Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

201.

A system call is a method by which a program makes a request to the

A. Input Management
B. Interrupt processing
C. Output Management
D. Operating system
Answer» E.
202.

In world today, most of the computers are :

A. Digital
B. Hybrid
C. Analog
D. Complex
Answer» B. Hybrid
203.

Issuance of files, regular maintenance, keeping records of files and its use are duties of

A. peripheral librarian
B. terminal librarian
C. file librarian
D. punch librarian
Answer» D. punch librarian
204.

The thing that eventually terminates a worm virus is a lack of:

A. Memory or disk space.
B. Time
C. CD drives space.
D. CD-RW
Answer» B. Time
205.

What is the name of the display feature that highlights are of the screen which requires operatorattention?

A. Pixel
B. Cursor
C. Reverse video
D. Touch screen
Answer» D. Touch screen
206.

Validation of programs is used to check that data is

A. in right format
B. of right type
C. within possible value ranges
D. all of above
Answer» E.
207.

——Is defined as any crime completed through the use of computer technology.

A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer» C. Hacking
208.

What is the most common tool used to restrict access to a computer system?

A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer» C. Computer keys
209.

Digital devices are

A. Clock with a dial and two hands
B. Digital Clock
C. Automobile speed meter
D. None of the above
Answer» C. Automobile speed meter
210.

Type of field in which reserved set of characters are not determined is classified as

A. stable length
B. file length
C. variable length
D. fixed length
Answer» D. fixed length
211.

Which American computer company is called Big Blue?

A. Microsoft
B. Tandy Svenson
C. IBM
D. Compaq Corp
Answer» D. Compaq Corp
212.

File containing data stocks, details of stocked items and order of item numbers is classified as

A. stock master file
B. master control file
C. punching control file
D. peripheral control file
Answer» B. master control file
213.

Type of forms that have printed space on them to fill information are classified as

A. situation forms
B. pre printed forms
C. distinguished forms
D. arithmetic forms
Answer» C. distinguished forms
214.

When last digits are adjusted to store accurate number, it is classified as

A. digit lost
B. digit stored
C. digit truncated
D. digit rounded
Answer» E.
215.

Information Technology Act was enacted on ………………

A. 19 January 2001
B. 30 June 2001
C. 9 June 2000
D. 15 July 1999
Answer» D. 15 July 1999
216.

Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?

A. Robot
B. Computer
C. Monitor
D. Hardware
Answer» C. Monitor
217.

Method in which year's fixed amount is divided and divided amount is paid to employee is classified as

A. bank payments
B. master payments
C. salary
D. hourly based rate
Answer» D. hourly based rate
218.

All goods which are collected by firm or shop for sale purpose is classified as

A. bug
B. stock
C. flag
D. pointer
Answer» C. flag
219.

If number of 1s in any bit string are odd then bit string parity is classified as

A. zero parity
B. double parity
C. odd parity
D. even parity
Answer» D. even parity
220.

In computer programming, type of failure which occurs because of input device that will not read data correctly is classified as

A. input error
B. output error
C. read error
D. write error
Answer» D. write error
221.

I/O is the communication between an ___________ and the outside world.

A. Internet System
B. Programming
C. Medical System
D. Information Processing System
Answer» E.
222.

What is the name of an application program that gathers user information and sends itto someone through the Internet?

A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer» C. Logic bomb
223.

………. are set of rules and procedures to control the data transmission over the internet.

A. IP address
B. Domains
C. Protocol
D. Gateway
Answer» D. Gateway
224.

Offline device is

A. A device which is connected to CPU
B. An I/O device
C. A device which is not connected to CPU
D. A direct access storage device
Answer» D. A direct access storage device
225.

This type of boot occurs when the computer is already on, and you restart it without turning offthe power.

A. generic boot
B. live boot
C. warm boot
D. cold boot
Answer» D. cold boot
226.

In a computer system, data and programs are stored as

A. files
B. records
C. archives
D. annals
Answer» B. records
227.

Starting or restarting a computer is called

A. booting the system
B. firing the system
C. tasking the system
D. restoring the system
Answer» B. firing the system
228.

Popular network operating systems include all of the following except

A. NetWare
B. Windows NT Server
C. Windows XP Server
D. Microsoft DOS
Answer» E.
229.

An embedded operating system would most likely be found in a

A. desktop computer
B. server
C. Web site
D. PDA
Answer» E.
230.

Process of managing stock goods in most sensible way is classified as

A. control system
B. overall system
C. stock control
D. stock
Answer» D. stock
231.

Media convergence jointly conveys which of the options?

A. Computing
B. Communication
C. Content
D. All of the above
Answer» E.
232.

Main types of programmers are

A. applications programmer
B. systems programmer
C. design programmer
D. both a and b
Answer» E.
233.

Passwords enable users to:

A. get into the system quickly
B. make efficient use of time
C. retain confidentiality of files
D. simplify file structures
Answer» D. simplify file structures
234.

How many users can use a microprocessor at a time?

A. single user
B. multi users
C. particular user
D. only professional user
Answer» B. multi users
235.

Personal computers can be connected together to form a …………..

A. enterprise
B. supercomputer
C. network
D. server
Answer» D. server
236.

Binary strings which are formed by replacing 0s by 1s and 1s by 0s is referred as

A. ones complement
B. twos complement
C. ones string
D. twos string
Answer» B. twos complement
237.

A technique to convert an analog signal into a digital bit stream is known as

A. Digital Signal Generator
B. Pulse Code Modulation
C. Pulse Signal Modulation
D. None of these
Answer» C. Pulse Signal Modulation
238.

A computer system having a memory of 256 MB is capable of storing

A. 1,07,37,41,824 bytes or characters
B. 26,84,35,456 bytes or characters
C. 10,48,576 bytes or characters
D. 26,85,30,456 bytes or characters
Answer» C. 10,48,576 bytes or characters
239.

Nibble is a set of _______ bits.

A. Two
B. Four
C. Six
D. Eight
Answer» C. Six
240.

The heart and the brain of a computer is

A. The CPU
B. The motherboard
C. The hard disk drive
D. The monitor
Answer» B. The motherboard
241.

The storage and rapid access to electronic medical records and its instant transmission over the Internet in large amounts is called ____________________.

A. Teleconsulting
B. Accumulator (AC)
C. Instruction Register (IR)
D. Program Counter (PC)
Answer» B. Accumulator (AC)
242.

Devices that provide backup storage are called

A. Main memory
B. Cache memory
C. Auxiliary memory
D. None of the above
Answer» D. None of the above
243.

It is an electronic medium for storing contact information inside the mobile phone.

A. SMS
B. Address Book
C. Send and Receive Mails
D. None of the above
Answer» C. Send and Receive Mails
244.

Programs and data must be entered into the computer memory for _____________.

A. Processing
B. Results
C. Calculations
D. Feedback
Answer» B. Results
245.

It is also known as the ‘blue screen’ process_______________.

A. Analog Compositing
B. Digital Compositing
C. Time Slicing
D. CGI
Answer» C. Time Slicing
246.

The latest version of Microsoft’s popular operating system is called

A. Windows ME
B. Windows 2000 Professional
C. Windows XP
D. Windows NT Workstation
Answer» D. Windows NT Workstation
247.

The first operating system developed that used GUI’s was by

A. Microsoft
B. Linux
C. Macintosh
D. Bell labs
Answer» D. Bell labs
248.

The most popular microcomputer operating system in use today is

A. Microsoft Windows
B. Linux
C. UNIX
D. Macintosh
Answer» B. Linux
249.

The Macintosh tool for organizing files is called

A. Dock
B. Sherlock
C. Aqua
D. Sandbox
Answer» B. Sherlock
250.

Operating systems that are owned and licensed by a corporation are called

A. proprietary operating systems
B. server operating systems
C. client operating systems
D. stand-alone operating systems
Answer» B. server operating systems