MCQOPTIONS
Saved Bookmarks
This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 151. |
BIOS stands for |
| A. | Basic Input Output system |
| B. | Binary Input output system |
| C. | Basic Input Off system |
| D. | all the above |
| Answer» B. Binary Input output system | |
| 152. |
Which of the following is a type of network? |
| A. | Ring |
| B. | Bus |
| C. | Star |
| D. | PAN |
| Answer» E. | |
| 153. |
Which type of network would use phone lines ? |
| A. | WAN |
| B. | LAN |
| C. | WWAN |
| D. | Wireless |
| Answer» B. LAN | |
| 154. |
…………….are used to identify a user who returns to a Website. |
| A. | Cookies |
| B. | Plug-ins |
| C. | Scripts |
| D. | ASPs |
| Answer» B. Plug-ins | |
| 155. |
To move a copy of file from one computer to another over a communication channel is called? |
| A. | File transfer |
| B. | File encryption |
| C. | File modification |
| D. | File copying |
| Answer» B. File encryption | |
| 156. |
Person who amends and produces computer program is considered as |
| A. | processor |
| B. | programmers |
| C. | managers |
| D. | analysts |
| Answer» C. managers | |
| 157. |
Which is the most valuable electronic commerce to the individual customer in long run? |
| A. | Business to Business |
| B. | Customer to Customer |
| C. | Business to Customer |
| D. | None of the above |
| Answer» B. Customer to Customer | |
| 158. |
Which of the following code is used in present day computing was developed by IBM corporation? |
| A. | Baudot code |
| B. | EBCDIC code |
| C. | ASCII |
| D. | Hollerith Code |
| Answer» C. ASCII | |
| 159. |
A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a- |
| A. | Hacker |
| B. | spammer |
| C. | instant messenger |
| D. | programmer |
| Answer» B. spammer | |
| 160. |
Where does most data go first with in a computer memory hierarchy ? |
| A. | RAM |
| B. | ROM |
| C. | BIOS |
| D. | CACHE |
| Answer» B. ROM | |
| 161. |
The trend to outsource IT functions to other countries is termed |
| A. | Outer outsourcing |
| B. | Offshore outsourcing |
| C. | Foreign outsourcing |
| D. | External outsourcing |
| Answer» C. Foreign outsourcing | |
| 162. |
Completeness and accuracy of data is called its |
| A. | management |
| B. | execution |
| C. | writing |
| D. | integrity |
| Answer» E. | |
| 163. |
What is it called when IT specialists within your organization develop the systems? |
| A. | Insourcing |
| B. | Selfsourcing |
| C. | Outsourcing |
| D. | All of the above |
| Answer» B. Selfsourcing | |
| 164. |
Order filling activity in the physical system is triggered by the |
| A. | Manufacturing information system |
| B. | Order entry subsystem |
| C. | Account receivable subsystem |
| D. | Billing subsystem |
| Answer» E. | |
| 165. |
Coded entries which are used to gain access to a computer system are called ………….. |
| A. | Entry codes |
| B. | Passwords |
| C. | security commands |
| D. | code words |
| Answer» C. security commands | |
| 166. |
The typical computer criminal is a(n): |
| A. | Young hacker. |
| B. | Trusted employee with no criminal record. |
| C. | Trusted employee with a long, but unknown criminal record. |
| D. | Overseas young cracker. |
| Answer» C. Trusted employee with a long, but unknown criminal record. | |
| 167. |
Fields may includes |
| A. | fixed length |
| B. | variable length |
| C. | item length |
| D. | both a and b |
| Answer» E. | |
| 168. |
SMPS stands for |
| A. | Switched mode Power Supply |
| B. | Start mode power supply |
| C. | Store mode power supply |
| D. | Single mode power supply |
| Answer» B. Start mode power supply | |
| 169. |
Octal number system has a base ……………. |
| A. | 2 |
| B. | 4 |
| C. | 6 |
| D. | 8 |
| Answer» E. | |
| 170. |
A program for viewing web pages is called ………….. |
| A. | Word processor |
| B. | Spreadsheet |
| C. | Protocol |
| D. | browser |
| Answer» E. | |
| 171. |
The benefit of using computers is that ……………. |
| A. | Computers are very fast and can store huge amounts of data |
| B. | Computers provide accurate output even when input is incorrect |
| C. | Computers are designed to be inflexible |
| D. | All of the above |
| Answer» B. Computers provide accurate output even when input is incorrect | |
| 172. |
Unwanted repetitious messages, such as unsolicited bulk e-mail is known as |
| A. | Spam |
| B. | Trash |
| C. | Calibri |
| D. | Courier |
| Answer» B. Trash | |
| 173. |
LAN stands for…………… |
| A. | Limited Area Network |
| B. | Logical Area Network |
| C. | Local Area Network |
| D. | Large Area Network |
| Answer» D. Large Area Network | |
| 174. |
The patterns of printed lines on most products are called ……………. |
| A. | prices |
| B. | barcodes |
| C. | scanners |
| D. | None of these |
| Answer» C. scanners | |
| 175. |
—— refers to electronic trespassing or criminal hacking. |
| A. | Cracking |
| B. | Jacking |
| C. | Spoofing |
| D. | Smarming |
| Answer» B. Jacking | |
| 176. |
Cursor is a ____ |
| A. | Pixel |
| B. | Pointing device |
| C. | Thin blinking line |
| D. | None of the above |
| Answer» D. None of the above | |
| 177. |
NOS stands for |
| A. | Node operating system |
| B. | Non-open software |
| C. | Network Operating system |
| D. | Non-operating software |
| Answer» D. Non-operating software | |
| 178. |
Which of the following refers to a small local network? |
| A. | LAN |
| B. | WAN |
| C. | MAN |
| D. | SLN |
| Answer» B. WAN | |
| 179. |
Numbers which are not stored, it becomes |
| A. | truncated |
| B. | rounded |
| C. | lost |
| D. | permanently stored |
| Answer» B. rounded | |
| 180. |
Personnel who design, program, operate and maintain computer equipment refers to |
| A. | Console-operator |
| B. | Programmer |
| C. | System Analyst |
| D. | Peopleware |
| Answer» E. | |
| 181. |
Which of the following are credit based systems? |
| A. | MasterCard Secure Code |
| B. | Verified By Visa |
| C. | Secure Electronic Transaction |
| D. | All of the above |
| Answer» E. | |
| 182. |
To prevent the loss of data during power failures, use a(n): |
| A. | Encryption program |
| B. | Surge protector |
| C. | Firewall |
| D. | UPS |
| Answer» E. | |
| 183. |
Which of the following is a network topology ? |
| A. | LAN |
| B. | WAN |
| C. | MAN |
| D. | BUS |
| Answer» E. | |
| 184. |
File which is created to carry out processing of data is classified as |
| A. | master file |
| B. | transaction file |
| C. | particular file |
| D. | reference file |
| Answer» C. particular file | |
| 185. |
Firewalls are used to protect a communication network system against |
| A. | Unauthorized attacks |
| B. | Virus attacks |
| C. | Data-driven attacks |
| D. | Fire-attacks |
| Answer» B. Virus attacks | |
| 186. |
Sales figures in the market forecast file are updated by the |
| A. | Market research procedure |
| B. | Sales forecasting |
| C. | Sales analysis procedures |
| D. | All of the above |
| Answer» D. All of the above | |
| 187. |
GPS is a system that helps in locating positions with the help of : |
| A. | Microwaves |
| B. | Satellites |
| C. | Police intelligence |
| D. | Wireless communication |
| Answer» C. Police intelligence | |
| 188. |
'OS' in computer system means ? |
| A. | Open System |
| B. | Open Software |
| C. | Operating System |
| D. | All of these |
| Answer» D. All of these | |
| 189. |
Which number system is commonly used as a shortcut notation for groups of four binary digits? |
| A. | Binary |
| B. | Decimal |
| C. | Octal |
| D. | Hexadecimal |
| Answer» E. | |
| 190. |
The process of starting a or restarting a computer system by loading instructions from a secondarystorage device into the computer memory is called |
| A. | Duping |
| B. | Padding |
| C. | CPS |
| D. | Booting |
| Answer» E. | |
| 191. |
Group of related data items that can be treated together as a unit is classified as |
| A. | row |
| B. | column |
| C. | record |
| D. | file |
| Answer» D. file | |
| 192. |
What are plastic cards the size of a credit card that contains an embedded chip on which digitalinformation can be stored? |
| A. | FEDI cards |
| B. | Smart cards |
| C. | Customer relationship management systems cards |
| D. | E-government identity cards |
| Answer» C. Customer relationship management systems cards | |
| 193. |
A computer program designed to perform group of coordinated functions, tasks, or activities for benefit of user is termed as |
| A. | computer application |
| B. | control application |
| C. | punching application |
| D. | peripheral application |
| Answer» B. control application | |
| 194. |
The device used to carry digital data on analogue lines is called as |
| A. | Modem |
| B. | Multiplexer |
| C. | Modulator |
| D. | Demodulator |
| Answer» B. Multiplexer | |
| 195. |
Who is the inventor of “Difference Engine”? |
| A. | Allen Turing |
| B. | Charles Babbage |
| C. | Simur Cray |
| D. | Augusta Adaming |
| Answer» C. Simur Cray | |
| 196. |
Numbers that are written with base 16 are classified as |
| A. | whole numbers |
| B. | hexadecimal |
| C. | exponential integers |
| D. | mantissa |
| Answer» C. exponential integers | |
| 197. |
Which are the major levels of convergence? |
| A. | Technologies |
| B. | Industries |
| C. | Both Technologies and Industries |
| D. | None of the above |
| Answer» D. None of the above | |
| 198. |
When computer program attempts an impossible operation, it results in |
| A. | overflow |
| B. | loss of accuracy |
| C. | message flow |
| D. | both b and c |
| Answer» D. both b and c | |
| 199. |
Response to messages, verification of keyed data, keeping record of data and keying in contents are duties of |
| A. | terminal operator |
| B. | punch operator |
| C. | peripheral operator |
| D. | terminating operator |
| Answer» C. peripheral operator | |
| 200. |
File used to update information in computer's master file is classified as |
| A. | transaction file |
| B. | direct file |
| C. | order file |
| D. | sequence file |
| Answer» B. direct file | |