Explore topic-wise MCQs in Internet of things (IoT).

This section includes 44 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.

1.

COBOL being a high level programming language was developed for what purpose?

A. Business data processing applications
B. Designing plan for buildings
C. Maintaining the data of a firm
D. Teaching children in schools
E. None
Answer» B. Designing plan for buildings
2.

An intentionally disruptive software that spreads from computer to computer is known as

A. search engine
B. chat software
C. e-mail
D. virus
Answer» E.
3.

In which year did the JavaScript Programming language come into existence?

A. 1999
B. 2000
C. 1995
D. 1990
Answer» D. 1990
4.

A ________________ program's drawings are often used as the basis for construction documents

A. Paint
B. Draw
C. Access
D. CAD
Answer» E.
5.

Free of cost repair of software bug available at Internet is called ….

A. Version
B. Ad-on
C. Tutorial
D. Patch
Answer» E.
6.

A program that infects other programs by modifying them is known as:

A. Search Engine
B. Antivirus
C. Virus
D. Cyber crime
Answer» D. Cyber crime
7.

A small wireless handled computer system that scans an items tag and pulls up the current price as you shop is called

A. POS
B. PSS
C. Data mining
D. Card reader
Answer» B. PSS
8.

Errors in computer programme is called

A. Spam
B. Follies
C. Virus
D. Bugs
Answer» E.
9.

_______ is the unauthorised use, duplication or sale of copyrighted software.

A. Licensed software
B. Privacy software
C. Pirated software
D. Open software
Answer» D. Open software
10.

In which year was Internet Explorer first released?

A. 1990
B. 1993
C. 1995
D. 1998
E. 1997
Answer» D. 1998
11.

_______ is not a Web Browser.

A. Netscape
B. Internet Explorer
C. Opera
D. Microsoft Outlook
Answer» E.
12.

In DASD, what is the full form of ‘A’?

A. Access
B. Around
C. Accessible
D. Arithmetic
Answer» B. Around
13.

________ is the fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords.

A. Malware
B. Trojan
C. Hacking
D. Phishing
Answer» E.
14.

A computer software that is sold and bundled with hardware is termed as ______.

A. Retail Software
B. Public Domain Software
C. OEM Software
D. Demo Software
Answer» D. Demo Software
15.

______ is the illegal reproduction and distribution of software application.

A. Sorting
B. Piracy
C. Cracker
D. Virus
Answer» C. Cracker
16.

_________ programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly.

A. Zombie
B. Worm
C. Trojan Horses
D. Logic Bomb
Answer» D. Logic Bomb
17.

_______ provides the instructions for ______ to follow.

A. Software, hardware
B. Hardware, software
C. Operating system, motherboard
D. Motherboard, operating system
Answer» B. Hardware, software
18.

__________ software is used for tasks such as managing disks and troubleshooting hardware problems.

A. Application
B. Operating system
C. Utility
D. Network system
Answer» C. Utility
19.

_________ is a software that assists users in processing and analysing tabular data.

A. Microsoft Paint
B. Microsoft Word
C. Note Pad Tool
D. Spreadsheet
Answer» E.
20.

In a laptop used for normal office related work, typical RAM size is likely to be:

A. 512 KB
B. 128 GB
C. 3.8 GB
D. 256 MB
Answer» D. 256 MB
21.

Linux is ______.

A. an operating system
B. an assembly language
C. a high level language
D. an interpreter
E. a complier
Answer» B. an assembly language
22.

Microsoft’s Messenger allows users to

A. bypass a browser to surf the web
B. create a blog
C. communicate via direct live communion
D. identify and eliminate spam
E. make graphic presentations
Answer» D. identify and eliminate spam
23.

Octal number system has a base ________

A. 2
B. 4
C. 8
D. 10
E. 12
Answer» D. 10
24.

________ is the central component of a computer operating system.

A. Terminal
B. Kernel
C. Shell
D. Hardware
Answer» C. Shell
25.

Choose the best option:An antivirus program is designed to _______ computer virus.

A. scan device and identify
B. scan device, identify and eliminate
C. scan device and eliminate
D. identify and eliminate
Answer» C. scan device and eliminate
26.

__________ is a problem oriented language.

A. High level language
B. Machine language
C. Assembly language
D. Low level language
E. None of these
Answer» B. Machine language
27.

Considering the below statements, choose the CORRECT option(i) A software program is a set of instructions given to a computer for the execution of the task(ii) Software is the variable part of a computer while the hardware is the invariable part(iii) System software is designed for computer-specific tasks

A. Statements (ii) and (iii) are correct and (i) is false
B. Statements (i) and (iii) are correct and (ii) is false
C. Statements (i) and (ii) are correct and (iii) is false
D. Statements (i), (ii) and (iii) are correct
Answer» E.
28.

A ________________ tells a program what kind of data is contained in a file and how the data is organised.

A. Document
B. Utility
C. Image
D. File format
Answer» E.
29.

Anti-virus is installed in a computer to:

A. Safeguard the computer from virus
B. Safeguard the computer from fire
C. Improve the memory size
D. Install other programs
Answer» B. Safeguard the computer from fire
30.

IT_WAS_ONE_OF_THE_FIRST_IDE_TO_RUN_UNDER__________AND_IT_RUNS_WITHOUT_PROBLEM_UNDER_ICEDTEA.?$

A. GNU General Public License
B. Both GNU Classpath, GPL
C. Neither GNU nor GPL
D. GNU Classpath
Answer» E.
31.

EPL stands for ________$

A. Extended Public License
B. Extended Platform License
C. Eclipse Platform License
D. Eclipse Public License
Answer» E.
32.

ACM_stands_for_________$

A. Architecture for Computing Machinery
B. Association for Computing Machinery
C. Association for Cloud Machinery
D. Architecture for Cloud Machinery
Answer» C. Association for Cloud Machinery
33.

Which allows for advanced refactoring technique?

A. JDK
B. SDK
C. UML
D. EPL
Answer» C. UML
34.

The Eclipse SDK includes the Eclipse Java development tools.

A. True
B. False
Answer» B. False
35.

UML stands for________

A. User Modeling Language
B. User Module Language
C. Unified Modeling Language
D. Unified Module Language
Answer» D. Unified Module Language
36.

Common_Public_License_is_re_licensed_under_________

A. Eclipse Public License
B. General Public License
C. Eclipse Platform
D. Eclipse plug-in
Answer» B. General Public License
37.

SDK stands for _______?

A. Software Design Kit
B. Serial Development Kit
C. Software Development Kit
D. Serial Design Kit
Answer» D. Serial Design Kit
38.

The initial codebase is originated from ________

A. IBM VisualAge
B. Equinox
C. Borland VisualAge
D. Red Hat VisualAge
Answer» B. Equinox
39.

Development environment include the __________

A. Eclipse VisualAge
B. Classpath
C. Eclipse JDT
D. IcedTea
Answer» D. IcedTea
40.

Eclipse is used to develop documents with LaTeX.

A. True
B. False
Answer» B. False
41.

What is Eclipse?

A. IDE
B. Software
C. GNU
D. Code base
Answer» B. Software
42.

What is the scenario the IDE generally required?

A. Language support
B. Visual programming
C. Attitude across different platforms
D. Out system platform
Answer» C. Attitude across different platforms
43.

What does an Eclipse IDE allows?

A. Editing the program
B. Compiling the program
C. Both editing and compiling
D. Editing, building, Debugging, Compiler
Answer» E.
44.

What is the main programming language code developed by eclipse?

A. C
B. JAVA
C. C++
D. C/C++
Answer» C. C++