temporary storage or caching purposes, but it is not specifically used for storing images.

    Rate this question:

  • 16. 

    What is the name of the below image? Which is a protection scheme that requires visitors to enter the letters and numbers when filling out a form on the Internet.

    • Captcha

    • Decepcha

    • Gotcha

    • GenImage

    Correct Answer
    A. Captcha
    Explanation
    The correct answer is "Captcha." Captcha is a protection scheme that requires visitors to enter letters and numbers when filling out a form on the Internet. It is commonly used to prevent automated bots from spamming or submitting malicious data on websites.

    Rate this question:

  • 17. 

    Which of the below media types hold the most information?

    • Blu-ray

    • CD

    • DVD

    • Floppy diskette

    Correct Answer
    A. Blu-ray
    Explanation
    Blu-ray holds the most information compared to the other media types listed. This is because Blu-ray discs have a higher storage capacity than CDs, DVDs, and floppy diskettes. Blu-ray discs can hold up to 25GB or 50GB of data, depending on the type, while CDs typically hold around 700MB, DVDs hold around 4.7GB or 8.5GB, and floppy diskettes hold only 1.44MB. Therefore, Blu-ray discs can store more data, making them capable of holding the most information.

    Rate this question:

  • 18. 

    Which below IP address would be used for a local, Non-Routable network?

    • 74.125.127.100

    • 69.72.169.241

    • 192.168.1.100

    • 209.131.36.100

    Correct Answer
    A. 192.168.1.100
    Explanation
    The IP address 192.168.1.100 would be used for a local, Non-Routable network. This is because it falls within the range of private IP addresses reserved for use within a local network. These addresses are not routable on the internet and are commonly used for internal networks in homes, offices, or other private settings.

    Rate this question:

  • 19. 

    This is a network point that acts as an entrance to another network.

    • Handshake

    • Gateway

    • Router

    • Switch

    Correct Answer
    A. Gateway
    Explanation
    A gateway is a network point that acts as an entrance to another network. It is responsible for connecting different networks and facilitating communication between them. It acts as a bridge between two networks with different protocols, allowing data to flow between them. A gateway can be a hardware device or a software program. It is commonly used in computer networks to connect local area networks (LANs) to wide area networks (WANs) or the internet.

    Rate this question:

  • 20. 

    Which part of the computer does an EIDE cable connect to?

    • Floppy drive

    • Hard disk drive

    • Sound card

    • Video card

    Correct Answer
    A. Hard disk drive
    Explanation
    An EIDE cable connects to the hard disk drive. EIDE stands for Enhanced Integrated Drive Electronics, and it is a type of interface used to connect storage devices like hard drives and optical drives to the motherboard of a computer. The EIDE cable allows for data transfer between the hard disk drive and the computer, enabling the computer to read and write data to the hard drive.

    Rate this question:

  • 21. 

    Which of the below will not help your computers security?

    • Firewall

    • VLAN

    • Good Password

    • Updated Software

    Correct Answer
    A. VLAN
    Explanation
    A VLAN (Virtual Local Area Network) is a network technology that allows for the segmentation of a physical network into multiple virtual networks. While VLANs can provide benefits such as improved network performance and increased security by separating traffic, they do not directly contribute to computer security. Computer security is typically enhanced through measures such as firewalls, which monitor and control network traffic, good passwords that protect against unauthorized access, and updated software that patches vulnerabilities. VLANs are more focused on network management and organization rather than computer security.

    Rate this question:

  • 22. 

    What is the input device primarily used with a PDA?

    • Keyboard

    • Mouse

    • Scanner

    • Stylus

    Correct Answer
    A. Stylus
    Explanation
    A stylus is the input device primarily used with a PDA. PDAs, also known as Personal Digital Assistants, are handheld devices that are used for various functions such as note-taking, scheduling, and accessing the internet. A stylus is a pen-like device that allows users to interact with the PDA's touchscreen, enabling them to navigate through menus, input text, and select options. It provides a precise and accurate input method, making it ideal for the small screens and limited space of a PDA.

    Rate this question:

  • 23. 

    What is the .tbz file extension?

    • Compressed text file

    • Text file

    • Audio file

    • Compressed tar file

    Correct Answer
    A. Compressed tar file
    Explanation
    The .tbz file extension is commonly used for compressed tar files. Tar files are archive files that contain multiple files and directories, while the .tbz extension indicates that the tar file has been further compressed using bzip2 compression. This compression method helps reduce the file size and makes it easier to transfer or store the file. Therefore, the correct answer is "Compressed tar file."

    Rate this question:

  • 24. 

    How to determine how much memory a program is using?

    • Windows Task Manager

    • Windows File Explorer

    • File Properties

    Correct Answer
    A. Windows Task Manager
    Explanation
    To determine how much memory a program is using, you can use the Windows Task Manager. The Task Manager provides real-time information about the processes and resources being utilized by various programs running on your computer. By accessing the Task Manager, you can navigate to the "Processes" tab and locate the specific program you are interested in. The "Memory" column will display the amount of memory (RAM) being used by each program, allowing you to determine the memory usage of the desired program.

    Rate this question:

  • 25. 

    What software would you use to convert a scanned image to text?

    • PBR

    • OCR

    • FDD

    • READ

    Correct Answer
    A. OCR
    Explanation
    OCR stands for Optical Character Recognition, which is a software technology used to convert scanned images or printed text into editable and searchable data. It analyzes the shapes and patterns of the characters in the scanned image and translates them into machine-readable text. OCR is commonly used in various applications such as document management, data entry, and automated data extraction. Therefore, OCR is the correct answer for converting a scanned image to text.

    Rate this question:

  • 26. 

    What MS-DOS command can display hidden files?

    • Attrib

    • Cd

    • Ls

    • More

    Correct Answer
    A. Attrib
    Explanation
    The MS-DOS command "attrib" can display hidden files. This command is used to view or change the attributes of files or directories in MS-DOS. By using the "attrib" command with the appropriate parameters, users can reveal hidden files and folders that are not normally visible in the file explorer.

    Rate this question:

  • 27. 

    What server would you check on if you were able to reach a website by IP address by not by the name?

    • WINS

    • Firewall

    • DNS

    • DHCP

    Correct Answer
    A. DNS
    Explanation
    If you are able to reach a website by its IP address but not by its name, it suggests that there may be an issue with the Domain Name System (DNS). DNS is responsible for translating domain names into IP addresses. In this case, the DNS server would be the one to check as it is responsible for resolving domain names to their corresponding IP addresses.

    Rate this question:

  • 28. 

    If I wanted to modify the registry of a computer what command would I use?

    • Registry123

    • Regedit

    • Editregistry

    • EDTREG

    Correct Answer
    A. Regedit
    Explanation
    To modify the registry of a computer, the command that would be used is "regedit". The "regedit" command is a built-in Windows utility that allows users to view, modify, and configure the Windows registry, which is a hierarchical database that stores settings and configurations for the operating system and installed applications. By using "regedit", users can make changes to the registry, such as adding, deleting, or modifying registry keys and values, which can affect various aspects of the computer's functionality and behavior.

    Rate this question:

  • 29. 

    Which of the below is not a type of computer memory?

    • DIMM

    • MIMM

    • RIMM

    • SIMM

    Correct Answer
    A. MIMM
    Explanation
    DIMM, RIMM, and SIMM are all types of computer memory modules. However, MIMM is not a recognized type of computer memory.

    Rate this question:

  • 30. 

    What is the name of the port in the below picture?

    • AT

    • Mouse

    • PS/2

    • USB

    Correct Answer
    A. PS/2
    Explanation
    The correct answer is PS/2. This is because the picture shows a port that is commonly known as a PS/2 port. PS/2 ports are used to connect keyboards and mice to computers. They are round in shape and have either a purple or green color coding. Other options mentioned in the question, such as AT, Mouse, and USB, are not relevant to the picture and do not match the port shown.

    Rate this question:

  • 31. 

    What is the free Microsoft program used to remotely administer computers and servers?

    • Remote Computer

    • VNC

    • LANDesk

    • Remote Desktop Connection

    Correct Answer
    A. Remote Desktop Connection
    Explanation
    Remote Desktop Connection is the correct answer because it is a free Microsoft program that allows users to remotely administer computers and servers. With Remote Desktop Connection, users can connect to another computer or server over a network and access its desktop, files, and applications as if they were sitting in front of it. This program is commonly used for remote troubleshooting, software installations, and remote support.

    Rate this question:

  • 32. 

    Which of the below is a PC video file extension?

    • .mve

    • .mp3

    • .avi

    • .vdo

    Correct Answer
    A. .avi
    Explanation
    The correct answer is .avi. This is a commonly used video file extension for PC. It stands for Audio Video Interleave and is widely supported by various media players and video editing software.

    Rate this question:

  • 33. 

    HTML Tags are case sensitive.

    • True

    • False

    Correct Answer
    A. False
    Explanation
    HTML tags are not case sensitive. This means that whether you write a tag in uppercase or lowercase, it will be interpreted the same way by the browser. For example, and are both valid paragraph tags in HTML. This flexibility allows developers to write tags in a way that is easier to read and understand.

    Rate this question:

  • 34. 

    What is SSL short for?

    • Secure Socket LAN

    • Software Security Layer

    • Secure Software Layer

    • Secure Socket Layer

    Correct Answer
    A. Secure Socket Layer
    Explanation
    SSL is short for Secure Socket Layer. It is a protocol that provides secure communication over the internet. SSL ensures that the data transmitted between a web server and a browser remains encrypted and cannot be intercepted or tampered with by unauthorized individuals. It establishes a secure connection by encrypting the data and verifying the identity of the server. SSL is commonly used for secure online transactions, such as online banking, e-commerce, and sensitive data transfers.

    Rate this question:

  • 35. 

    What is the standard HTTP port number?

    • 443

    • 80

    • 8080

    • 25

    Correct Answer
    A. 80
    Explanation
    The standard HTTP port number is 80. When a client sends an HTTP request to a server, it typically uses port 80 to establish the connection. This is the default port for HTTP communication and is widely supported by web servers and browsers.

    Rate this question:

  • 36. 

    What is Apache?

    • Browser

    • Computer

    • Operating system

    • Web server

    Correct Answer
    A. Web server
    Explanation
    Apache is a web server software that allows websites to be hosted on the internet. It is not a browser, computer, or operating system. Apache is widely used due to its reliability, security, and flexibility. It supports various features and protocols, making it a popular choice for hosting websites and serving web content.

    Rate this question:

  • 37. 

    A DNS translates a domain name into what?

    • Binary

    • Hex

    • IP

    • URL

    Correct Answer
    A. IP
    Explanation
    A DNS (Domain Name System) translates a domain name into an IP (Internet Protocol) address. This is necessary because domain names are easier for humans to remember and use, while IP addresses are used by computers to identify and communicate with each other on the internet. Therefore, when a user types a domain name into a web browser, the DNS system translates that domain name into the corresponding IP address, allowing the browser to connect to the correct web server and retrieve the requested webpage.

    Rate this question:

  • 38. 

    Which command lists files in MS-DOS?

    • Cd

    • Ls

    • Dir

    • List

    Correct Answer
    A. Dir
    Explanation
    The correct answer is "dir" because in MS-DOS, the "dir" command is used to list the files and directories in the current directory. The "cd" command is used to change the current directory, "ls" is a command used in Unix-based systems, and "list" is not a valid command in MS-DOS.

    Rate this question:

  • 39. 

    What is another common name for a motherboard?

    • CPU

    • Fatherboard

    • Main system

    • System board

    Correct Answer
    A. System board
    Explanation
    The correct answer is "System board". A motherboard is also commonly referred to as a system board. It is the main circuit board in a computer that holds and connects all the crucial components such as the CPU, memory, and other peripherals.

    Rate this question:

  • 40. 

    What is the original capacity of a standard CD?

    • 650MB

    • 600MB

    • 500MB

    • 200MB

    Correct Answer
    A. 650MB
    Explanation
    The original capacity of a standard CD is 650MB. This means that the CD can hold up to 650 megabytes of data.

    Rate this question:

  • 41. 

    Which of the below Windows utilities allow you to view a drives partition information?

    • Chkdsk

    • Disk Management

    • Device Manager

    • Scandisk

    Correct Answer
    A. Disk Management
    Explanation
    Disk Management is a Windows utility that allows users to view a drive's partition information. It provides a graphical interface to manage disks, partitions, and volumes on a computer. With Disk Management, users can view the layout and properties of their hard drives, including the partition style, file system, and available space. They can also create, delete, resize, and format partitions as needed. This utility is particularly useful for managing storage devices and organizing data on a computer system.

    Rate this question:

  • 42. 

    What is the capacity of a standard formatted PC floppy?

    • 2MB

    • 1.44K

    • 1.44MB

    • 120MB

    Correct Answer
    A. 1.44MB
    Explanation
    The capacity of a standard formatted PC floppy is 1.44MB. Floppy disks were commonly used as a portable storage medium in the past. They were capable of storing a small amount of data, usually text files, images, or small programs. The 1.44MB capacity refers to the maximum amount of data that could be stored on a single floppy disk. This capacity was sufficient for many basic computing tasks at the time, but it is now considered extremely small compared to modern storage options.

    Rate this question:

  • 43. 

    Which of the below is not a type of computer battery?

    • BIOS

    • CMOS

    • Li-ion

    • NiMH

    Correct Answer
    A. BIOS
    Explanation
    The correct answer is BIOS. BIOS stands for Basic Input/Output System and it is a firmware that is responsible for initializing the hardware of a computer during the boot process. It is not a type of computer battery. CMOS (Complementary Metal-Oxide-Semiconductor), Li-ion (Lithium-ion), and NiMH (Nickel Metal Hydride) are all types of computer batteries commonly used in laptops and other portable devices.

    Rate this question:

  • 44. 

    Email uses communication protocol:

    • SMTP

    • HTTP

    • ICMP

    • TCP/IP

    Correct Answer
    A. SMTP
    Explanation
    SMTP stands for Simple Mail Transfer Protocol. It is a communication protocol used for sending and receiving email messages between servers. SMTP is responsible for the transmission of email messages from the sender's email client to the recipient's mail server. It works in conjunction with other protocols such as POP (Post Office Protocol) or IMAP (Internet Message Access Protocol) for email retrieval. SMTP is widely used across the internet for email communication and is an essential component of the email infrastructure.

    Rate this question:

  • 45. 

    What is the basic program used to verify that an IP address is online and accepting requests?

    • Universal Resource Locator

    • NOC

    • Ping

    • Bandwidth Test

    Correct Answer
    A. Ping
    Explanation
    Ping is the correct answer because it is a basic program used to verify if an IP address is online and accepting requests. It sends a small packet of data to the IP address and waits for a response. If a response is received, it confirms that the IP address is online and functioning properly. Ping is commonly used for troubleshooting network connectivity issues and to measure the response time between devices on a network.

    Rate this question:

  • 46. 

    You are working in Linux when a program hits a flaw and stops running.  Which command can be used to end the process?

    • Kill

    • Stop

    • End

    • Wait

    • CTRL-ALT-DEL

    Correct Answer
    A. Kill
    Explanation
    The kill command in Linux is used to terminate a process. When a program hits a flaw and stops running, the kill command can be used to forcefully end the process. It sends a signal to the process, instructing it to terminate immediately. This allows the user to regain control over the system and free up system resources that were being used by the faulty program.

    Rate this question:

  • 47. 

    Which network protocol is used to send e-mail from server to server?

    • FTP

    • SSH

    • POP3

    • SMTP

    Correct Answer
    A. SMTP
    Explanation
    SMTP (Simple Mail Transfer Protocol) is the correct answer. It is a network protocol used to send email messages from one server to another. SMTP is responsible for the transmission and delivery of email over the internet. It works in conjunction with other protocols like POP3 and IMAP to handle the sending, receiving, and storage of email messages. FTP (File Transfer Protocol) is used for transferring files, SSH (Secure Shell) is used for secure remote login, and POP3 (Post Office Protocol version 3) is used for retrieving email from a mail server.

    Rate this question:

  • 48. 

    What is IRC short for?

    • Internet Relay Channel

    • Internet Respond Channel

    • Internet Relay Chat

    • Internet Response Cache

    Correct Answer
    A. Internet Relay Chat
    Explanation
    IRC is short for Internet Relay Chat. IRC is a protocol that enables real-time text communication between users over the internet. It allows users to join chat rooms, send messages, and participate in group discussions. The term "chat" in the correct answer indicates that IRC is primarily used for online chatting and communication purposes.

    Rate this question:

  • 49. 

    Which Linux command sets a files permission?

    • Attrib

    • Chmod

    • Properties

    • Rights

    Correct Answer
    A. Chmod
    Explanation
    The Linux command "chmod" is used to set permissions for files. It allows the user to change the read, write, and execute permissions for the owner, group, and others. By using the "chmod" command followed by the appropriate permission codes, users can control who can access and modify a file.

    Rate this question:

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 29, 2011
    Quiz Created by
    Burdsjm
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.