MCQOPTIONS
Saved Bookmarks
This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
A system call is a method by which a program makes a request to the |
| A. | Input Management |
| B. | Interrupt processing |
| C. | Output Management |
| D. | Operating system |
| Answer» E. | |
| 202. |
In world today, most of the computers are : |
| A. | Digital |
| B. | Hybrid |
| C. | Analog |
| D. | Complex |
| Answer» B. Hybrid | |
| 203. |
Issuance of files, regular maintenance, keeping records of files and its use are duties of |
| A. | peripheral librarian |
| B. | terminal librarian |
| C. | file librarian |
| D. | punch librarian |
| Answer» D. punch librarian | |
| 204. |
The thing that eventually terminates a worm virus is a lack of: |
| A. | Memory or disk space. |
| B. | Time |
| C. | CD drives space. |
| D. | CD-RW |
| Answer» B. Time | |
| 205. |
What is the name of the display feature that highlights are of the screen which requires operatorattention? |
| A. | Pixel |
| B. | Cursor |
| C. | Reverse video |
| D. | Touch screen |
| Answer» D. Touch screen | |
| 206. |
Validation of programs is used to check that data is |
| A. | in right format |
| B. | of right type |
| C. | within possible value ranges |
| D. | all of above |
| Answer» E. | |
| 207. |
——Is defined as any crime completed through the use of computer technology. |
| A. | Computer forensics |
| B. | Computer crime |
| C. | Hacking |
| D. | Cracking |
| Answer» C. Hacking | |
| 208. |
What is the most common tool used to restrict access to a computer system? |
| A. | User logins |
| B. | Passwords |
| C. | Computer keys |
| D. | Access-control software |
| Answer» C. Computer keys | |
| 209. |
Digital devices are |
| A. | Clock with a dial and two hands |
| B. | Digital Clock |
| C. | Automobile speed meter |
| D. | None of the above |
| Answer» C. Automobile speed meter | |
| 210. |
Type of field in which reserved set of characters are not determined is classified as |
| A. | stable length |
| B. | file length |
| C. | variable length |
| D. | fixed length |
| Answer» D. fixed length | |
| 211. |
Which American computer company is called Big Blue? |
| A. | Microsoft |
| B. | Tandy Svenson |
| C. | IBM |
| D. | Compaq Corp |
| Answer» D. Compaq Corp | |
| 212. |
File containing data stocks, details of stocked items and order of item numbers is classified as |
| A. | stock master file |
| B. | master control file |
| C. | punching control file |
| D. | peripheral control file |
| Answer» B. master control file | |
| 213. |
Type of forms that have printed space on them to fill information are classified as |
| A. | situation forms |
| B. | pre printed forms |
| C. | distinguished forms |
| D. | arithmetic forms |
| Answer» C. distinguished forms | |
| 214. |
When last digits are adjusted to store accurate number, it is classified as |
| A. | digit lost |
| B. | digit stored |
| C. | digit truncated |
| D. | digit rounded |
| Answer» E. | |
| 215. |
Information Technology Act was enacted on ……………… |
| A. | 19 January 2001 |
| B. | 30 June 2001 |
| C. | 9 June 2000 |
| D. | 15 July 1999 |
| Answer» D. 15 July 1999 | |
| 216. |
Human beings are referred to as Homosapinens, which device is called Sillico Sapiens? |
| A. | Robot |
| B. | Computer |
| C. | Monitor |
| D. | Hardware |
| Answer» C. Monitor | |
| 217. |
Method in which year's fixed amount is divided and divided amount is paid to employee is classified as |
| A. | bank payments |
| B. | master payments |
| C. | salary |
| D. | hourly based rate |
| Answer» D. hourly based rate | |
| 218. |
All goods which are collected by firm or shop for sale purpose is classified as |
| A. | bug |
| B. | stock |
| C. | flag |
| D. | pointer |
| Answer» C. flag | |
| 219. |
If number of 1s in any bit string are odd then bit string parity is classified as |
| A. | zero parity |
| B. | double parity |
| C. | odd parity |
| D. | even parity |
| Answer» D. even parity | |
| 220. |
In computer programming, type of failure which occurs because of input device that will not read data correctly is classified as |
| A. | input error |
| B. | output error |
| C. | read error |
| D. | write error |
| Answer» D. write error | |
| 221. |
I/O is the communication between an ___________ and the outside world. |
| A. | Internet System |
| B. | Programming |
| C. | Medical System |
| D. | Information Processing System |
| Answer» E. | |
| 222. |
What is the name of an application program that gathers user information and sends itto someone through the Internet? |
| A. | A virus |
| B. | Spybot |
| C. | Logic bomb |
| D. | Security patch |
| Answer» C. Logic bomb | |
| 223. |
………. are set of rules and procedures to control the data transmission over the internet. |
| A. | IP address |
| B. | Domains |
| C. | Protocol |
| D. | Gateway |
| Answer» D. Gateway | |
| 224. |
Offline device is |
| A. | A device which is connected to CPU |
| B. | An I/O device |
| C. | A device which is not connected to CPU |
| D. | A direct access storage device |
| Answer» D. A direct access storage device | |
| 225. |
This type of boot occurs when the computer is already on, and you restart it without turning offthe power. |
| A. | generic boot |
| B. | live boot |
| C. | warm boot |
| D. | cold boot |
| Answer» D. cold boot | |
| 226. |
In a computer system, data and programs are stored as |
| A. | files |
| B. | records |
| C. | archives |
| D. | annals |
| Answer» B. records | |
| 227. |
Starting or restarting a computer is called |
| A. | booting the system |
| B. | firing the system |
| C. | tasking the system |
| D. | restoring the system |
| Answer» B. firing the system | |
| 228. |
Popular network operating systems include all of the following except |
| A. | NetWare |
| B. | Windows NT Server |
| C. | Windows XP Server |
| D. | Microsoft DOS |
| Answer» E. | |
| 229. |
An embedded operating system would most likely be found in a |
| A. | desktop computer |
| B. | server |
| C. | Web site |
| D. | PDA |
| Answer» E. | |
| 230. |
Process of managing stock goods in most sensible way is classified as |
| A. | control system |
| B. | overall system |
| C. | stock control |
| D. | stock |
| Answer» D. stock | |
| 231. |
Media convergence jointly conveys which of the options? |
| A. | Computing |
| B. | Communication |
| C. | Content |
| D. | All of the above |
| Answer» E. | |
| 232. |
Main types of programmers are |
| A. | applications programmer |
| B. | systems programmer |
| C. | design programmer |
| D. | both a and b |
| Answer» E. | |
| 233. |
Passwords enable users to: |
| A. | get into the system quickly |
| B. | make efficient use of time |
| C. | retain confidentiality of files |
| D. | simplify file structures |
| Answer» D. simplify file structures | |
| 234. |
How many users can use a microprocessor at a time? |
| A. | single user |
| B. | multi users |
| C. | particular user |
| D. | only professional user |
| Answer» B. multi users | |
| 235. |
Personal computers can be connected together to form a ………….. |
| A. | enterprise |
| B. | supercomputer |
| C. | network |
| D. | server |
| Answer» D. server | |
| 236. |
Binary strings which are formed by replacing 0s by 1s and 1s by 0s is referred as |
| A. | ones complement |
| B. | twos complement |
| C. | ones string |
| D. | twos string |
| Answer» B. twos complement | |
| 237. |
A technique to convert an analog signal into a digital bit stream is known as |
| A. | Digital Signal Generator |
| B. | Pulse Code Modulation |
| C. | Pulse Signal Modulation |
| D. | None of these |
| Answer» C. Pulse Signal Modulation | |
| 238. |
A computer system having a memory of 256 MB is capable of storing |
| A. | 1,07,37,41,824 bytes or characters |
| B. | 26,84,35,456 bytes or characters |
| C. | 10,48,576 bytes or characters |
| D. | 26,85,30,456 bytes or characters |
| Answer» C. 10,48,576 bytes or characters | |
| 239. |
Nibble is a set of _______ bits. |
| A. | Two |
| B. | Four |
| C. | Six |
| D. | Eight |
| Answer» C. Six | |
| 240. |
The heart and the brain of a computer is |
| A. | The CPU |
| B. | The motherboard |
| C. | The hard disk drive |
| D. | The monitor |
| Answer» B. The motherboard | |
| 241. |
The storage and rapid access to electronic medical records and its instant transmission over the Internet in large amounts is called ____________________. |
| A. | Teleconsulting |
| B. | Accumulator (AC) |
| C. | Instruction Register (IR) |
| D. | Program Counter (PC) |
| Answer» B. Accumulator (AC) | |
| 242. |
Devices that provide backup storage are called |
| A. | Main memory |
| B. | Cache memory |
| C. | Auxiliary memory |
| D. | None of the above |
| Answer» D. None of the above | |
| 243. |
It is an electronic medium for storing contact information inside the mobile phone. |
| A. | SMS |
| B. | Address Book |
| C. | Send and Receive Mails |
| D. | None of the above |
| Answer» C. Send and Receive Mails | |
| 244. |
Programs and data must be entered into the computer memory for _____________. |
| A. | Processing |
| B. | Results |
| C. | Calculations |
| D. | Feedback |
| Answer» B. Results | |
| 245. |
It is also known as the ‘blue screen’ process_______________. |
| A. | Analog Compositing |
| B. | Digital Compositing |
| C. | Time Slicing |
| D. | CGI |
| Answer» C. Time Slicing | |
| 246. |
The latest version of Microsoft’s popular operating system is called |
| A. | Windows ME |
| B. | Windows 2000 Professional |
| C. | Windows XP |
| D. | Windows NT Workstation |
| Answer» D. Windows NT Workstation | |
| 247. |
The first operating system developed that used GUI’s was by |
| A. | Microsoft |
| B. | Linux |
| C. | Macintosh |
| D. | Bell labs |
| Answer» D. Bell labs | |
| 248. |
The most popular microcomputer operating system in use today is |
| A. | Microsoft Windows |
| B. | Linux |
| C. | UNIX |
| D. | Macintosh |
| Answer» B. Linux | |
| 249. |
The Macintosh tool for organizing files is called |
| A. | Dock |
| B. | Sherlock |
| C. | Aqua |
| D. | Sandbox |
| Answer» B. Sherlock | |
| 250. |
Operating systems that are owned and licensed by a corporation are called |
| A. | proprietary operating systems |
| B. | server operating systems |
| C. | client operating systems |
| D. | stand-alone operating systems |
| Answer» B. server operating systems | |