Information Technology

IT
August 7, 2025

An Information Technology (IT) internship is a short-term, hands-on experience designed to give students or recent graduates practical exposure to real-world IT environments. It allows interns to apply classroom knowledge, gain technical skills, understand workplace dynamics, and build a foundation for a future career in tech.

Common Areas of Work

AreaDescription
Tech SupportAssisting in troubleshooting hardware/software issues, maintaining systems.
Software DevelopmentWriting and testing code, working on web/app development projects.
Network AdministrationHelping manage network infrastructure, configuring routers/switches.
CybersecurityAssisting in monitoring systems for threats, learning ethical hacking basics.
Database ManagementWriting queries, managing records, working with MySQL, PostgreSQL, etc.
Cloud/DevOpsExposure to AWS, Azure, CI/CD pipelines, or container tools like Docker.
IT Project ManagementUnderstanding documentation, planning, and task tracking tools like Jira.
0%

Important Notice:
Once you start the quiz, you will not be able to pause, exit, or restart it. Please ensure you are ready before beginning.


IT

Information Technology L1

1 / 100

1) Which component acts as the brain of the computer?

2 / 100

2) In cybersecurity, what does “2FA” stand for?

3 / 100

3) Which language is commonly used to manage databases?

4 / 100

4) Which one of the following is a cloud platform?

5 / 100

5) Which layer of the OSI model deals with logical addressing?

6 / 100

6) Which company developed the Linux operating system?

7 / 100

7) What is the full form of GUI?

8 / 100

8) Which of the following is a function of a switch in networking?

9 / 100

9) Which of the following is an example of cloud storage?

10 / 100

10) Which of the following is a function of an operating system?

11 / 100

11) Which HTTP method is used to retrieve data from a server?

12 / 100

12) Which keyword is used to inherit a class in Java?

13 / 100

13) Which of the following best describes phishing?

14 / 100

14) Which of the following is an example of biometric security?

15 / 100

15) What is the size of an int in Java?

16 / 100

16) Which of these access modifiers makes a member visible only within its own class?

17 / 100

17) Which of these is not an operating system?

18 / 100

18) Which one is a valid IPv6 address?

19 / 100

19) What is the main purpose of an operating system?

20 / 100

20) What is the default value of a local variable in Java?

21 / 100

21) What does the acronym "BIOS" stand for?

22 / 100

22) What is an IP address used for?

23 / 100

23) Which tone is most appropriate when responding to an upset client?

24 / 100

24) Which of these collections guarantees insertion order?

25 / 100

25) Which of the following is not a characteristic of cloud computing?

26 / 100

26) Which of these is an example of open-source software?

27 / 100

27) Which company developed the Windows operating system?

28 / 100

28) What does the "ping" command do?

29 / 100

29) Which of the following is not a Microsoft product?

30 / 100

30) What is the purpose of an IP address?

31 / 100

31) Which of the following best describes encryption?

32 / 100

32) What is a URL?

33 / 100

33) What is the extension of Microsoft Excel files?

34 / 100

34) Which one of the following is an IP address?

35 / 100

35) What does CPU stand for?

36 / 100

36) In cloud computing, what does "IaaS" stand for?

37 / 100

37) Which Java feature allows the same method to have different implementations?
A) Inheritance

38 / 100

38) What kind of device is a firewall?

39 / 100

39) Which of the following devices forwards data packets between computer networks?

40 / 100

40) Which of the following is a valid IPv4 address?

41 / 100

41) What is the full form of URL?

42 / 100

42) What is the most important part of effective customer communication?

43 / 100

43) Which of the following is an example of a cloud service model?

44 / 100

44) Which of the following is an input device?

45 / 100

45) Which method is the entry point of any Java program?

46 / 100

46) Which of the following is a type of non-volatile memory?

47 / 100

47) Which device is used to connect multiple networks together?

48 / 100

48) Which of the following is a NoSQL database?

49 / 100

49) What is phishing?

50 / 100

50) What does the acronym "URL" stand for?

51 / 100

51) What is the function of RAM?

52 / 100

52) Which of the following is not a Java keyword?

53 / 100

53) Which of the following is used to handle exceptions in Java?

54 / 100

54) What is the function of DNS?

55 / 100

55) What does GUI stand for in computing?

56 / 100

56) What is an example of a domain name?

57 / 100

57) What type of device is a router?

58 / 100

58) Which protocol is used to securely transfer files?

59 / 100

59) What is the full form of ISP?

60 / 100

60) What does SaaS stand for in cloud computing?

61 / 100

61) What is the binary representation of the decimal number 10?

62 / 100

62) Which protocol is used to send emails?

63 / 100

63) Which of the following storage types is fastest?

64 / 100

64) Which programming language is used for web development?

65 / 100

65) What is the function of the DHCP protocol?

66 / 100

66) Which of the following commands is used to view directory contents in Linux?

67 / 100

67) What is the function of a modem?

68 / 100

68) What does 'ping' do in a network?

69 / 100

69) Which type of software is MS Word?

70 / 100

70) What is the purpose of a VPN?

71 / 100

71) What is the role of DNS (Domain Name System)?

72 / 100

72) Which of these is a Linux distribution?

73 / 100

73) Which of these is used to uniquely identify a device on a network?

74 / 100

74) Which of the following can protect data by converting it into unreadable code?

75 / 100

75) Which of the following is not a relational database?

76 / 100

76) What is the main purpose of a database?

77 / 100

77) Which of these is used to uniquely identify every computer on the internet?

78 / 100

78) What is the purpose of RAID in storage systems?

79 / 100

79) Which company is known for developing the Android operating system?

80 / 100

80) Which of the following is not an example of a mobile operating system?

81 / 100

81) Which language is primarily used for Android app development?

82 / 100

82) What type of software is an antivirus program?

83 / 100

83) Which one is a relational database management system (RDBMS)?

84 / 100

84) Which of the following is a strong password?

85 / 100

85) Which of the following is a type of malware that demands payment?

86 / 100

86) Which protocol is used to browse websites?

87 / 100

87) Which of the following is not an input device?

88 / 100

88) What type of cyber attack involves overwhelming a system with traffic?

89 / 100

89) Which protocol is used for secure communication over the Internet?

90 / 100

90) What does SSD stand for?

91 / 100

91) What is the standard port number for HTTP?

92 / 100

92) What is the primary function of a firewall?

93 / 100

93) Which of the following is NOT an output device?

94 / 100

94) What does HTML stand for?

95 / 100

95) What is the most common unit to measure memory size?

96 / 100

96) What is the parent class of all Java classes?

97 / 100

97) Which command is used to copy files in Windows command prompt?

98 / 100

98) What is the main characteristic of open-source software?

99 / 100

99) What does IP stand for in IP address?

100 / 100

100) Which of these storage types is volatile?

Your score is

The average score is 74%

0%

Exit

Leave a Reply

Your email address will not be published. Required fields are marked *