MCQOPTIONS
Saved Bookmarks
This section includes 30 Mcqs, each offering curated multiple-choice questions to sharpen your ICT knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Given below are two statementsStatement I: Example of primary memory is RAMStatement II: Example of secondary memory is Pen driveIn light of the above statement, choose the correct answer from the option given below |
| A. | Both statement I and statement II are true |
| B. | Both statement I and statement II are false |
| C. | Statement I is correct but statement II is false |
| D. | Statement I is incorrect but statement II is true |
| Answer» B. Both statement I and statement II are false | |
| 2. |
Identify the correct chronology of the internet facilities from the following |
| A. | IMDb, Google, LinkedIn, YouTube |
| B. | Google, IMDb, YouTube, LinkedIn |
| C. | Google, YouTube, LinkedIn, IMDb |
| D. | LinkedIn, Google, YouTube, IMDb |
| Answer» B. Google, IMDb, YouTube, LinkedIn | |
| 3. |
Data can be saved on backing storage medium known as |
| A. | Compact disk rewritable |
| B. | Computer disk rewritable |
| C. | Compact disk recoverable |
| D. | Computer data rewritable |
| Answer» B. Computer disk rewritable | |
| 4. |
______ is a connectionless, unreliable transport protocol. |
| A. | User Datagram Protocol (UDP) |
| B. | Transmission Control Protocol (TCP) |
| C. | Both (A) and (B) |
| D. | None of these |
| Answer» B. Transmission Control Protocol (TCP) | |
| 5. |
In Internet, the term WWWW, the 4th W stands for ________. |
| A. | Web |
| B. | Worm |
| C. | Wreck |
| D. | Wsjk |
| Answer» C. Wreck | |
| 6. |
Identify the correct ascending order of the units of digital memory |
| A. | megabyte, petabyte, gigabyte, terabyte |
| B. | megabyte, terabyte, petabyte, gigabyte |
| C. | gigabyte, megabyte, petabyte, terabyte |
| D. | megabyte, gigabyte, terabyte, petabyte |
| Answer» E. | |
| 7. |
Match List I with List IIList IList II A. Programming Language I. Wide Area Network B. Operating System II. MS Powerpoint C. Internet III. Window XP D. Application Software IV. C++ Choose the correct answer from the options given below: |
| A. | A - I, B - II, C - III, D - IV |
| B. | A - IV, B - III, C - I, D - II |
| C. | A - IV, B - II, C - III, D - I |
| D. | A - II, B - III, C - I, D - IV |
| Answer» C. A - IV, B - II, C - III, D - I | |
| 8. |
In the context of Internet, the facility in which the server application allows many users to create and edit pages on a website through their browser is called as: |
| A. | Hacking |
| B. | Troll |
| C. | Cybernetics |
| D. | Wiki |
| Answer» E. | |
| 9. |
Given below are two statements:Statement I: In a peer-to-peer network, there is no central server instead each computer can act as a server as well as a client.Statement II: LAN is a computer network created for individual persons.In the light of the above statements, choose the correct answer from the options given below: |
| A. | Both Statement I and Statement II are true |
| B. | Both Statement I and Statement II are false |
| C. | Statement I is correct but Statement II is false |
| D. | Statement I is incorrect but Statement II is true |
| Answer» D. Statement I is incorrect but Statement II is true | |
| 10. |
One of the following is not a social networking sites : |
| A. | |
| B. | Notebook |
| C. | |
| D. | |
| E. | All of the above |
| Answer» C. Linkedin | |
| 11. |
How would you insert some slides from other presentation into current one? |
| A. | From Insert menu, choose Slides from Files |
| B. | From Insert menu, choose Slides from Presentation |
| C. | From Insert menu, choose Slides |
| D. | None of these |
| Answer» C. From Insert menu, choose Slides | |
| 12. |
BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the following groups? |
| A. | ISDN |
| B. | IRC |
| C. | ISP |
| D. | ICONS |
| Answer» D. ICONS | |
| 13. |
A computer network which is used within a building is called a: |
| A. | WAN |
| B. | MAN |
| C. | LAN |
| D. | SAN |
| Answer» D. SAN | |
| 14. |
______ are used to measure both computer memory (RAM) and storage capacity of Floppy disks, CD-ROM drives and hard Drives. |
| A. | Octal numbers |
| B. | Binary numbers |
| C. | Bytes |
| D. | Bites |
| Answer» D. Bites | |
| 15. |
___________ program provides access to web resources. |
| A. | Web |
| B. | Browser |
| C. | URL |
| D. | ISP |
| Answer» C. URL | |
| 16. |
'Internet Explorer' is type of: |
| A. | Operating System |
| B. | Browser |
| C. | IP Address |
| D. | Compiler |
| Answer» C. IP Address | |
| 17. |
Given below are two statements:Statement I: Internet is the largest information base and has become a vital part of our lives.Statement II: HTML is an incomplete code package that allows a user to create web pages.In the light of the above statements, choose the correct answer from the options given below: |
| A. | Both Statement I and Statement II are true |
| B. | Both Statement I and Statement II are false |
| C. | Statement I is correct but Statement II is false |
| D. | Statement I is incorrect but Statement II is true |
| Answer» D. Statement I is incorrect but Statement II is true | |
| 18. |
Internet Explorer belongs to which application category? |
| A. | Mail Client |
| B. | Web Browser |
| C. | Spread Sheet |
| D. | Folder |
| Answer» C. Spread Sheet | |
| 19. |
Personal data is often transmitted over the internet. One method of securing the data before transmission is: |
| A. | Filtering |
| B. | Using encryption |
| C. | Using firewall |
| D. | Streaming |
| Answer» C. Using firewall | |
| 20. |
Python is a/anA. Programming languageB. Operating systemC. Search engineD. SnakeChoose the correct answer from the options given below: |
| A. | B only |
| B. | A only |
| C. | B and C only |
| D. | C and D only |
| Answer» C. B and C only | |
| 21. |
Match List I with List IIList IList IIA. Search engineI. www.gmail.comB. Job openingsII. www.amazon.inC. E- mailIII. www.google.comD. E - commerceIV. www.naukri.comChoose the correct answer from the options given below: |
| A. | A - III, B - IV, C - I, D - II |
| B. | A - IV, B - III, C - I, D - II |
| C. | A - I, B - II, C - III,D - IV |
| D. | A - I, B - III, C - II, D - IV |
| Answer» B. A - IV, B - III, C - I, D - II | |
| 22. |
In the context of computing and internet, identify the correct pair from the following : |
| A. | TB - Memory Storage Unit |
| B. | Playstore - Operating system |
| C. | Pixel - Colour enhancing facility |
| D. | USB - Antivirus |
| Answer» B. Playstore - Operating system | |
| 23. |
Compact disk that can store approximately 650-800 MB of data or 74-80 Min of music are _______. |
| A. | Floppy diskettes |
| B. | CD-ROM |
| C. | Zip disks |
| D. | Video cards |
| Answer» C. Zip disks | |
| 24. |
Consider the following incomplete sentence:Wi-Fi is short for Wireless Fidelity and it is a set of _____for using short range______ to allow computing ______ to connect to a LAN or to the Internet.Complete the above sentence by choosing the correct words in order from the following list:A. StandardsB. WavesC. DevicesChoose the correct answer from the options given below: |
| A. | C, B, A |
| B. | C, A, B |
| C. | A, C, B |
| D. | A, B, C |
| Answer» E. | |
| 25. |
Given below are two statements:Statement I: Operators are special symbols that are used to perform calculations, make comparisons and check logical conditions.Statement II: Relational operators are used for arithmetic operations.In the light of the above statements, choose the correct answer from the options given below: |
| A. | Both Statement I and Statement II are true |
| B. | Both Statement I and Statement II are false |
| C. | Statement I is correct but Statement II is false |
| D. | Statement I is incorrect but Statement II is trie |
| Answer» D. Statement I is incorrect but Statement II is trie | |
| 26. |
Digital signature means |
| A. | A digital code that measures the unique physical trait of an individual |
| B. | A digital code that uniquely identifies the content of the message and the sender |
| C. | A logo onto computer system for unique identification |
| D. | A multi-level password used to login to a unique computer |
| Answer» C. A logo onto computer system for unique identification | |
| 27. |
Given below are two statements:Statement I: A company-wide network, closed to public access, which uses internet-type technology is called World Wide Web.Statement II: MODEM is a device that enables a computer to communicate over telephone lines.In the light of the above statements, choose the correct answer from the options given below: |
| A. | Both Statement I and Statement II are true |
| B. | Both Statement I and Statement II are false |
| C. | Statement I is correct but Statement II is false |
| D. | Statement I is incorrect but Statement II is true |
| Answer» E. | |
| 28. |
Identify the incorrect pair from the following : |
| A. | .ttf = font file |
| B. | .wav = audio file |
| C. | .jpg = graphic file |
| D. | .exe = exclusive data file |
| Answer» E. | |
| 29. |
Match List I with List-II.List IList IIA) WWW1) Volatile MemoryB) JAVA2) Non-volatile memoryC) RAM3) World Wide WebD) ROM4) Programming language Choose the correct option from the following: |
| A. | (A)-(1) , (B)-(2) , (C)-(3) , (D)-(4) |
| B. | (A)-(2) , (B)-(3) , (C)-(4) , (D)-(1) |
| C. | (A)-(3) , (B)-(4) , (C)-(1) , (D)-(2) |
| D. | (A)-(4) , (B)-(1) , (C)-(2) , (D)-(3) |
| Answer» D. (A)-(4) , (B)-(1) , (C)-(2) , (D)-(3) | |
| 30. |
A computer network enables two or more computers to |
| A. | Increase the speed |
| B. | Share data and hardware resources |
| C. | Increase the work |
| D. | Monitor the software |
| Answer» C. Increase the work | |