MCQOPTIONS
Saved Bookmarks
This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 251. |
This operating system is an example of an open source program. |
| A. | Linux |
| B. | Windows XP |
| C. | Macintosh |
| D. | UNIX |
| Answer» B. Windows XP | |
| 252. |
Apple computers use which operating system? |
| A. | Windows |
| B. | Be O/S |
| C. | Linux |
| D. | Macintosh |
| Answer» E. | |
| 253. |
When multiple topologies are put into one large topology, it is called |
| A. | Star topology |
| B. | Ring topology |
| C. | Hybrid topology |
| D. | Bus topology |
| Answer» D. Bus topology | |
| 254. |
_________ is the lower part of TCP/IP whose function is to handle the address part of each packet to enable it to be delivered to the right destination. |
| A. | IP |
| B. | TCP |
| C. | FTP |
| D. | Telnet |
| Answer» B. TCP | |
| 255. |
________is the simplest and most commonly used protocol for downloading/uploading a file from/to a server. |
| A. | IP |
| B. | TCP |
| C. | FTP |
| D. | Telnet |
| Answer» D. Telnet | |
| 256. |
What is a smart card ? |
| A. | form of ATM card |
| B. | has more storage capacity than an ATM card |
| C. | an access card for a security system |
| D. | contains a microprocessor |
| Answer» D. contains a microprocessor | |
| 257. |
________ is a function in router that allows dumping of invalid packet for a specific network instead of forwarding. |
| A. | Forwarding |
| B. | Filtering |
| C. | Selecting |
| D. | None of the above |
| Answer» C. Selecting | |
| 258. |
_________ is a unique number associated with each computer making it uniquely identifiable amongst all the computers connected to the Internet. |
| A. | IP address |
| B. | MAC address |
| C. | Inode |
| D. | None of the above |
| Answer» B. MAC address | |
| 259. |
________is the language for publishing hypertext pages on WWW. |
| A. | HTTP |
| B. | High level language |
| C. | Machine language |
| D. | HTML |
| Answer» E. | |
| 260. |
The process of altering the data for the purpose of disruption is called |
| A. | Interruption |
| B. | Interception |
| C. | Modification |
| D. | Fabrication |
| Answer» D. Fabrication | |
| 261. |
EPS is needed because |
| A. | Fast and secure |
| B. | Inexpensive |
| C. | Global breakthrough |
| D. | All of the above |
| Answer» C. Global breakthrough | |
| 262. |
Hardware or software designed to guard against unauthorized access to a computernetwork is known as a(n): |
| A. | Hacker-proof program. |
| B. | Firewall |
| C. | Hacker-resistant server. |
| D. | Encryption safe wall |
| Answer» C. Hacker-resistant server. | |
| 263. |
________ is HTTP web server. |
| A. | Lucene |
| B. | Fedora |
| C. | Perl |
| D. | Apache |
| Answer» E. | |
| 264. |
The Father of Modern Computer is: |
| A. | Charles Babbage |
| B. | Blaize Pascal |
| C. | Howard Icons |
| D. | Shanon |
| Answer» B. Blaize Pascal | |
| 265. |
Particular file used as a reference for computer application is classified as |
| A. | master file |
| B. | application file |
| C. | particular file |
| D. | reference file |
| Answer» B. application file | |
| 266. |
All of the following are disadvantage of RPG except: |
| A. | It is a very machine dependent language |
| B. | Is not suited for complex problems requiring extensive programming logic |
| C. | It has larger storage requierments |
| D. | It is very limited in scope |
| Answer» E. | |
| 267. |
Yahoo was developed by: |
| A. | Dennis Ritchie and Ken Thompson |
| B. | Vint Cerf and Robert Kahn |
| C. | David Filo and Jerry Yang |
| D. | Steve Case and Jeff Bezos |
| Answer» D. Steve Case and Jeff Bezos | |
| 268. |
Which one of the following is different from other members ? |
| A. | |
| B. | Windows |
| C. | Linux |
| D. | Mac |
| Answer» B. Windows | |
| 269. |
What is the full form of What does DMA stand for? in IT Basics? |
| A. | Direct Memory Access |
| B. | Direct Memory Allocation |
| C. | Distinct Memory Access |
| D. | Direct Module Access |
| Answer» B. Direct Memory Allocation | |
| 270. |
Which one of the following is correct ? |
| A. | (17)10 = (17)16 |
| B. | (17)10 = (17)8 |
| C. | (17)10 = (10111)2 |
| D. | (17)10 = (10001)2 |
| Answer» E. | |
| 271. |
Saving a file from the Internet onto your computer is called ……………. |
| A. | downloading |
| B. | uploading |
| C. | transferring |
| D. | All of these |
| Answer» B. uploading | |
| 272. |
The term ‘bit’ is a short for |
| A. | binary digit |
| B. | binary number |
| C. | digit |
| D. | byte |
| Answer» B. binary number | |
| 273. |
Which was the first company to launch mobile phone services in India ? |
| A. | Essar |
| B. | BPL |
| C. | Hutchison |
| D. | Airtel |
| Answer» C. Hutchison | |
| 274. |
What is the first stage in software development? |
| A. | Specification and design |
| B. | Testing |
| C. | Maintenance |
| D. | System Analysis |
| Answer» E. | |
| 275. |
_______refer to the LANs connected through high-speed, seamless inter-connection within a ‘metropolitan’ area. |
| A. | Remote LAN |
| B. | WAN |
| C. | MAN |
| D. | None of the above |
| Answer» D. None of the above | |
| 276. |
The ability of the CPU to serve many users connected to it through network is called |
| A. | Timesharing |
| B. | Networking |
| C. | Multitasking |
| D. | Multiprogramming |
| Answer» B. Networking | |
| 277. |
A computer connected to a network is called a ________. |
| A. | Hub |
| B. | Bridge |
| C. | Router |
| D. | Node |
| Answer» E. | |
| 278. |
FDDI is an example of _______. |
| A. | Bus topology |
| B. | Star topology |
| C. | Ring topology |
| D. | Hybrid topology |
| Answer» D. Hybrid topology | |
| 279. |
In ________ topology, each device connects to a central point through cables in a network. |
| A. | Bus topology |
| B. | Star topology |
| C. | Ring topology |
| D. | Hybrid topology |
| Answer» C. Ring topology | |
| 280. |
UNIX was originally developed in 1969 by employees of |
| A. | Microsoft |
| B. | AT&T |
| C. | Sun |
| D. | Apple |
| Answer» C. Sun | |
| 281. |
________ refers to a network used to connect different equipments from remote areas. |
| A. | LAN |
| B. | WAN |
| C. | MAN |
| D. | None of the above |
| Answer» C. MAN | |
| 282. |
Which of the following is an example of Star topology? |
| A. | ARCnet |
| B. | 10 Base-T, 100 Base-TX |
| C. | Both a and b |
| D. | Neither a nor b |
| Answer» D. Neither a nor b | |
| 283. |
The Institution set up by the Government of India to provide computer based information services to government departments |
| A. | C-DIT |
| B. | CDAC |
| C. | NIC |
| D. | DOEACC |
| Answer» D. DOEACC | |
| 284. |
Following is valid Linux based Shell. |
| A. | C-shell |
| B. | D-shell |
| C. | K-shell |
| D. | None of above |
| Answer» B. D-shell | |
| 285. |
Checking of submitted jobs, preparation of keyed in data and returning output to users are duties of |
| A. | peripheral control staff |
| B. | librarian control staff |
| C. | terminal control staff |
| D. | data control staff |
| Answer» E. | |
| 286. |
Which of the following device cannot be shared in Network? |
| A. | Hard Disk |
| B. | Mouse |
| C. | CD Drive |
| D. | Printer |
| Answer» C. CD Drive | |
| 287. |
Training of junior programmers is responsibility of |
| A. | senior programmers |
| B. | special programmers |
| C. | trail programmers |
| D. | modified programmers |
| Answer» B. special programmers | |
| 288. |
1 GB is equal to |
| A. | 10000 KB |
| B. | 1073741824 KB |
| C. | 1048576 KB |
| D. | 100000 KB |
| Answer» D. 100000 KB | |
| 289. |
If even parity bit string gets its one bit changed then parity becomes |
| A. | even |
| B. | double |
| C. | odd |
| D. | zero |
| Answer» D. zero | |
| 290. |
DOS stands for |
| A. | Disk Operating System |
| B. | Disk operating session |
| C. | Digital Operating System |
| D. | Digital Open system |
| Answer» B. Disk operating session | |
| 291. |
Method of detecting or avoiding input errors is |
| A. | Pre printed forms |
| B. | distinguished forms |
| C. | arithmetic forms |
| D. | situation forms |
| Answer» B. distinguished forms | |
| 292. |
Numbers that are written with base 8 are classified as |
| A. | octal numbers |
| B. | hexadecimal |
| C. | two digit positive integers |
| D. | real numbers |
| Answer» B. hexadecimal | |
| 293. |
Examples of meta-search engines are |
| A. | MetaCrawler |
| B. | Mamma |
| C. | DogPile |
| D. | All of the above |
| Answer» E. | |
| 294. |
Inventor of Email System is: |
| A. | Winton surf |
| B. | Jan Kenneth |
| C. | Bill Gates |
| D. | None of the above |
| Answer» E. | |
| 295. |
Which type of application is built by app wizard in MFC? |
| A. | SDI |
| B. | Dialog |
| C. | MDI |
| D. | All of the above |
| Answer» E. | |
| 296. |
The RF communication can be broadly classified in how many types? |
| A. | Six |
| B. | Three |
| C. | Four |
| D. | Two |
| Answer» C. Four | |
| 297. |
Data stored in primary storage is represented using |
| A. | base 16 |
| B. | base 10 |
| C. | base 5 |
| D. | base 2 |
| Answer» E. | |
| 298. |
The ‘copy’ command saves the content temporarily to the: |
| A. | Desktop |
| B. | Printer |
| C. | Clipboard |
| D. | MS word |
| Answer» D. MS word | |
| 299. |
Read the following two statements:I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).II: The ‘right to use’ a piece of software is termed as copyright.Which of the above statement(s) is/are CORRECT? |
| A. | Both I and II |
| B. | Neither I nor II |
| C. | II only |
| D. | I only |
| Answer» C. II only | |
| 300. |
The statement “the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer Hardware” refers to |
| A. | Information Technology (IT) |
| B. | Information and Collaborative Technology (ICT) |
| C. | Information and Data Technology (IDT) |
| D. | Artificial Intelligence (AI) |
| Answer» B. Information and Collaborative Technology (ICT) | |