Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

151.

BIOS stands for

A. Basic Input Output system
B. Binary Input output system
C. Basic Input Off system
D. all the above
Answer» B. Binary Input output system
152.

Which of the following is a type of network?

A. Ring
B. Bus
C. Star
D. PAN
Answer» E.
153.

Which type of network would use phone lines ?

A. WAN
B. LAN
C. WWAN
D. Wireless
Answer» B. LAN
154.

…………….are used to identify a user who returns to a Website.

A. Cookies
B. Plug-ins
C. Scripts
D. ASPs
Answer» B. Plug-ins
155.

To move a copy of file from one computer to another over a communication channel is called?

A. File transfer
B. File encryption
C. File modification
D. File copying
Answer» B. File encryption
156.

Person who amends and produces computer program is considered as

A. processor
B. programmers
C. managers
D. analysts
Answer» C. managers
157.

Which is the most valuable electronic commerce to the individual customer in long run?

A. Business to Business
B. Customer to Customer
C. Business to Customer
D. None of the above
Answer» B. Customer to Customer
158.

Which of the following code is used in present day computing was developed by IBM corporation?

A. Baudot code
B. EBCDIC code
C. ASCII
D. Hollerith Code
Answer» C. ASCII
159.

A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a-

A. Hacker
B. spammer
C. instant messenger
D. programmer
Answer» B. spammer
160.

Where does most data go first with in a computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE
Answer» B. ROM
161.

The trend to outsource IT functions to other countries is termed

A. Outer outsourcing
B. Offshore outsourcing
C. Foreign outsourcing
D. External outsourcing
Answer» C. Foreign outsourcing
162.

Completeness and accuracy of data is called its

A. management
B. execution
C. writing
D. integrity
Answer» E.
163.

What is it called when IT specialists within your organization develop the systems?

A. Insourcing
B. Selfsourcing
C. Outsourcing
D. All of the above
Answer» B. Selfsourcing
164.

Order filling activity in the physical system is triggered by the

A. Manufacturing information system
B. Order entry subsystem
C. Account receivable subsystem
D. Billing subsystem
Answer» E.
165.

Coded entries which are used to gain access to a computer system are called …………..

A. Entry codes
B. Passwords
C. security commands
D. code words
Answer» C. security commands
166.

The typical computer criminal is a(n):

A. Young hacker.
B. Trusted employee with no criminal record.
C. Trusted employee with a long, but unknown criminal record.
D. Overseas young cracker.
Answer» C. Trusted employee with a long, but unknown criminal record.
167.

Fields may includes

A. fixed length
B. variable length
C. item length
D. both a and b
Answer» E.
168.

SMPS stands for

A. Switched mode Power Supply
B. Start mode power supply
C. Store mode power supply
D. Single mode power supply
Answer» B. Start mode power supply
169.

Octal number system has a base …………….

A. 2
B. 4
C. 6
D. 8
Answer» E.
170.

A program for viewing web pages is called …………..

A. Word processor
B. Spreadsheet
C. Protocol
D. browser
Answer» E.
171.

The benefit of using computers is that …………….

A. Computers are very fast and can store huge amounts of data
B. Computers provide accurate output even when input is incorrect
C. Computers are designed to be inflexible
D. All of the above
Answer» B. Computers provide accurate output even when input is incorrect
172.

Unwanted repetitious messages, such as unsolicited bulk e-mail is known as

A. Spam
B. Trash
C. Calibri
D. Courier
Answer» B. Trash
173.

LAN stands for……………

A. Limited Area Network
B. Logical Area Network
C. Local Area Network
D. Large Area Network
Answer» D. Large Area Network
174.

The patterns of printed lines on most products are called …………….

A. prices
B. barcodes
C. scanners
D. None of these
Answer» C. scanners
175.

—— refers to electronic trespassing or criminal hacking.

A. Cracking
B. Jacking
C. Spoofing
D. Smarming
Answer» B. Jacking
176.

Cursor is a ____

A. Pixel
B. Pointing device
C. Thin blinking line
D. None of the above
Answer» D. None of the above
177.

NOS stands for

A. Node operating system
B. Non-open software
C. Network Operating system
D. Non-operating software
Answer» D. Non-operating software
178.

Which of the following refers to a small local network?

A. LAN
B. WAN
C. MAN
D. SLN
Answer» B. WAN
179.

Numbers which are not stored, it becomes

A. truncated
B. rounded
C. lost
D. permanently stored
Answer» B. rounded
180.

Personnel who design, program, operate and maintain computer equipment refers to

A. Console-operator
B. Programmer
C. System Analyst
D. Peopleware
Answer» E.
181.

Which of the following are credit based systems?

A. MasterCard Secure Code
B. Verified By Visa
C. Secure Electronic Transaction
D. All of the above
Answer» E.
182.

To prevent the loss of data during power failures, use a(n):

A. Encryption program
B. Surge protector
C. Firewall
D. UPS
Answer» E.
183.

Which of the following is a network topology ?

A. LAN
B. WAN
C. MAN
D. BUS
Answer» E.
184.

File which is created to carry out processing of data is classified as

A. master file
B. transaction file
C. particular file
D. reference file
Answer» C. particular file
185.

Firewalls are used to protect a communication network system against

A. Unauthorized attacks
B. Virus attacks
C. Data-driven attacks
D. Fire-attacks
Answer» B. Virus attacks
186.

Sales figures in the market forecast file are updated by the

A. Market research procedure
B. Sales forecasting
C. Sales analysis procedures
D. All of the above
Answer» D. All of the above
187.

GPS is a system that helps in locating positions with the help of :

A. Microwaves
B. Satellites
C. Police intelligence
D. Wireless communication
Answer» C. Police intelligence
188.

'OS' in computer system means ?

A. Open System
B. Open Software
C. Operating System
D. All of these
Answer» D. All of these
189.

Which number system is commonly used as a shortcut notation for groups of four binary digits?

A. Binary
B. Decimal
C. Octal
D. Hexadecimal
Answer» E.
190.

The process of starting a or restarting a computer system by loading instructions from a secondarystorage device into the computer memory is called

A. Duping
B. Padding
C. CPS
D. Booting
Answer» E.
191.

Group of related data items that can be treated together as a unit is classified as

A. row
B. column
C. record
D. file
Answer» D. file
192.

What are plastic cards the size of a credit card that contains an embedded chip on which digitalinformation can be stored?

A. FEDI cards
B. Smart cards
C. Customer relationship management systems cards
D. E-government identity cards
Answer» C. Customer relationship management systems cards
193.

A computer program designed to perform group of coordinated functions, tasks, or activities for benefit of user is termed as

A. computer application
B. control application
C. punching application
D. peripheral application
Answer» B. control application
194.

The device used to carry digital data on analogue lines is called as

A. Modem
B. Multiplexer
C. Modulator
D. Demodulator
Answer» B. Multiplexer
195.

Who is the inventor of “Difference Engine”?

A. Allen Turing
B. Charles Babbage
C. Simur Cray
D. Augusta Adaming
Answer» C. Simur Cray
196.

Numbers that are written with base 16 are classified as

A. whole numbers
B. hexadecimal
C. exponential integers
D. mantissa
Answer» C. exponential integers
197.

Which are the major levels of convergence?

A. Technologies
B. Industries
C. Both Technologies and Industries
D. None of the above
Answer» D. None of the above
198.

When computer program attempts an impossible operation, it results in

A. overflow
B. loss of accuracy
C. message flow
D. both b and c
Answer» D. both b and c
199.

Response to messages, verification of keyed data, keeping record of data and keying in contents are duties of

A. terminal operator
B. punch operator
C. peripheral operator
D. terminating operator
Answer» C. peripheral operator
200.

File used to update information in computer's master file is classified as

A. transaction file
B. direct file
C. order file
D. sequence file
Answer» B. direct file