Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

251.

This operating system is an example of an open source program.

A. Linux
B. Windows XP
C. Macintosh
D. UNIX
Answer» B. Windows XP
252.

Apple computers use which operating system?

A. Windows
B. Be O/S
C. Linux
D. Macintosh
Answer» E.
253.

When multiple topologies are put into one large topology, it is called

A. Star topology
B. Ring topology
C. Hybrid topology
D. Bus topology
Answer» D. Bus topology
254.

_________ is the lower part of TCP/IP whose function is to handle the address part of each packet to enable it to be delivered to the right destination.

A. IP
B. TCP
C. FTP
D. Telnet
Answer» B. TCP
255.

________is the simplest and most commonly used protocol for downloading/uploading a file from/to a server.

A. IP
B. TCP
C. FTP
D. Telnet
Answer» D. Telnet
256.

What is a smart card ?

A. form of ATM card
B. has more storage capacity than an ATM card
C. an access card for a security system
D. contains a microprocessor
Answer» D. contains a microprocessor
257.

________ is a function in router that allows dumping of invalid packet for a specific network instead of forwarding.

A. Forwarding
B. Filtering
C. Selecting
D. None of the above
Answer» C. Selecting
258.

_________ is a unique number associated with each computer making it uniquely identifiable amongst all the computers connected to the Internet.

A. IP address
B. MAC address
C. Inode
D. None of the above
Answer» B. MAC address
259.

________is the language for publishing hypertext pages on WWW.

A. HTTP
B. High level language
C. Machine language
D. HTML
Answer» E.
260.

The process of altering the data for the purpose of disruption is called

A. Interruption
B. Interception
C. Modification
D. Fabrication
Answer» D. Fabrication
261.

EPS is needed because

A. Fast and secure
B. Inexpensive
C. Global breakthrough
D. All of the above
Answer» C. Global breakthrough
262.

Hardware or software designed to guard against unauthorized access to a computernetwork is known as a(n):

A. Hacker-proof program.
B. Firewall
C. Hacker-resistant server.
D. Encryption safe wall
Answer» C. Hacker-resistant server.
263.

________ is HTTP web server.

A. Lucene
B. Fedora
C. Perl
D. Apache
Answer» E.
264.

The Father of Modern Computer is:

A. Charles Babbage
B. Blaize Pascal
C. Howard Icons
D. Shanon
Answer» B. Blaize Pascal
265.

Particular file used as a reference for computer application is classified as

A. master file
B. application file
C. particular file
D. reference file
Answer» B. application file
266.

All of the following are disadvantage of RPG except:

A. It is a very machine dependent language
B. Is not suited for complex problems requiring extensive programming logic
C. It has larger storage requierments
D. It is very limited in scope
Answer» E.
267.

Yahoo was developed by:

A. Dennis Ritchie and Ken Thompson
B. Vint Cerf and Robert Kahn
C. David Filo and Jerry Yang
D. Steve Case and Jeff Bezos
Answer» D. Steve Case and Jeff Bezos
268.

Which one of the following is different from other members ?

A. Google
B. Windows
C. Linux
D. Mac
Answer» B. Windows
269.

What is the full form of What does DMA stand for? in IT Basics?

A. Direct Memory Access
B. Direct Memory Allocation
C. Distinct Memory Access
D. Direct Module Access
Answer» B. Direct Memory Allocation
270.

Which one of the following is correct ?

A. (17)10 = (17)16
B. (17)10 = (17)8
C. (17)10 = (10111)2
D. (17)10 = (10001)2
Answer» E.
271.

Saving a file from the Internet onto your computer is called …………….

A. downloading
B. uploading
C. transferring
D. All of these
Answer» B. uploading
272.

The term ‘bit’ is a short for

A. binary digit
B. binary number
C. digit
D. byte
Answer» B. binary number
273.

Which was the first company to launch mobile phone services in India ?

A. Essar
B. BPL
C. Hutchison
D. Airtel
Answer» C. Hutchison
274.

What is the first stage in software development?

A. Specification and design
B. Testing
C. Maintenance
D. System Analysis
Answer» E.
275.

_______refer to the LANs connected through high-speed, seamless inter-connection within a ‘metropolitan’ area.

A. Remote LAN
B. WAN
C. MAN
D. None of the above
Answer» D. None of the above
276.

The ability of the CPU to serve many users connected to it through network is called

A. Timesharing
B. Networking
C. Multitasking
D. Multiprogramming
Answer» B. Networking
277.

A computer connected to a network is called a ________.

A. Hub
B. Bridge
C. Router
D. Node
Answer» E.
278.

FDDI is an example of _______.

A. Bus topology
B. Star topology
C. Ring topology
D. Hybrid topology
Answer» D. Hybrid topology
279.

In ________ topology, each device connects to a central point through cables in a network.

A. Bus topology
B. Star topology
C. Ring topology
D. Hybrid topology
Answer» C. Ring topology
280.

UNIX was originally developed in 1969 by employees of

A. Microsoft
B. AT&T
C. Sun
D. Apple
Answer» C. Sun
281.

________ refers to a network used to connect different equipments from remote areas.

A. LAN
B. WAN
C. MAN
D. None of the above
Answer» C. MAN
282.

Which of the following is an example of Star topology?

A. ARCnet
B. 10 Base-T, 100 Base-TX
C. Both a and b
D. Neither a nor b
Answer» D. Neither a nor b
283.

The Institution set up by the Government of India to provide computer based information services to government departments

A. C-DIT
B. CDAC
C. NIC
D. DOEACC
Answer» D. DOEACC
284.

Following is valid Linux based Shell.

A. C-shell
B. D-shell
C. K-shell
D. None of above
Answer» B. D-shell
285.

Checking of submitted jobs, preparation of keyed in data and returning output to users are duties of

A. peripheral control staff
B. librarian control staff
C. terminal control staff
D. data control staff
Answer» E.
286.

Which of the following device cannot be shared in Network?

A. Hard Disk
B. Mouse
C. CD Drive
D. Printer
Answer» C. CD Drive
287.

Training of junior programmers is responsibility of

A. senior programmers
B. special programmers
C. trail programmers
D. modified programmers
Answer» B. special programmers
288.

1 GB is equal to

A. 10000 KB
B. 1073741824 KB
C. 1048576 KB
D. 100000 KB
Answer» D. 100000 KB
289.

If even parity bit string gets its one bit changed then parity becomes

A. even
B. double
C. odd
D. zero
Answer» D. zero
290.

DOS stands for

A. Disk Operating System
B. Disk operating session
C. Digital Operating System
D. Digital Open system
Answer» B. Disk operating session
291.

Method of detecting or avoiding input errors is

A. Pre printed forms
B. distinguished forms
C. arithmetic forms
D. situation forms
Answer» B. distinguished forms
292.

Numbers that are written with base 8 are classified as

A. octal numbers
B. hexadecimal
C. two digit positive integers
D. real numbers
Answer» B. hexadecimal
293.

Examples of meta-search engines are

A. MetaCrawler
B. Mamma
C. DogPile
D. All of the above
Answer» E.
294.

Inventor of Email System is:

A. Winton surf
B. Jan Kenneth
C. Bill Gates
D. None of the above
Answer» E.
295.

Which type of application is built by app wizard in MFC?

A. SDI
B. Dialog
C. MDI
D. All of the above
Answer» E.
296.

The RF communication can be broadly classified in how many types?

A. Six
B. Three
C. Four
D. Two
Answer» C. Four
297.

Data stored in primary storage is represented using

A. base 16
B. base 10
C. base 5
D. base 2
Answer» E.
298.

The ‘copy’ command saves the content temporarily to the:

A. Desktop
B. Printer
C. Clipboard
D. MS word
Answer» D. MS word
299.

Read the following two statements:I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).II: The ‘right to use’ a piece of software is termed as copyright.Which of the above statement(s) is/are CORRECT?

A. Both I and II
B. Neither I nor II
C. II only
D. I only
Answer» C. II only
300.

The statement “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware” refers to

A. Information Technology (IT)
B. Information and Collaborative Technology (ICT)
C. Information and Data Technology (IDT)
D. Artificial Intelligence (AI)
Answer» B. Information and Collaborative Technology (ICT)