Information Technology

IT
August 7, 2025

An Information Technology (IT) internship is a short-term, hands-on experience designed to give students or recent graduates practical exposure to real-world IT environments. It allows interns to apply classroom knowledge, gain technical skills, understand workplace dynamics, and build a foundation for a future career in tech.

Common Areas of Work

AreaDescription
Tech SupportAssisting in troubleshooting hardware/software issues, maintaining systems.
Software DevelopmentWriting and testing code, working on web/app development projects.
Network AdministrationHelping manage network infrastructure, configuring routers/switches.
CybersecurityAssisting in monitoring systems for threats, learning ethical hacking basics.
Database ManagementWriting queries, managing records, working with MySQL, PostgreSQL, etc.
Cloud/DevOpsExposure to AWS, Azure, CI/CD pipelines, or container tools like Docker.
IT Project ManagementUnderstanding documentation, planning, and task tracking tools like Jira.
0%

Important Notice:
Once you start the quiz, you will not be able to pause, exit, or restart it. Please ensure you are ready before beginning.


IT

Information Technology L1

1 / 100

1) Which company is known for developing the Android operating system?

2 / 100

2) Which of the following is not a Microsoft product?

3 / 100

3) What is the purpose of RAID in storage systems?

4 / 100

4) Which command is used to copy files in Windows command prompt?

5 / 100

5) Which of the following is used to handle exceptions in Java?

6 / 100

6) What is the role of DNS (Domain Name System)?

7 / 100

7) Which of the following can protect data by converting it into unreadable code?

8 / 100

8) In cybersecurity, what does “2FA” stand for?

9 / 100

9) What is the full form of GUI?

10 / 100

10) What type of software is an antivirus program?

11 / 100

11) Which of the following is a function of a switch in networking?

12 / 100

12) Which component acts as the brain of the computer?

13 / 100

13) Which of the following is a NoSQL database?

14 / 100

14) What type of cyber attack involves overwhelming a system with traffic?

15 / 100

15) What is the full form of ISP?

16 / 100

16) What is the purpose of a VPN?

17 / 100

17) Which of the following is a type of non-volatile memory?

18 / 100

18) Which one is a valid IPv6 address?

19 / 100

19) What is the main characteristic of open-source software?

20 / 100

20) Which protocol is used for secure communication over the Internet?

21 / 100

21) Which of the following is not an input device?

22 / 100

22) Which of the following is an input device?

23 / 100

23) What does GUI stand for in computing?

24 / 100

24) Which HTTP method is used to retrieve data from a server?

25 / 100

25) What does 'ping' do in a network?

26 / 100

26) Which tone is most appropriate when responding to an upset client?

27 / 100

27) What is an example of a domain name?

28 / 100

28) What is the function of the DHCP protocol?

29 / 100

29) Which of the following is an example of cloud storage?

30 / 100

30) Which keyword is used to inherit a class in Java?

31 / 100

31) Which type of software is MS Word?

32 / 100

32) Which of the following is a function of an operating system?

33 / 100

33) What is the most important part of effective customer communication?

34 / 100

34) Which layer of the OSI model deals with logical addressing?

35 / 100

35) Which of these storage types is volatile?

36 / 100

36) What is the parent class of all Java classes?

37 / 100

37) Which of the following is an example of biometric security?

38 / 100

38) Which device is used to connect multiple networks together?

39 / 100

39) Which language is commonly used to manage databases?

40 / 100

40) Which of these is used to uniquely identify every computer on the internet?

41 / 100

41) Which of the following storage types is fastest?

42 / 100

42) Which programming language is used for web development?

43 / 100

43) What kind of device is a firewall?

44 / 100

44) What does the acronym "URL" stand for?

45 / 100

45) Which of the following is an example of a cloud service model?

46 / 100

46) What type of device is a router?

47 / 100

47) What does IP stand for in IP address?

48 / 100

48) Which of the following is a valid IPv4 address?

49 / 100

49) Which of the following is not a Java keyword?

50 / 100

50) Which language is primarily used for Android app development?

51 / 100

51) What is an IP address used for?

52 / 100

52) What is the function of DNS?

53 / 100

53) Which one of the following is a cloud platform?

54 / 100

54) Which of the following is a type of malware that demands payment?

55 / 100

55) Which of the following commands is used to view directory contents in Linux?

56 / 100

56) Which protocol is used to browse websites?

57 / 100

57) Which of the following best describes phishing?

58 / 100

58) Which of the following is not a characteristic of cloud computing?

59 / 100

59) Which of the following is a strong password?

60 / 100

60) Which of these is an example of open-source software?

61 / 100

61) What is the primary function of a firewall?

62 / 100

62) Which protocol is used to securely transfer files?

63 / 100

63) Which of these collections guarantees insertion order?

64 / 100

64) Which of the following best describes encryption?

65 / 100

65) What does HTML stand for?

66 / 100

66) Which of these access modifiers makes a member visible only within its own class?

67 / 100

67) What does CPU stand for?

68 / 100

68) What is the size of an int in Java?

69 / 100

69) What is the main purpose of a database?

70 / 100

70) Which of these is not an operating system?

71 / 100

71) What is the full form of URL?

72 / 100

72) What is phishing?

73 / 100

73) What is the most common unit to measure memory size?

74 / 100

74) Which of these is used to uniquely identify a device on a network?

75 / 100

75) In cloud computing, what does "IaaS" stand for?

76 / 100

76) What is the extension of Microsoft Excel files?

77 / 100

77) What does the "ping" command do?

78 / 100

78) What is the main purpose of an operating system?

79 / 100

79) What does SaaS stand for in cloud computing?

80 / 100

80) Which Java feature allows the same method to have different implementations?
A) Inheritance

81 / 100

81) Which method is the entry point of any Java program?

82 / 100

82) What does SSD stand for?

83 / 100

83) Which of the following is not a relational database?

84 / 100

84) Which of these is a Linux distribution?

85 / 100

85) What is the function of RAM?

86 / 100

86) What is the function of a modem?

87 / 100

87) Which company developed the Windows operating system?

88 / 100

88) Which company developed the Linux operating system?

89 / 100

89) What is the binary representation of the decimal number 10?

90 / 100

90) What does the acronym "BIOS" stand for?

91 / 100

91) What is a URL?

92 / 100

92) Which one is a relational database management system (RDBMS)?

93 / 100

93) Which one of the following is an IP address?

94 / 100

94) Which of the following is NOT an output device?

95 / 100

95) Which of the following is not an example of a mobile operating system?

96 / 100

96) What is the standard port number for HTTP?

97 / 100

97) Which protocol is used to send emails?

98 / 100

98) What is the purpose of an IP address?

99 / 100

99) Which of the following devices forwards data packets between computer networks?

100 / 100

100) What is the default value of a local variable in Java?

Your score is

The average score is 0%

0%

Exit

Leave a Reply

Your email address will not be published. Required fields are marked *