(Translated by https://www.hiragana.jp/)
Information Technology Quizzes from Computer Weekly
ComputerWeekly ComputerWeekly TechTarget
    Join CW+
    Login Register Cookies
    • News
    • In Depth
    • Blogs
    • Opinion
    • Videos
    • Photo Stories
    • Premium Content
    • Webinars
    • Download 2024 IT salary survey
    RSS
    • IT Management
      • IT leadership & CW500
      • IT architecture
      • IT efficiency
      • Governance
      • Innovation
      • Legislation & regulation
      • Operations & support
      • Project management
      • Strategy
      • Supplier management
      • Business issues
      • Sponsored Communities
    • Industry Sectors
      • Healthcare IT
      • Charity IT
      • Business services IT
      • Financial services IT
      • Government & public sector IT
      • Leisure & hospitality IT
      • Manufacturing IT
      • Media & entertainment IT
      • Retail IT
      • SME IT
      • Telecoms & internet
      • Transport & travel IT
      • Utilities IT
      • IT suppliers
    • Technology Topics
      Datacentre View All
      • Clustering for high availability and HPC
      • Containers
      • Converged infrastructure
      • Datacentre backup power and power distribution
      • Datacentre capacity planning
      • Datacentre cooling infrastructure
      • Disaster recovery/security
      • Green IT
      • Performance, monitoring and optimisation
      • Systems management
      • DevOps
      • IaaS
      • Server and Operating Systems
      • PaaS
      • Virtualisation
      • SaaS
      • Desktop virtualisation platforms
      Enterprise software View All
      • AI and automation
      • Blockchain
      • Business applications
      • Business intelligence
      • Cloud applications
      • Collaboration
      • CRM
      • Database
      • ERP
      • Financial applications
      • HR software
      • Middleware
      • Microservices
      • Windows
      • Mobile
      • Open source
      • Operating systems
      • SOA
      • Software development
      • Software licensing
      • Virtualisation
      • Web software
      IT in Europe and Middle East View All
      • IT in France
      • IT in the Nordics
      • IT in Benelux
      • IT in Germany
      • IT in Italy
      • IT in Poland
      • IT in Russia
      • IT in Spain
      • IT in the Middle East
      • IT in Turkey
      Information Management View All
      • Big data
      • Business intelligence and analytics
      • BPM
      • Content management
      • Database management
      • Quality/governance
      • Data warehousing
      • MDM/Integration
      IT in Asia-Pacific View All
      • IT in ASEAN
      • IT in Australia & New Zealand
      • IT in India
      Internet View All
      • Cloud
      • E-commerce
      • Internet infrastructure
      • Social media
      • Web development
      IT skills View All
      • Diversity in IT
      • Training
      • Jobs
      • Management skills
      • Technical skills
      Hardware View All
      • Chips & processors
      • Printers
      • Storage
      • Data centre
      • Mobile
      • Networking
      • PC
      • Servers
      IT security View All
      • Antivirus
      • Secure Coding and Application Programming
      • Continuity
      • Cloud security
      • Data Breach Incident Management and Recovery
      • Endpoint and NAC Protection
      • Cybercrime
      • IAM
      • Risk management
      • Network Security Management
      • Data protection
      • Compliance Regulation and Standard Requirements
      • Security policy and user awareness
      • Web Application Security
      IT services View All
      • Cloud
      • Consultancy
      • Outsourcing
      • Hosting
      • Offshore
      • Startups
      Mobile View All
      • Laptop
      • Mobile software
      • Mobile networking
      • Smartphone
      • Tablet
      Networking View All
      • Datacentre networking
      • Internet of Things
      • Mobile
      • Network hardware
      • Network monitoring and analysis
      • Network routing and switching
      • Network security strategy
      • Network software
      • Software-defined networking
      • Telecoms networks and broadband communications
      • Unified communications
      • VoIP
      • WAN performance and optimisation
      • Wireless
      Storage View All
      • AI and storage
      • Cloud storage
      • Containers and storage
      • Data management
      • Backup
      • Compliance and storage
      • Disaster recovery
      • Flash and SSDs
      • Hyper-convergence
      • Object storage
      • Disk systems
      • Software-defined storage
      • Storage switches
      • Storage management
      • Storage performance
      • Tape storage
      • Virtualisation and storage
      Please select a category
      • Datacentre
      • Enterprise software
      • IT in Europe and Middle East
      • Information Management
      • IT in Asia-Pacific
      • Internet
      • IT skills
      • Hardware
      • IT security
      • IT services
      • Mobile
      • Networking
      • Storage
    • Follow:
    • ComputerWeekly.com.br
    • ComputerWeekly.de
    • ComputerWeekly.es
    • LeMagIT.fr
    • MicroScope.co.uk

    Quizzes

    Quizzes

    • System Mechanic 12 Competition

      Enter here.  Continue Reading

    Latest TechTarget resources
    • CIO
    • Security
    • Networking
    • Data Center
    • Data Management
    Search CIO
    • Why digital literacy in the workplace is important

      Some examples of digital literacy that are necessary for the contemporary workplace are knowing how to use Excel and generative ...

    • 9 common risk management failures and how to avoid them

      As enterprises rework their business models and strategies to meet various new challenges, risks abound. Here are nine risk ...

    • Traditional vs. enterprise risk management: How do they differ?

      Traditional risk management and enterprise risk management are similar in their aim to mitigate risks that can harm a company. ...

    Search Security
    • Dark Reading News Desk turns 10, back at Black Hat USA for 2025

      Dark Reading's 2025 News Desk marks a decade of Black Hat USA memories. We're making our return with a slate of interviews that ...

    • The latest from Black Hat USA 2025

      This is your guide to the breaking news, trending topics and more from Black Hat USA 2025, one of the world's top cybersecurity ...

    • How to recover from a ransomware attack: A complete guide

      With a ransomware recovery plan, organizations can act quickly to prevent data loss without descending into chaos. Learn the ...

    Search Networking
    • Broadcom's Jericho4 boosts data center AI networking

      The company's latest networking chip promises better bandwidth, security and connectivity throughout and between data centers.

    • How Ansible's Python framework enables network automation

      Ansible's use of Python scripts creates a powerful network automation tool. This guide shows how to automate router tasks with ...

    • How to develop a network budget

      A network budget is an important part of IT financial planning. Organizations can follow one of several different approaches to ...

    Search Data Center
    • 8 ways to enhance data center physical security

      Data center physical security is just as important as cybersecurity. Organizations can follow these eight security approaches to ...

    • Benefits of edge computing over large data centers

      Edge computing attracts companies by reducing latency. Its benefits over large data centers include modular design, effective ...

    • AWS tables Virginia data center after community pushback

      The proposed 7.2 million-square-foot operation -- one of the world's largest -- would have added to Amazon's $35 billion data ...

    Search Data Management
    • Informatica adds MCP support, spate of AI-fueled features

      With Model Context Protocol helping standardize how enterprises develop and deploy agents, support for the open standard is ...

    • What is data lineage? Techniques, best practices and tools

      Organizations can bolster data governance efforts by tracking the lineage of data in their systems. Get advice on how to do so ...

    • Collibra's acquisition of Deasy targets unstructured data

      With AI development on the rise, the vendor's latest purchase better enables customers to combine the complete array of relevant ...

    • About Us
    • Editorial Ethics Policy
    • Meet The Editors
    • Contact Us
    • Our Use of Cookies
    • Advertisers
    • Business Partners
    • Media Kit
    • Corporate Site
    • Contributors
    • Reprints
    • Answers
    • E-Products
    • Events
    • In Depth
    • Guides
    • Opinions
    • Quizzes
    • Photo Stories
    • Tips
    • Tutorials
    • Videos
    • Computer Weekly Topics

    ©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

    Privacy Policy
    Cookie Preferences
    Cookie Preferences
    Do Not Sell or Share My Personal Information

    Close