Are you ready to put your ICT expertise to the ultimate test? Our ICT True or False Quiz: Challenge Your Tech Knowledge invites tech enthusiasts, students, and professionals to tackle a series of thought-provoking ICT true or false questions. Dive into our free information and communication technology quiz and engage with trivia true false questions covering networks, cybersecurity, software, and emerging trends. Whether you're brushing up on ICT quiz questions for class or simply hungry for fun tech trivia, this interactive challenge will sharpen your skills. Think you can ace our ICT true false trivia? Jump in by starting our ict tests and uncover exciting technology trivia - let's begin!
The primary function of an operating system is to manage computer hardware resources.
True
False
An operating system acts as an intermediary between hardware and user applications, handling tasks like memory management, process scheduling, and device I/O. It allocates hardware resources among programs to ensure efficient operation. Without an OS, users would interact directly with hardware, making computing far more complex. Learn more about operating systems.
RAM is non-volatile memory.
False
True
Random Access Memory (RAM) is volatile memory, which means it loses its contents when power is turned off. Non-volatile memory retains data without power and includes storage devices like SSDs and HDDs. RAM's volatility allows for rapid read/write operations essential for running active processes. Learn more about RAM.
An IP address uniquely identifies a device on a network.
False
True
An IP address is a unique numerical label assigned to each device on an IP network, ensuring data sent across the Internet reaches the correct destination. IPv4 addresses are 32 bits long, while IPv6 addresses extend this to 128 bits. This uniqueness prevents address conflicts and enables reliable routing. Learn more about IP addresses.
HTTP is a protocol used for secure communication over the web.
False
True
HTTP (Hypertext Transfer Protocol) is the foundational protocol for web communication but does not include encryption. HTTPS (HTTP Secure) adds a TLS/SSL layer for encryption and authentication to protect data in transit. Using HTTP alone exposes data to eavesdropping and tampering. Learn more about HTTPS.
A binary digit (bit) can represent two states: 0 or 1.
False
True
A bit, short for binary digit, is the most basic unit of data in computing and digital communications. It can have one of two values, typically represented as 0 or 1. Bits form the foundation of more complex data structures and encoding schemes. Learn more about bits.
SSDs have no moving parts.
False
True
Solid State Drives (SSDs) use flash memory and have no mechanical moving parts, unlike Hard Disk Drives (HDDs) which rely on spinning disks. This absence of moving parts leads to faster access times and greater resistance to physical shock. However, SSDs have finite write cycles that may wear out over time. Learn more about SSDs.
USB stands for Universal Serial Bus.
True
False
USB stands for Universal Serial Bus, a standard for cables and connectors used to attach peripheral devices to computers. It was designed to standardize the connection of peripherals and replace several earlier interfaces. USB supports both data transfer and power supply between devices. Learn more about USB.
The OSI model has seven layers.
False
True
The OSI (Open Systems Interconnection) model is a conceptual framework with seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. It standardizes network functions to enable interoperability across diverse systems. Although modern networks often implement the TCP/IP model, OSI remains a key teaching tool. Learn more about the OSI model.
VPN stands for Virtual Private Network.
False
True
A VPN (Virtual Private Network) creates a secure tunnel over public networks by encrypting traffic between the user's device and a VPN server. It masks the user's IP address, increasing privacy and bypassing geographic restrictions. Businesses and individuals use VPNs to protect sensitive data from eavesdropping. Learn more about VPNs.
HTTPS uses port 443 by default.
False
True
HTTPS defaults to TCP port 443, while unsecured HTTP uses port 80. Port 443 is reserved for secure HTTP traffic encrypted with TLS/SSL, ensuring confidentiality and integrity during transmission. Web servers must listen on this port to handle HTTPS connections. Learn more about HTTPS port.
DNS translates domain names to IP addresses.
True
False
DNS (Domain Name System) resolves human-readable domain names into IP addresses that machines use to route traffic. When you enter a URL, your device queries DNS servers to obtain the corresponding IP address. Without DNS, users would need to remember numeric addresses for every website. Learn more about DNS.
CPU clock speed is measured in gigabytes.
False
True
CPU clock speed is measured in hertz (Hz), typically expressed in megahertz (MHz) or gigahertz (GHz), indicating cycles per second. A gigabyte (GB) is a unit of digital data storage, not frequency. Mixing these units is incorrect since they quantify different properties. Learn more about CPU clock speed.
An Ethernet cable uses coaxial technology.
True
False
Modern Ethernet cables (such as Cat5e and Cat6) use twisted pair copper wiring or fiber optics, not coaxial cabling. Early Ethernet standards like 10BASE2 and 10BASE5 did use coaxial, but these have been phased out. Today's Ethernet relies on twisted pairs for most local networks. Learn more about Ethernet cables.
SQL is a type of programming language used for managing relational databases.
True
False
SQL (Structured Query Language) is a domain-specific language used to query, manipulate, and manage data in relational database systems. It's not a general-purpose programming language but is essential for database operations. Common SQL commands include SELECT, INSERT, UPDATE, and DELETE. Learn more about SQL.
A malware can replicate itself without user intervention.
True
False
Certain types of malware, such as worms, are designed to self-propagate across networks without any user action. They exploit vulnerabilities in systems or network services to spread autonomously. Other malware like viruses require user action, such as opening an infected file. Learn more about worms.
RAID 0 provides data redundancy by striping data across multiple disks.
True
False
RAID 0 uses striping to distribute data evenly across multiple disks, which improves performance but offers no redundancy. If any disk in a RAID 0 array fails, all data is lost. Redundant RAID levels like RAID 1, RAID 5, and RAID 6 provide fault tolerance. Learn more about RAID 0.
IPv6 addresses are 128 bits long.
False
True
IPv6 uses 128-bit addresses, allowing approximately 3.4×10^38 unique addresses - vastly more than IPv4's 32-bit space. It was developed to address IPv4 address exhaustion and simplifies routing. IPv6 addresses are written in hexadecimal and separated by colons. Learn more about IPv6 addresses.
A stateless firewall tracks the state of active connections to filter packets.
True
False
A stateless firewall filters each packet individually based on predefined rules and does not monitor the state of active connections. Stateful firewalls maintain connection tables and make decisions based on context and packet history. Stateless designs are simpler but can be less secure. Learn more about firewalls.
VLAN stands for Virtual Local Area Network and segregates network traffic logically.
True
False
A VLAN is a Virtual Local Area Network that partitions a physical network into multiple logical networks at the data link layer. VLANs improve security and reduce broadcast domains by isolating traffic. Communication between VLANs requires routing or a Layer 3 switch. Learn more about VLANs.
The concept of virtualization allows multiple operating systems to run on a single physical server simultaneously.
True
False
Virtualization uses a hypervisor layer to abstract hardware resources, enabling multiple guest operating systems to run concurrently on a single physical host. This improves resource utilization, scalability, and isolation between environments. Common hypervisors include VMware ESXi, Microsoft Hyper-V, and KVM. Learn more about virtualization.
Symmetric encryption uses different keys for encryption and decryption.
True
False
Symmetric encryption uses a single shared secret key for both encryption and decryption. Asymmetric encryption uses distinct public and private key pairs. Using different keys in symmetric cryptography contradicts its fundamental definition. Learn more about symmetric cryptography.
A hash function is reversible and can be decrypted to retrieve the original data.
True
False
Cryptographic hash functions are one-way functions that map data of arbitrary size to fixed-length digests. They are designed to be computationally irreversible and collision-resistant, meaning you cannot recover the original input from its hash. This property is essential for data integrity checks. Learn more about hash functions.
CAP theorem states that a distributed data store can simultaneously provide consistency, availability, and partition tolerance.
False
True
The CAP theorem states that in the presence of a network partition, a distributed system can guarantee only two of the following three: consistency, availability, and partition tolerance. It is impossible to simultaneously achieve all three in a distributed environment. System designers must choose trade-offs based on requirements. Learn more about the CAP theorem.
In TCP, the three-way handshake involves SYN, ACK, and FIN flags.
False
True
The TCP three-way handshake uses the SYN, SYN-ACK, and ACK flags to establish a connection. FIN is used during connection termination rather than establishment. This handshake ensures reliable connection setup before data transfer. Learn more about TCP handshake.
Quantum cryptography relies on quantum key distribution to ensure unbreakable encryption.
True
False
Quantum cryptography uses principles of quantum mechanics, such as quantum key distribution (QKD), to detect any eavesdropping on key exchange. Intercepting quantum bits disturbs their state, alerting communicating parties. This makes the key exchange theoretically unbreakable if implemented correctly. Learn more about quantum cryptography.
0
{"name":"The primary function of an operating system is to manage computer hardware resources.", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"The primary function of an operating system is to manage computer hardware resources., RAM is non-volatile memory., An IP address uniquely identifies a device on a network.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Score18/25
Easy4/7
Medium5/8
Hard6/7
Expert3/3
AI Study Notes
Email these to me
You can bookmark this page to review your notes in future, or fill out the email box below to email them to yourself.
Study Outcomes
Understand ICT Fundamentals -
Grasp core information and communication technology principles through engaging ICT true or false questions.
Differentiate True and False Statements -
Develop the ability to accurately judge claims by identifying correct and incorrect information in ICT true false trivia.
Apply Critical Thinking -
Challenge your analytical skills by evaluating statements in trivia true false questions, enhancing logical reasoning within technology contexts.
Recall ICT Terminology -
Solidify your understanding of key terms in an information and communication technology quiz setting, boosting your digital vocabulary.
Enhance Digital Literacy -
Improve practical digital skills and confidence as you engage with interactive ICT quiz questions designed to spark curiosity.
Cheat Sheet
Boolean Logic Foundations -
Boolean operators - AND, OR, NOT - are the basis of ICT true or false questions; use truth tables to map all possible input combinations. Memorize De Morgan's laws with the phrase "Not both is same as either not" to transform expressions swiftly (University of Cambridge Computer Lab).
Data Representation Fundamentals -
Understanding bits and bytes is vital: one byte equals 8 bits, and ASCII uses 7 bits per character (e.g., 'A' = 65), while Unicode supports over 137,000 characters for global compatibility (W3C). This detail frequently appears in ICT quiz questions on storage limits and text encoding.
OSI Model Layers -
The seven-layer OSI model - All People Seem To Need Data Processing (Application, Presentation, Session, Transport, Network, Data Link, Physical) - helps pinpoint network issues methodically. Many ICT true false trivia questions test your recall of this mnemonic and each layer's role (IEEE Networking Standards).
CIA Triad in Cybersecurity -
Confidentiality, Integrity, and Availability (CIA) form the core of information security, and true or false questions often probe which controls support each pillar. Use the acronym CIA: encryption for confidentiality, hashing and digital signatures for integrity, and redundancy or failover for availability (NIST SP 800-27).
TCP vs UDP Protocols -
TCP is connection-oriented and ensures reliable, ordered delivery (e.g., HTTP on port 80), while UDP is connectionless and faster (e.g., DNS queries on port 53) according to RFC 793 and RFC 768. Recognizing these differences is a staple of ICT true false quiz questions on network communication behaviors.