MCQOPTIONS
Saved Bookmarks
This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Inventor of Email system ? |
| A. | Alan Turing |
| B. | Zuckerburg |
| C. | Vint Cerf |
| D. | Ray Tomilson |
| Answer» E. | |
| 2. |
Senior programmers, programming managers and chief programmers are programmers with |
| A. | special responsibilities |
| B. | testing responsibilities |
| C. | debugging responsibilities |
| D. | maintenance responsibilities |
| Answer» B. testing responsibilities | |
| 3. |
If any of string has odd parity initially, it is because of data |
| A. | transmission |
| B. | error |
| C. | collection |
| D. | intervals |
| Answer» C. collection | |
| 4. |
Connections to the Internet using a phone line and a modem are called …………… connections. |
| A. | broadband |
| B. | dial-up |
| C. | digital |
| D. | None of these |
| Answer» C. digital | |
| 5. |
In computing and electronic systems BCD is abbreviation of |
| A. | Bit Coded Digit |
| B. | Binary Coded Decimal |
| C. | Binary Coded Digit |
| D. | Bit Coded Decimal |
| Answer» C. Binary Coded Digit | |
| 6. |
Extra digits added to international book numbers is classified as |
| A. | mistake digit |
| B. | parity digits |
| C. | check digit |
| D. | extra digit |
| Answer» D. extra digit | |
| 7. |
The pattern of printed lines on most products is called ………….. |
| A. | prices |
| B. | OCR |
| C. | scanners |
| D. | barcodes |
| Answer» E. | |
| 8. |
Which of the following is the most common method for online payment? |
| A. | Card based system |
| B. | E cash system |
| C. | Cheque based system |
| D. | None of the above |
| Answer» B. E cash system | |
| 9. |
In 1940, first electronic computer was invented by |
| A. | Clifford Bery |
| B. | George Boole |
| C. | Atanasoff and Berry |
| D. | John V.Atanasoff |
| Answer» D. John V.Atanasoff | |
| 10. |
Field which is used to identify specific record and can't be duplicated is classified as |
| A. | key field |
| B. | duplicate field |
| C. | copied field |
| D. | original field |
| Answer» B. duplicate field | |
| 11. |
Binary integers that are formed by finding 1s complement and adding 1 to it are called |
| A. | threes complement |
| B. | ones complement |
| C. | twos complement |
| D. | ones string |
| Answer» D. ones string | |
| 12. |
Phones that offer advanced features not typically found in cellular phones, and are called |
| A. | DSLRs |
| B. | smart phones |
| C. | tablets |
| D. | notepads |
| Answer» C. tablets | |
| 13. |
Which of the following are the functions of a operating system ? |
| A. | Allocates resources |
| B. | Monitors Activities |
| C. | Manages disks and files |
| D. | All of the above |
| Answer» E. | |
| 14. |
MFC stands for |
| A. | Microsoft File Class |
| B. | Microsoft Form Class |
| C. | Microsoft Foundation Class |
| D. | None of the above |
| Answer» D. None of the above | |
| 15. |
File which is automatically updated when needed is classified as |
| A. | particular file |
| B. | reference file |
| C. | master file |
| D. | application file |
| Answer» D. application file | |
| 16. |
A method for ensuring accuracy of processed data and is a total of several fields of data in a file, including fields not normally used in calculations, such as account number is termed as |
| A. | grand total |
| B. | hash total |
| C. | slash total |
| D. | parity total |
| Answer» C. slash total | |
| 17. |
Where was India's first computer installed and when? |
| A. | Indian Institute of Technology, Delhi, 1977 |
| B. | Indian Institute of Science, Bangalore, 1971 |
| C. | Indian Iron & Steel Co. Ltd., 1968 |
| D. | Indian Statistical Institute, Calcutta, 1955 |
| Answer» E. | |
| 18. |
Which device is required for the Internet connection? |
| A. | Modem |
| B. | NIC Card |
| C. | Joystick |
| D. | CD Drive |
| Answer» B. NIC Card | |
| 19. |
In Computer terminology ‘CAD’ is stands for |
| A. | Computer And Design |
| B. | Computer Algorithm in Design |
| C. | Computer Aided Design |
| D. | None of the above |
| Answer» D. None of the above | |
| 20. |
Which characteristics of computer distinguishes it from electronic calculation? |
| A. | Accuracy |
| B. | Storage |
| C. | Versatility |
| D. | Automatic |
| Answer» C. Versatility | |
| 21. |
A ………… is an additional set of commands that the computer displays after you make a selection from the main menu. |
| A. | dialog box |
| B. | submenu |
| C. | menu selection |
| D. | All of the above |
| Answer» B. submenu | |
| 22. |
There are ……….. bits in one byte. |
| A. | 4 |
| B. | 8 |
| C. | 12 |
| D. | 32 |
| Answer» C. 12 | |
| 23. |
Which Disk Format can access by MS-Dos 6.0? |
| A. | OSX |
| B. | FAT |
| C. | NTFS |
| D. | EXT2 |
| Answer» C. NTFS | |
| 24. |
Codes consisting of lines of varying widths or lengths that are computer-readable are known as- |
| A. | an ASCII code |
| B. | a magnetic tape |
| C. | an OCR scanner |
| D. | a bar code |
| Answer» E. | |
| 25. |
Method of ensuring bit strings integrity is termed as |
| A. | parity bit |
| B. | parity even |
| C. | parity odd |
| D. | check parity |
| Answer» B. parity even | |
| 26. |
Which of the following operating system is used on mobile phones ? |
| A. | Windows Vista |
| B. | Android |
| C. | Windows XP |
| D. | All of the above |
| Answer» C. Windows XP | |
| 27. |
Which of the following is not a browser program ? |
| A. | MOSAIC |
| B. | Windows Explorer |
| C. | Internet Explorer |
| D. | Netscape Navigator |
| Answer» C. Internet Explorer | |
| 28. |
The computer code for the interchange of information between terminals is |
| A. | BCD |
| B. | EBCDIC |
| C. | ASCII |
| D. | All of the above |
| Answer» D. All of the above | |
| 29. |
WAN stands for |
| A. | Wap Area Network |
| B. | Wireless Area Network |
| C. | Wide Area Network |
| D. | Wide Array Net |
| Answer» D. Wide Array Net | |
| 30. |
What is System Analysis? |
| A. | System Analysis involves creating formal model of the problem to be solved |
| B. | System analysis defines the format and type of data the program will use |
| C. | The design of the screen the user will see and use to enter or display data |
| D. | None of the above |
| Answer» B. System analysis defines the format and type of data the program will use | |
| 31. |
Which of the following devices have a limitation that we can only store information to it but cannoterase or modify it? |
| A. | Tape Drive |
| B. | CDROM |
| C. | Floppy Disk |
| D. | Hard Disk |
| Answer» C. Floppy Disk | |
| 32. |
A network that links across metropolitan, regional and national boundaries is called: |
| A. | MAN |
| B. | LAN |
| C. | WAN |
| D. | VAN |
| Answer» D. VAN | |
| 33. |
Type of computing error occurs because of typing letters and digits incorrectly is classified as |
| A. | transformed error |
| B. | crossed error |
| C. | typed error |
| D. | transposition |
| Answer» E. | |
| 34. |
Errors in preparation of data does not include |
| A. | simple type error |
| B. | transmission error |
| C. | misreading characters error |
| D. | management failure error |
| Answer» C. misreading characters error | |
| 35. |
The system unit of a personal computer typically contains all of the following except: |
| A. | Microprocessor |
| B. | Serial interface |
| C. | Modem |
| D. | Disk controller |
| Answer» D. Disk controller | |
| 36. |
'.MPG' extension refers to: |
| A. | Word file |
| B. | Text file |
| C. | Image file |
| D. | Movie file |
| Answer» E. | |
| 37. |
Person who is responsible for data preparation area supervision is called |
| A. | data preparation supervisor |
| B. | terminal supervisor |
| C. | punching supervisor |
| D. | peripheral supervisor |
| Answer» B. terminal supervisor | |
| 38. |
Keyboard operator is also known as |
| A. | punch operator |
| B. | data operator |
| C. | peripheral operator |
| D. | both a and b |
| Answer» E. | |
| 39. |
In information technology processed form of data is called |
| A. | data processing |
| B. | system |
| C. | information |
| D. | instruction |
| Answer» D. instruction | |
| 40. |
Modern computers are based on |
| A. | microprocessor |
| B. | micro chip |
| C. | Both a and b |
| D. | IO Devices |
| Answer» D. IO Devices | |
| 41. |
A field of technology that deals with combination of real world and the data generated from computer. |
| A. | ML |
| B. | AI |
| C. | AR |
| D. | IoT |
| Answer» D. IoT | |
| 42. |
Computer that uses microprocessor as its central processing unit is known as |
| A. | personal computer |
| B. | micro computer |
| C. | mini computer |
| D. | Both a and b |
| Answer» E. | |
| 43. |
Before the development of microprocessors, computers are operated and accessed by |
| A. | particular person |
| B. | two persons |
| C. | any one |
| D. | no one |
| Answer» B. two persons | |
| 44. |
Operations of a computer which are controlled by microprocessor are |
| A. | all operations |
| B. | logic operations |
| C. | arithmetic operations |
| D. | processing operations |
| Answer» B. logic operations | |
| 45. |
What is the full form of AT in the IBM PC-AT? |
| A. | Applied Technology |
| B. | Advance Technology |
| C. | Additional Technology |
| D. | None of the Above |
| Answer» C. Additional Technology | |
| 46. |
An error in computer data is called |
| A. | Bug |
| B. | Storage device |
| C. | Chip |
| D. | CPU |
| Answer» B. Storage device | |
| 47. |
Programmer who works with high level languages and have better understanding with applications are considered as |
| A. | design programmer |
| B. | application programmer |
| C. | analysis programmer |
| D. | train programmer |
| Answer» C. analysis programmer | |
| 48. |
Select the Odd one |
| A. | Operating system |
| B. | Interpreter |
| C. | Compiler |
| D. | Assembler |
| Answer» B. Interpreter | |
| 49. |
The mercantile process model consists of the following phases |
| A. | The pre-purchase phase |
| B. | Purchase consummation phase |
| C. | Post-purchase Interaction phase |
| D. | All of the above |
| Answer» E. | |
| 50. |
In 1999, the Melissa virus was a widely publicised: |
| A. | E-mail virus |
| B. | Macro virus |
| C. | Trojan horse |
| D. | Time bomb |
| Answer» B. Macro virus | |