

MCQOPTIONS
Saved Bookmarks
This section includes 44 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.
1. |
COBOL being a high level programming language was developed for what purpose? |
A. | Business data processing applications |
B. | Designing plan for buildings |
C. | Maintaining the data of a firm |
D. | Teaching children in schools |
E. | None |
Answer» B. Designing plan for buildings | |
2. |
An intentionally disruptive software that spreads from computer to computer is known as |
A. | search engine |
B. | chat software |
C. | |
D. | virus |
Answer» E. | |
3. |
In which year did the JavaScript Programming language come into existence? |
A. | 1999 |
B. | 2000 |
C. | 1995 |
D. | 1990 |
Answer» D. 1990 | |
4. |
A ________________ program's drawings are often used as the basis for construction documents |
A. | Paint |
B. | Draw |
C. | Access |
D. | CAD |
Answer» E. | |
5. |
Free of cost repair of software bug available at Internet is called …. |
A. | Version |
B. | Ad-on |
C. | Tutorial |
D. | Patch |
Answer» E. | |
6. |
A program that infects other programs by modifying them is known as: |
A. | Search Engine |
B. | Antivirus |
C. | Virus |
D. | Cyber crime |
Answer» D. Cyber crime | |
7. |
A small wireless handled computer system that scans an items tag and pulls up the current price as you shop is called |
A. | POS |
B. | PSS |
C. | Data mining |
D. | Card reader |
Answer» B. PSS | |
8. |
Errors in computer programme is called |
A. | Spam |
B. | Follies |
C. | Virus |
D. | Bugs |
Answer» E. | |
9. |
_______ is the unauthorised use, duplication or sale of copyrighted software. |
A. | Licensed software |
B. | Privacy software |
C. | Pirated software |
D. | Open software |
Answer» D. Open software | |
10. |
In which year was Internet Explorer first released? |
A. | 1990 |
B. | 1993 |
C. | 1995 |
D. | 1998 |
E. | 1997 |
Answer» D. 1998 | |
11. |
_______ is not a Web Browser. |
A. | Netscape |
B. | Internet Explorer |
C. | Opera |
D. | Microsoft Outlook |
Answer» E. | |
12. |
In DASD, what is the full form of ‘A’? |
A. | Access |
B. | Around |
C. | Accessible |
D. | Arithmetic |
Answer» B. Around | |
13. |
________ is the fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords. |
A. | Malware |
B. | Trojan |
C. | Hacking |
D. | Phishing |
Answer» E. | |
14. |
A computer software that is sold and bundled with hardware is termed as ______. |
A. | Retail Software |
B. | Public Domain Software |
C. | OEM Software |
D. | Demo Software |
Answer» D. Demo Software | |
15. |
______ is the illegal reproduction and distribution of software application. |
A. | Sorting |
B. | Piracy |
C. | Cracker |
D. | Virus |
Answer» C. Cracker | |
16. |
_________ programs can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly. |
A. | Zombie |
B. | Worm |
C. | Trojan Horses |
D. | Logic Bomb |
Answer» D. Logic Bomb | |
17. |
_______ provides the instructions for ______ to follow. |
A. | Software, hardware |
B. | Hardware, software |
C. | Operating system, motherboard |
D. | Motherboard, operating system |
Answer» B. Hardware, software | |
18. |
__________ software is used for tasks such as managing disks and troubleshooting hardware problems. |
A. | Application |
B. | Operating system |
C. | Utility |
D. | Network system |
Answer» C. Utility | |
19. |
_________ is a software that assists users in processing and analysing tabular data. |
A. | Microsoft Paint |
B. | Microsoft Word |
C. | Note Pad Tool |
D. | Spreadsheet |
Answer» E. | |
20. |
In a laptop used for normal office related work, typical RAM size is likely to be: |
A. | 512 KB |
B. | 128 GB |
C. | 3.8 GB |
D. | 256 MB |
Answer» D. 256 MB | |
21. |
Linux is ______. |
A. | an operating system |
B. | an assembly language |
C. | a high level language |
D. | an interpreter |
E. | a complier |
Answer» B. an assembly language | |
22. |
Microsoft’s Messenger allows users to |
A. | bypass a browser to surf the web |
B. | create a blog |
C. | communicate via direct live communion |
D. | identify and eliminate spam |
E. | make graphic presentations |
Answer» D. identify and eliminate spam | |
23. |
Octal number system has a base ________ |
A. | 2 |
B. | 4 |
C. | 8 |
D. | 10 |
E. | 12 |
Answer» D. 10 | |
24. |
________ is the central component of a computer operating system. |
A. | Terminal |
B. | Kernel |
C. | Shell |
D. | Hardware |
Answer» C. Shell | |
25. |
Choose the best option:An antivirus program is designed to _______ computer virus. |
A. | scan device and identify |
B. | scan device, identify and eliminate |
C. | scan device and eliminate |
D. | identify and eliminate |
Answer» C. scan device and eliminate | |
26. |
__________ is a problem oriented language. |
A. | High level language |
B. | Machine language |
C. | Assembly language |
D. | Low level language |
E. | None of these |
Answer» B. Machine language | |
27. |
Considering the below statements, choose the CORRECT option(i) A software program is a set of instructions given to a computer for the execution of the task(ii) Software is the variable part of a computer while the hardware is the invariable part(iii) System software is designed for computer-specific tasks |
A. | Statements (ii) and (iii) are correct and (i) is false |
B. | Statements (i) and (iii) are correct and (ii) is false |
C. | Statements (i) and (ii) are correct and (iii) is false |
D. | Statements (i), (ii) and (iii) are correct |
Answer» E. | |
28. |
A ________________ tells a program what kind of data is contained in a file and how the data is organised. |
A. | Document |
B. | Utility |
C. | Image |
D. | File format |
Answer» E. | |
29. |
Anti-virus is installed in a computer to: |
A. | Safeguard the computer from virus |
B. | Safeguard the computer from fire |
C. | Improve the memory size |
D. | Install other programs |
Answer» B. Safeguard the computer from fire | |
30. |
IT_WAS_ONE_OF_THE_FIRST_IDE_TO_RUN_UNDER__________AND_IT_RUNS_WITHOUT_PROBLEM_UNDER_ICEDTEA.?$ |
A. | GNU General Public License |
B. | Both GNU Classpath, GPL |
C. | Neither GNU nor GPL |
D. | GNU Classpath |
Answer» E. | |
31. |
EPL stands for ________$ |
A. | Extended Public License |
B. | Extended Platform License |
C. | Eclipse Platform License |
D. | Eclipse Public License |
Answer» E. | |
32. |
ACM_stands_for_________$ |
A. | Architecture for Computing Machinery |
B. | Association for Computing Machinery |
C. | Association for Cloud Machinery |
D. | Architecture for Cloud Machinery |
Answer» C. Association for Cloud Machinery | |
33. |
Which allows for advanced refactoring technique? |
A. | JDK |
B. | SDK |
C. | UML |
D. | EPL |
Answer» C. UML | |
34. |
The Eclipse SDK includes the Eclipse Java development tools. |
A. | True |
B. | False |
Answer» B. False | |
35. |
UML stands for________ |
A. | User Modeling Language |
B. | User Module Language |
C. | Unified Modeling Language |
D. | Unified Module Language |
Answer» D. Unified Module Language | |
36. |
Common_Public_License_is_re_licensed_under_________ |
A. | Eclipse Public License |
B. | General Public License |
C. | Eclipse Platform |
D. | Eclipse plug-in |
Answer» B. General Public License | |
37. |
SDK stands for _______? |
A. | Software Design Kit |
B. | Serial Development Kit |
C. | Software Development Kit |
D. | Serial Design Kit |
Answer» D. Serial Design Kit | |
38. |
The initial codebase is originated from ________ |
A. | IBM VisualAge |
B. | Equinox |
C. | Borland VisualAge |
D. | Red Hat VisualAge |
Answer» B. Equinox | |
39. |
Development environment include the __________ |
A. | Eclipse VisualAge |
B. | Classpath |
C. | Eclipse JDT |
D. | IcedTea |
Answer» D. IcedTea | |
40. |
Eclipse is used to develop documents with LaTeX. |
A. | True |
B. | False |
Answer» B. False | |
41. |
What is Eclipse? |
A. | IDE |
B. | Software |
C. | GNU |
D. | Code base |
Answer» B. Software | |
42. |
What is the scenario the IDE generally required? |
A. | Language support |
B. | Visual programming |
C. | Attitude across different platforms |
D. | Out system platform |
Answer» C. Attitude across different platforms | |
43. |
What does an Eclipse IDE allows? |
A. | Editing the program |
B. | Compiling the program |
C. | Both editing and compiling |
D. | Editing, building, Debugging, Compiler |
Answer» E. | |
44. |
What is the main programming language code developed by eclipse? |
A. | C |
B. | JAVA |
C. | C++ |
D. | C/C++ |
Answer» C. C++ | |