Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

51.

Duties of computer programmer includes

A. program detailed flowcharts
B. testing and debugging
C. program maintenance
D. all of above
Answer» E.
52.

Which of the following statements is true?

A. The installation of a computer is favorably received by all employees
B. Some form of training is necessary for employees who will work with computers
C. Computers are portrayed solely as society's benefactor
D. A businessperson is only interested in the computer's accuracy
Answer» C. Computers are portrayed solely as society's benefactor
53.

When you make graph and picture in document, then your Computer holds the data in …………..

A. Restore file
B. Backup drive
C. Clipboard
D. Memory
Answer» E.
54.

Device in which data is represented by continuous variable quantity is called

A. analogue device
B. computer device
C. system programs
D. digital program
Answer» B. computer device
55.

……….is a combination of hardware and software that facilitates the sharing of information between computing devices.

A. network
B. peripheral
C. expansion board
D. digital device
Answer» B. peripheral
56.

E-Commerce is not suitable for

A. Sale/Purchase of expensive jewellery and antiques
B. Sale/Purchase of branded clothes
C. Online job searching
D. Sale/Purchase of mobile phones
Answer» D. Sale/Purchase of mobile phones
57.

Set of numbers used to check all groups record within limits of data is classified as

A. variable check
B. decimal check
C. type check
D. range check
Answer» E.
58.

I/O is short form of ___________.

A. Input / Output
B. Income / Outcome
C. Incoming / Outgoing
D. Inner / Outer
Answer» B. Income / Outcome
59.

A tracking based on geo-location information.

A. Location based
B. Markerless
C. Marker based
D. GPS
Answer» B. Markerless
60.

E-mail addresses separate the user name from the ISP using the symbol:

A. &
B. @
C. %
D. *
Answer» C. %
61.

The term PC means?

A. Personal Computer
B. Public Computer
C. Private Computer
D. Professional Computer
Answer» B. Public Computer
62.

____ is not an E-Commerce application.

A. Conducting an auction
B. Evaluating an employee
C. House banking
D. Buying stocks
Answer» C. House banking
63.

Which of the following is false concerning Enterprise Resource Planning (ERP)?

A. It provides and access information in a real-time environment.
B. It is inexpensive to implement.
C. It attempts to automate and integrate the majority of business processes.
D. It shares common data and practices across the enterprise
Answer» C. It attempts to automate and integrate the majority of business processes.
64.

Line access and avoidance of collision are the main functions of

A. the CPU
B. the monitor
C. network protocols
D. wide area networks
Answer» D. wide area networks
65.

In the hypermedia database, information bits are stored in the form of

A. signals
B. cubes
C. nodes
D. symbols
Answer» D. symbols
66.

'.MOV' extension refers to:

A. Word file
B. Text file
C. Image file
D. Movie file
Answer» E.
67.

VOIP stands for……….

A. Voice over IP
B. Video over IP
C. Viruses over IP
D. Virtual over IP
Answer» B. Video over IP
68.

An intentionally disruptive program that spreads from program to program or from diskto disk is known as a:

A. Trojan horse
B. Virus
C. Time bomb
D. Time-related bomb sequence.
Answer» C. Time bomb
69.

The browser’s ……………. keeps a list of web pages you have visited during the current session.

A. favorites
B. cache
C. history
D. All of these
Answer» D. All of these
70.

Type of error which occurs when data is transferred from one device to another is classified as

A. transmission error
B. interval error
C. software error
D. discontinued error
Answer» B. interval error
71.

Type of programmer who write programs for a specific user to carry out special instructions is classified as

A. applications programmer
B. analysis programmer
C. train programmers
D. design programmers
Answer» B. analysis programmer
72.

IBM stands for

A. Internal Business Management
B. International Business Management
C. International Business Machines
D. Internal Business Machines
Answer» D. Internal Business Machines
73.

A name or number used to identify a storage location devices?

A. A record
B. An address
C. A byte
D. All of the above
Answer» C. A byte
74.

Check of stock goods, sold goods and reordering of sold goods are tasks of

A. stock control
B. stock
C. control system
D. overall system
Answer» B. stock
75.

The principal electronic payment systems for electronic commerce is

A. Digital Wallet
B. Electronic Cheque
C. Credit Card
D. All of the above
Answer» E.
76.

The BIOS is the abbreviation of ________.

A. Best Input Output System
B. Base Input Output System
C. Basic Input Output System
D. Basic Input Output Symbol
Answer» D. Basic Input Output Symbol
77.

Devices such as mercury thermometer and kitchen scales are classified as

A. digital devices
B. analogue devices
C. programmed devices
D. signal led devices
Answer» C. programmed devices
78.

Programmer who writes system software is called

A. system programmer
B. analysis programmer
C. train programmer
D. design programmer
Answer» B. analysis programmer
79.

What kind of architecture does mobile computing deploy?

A. Three layered
B. Four layered
C. Two layered
D. None of the above
Answer» B. Four layered
80.

E-commerce infrastructure involves

A. Network
B. E-catalogs
C. Web servers
D. All of the above
Answer» E.
81.

The difference between people with access to computers and the Internet and those without this access is known as the :

A. digital divide
B. Internet divide
C. Web divide
D. E-illiteracy
Answer» B. Internet divide
82.

The scrambling of code is known as:

A. Encryption
B. a firewall
C. Scrambling
D. Password proofing
Answer» B. a firewall
83.

The terminal device that functions as a cash register, computer terminal, and OCR reader is the:

A. Data collection terminal
B. OCR register terminal
C. Video Display terminal
D. POS terminal
Answer» E.
84.

Small cardboard ticket which includes coded information and is usually attached to products is usually classified as

A. tags
B. coded cardboard
C. decoded paper
D. digital cardboard
Answer» B. coded cardboard
85.

It is easier to change the name of file using …………… process.

A. Transforming
B. Christening
C. Renaming
D. None of these
Answer» D. None of these
86.

Physical structure of computer is called :

A. Software
B. Hardware
C. Human ware
D. All of these
Answer» C. Human ware
87.

The blinking symbol on the computer screen:

A. Mouse
B. Cursor
C. Character
D. Blinker
Answer» C. Character
88.

File extensions are used in order to ……….

A. Name the file
B. Ensure the filename is not lost
C. Identify the file
D. Identify the file type
Answer» E.
89.

Enabling data to be readily available for required processing is responsibility of operation named

A. Inputting
B. Processing
C. Controlling
D. Storing
Answer» E.
90.

Various applications and documents are represented on the Windows desktop by …………

A. Symbols
B. Labels
C. Graphs
D. Icons
Answer» E.
91.

Benefits of EDI are

A. Speed and volume
B. Profit
C. Accuracy
D. All of the above
Answer» E.
92.

Organizations with both physical and online presences are referred to as what?

A. Dual-presence companies
B. Click-and-mortar
C. Multi-presence organizations
D. All of the above
Answer» C. Multi-presence organizations
93.

Identify the IP address from the following:

A. 300 .215.317 3
B. 302.215@417.5
C. 202.50.20.148
D. 202-50-20-148
Answer» D. 202-50-20-148
94.

Which of the following is part of the four main segments for e-commerce?

A. C2B
B. B2C
C. B2B
D. All of the above
Answer» E.
95.

People who accept tasks from computer users, processes it and then return user there complete tasks are considered as

A. terminal control staff
B. data control staff
C. peripheral control staff
D. librarian control staff
Answer» C. peripheral control staff
96.

Planning, supervising and coordinating are duties of

A. trail manager
B. maintenance manager
C. operations manager
D. day to day managers
Answer» D. day to day managers
97.

When a logic bomb is activated by a time-related event, it is known as a:

A. Time-related bomb sequence.
B. Virus
C. Time bomb
D. Trojan horse
Answer» D. Trojan horse
98.

A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a:

A. Time-related bomb sequence.
B. Virus
C. Time bomb
D. Trojan horse
Answer» D. Trojan horse
99.

Computers manipulate data in many ways, and this manipulation is called……

A. upgrading
B. processing
C. batching
D. utilizing
Answer» C. batching
100.

The amount of a certain product sold to a certain customer in a past period can be obtained from the

A. Inventory file
B. Sales history file
C. Customer file
D. All of the above
Answer» C. Customer file