MCQOPTIONS
Saved Bookmarks
This section includes 24 Mcqs, each offering curated multiple-choice questions to sharpen your ICT knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
It is unique numeric identifier used to specify a particular host computer on a particular network, what it is? |
| A. | LP address |
| B. | UP address |
| C. | IP address |
| D. | IL address |
| Answer» D. IL address | |
| 2. |
Consider the following storage devices:(a) Hard disc(b) CD-ROM(c) DVD-ROMArrange these in ascending order of storage capacity and select the correct option: |
| A. | (b), (c), (a) |
| B. | (b), (a), (c) |
| C. | (c), (b), (a) |
| D. | (a), (c), (b) |
| Answer» B. (b), (a), (c) | |
| 3. |
Python is: |
| A. | a programming language |
| B. | an operating system |
| C. | an application program |
| D. | a compiler |
| Answer» B. an operating system | |
| 4. |
Email is delivered by which of the following? |
| A. | Postal Carriers |
| B. | Message Services |
| C. | Fax Machines |
| D. | Computers |
| Answer» E. | |
| 5. |
In Audio and Video compression, the term RGB means: |
| A. | Red, Grey, Blue |
| B. | Red, Green, Blue |
| C. | Red, Green, Black |
| D. | Red, Grey, Black |
| Answer» C. Red, Green, Black | |
| 6. |
Pretty Good Privacy (PGP) which encrypts the data by using a block cipher is used in |
| A. | FTP security |
| B. | e-mail security |
| C. | Browser security |
| D. | Bluetooth security |
| Answer» C. Browser security | |
| 7. |
Given below are two statements, one is labeled as Assertion A and the other is labeled as Reason RAssertion A: E-commerce companies require personal data to serve the stakeholders betterReason R: In this process, privacy may get compromisedIn light of the above statements, choose the most appropriate answer from the options given below. |
| A. | Both A and R are correct and R is the correct explanation of A |
| B. | Both A and R are correct but R is NOT the correct explanation of A |
| C. | A is correct but R is not correct |
| D. | A is not correct but R is correct |
| Answer» B. Both A and R are correct but R is NOT the correct explanation of A | |
| 8. |
IEEE standard protocol which defines a wireless Personal Area Network (PAN) operable in a room is |
| A. | Wi-Fi |
| B. | Bluetooth |
| C. | Infrared |
| D. | Wireless LAN |
| Answer» C. Infrared | |
| 9. |
Consider the following statements regarding Holostore:1. It is a device that reads and writes data in an optical form2. It is a computer storage device3. It refers to Institutions where holography is taughtWhich of the above statements are correct? |
| A. | 1, 2 and 3 |
| B. | 1 and 3 only |
| C. | 1 and 2 only |
| D. | 2 and 3 only |
| Answer» D. 2 and 3 only | |
| 10. |
On the basis of structure and function identify the odd out from the following : Facebook, G-mail, MySpace, Orkut, Linkedin : |
| A. | |
| B. | G-mail |
| C. | MySpace |
| D. | |
| Answer» C. MySpace | |
| 11. |
Consider the following statements concerning e-governance and technology:1. Rich Site Summary (RSS) is not a very useful tool for working on Web-service technology2. Myspace is one of the most visited networks in the world3. Facebook.com is not the most useful social networking site of choice for most students4. Wiki- is a group collaboration software tool working on Web-service technologyWhich of the above statements are correct? |
| A. | 1 and 4 |
| B. | 2 and 4 |
| C. | 1 and 3 |
| D. | 2 and 3 |
| Answer» C. 1 and 3 | |
| 12. |
A combination of hardware and software which links two parts of the same LAN or two compatible LANs by directing messages to the correct node is called |
| A. | Embedded System |
| B. | Router |
| C. | Hybrid Computer |
| D. | Microprocessor |
| Answer» C. Hybrid Computer | |
| 13. |
In the context of internet what is the full form of URL ? |
| A. | User Requested Link |
| B. | Ultimate Response Location |
| C. | Unique Request Locator |
| D. | Uniform Resource Locator |
| Answer» E. | |
| 14. |
In a computer network, a point-to-point transmission, with one sender and one receiver is called |
| A. | Unicasting |
| B. | Multicasting |
| C. | Broadcasting |
| D. | Internetworking |
| Answer» B. Multicasting | |
| 15. |
Consider a packet-switched network based on a virtual circuit mode of switching. The delay jitter for the packets of a session from the source node to the destination node is/are1. always Zero2. non-zero3. for some networks, zeroSelect the correct answer using the code given below. |
| A. | 1 |
| B. | 2 only |
| C. | 3 only |
| D. | 2 and 3 |
| Answer» B. 2 only | |
| 16. |
For a 10 Mbps Ethernet link, if the length of the packet is 32 bits, the transmission delay is (in milliseconds) |
| A. | 3.2 |
| B. | 0.0032 |
| C. | 0.032 |
| D. | 32 |
| Answer» C. 0.032 | |
| 17. |
An unsolicited e-mail message sent to many recipients at once is |
| A. | Inbox |
| B. | Spam |
| C. | Virus |
| D. | Attack |
| Answer» C. Virus | |
| 18. |
In computer-related activities, what is the full form of WORM: |
| A. | Write on Random Memory |
| B. | Write on Real Memory |
| C. | Write Once Read Many |
| D. | Write Once Read Memory |
| Answer» D. Write Once Read Memory | |
| 19. |
Computer peripherals are external devices connected to a computer. Which list contains input peripheral devices only? |
| A. | Speakers, Scanners, Mouse, Modem |
| B. | Keyboard, Projector, Mouse, Flash drive |
| C. | Microphones, Track-ball mouse, Scanner, Touch screen |
| D. | Laser printer, Graphic tablet, Barcode reader, Hard disk |
| Answer» D. Laser printer, Graphic tablet, Barcode reader, Hard disk | |
| 20. |
______ represents raw facts, whereas ______ is processed meaningful data. |
| A. | Information, Bits |
| B. | Records, Bytes |
| C. | Data, Information |
| D. | Information, Reporting |
| Answer» D. Information, Reporting | |
| 21. |
Mohan tells his friends, Sohan ([email protected]), Rohan ([email protected]) and John ([email protected]), date of his birthday party through an email as shown below:To : [email protected]Cc : [email protected]Bcc : [email protected]Subjects : My birthday party is on 15/01/2019Hello all,Call me if you can come.MohanWhich of the following cannot be derived from this email? |
| A. | Sohan knows that Rohan receives the email. |
| B. | Rohan knows that John receives the email. |
| C. | John knows that both Sohan and Rohan receive the email. |
| D. | Sohan knows that the birthday party will be held on 15/01/2019. |
| Answer» C. John knows that both Sohan and Rohan receive the email. | |
| 22. |
given below are two statementsStatement I: Printed output from a computer system is called soft copyStatement II: RAM is a read/write memoryIn light of the above statements, choose the correct answer from the options given below |
| A. | Both Statement I and Statement II are true |
| B. | Both Statement I and Statement II are false |
| C. | Statement I is correct but Statement II is false |
| D. | Statement I is incorrect but Statement II is true |
| Answer» E. | |
| 23. |
Consider an uncompressed stereo audio signal of CD quality which is sampled at 44.1 kHz and quantized using 16 bits. What is required storage space if a compression ratio of 0.5 is achieved for 10 seconds of this audio? |
| A. | 172 KB |
| B. | 430 KB |
| C. | 860 KB |
| D. | 1720 KB |
| Answer» D. 1720 KB | |
| 24. |
Consider the following statements on 'firewall' used in computing systems:1. It controls and monitors the data traffic flow between inside and outside the network.2. It protects and secures the inside network from any outside network3. It can be implemented in software or hardware or a combination of both Which of the above statements are correct? |
| A. | 1 and 2 only |
| B. | 1 and 3 only |
| C. | 2 and 3 only |
| D. | 1, 2 and 3 |
| Answer» E. | |