MCQOPTIONS
Saved Bookmarks
This section includes 44 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
COBOL being a high level programming language was developed for what purpose? |
| A. | Business data processing applications |
| B. | Designing plan for buildings |
| C. | Maintaining the data of a firm |
| D. | Teaching children in schools |
| E. | None |
| Answer» B. Designing plan for buildings | |
| 2. |
An intentionally disruptive software that spreads from computer to computer is known as |
| A. | search engine |
| B. | chat software |
| C. | |
| D. | virus |
| Answer» E. | |
| 3. |
In which year did the JavaScript Programming language come into existence? |
| A. | 1999 |
| B. | 2000 |
| C. | 1995 |
| D. | 1990 |
| Answer» D. 1990 | |
| 4. |
A ________________ program's drawings are often used as the basis for construction documents |
| A. | Paint |
| B. | Draw |
| C. | Access |
| D. | CAD |
| Answer» E. | |
| 5. |
Free of cost repair of software bug available at Internet is called …. |
| A. | Version |
| B. | Ad-on |
| C. | Tutorial |
| D. | Patch |
| Answer» E. | |
| 6. |
A program that infects other programs by modifying them is known as: |
| A. | Search Engine |
| B. | Antivirus |
| C. | Virus |
| D. | Cyber crime |
| Answer» D. Cyber crime | |
| 7. |
A small wireless handled computer system that scans an items tag and pulls up the current price as you shop is called |
| A. | POS |
| B. | PSS |
| C. | Data mining |
| D. | Card reader |
| Answer» B. PSS | |
| 8. |
Errors in computer programme is called |
| A. | Spam |
| B. | Follies |
| C. | Virus |
| D. | Bugs |
| Answer» E. | |
| 9. |
_______ is the unauthorised use, duplication or sale of copyrighted software. |
| A. | Licensed software |
| B. | Privacy software |
| C. | Pirated software |
| D. | Open software |
| Answer» D. Open software | |
| 10. |
In which year was Internet Explorer first released? |
| A. | 1990 |
| B. | 1993 |
| C. | 1995 |
| D. | 1998 |
| E. | 1997 |
| Answer» D. 1998 | |
| 11. |
_______ is not a Web Browser. |
| A. | Netscape |
| B. | Internet Explorer |
| C. | Opera |
| D. | Microsoft Outlook |
| Answer» E. | |
| 12. |
In DASD, what is the full form of ‘A’? |
| A. | Access |
| B. | Around |
| C. | Accessible |
| D. | Arithmetic |
| Answer» B. Around | |
| 13. |
________ is the fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords. |
| A. | Malware |
| B. | Trojan |
| C. | Hacking |
| D. | Phishing |
| Answer» E. | |
| 14. |
A computer software that is sold and bundled with hardware is termed as ______. |
| A. | Retail Software |
| B. | Public Domain Software |
| C. | OEM Software |
| D. | Demo Software |
| Answer» D. Demo Software | |
| 15. |
______ is the illegal reproduction and distribution of software application. |
| A. | Sorting |
| B. | Piracy |
| C. | Cracker |
| D. | Virus |
| Answer» C. Cracker | |
| 16. |
_________ programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. |
| A. | Zombie |
| B. | Worm |
| C. | Trojan Horses |
| D. | Logic Bomb |
| Answer» D. Logic Bomb | |
| 17. |
_______ provides the instructions for ______ to follow. |
| A. | Software, hardware |
| B. | Hardware, software |
| C. | Operating system, motherboard |
| D. | Motherboard, operating system |
| Answer» B. Hardware, software | |
| 18. |
__________ software is used for tasks such as managing disks and troubleshooting hardware problems. |
| A. | Application |
| B. | Operating system |
| C. | Utility |
| D. | Network system |
| Answer» C. Utility | |
| 19. |
_________ is a software that assists users in processing and analysing tabular data. |
| A. | Microsoft Paint |
| B. | Microsoft Word |
| C. | Note Pad Tool |
| D. | Spreadsheet |
| Answer» E. | |
| 20. |
In a laptop used for normal office related work, typical RAM size is likely to be: |
| A. | 512 KB |
| B. | 128 GB |
| C. | 3.8 GB |
| D. | 256 MB |
| Answer» D. 256 MB | |
| 21. |
Linux is ______. |
| A. | an operating system |
| B. | an assembly language |
| C. | a high level language |
| D. | an interpreter |
| E. | a complier |
| Answer» B. an assembly language | |
| 22. |
Microsoft’s Messenger allows users to |
| A. | bypass a browser to surf the web |
| B. | create a blog |
| C. | communicate via direct live communion |
| D. | identify and eliminate spam |
| E. | make graphic presentations |
| Answer» D. identify and eliminate spam | |
| 23. |
Octal number system has a base ________ |
| A. | 2 |
| B. | 4 |
| C. | 8 |
| D. | 10 |
| E. | 12 |
| Answer» D. 10 | |
| 24. |
________ is the central component of a computer operating system. |
| A. | Terminal |
| B. | Kernel |
| C. | Shell |
| D. | Hardware |
| Answer» C. Shell | |
| 25. |
Choose the best option:An antivirus program is designed to _______ computer virus. |
| A. | scan device and identify |
| B. | scan device, identify and eliminate |
| C. | scan device and eliminate |
| D. | identify and eliminate |
| Answer» C. scan device and eliminate | |
| 26. |
__________ is a problem oriented language. |
| A. | High level language |
| B. | Machine language |
| C. | Assembly language |
| D. | Low level language |
| E. | None of these |
| Answer» B. Machine language | |
| 27. |
Considering the below statements, choose the CORRECT option(i) A software program is a set of instructions given to a computer for the execution of the task(ii) Software is the variable part of a computer while the hardware is the invariable part(iii) System software is designed for computer-specific tasks |
| A. | Statements (ii) and (iii) are correct and (i) is false |
| B. | Statements (i) and (iii) are correct and (ii) is false |
| C. | Statements (i) and (ii) are correct and (iii) is false |
| D. | Statements (i), (ii) and (iii) are correct |
| Answer» E. | |
| 28. |
A ________________ tells a program what kind of data is contained in a file and how the data is organised. |
| A. | Document |
| B. | Utility |
| C. | Image |
| D. | File format |
| Answer» E. | |
| 29. |
Anti-virus is installed in a computer to: |
| A. | Safeguard the computer from virus |
| B. | Safeguard the computer from fire |
| C. | Improve the memory size |
| D. | Install other programs |
| Answer» B. Safeguard the computer from fire | |
| 30. |
IT_WAS_ONE_OF_THE_FIRST_IDE_TO_RUN_UNDER__________AND_IT_RUNS_WITHOUT_PROBLEM_UNDER_ICEDTEA.?$ |
| A. | GNU General Public License |
| B. | Both GNU Classpath, GPL |
| C. | Neither GNU nor GPL |
| D. | GNU Classpath |
| Answer» E. | |
| 31. |
EPL stands for ________$ |
| A. | Extended Public License |
| B. | Extended Platform License |
| C. | Eclipse Platform License |
| D. | Eclipse Public License |
| Answer» E. | |
| 32. |
ACM_stands_for_________$ |
| A. | Architecture for Computing Machinery |
| B. | Association for Computing Machinery |
| C. | Association for Cloud Machinery |
| D. | Architecture for Cloud Machinery |
| Answer» C. Association for Cloud Machinery | |
| 33. |
Which allows for advanced refactoring technique? |
| A. | JDK |
| B. | SDK |
| C. | UML |
| D. | EPL |
| Answer» C. UML | |
| 34. |
The Eclipse SDK includes the Eclipse Java development tools. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 35. |
UML stands for________ |
| A. | User Modeling Language |
| B. | User Module Language |
| C. | Unified Modeling Language |
| D. | Unified Module Language |
| Answer» D. Unified Module Language | |
| 36. |
Common_Public_License_is_re_licensed_under_________ |
| A. | Eclipse Public License |
| B. | General Public License |
| C. | Eclipse Platform |
| D. | Eclipse plug-in |
| Answer» B. General Public License | |
| 37. |
SDK stands for _______? |
| A. | Software Design Kit |
| B. | Serial Development Kit |
| C. | Software Development Kit |
| D. | Serial Design Kit |
| Answer» D. Serial Design Kit | |
| 38. |
The initial codebase is originated from ________ |
| A. | IBM VisualAge |
| B. | Equinox |
| C. | Borland VisualAge |
| D. | Red Hat VisualAge |
| Answer» B. Equinox | |
| 39. |
Development environment include the __________ |
| A. | Eclipse VisualAge |
| B. | Classpath |
| C. | Eclipse JDT |
| D. | IcedTea |
| Answer» D. IcedTea | |
| 40. |
Eclipse is used to develop documents with LaTeX. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 41. |
What is Eclipse? |
| A. | IDE |
| B. | Software |
| C. | GNU |
| D. | Code base |
| Answer» B. Software | |
| 42. |
What is the scenario the IDE generally required? |
| A. | Language support |
| B. | Visual programming |
| C. | Attitude across different platforms |
| D. | Out system platform |
| Answer» C. Attitude across different platforms | |
| 43. |
What does an Eclipse IDE allows? |
| A. | Editing the program |
| B. | Compiling the program |
| C. | Both editing and compiling |
| D. | Editing, building, Debugging, Compiler |
| Answer» E. | |
| 44. |
What is the main programming language code developed by eclipse? |
| A. | C |
| B. | JAVA |
| C. | C++ |
| D. | C/C++ |
| Answer» C. C++ | |