MCQOPTIONS
Saved Bookmarks
This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Duties of computer programmer includes |
| A. | program detailed flowcharts |
| B. | testing and debugging |
| C. | program maintenance |
| D. | all of above |
| Answer» E. | |
| 52. |
Which of the following statements is true? |
| A. | The installation of a computer is favorably received by all employees |
| B. | Some form of training is necessary for employees who will work with computers |
| C. | Computers are portrayed solely as society's benefactor |
| D. | A businessperson is only interested in the computer's accuracy |
| Answer» C. Computers are portrayed solely as society's benefactor | |
| 53. |
When you make graph and picture in document, then your Computer holds the data in ………….. |
| A. | Restore file |
| B. | Backup drive |
| C. | Clipboard |
| D. | Memory |
| Answer» E. | |
| 54. |
Device in which data is represented by continuous variable quantity is called |
| A. | analogue device |
| B. | computer device |
| C. | system programs |
| D. | digital program |
| Answer» B. computer device | |
| 55. |
……….is a combination of hardware and software that facilitates the sharing of information between computing devices. |
| A. | network |
| B. | peripheral |
| C. | expansion board |
| D. | digital device |
| Answer» B. peripheral | |
| 56. |
E-Commerce is not suitable for |
| A. | Sale/Purchase of expensive jewellery and antiques |
| B. | Sale/Purchase of branded clothes |
| C. | Online job searching |
| D. | Sale/Purchase of mobile phones |
| Answer» D. Sale/Purchase of mobile phones | |
| 57. |
Set of numbers used to check all groups record within limits of data is classified as |
| A. | variable check |
| B. | decimal check |
| C. | type check |
| D. | range check |
| Answer» E. | |
| 58. |
I/O is short form of ___________. |
| A. | Input / Output |
| B. | Income / Outcome |
| C. | Incoming / Outgoing |
| D. | Inner / Outer |
| Answer» B. Income / Outcome | |
| 59. |
A tracking based on geo-location information. |
| A. | Location based |
| B. | Markerless |
| C. | Marker based |
| D. | GPS |
| Answer» B. Markerless | |
| 60. |
E-mail addresses separate the user name from the ISP using the symbol: |
| A. | & |
| B. | @ |
| C. | % |
| D. | * |
| Answer» C. % | |
| 61. |
The term PC means? |
| A. | Personal Computer |
| B. | Public Computer |
| C. | Private Computer |
| D. | Professional Computer |
| Answer» B. Public Computer | |
| 62. |
____ is not an E-Commerce application. |
| A. | Conducting an auction |
| B. | Evaluating an employee |
| C. | House banking |
| D. | Buying stocks |
| Answer» C. House banking | |
| 63. |
Which of the following is false concerning Enterprise Resource Planning (ERP)? |
| A. | It provides and access information in a real-time environment. |
| B. | It is inexpensive to implement. |
| C. | It attempts to automate and integrate the majority of business processes. |
| D. | It shares common data and practices across the enterprise |
| Answer» C. It attempts to automate and integrate the majority of business processes. | |
| 64. |
Line access and avoidance of collision are the main functions of |
| A. | the CPU |
| B. | the monitor |
| C. | network protocols |
| D. | wide area networks |
| Answer» D. wide area networks | |
| 65. |
In the hypermedia database, information bits are stored in the form of |
| A. | signals |
| B. | cubes |
| C. | nodes |
| D. | symbols |
| Answer» D. symbols | |
| 66. |
'.MOV' extension refers to: |
| A. | Word file |
| B. | Text file |
| C. | Image file |
| D. | Movie file |
| Answer» E. | |
| 67. |
VOIP stands for………. |
| A. | Voice over IP |
| B. | Video over IP |
| C. | Viruses over IP |
| D. | Virtual over IP |
| Answer» B. Video over IP | |
| 68. |
An intentionally disruptive program that spreads from program to program or from diskto disk is known as a: |
| A. | Trojan horse |
| B. | Virus |
| C. | Time bomb |
| D. | Time-related bomb sequence. |
| Answer» C. Time bomb | |
| 69. |
The browser’s ……………. keeps a list of web pages you have visited during the current session. |
| A. | favorites |
| B. | cache |
| C. | history |
| D. | All of these |
| Answer» D. All of these | |
| 70. |
Type of error which occurs when data is transferred from one device to another is classified as |
| A. | transmission error |
| B. | interval error |
| C. | software error |
| D. | discontinued error |
| Answer» B. interval error | |
| 71. |
Type of programmer who write programs for a specific user to carry out special instructions is classified as |
| A. | applications programmer |
| B. | analysis programmer |
| C. | train programmers |
| D. | design programmers |
| Answer» B. analysis programmer | |
| 72. |
IBM stands for |
| A. | Internal Business Management |
| B. | International Business Management |
| C. | International Business Machines |
| D. | Internal Business Machines |
| Answer» D. Internal Business Machines | |
| 73. |
A name or number used to identify a storage location devices? |
| A. | A record |
| B. | An address |
| C. | A byte |
| D. | All of the above |
| Answer» C. A byte | |
| 74. |
Check of stock goods, sold goods and reordering of sold goods are tasks of |
| A. | stock control |
| B. | stock |
| C. | control system |
| D. | overall system |
| Answer» B. stock | |
| 75. |
The principal electronic payment systems for electronic commerce is |
| A. | Digital Wallet |
| B. | Electronic Cheque |
| C. | Credit Card |
| D. | All of the above |
| Answer» E. | |
| 76. |
The BIOS is the abbreviation of ________. |
| A. | Best Input Output System |
| B. | Base Input Output System |
| C. | Basic Input Output System |
| D. | Basic Input Output Symbol |
| Answer» D. Basic Input Output Symbol | |
| 77. |
Devices such as mercury thermometer and kitchen scales are classified as |
| A. | digital devices |
| B. | analogue devices |
| C. | programmed devices |
| D. | signal led devices |
| Answer» C. programmed devices | |
| 78. |
Programmer who writes system software is called |
| A. | system programmer |
| B. | analysis programmer |
| C. | train programmer |
| D. | design programmer |
| Answer» B. analysis programmer | |
| 79. |
What kind of architecture does mobile computing deploy? |
| A. | Three layered |
| B. | Four layered |
| C. | Two layered |
| D. | None of the above |
| Answer» B. Four layered | |
| 80. |
E-commerce infrastructure involves |
| A. | Network |
| B. | E-catalogs |
| C. | Web servers |
| D. | All of the above |
| Answer» E. | |
| 81. |
The difference between people with access to computers and the Internet and those without this access is known as the : |
| A. | digital divide |
| B. | Internet divide |
| C. | Web divide |
| D. | E-illiteracy |
| Answer» B. Internet divide | |
| 82. |
The scrambling of code is known as: |
| A. | Encryption |
| B. | a firewall |
| C. | Scrambling |
| D. | Password proofing |
| Answer» B. a firewall | |
| 83. |
The terminal device that functions as a cash register, computer terminal, and OCR reader is the: |
| A. | Data collection terminal |
| B. | OCR register terminal |
| C. | Video Display terminal |
| D. | POS terminal |
| Answer» E. | |
| 84. |
Small cardboard ticket which includes coded information and is usually attached to products is usually classified as |
| A. | tags |
| B. | coded cardboard |
| C. | decoded paper |
| D. | digital cardboard |
| Answer» B. coded cardboard | |
| 85. |
It is easier to change the name of file using …………… process. |
| A. | Transforming |
| B. | Christening |
| C. | Renaming |
| D. | None of these |
| Answer» D. None of these | |
| 86. |
Physical structure of computer is called : |
| A. | Software |
| B. | Hardware |
| C. | Human ware |
| D. | All of these |
| Answer» C. Human ware | |
| 87. |
The blinking symbol on the computer screen: |
| A. | Mouse |
| B. | Cursor |
| C. | Character |
| D. | Blinker |
| Answer» C. Character | |
| 88. |
File extensions are used in order to ………. |
| A. | Name the file |
| B. | Ensure the filename is not lost |
| C. | Identify the file |
| D. | Identify the file type |
| Answer» E. | |
| 89. |
Enabling data to be readily available for required processing is responsibility of operation named |
| A. | Inputting |
| B. | Processing |
| C. | Controlling |
| D. | Storing |
| Answer» E. | |
| 90. |
Various applications and documents are represented on the Windows desktop by ………… |
| A. | Symbols |
| B. | Labels |
| C. | Graphs |
| D. | Icons |
| Answer» E. | |
| 91. |
Benefits of EDI are |
| A. | Speed and volume |
| B. | Profit |
| C. | Accuracy |
| D. | All of the above |
| Answer» E. | |
| 92. |
Organizations with both physical and online presences are referred to as what? |
| A. | Dual-presence companies |
| B. | Click-and-mortar |
| C. | Multi-presence organizations |
| D. | All of the above |
| Answer» C. Multi-presence organizations | |
| 93. |
Identify the IP address from the following: |
| A. | 300 .215.317 3 |
| B. | 302.215@417.5 |
| C. | 202.50.20.148 |
| D. | 202-50-20-148 |
| Answer» D. 202-50-20-148 | |
| 94. |
Which of the following is part of the four main segments for e-commerce? |
| A. | C2B |
| B. | B2C |
| C. | B2B |
| D. | All of the above |
| Answer» E. | |
| 95. |
People who accept tasks from computer users, processes it and then return user there complete tasks are considered as |
| A. | terminal control staff |
| B. | data control staff |
| C. | peripheral control staff |
| D. | librarian control staff |
| Answer» C. peripheral control staff | |
| 96. |
Planning, supervising and coordinating are duties of |
| A. | trail manager |
| B. | maintenance manager |
| C. | operations manager |
| D. | day to day managers |
| Answer» D. day to day managers | |
| 97. |
When a logic bomb is activated by a time-related event, it is known as a: |
| A. | Time-related bomb sequence. |
| B. | Virus |
| C. | Time bomb |
| D. | Trojan horse |
| Answer» D. Trojan horse | |
| 98. |
A logic bomb that was created to erupt on Michelangelo‘s birthday is an example of a: |
| A. | Time-related bomb sequence. |
| B. | Virus |
| C. | Time bomb |
| D. | Trojan horse |
| Answer» D. Trojan horse | |
| 99. |
Computers manipulate data in many ways, and this manipulation is called…… |
| A. | upgrading |
| B. | processing |
| C. | batching |
| D. | utilizing |
| Answer» C. batching | |
| 100. |
The amount of a certain product sold to a certain customer in a past period can be obtained from the |
| A. | Inventory file |
| B. | Sales history file |
| C. | Customer file |
| D. | All of the above |
| Answer» C. Customer file | |