• Difficulty - Medium
    Total Plays - 12
    Allowed Time - 10 sec
    Best time - 2.640 sec

    Which command checks network connectivity?

    Tip: Click "Play" to reveal options and start playing.

    A simple, everyday diagnostic command used by all IT techs.

    #A
    #B
    #C
    #D
    Explanation:
    The ping command sends packets to a host and checks response time to test connectivity.
  • Difficulty - Hard
    Total Plays - 13
    Allowed Time - 15 sec
    Best time - 2.973 sec

    What does the DNS stand for?

    Tip: Click "Play" to reveal options and start playing.

    Every time you visit a website, DNS helps translate domain names into IP addresses.

    #A
    #B
    #C
    #D
    Explanation:
    DNS is the system that converts readable domains (like google.com) into machine-friendly IPs.
  • Difficulty - Easy
    Total Plays - 15
    Allowed Time - 5 sec
    Best time - 1.849

    Which Windows shortcut opens Task Manager directly?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Ctrl + Shift + Esc opens Task Manager immediately without extra clicks. Useful when an app is unresponsive or for killing processes.
  • Difficulty - Easy
    Total Plays - 17
    Allowed Time - 5 sec
    Best time - 1.042

    What does SSD stand for?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    SSDs (Solid State Drive) use NAND flash memory for storage — no moving parts — giving faster boot and random access performance compared to HDDs
  • Difficulty - Medium
    Total Plays - 15
    Allowed Time - 10 sec
    Best time - 10

    Which command repairs corrupted Windows images?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    DISM (Deployment Image Servicing and Management) repairs and restores the Windows image used for system recovery.
  • Difficulty - Easy
    Total Plays - 15
    Allowed Time - 5 sec
    Best time - 1.798

    Which type of IP is permanently assigned and doesn’t change?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Static IPs are manually set and remain constant, often used for servers, printers, and port forwarding where a predictable address is needed. Using static IPs incorrectly (assigning within DHCP pool) can cause address conflicts, so document and plan addressing schemes.
  • Difficulty - Easy
    Total Plays - 14
    Allowed Time - 5 sec
    Best time - 0.697

    Which tool manages partitions in Windows?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Disk Management (diskmgmt.msc) creates, formats, extends, shrinks, and deletes partitions. It can convert disks between MBR and GPT (with caveats) and create volumes. For advanced tasks (command line, scripting, or low-level recovery), use diskpart. Always back up data before partition changes.
  • Difficulty - Easy
    Total Plays - 13
    Allowed Time - 5 sec
    Best time - 2.840 sec

    Which command clears the DNS cache in Windows?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    ipconfig /flushdns clears the local DNS resolver cache, useful when DNS records have changed or stale entries cause resolution failures. After flushing, test with nslookup to confirm fresh lookups. On client machines, browser caches may also need clearing for web content updates.
  • Difficulty - Easy
    Total Plays - 11
    Allowed Time - 5 sec
    Best time - 0.791

    Which key is often used to enter Safe Mode in older Windows versions?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    In older Windows (7 and earlier), F8 at boot opened Advanced Boot Options including Safe Mode. Modern Windows boots faster and often requires different methods (Shift + Restart or recovery options) to access safe modes. For legacy systems, F8 remains useful if fast boot isn’t enabled.
  • Difficulty - Easy
    Total Plays - 15
    Allowed Time - 5 sec
    Best time - 1.800

    Which malware records everything a user types?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    Keyloggers secretly records keystrokes to steal credentials, PII, or other sensitive data and can be hardware or software based. Detecting them can be challenging; use reputable endpoint protection, monitor for suspicious processes, check startup entries, and employ two-factor authentication to mitigate credential theft.
  • Difficulty - Medium
    Total Plays - 24
    Allowed Time - 10 sec
    Best time - 1.464

    What is Information Technology (IT) Support?

    Tip: Click "Play" to reveal options and start playing.

    #A
    #B
    #C
    #D
    Explanation:
    IT Support (Information Technology) refers to the services provided to help users troubleshoot, maintain, and optimize their computers, networks, and software systems.