Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

301.

The rules for exchanging data between computers are called as

A. Programs
B. Procedures
C. Protocols
D. Hyperlinks
Answer» D. Hyperlinks
302.

What is the full form of The Acronym ISDN in IT Basics?

A. Indian Standard Digital Network
B. Integrated Services Digital Network
C. Intelligent Services Digital Network
D. Integrated Services Data Network
Answer» C. Intelligent Services Digital Network
303.

An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the keyboard. ASCII is an acronym for

A. American Standard Code for Information Interchange
B. American Standard Code for Intelligent Information
C. American Standard Code for Information Integrity
D. American Standard Code for Isolated Information
Answer» B. American Standard Code for Intelligent Information
304.

The act of unauthorized copying or downloading of a program from a network and making multiple copies of it is

A. Plagiarism
B. Network piracy
C. Software piracy
D. Site-license piracy
Answer» D. Site-license piracy
305.

In basic operations of computer, process of storing takes place after

A. Inputting
B. Processing
C. Controlling
D. Access arrangement
Answer» B. Processing
306.

Sequencing manner in which all computer operations are performed is process of

A. Storing
B. Access arrangement
C. Processing
D. Controlling
Answer» E.
307.

Process of feeding instructions into computer system is called

A. Processing
B. Accessing
C. Inputting
D. Outputting
Answer» D. Outputting
308.

Process of controlling in basic operations of computer, is made after

A. Processing
B. Inputting
C. Storing
D. Outputting
Answer» E.
309.

............. is the brain of a computer.

A. Keyboard
B. Central Processing Unit
C. Monitor
D. Printer
Answer» C. Monitor
310.

The most common smart card application is ________.

A. credit card
B. atm card
C. business card
D. system card
Answer» B. atm card
311.

The space in your computer that loads and works with data

A. Cache memory
B. CPU
C. ROM memory
D. RAM memory
Answer» E.
312.

The full form of PIN in a ATM card is

A. Permanent Information Number
B. Personal Identification Number
C. Personal Index Number
D. Permanent Identification Number
Answer» C. Personal Index Number
313.

Computer uses the ................ number system to store data and perform calculations.

A. Binary
B. Octal
C. Decimal
D. Hexadecimal
Answer» B. Octal
314.

When is World Computer Literacy Day celebrated?

A. January 22nd
B. March 5th
C. May 20th
D. December 2nd
Answer» E.
315.

What is the function of Firewall?

A. Organizes the software installed in your computer
B. Does complex calculations
C. Edits complex documents
D. Monitors and controls incoming and outgoing data traffic
Answer» E.
316.

An application suitable for sequential processing is

A. Payroll processing
B. Processing of grades
C. Both Processing of grades and Payroll processing
D. All of the above
Answer» C. Both Processing of grades and Payroll processing
317.

If a quantity in device is treated as different set of separate values, device is said to be

A. digital
B. analogues
C. signals
D. computer
Answer» B. analogues
318.

Methods of paying an employee for his particular work includes

A. salary
B. hourly based rate
C. bank payments
D. both a and b
Answer» E.
319.

Servers are computers that provide resources to other computers connected to a :

A. networked
B. mainframe
C. supercomputer
D. client
Answer» C. supercomputer
320.

A program that performs a useful task while simultaneously allowing destructive acts is

A. Worm
B. Trojan horse
C. Virus
D. Macro virus
Answer» C. Virus
321.

Bit string parity depends mainly on number of

A. zero's
B. one's
C. two's
D. three's
Answer» C. two's
322.

File that contains suppliers data such as name, address and status of supplier is considered as

A. peripheral control file
B. suppliers master file
C. master control file
D. punching control file
Answer» C. master control file
323.

Office LANS, which are scattered geographically on large scale, can be connected by the use

A. CAN
B. LAN
C. DAN
D. WAN
Answer» E.
324.

When a file is saved for the first time

A. a copy is automatically printed
B. it must be given a name to identify it
C. it does not need a name
D. it only needs a name if it is not going to be printed
Answer» C. it does not need a name
325.

In a Computer, a byte generally consists of:

A. 4 bits
B. 8 bits
C. 16 bits
D. 10 bits
Answer» C. 16 bits
326.

BCD can represent only __________distinct character.

A. 24
B. 54
C. 34
D. 64
Answer» E.
327.

What do you call the programs that are used to find out possible faults and their causes?

A. Operating system extensions
B. Boot diskettes
C. Diagnostic software
D. Cookies
Answer» D. Cookies
328.

Condensing output data to exhibit specific information is

A. Calculating
B. Merging
C. Summarizing
D. Recording
Answer» D. Recording
329.

An email account includes a storage area, often called a/an

A. Attachment
B. Hyperlink
C. Mailbox
D. IP address
Answer» D. IP address
330.

Computer follows a simple principle called ‘GIGO’ which means:

A. Good Input Good Output
B. Garbage Input Good output
C. Garbage In, Garbage Out
D. Greater Instruction Great Output
Answer» D. Greater Instruction Great Output
331.

The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called:

A. robotics
B. simulation
C. computer forensics
D. animation
Answer» D. animation
332.

'credit cards' and 'bank cards' are examples of

A. inked stripe
B. coded stripe
C. magnetic stripe
D. tagged stripe
Answer» D. tagged stripe
333.

Useful processed information is produced as a report or usual in process named as

A. Controlling
B. Evaluation
C. Outputting
D. Processing
Answer» D. Processing
334.

A CPU contains

A. a card reader and a printing device
B. an analytical engine and a control unit
C. a control unit and an arithmetic logic unit
D. an arithmetic logic unit and a card reader
Answer» D. an arithmetic logic unit and a card reader
335.

The best products to sell in B2C e-commerce are

A. Fresh products
B. Digital products
C. Small products
D. Specialty products
Answer» C. Small products
336.

If (y)x represents a number y in base x, then which of the following numbers is smallest of all ?

A. (1111)2
B. (1111)8
C. (1111)10
D. (1111)16
Answer» B. (1111)8
337.

A characteristic of card systems is:

A. Needing a larger DP staff
B. Using cards as records of transactions
C. Slowness in processing data
D. All of the above
Answer» E.
338.

When you are working on a document on PC, where is the document temporarily stored?

A. RAM
B. ROM
C. CPU
D. Flash Memory
Answer» B. ROM
339.

The term ‘Computer’ is derived from……….

A. Latin
B. German
C. French
D. Arabic
Answer» B. German
340.

Who is the father of Computer science?

A. Allen Turing
B. Charles Babbage
C. Simur Cray
D. Augusta Adaming
Answer» B. Charles Babbage
341.

Which of the following methods of channelisation are used for mobile data internet working?

A. Frequency Division Multiple Access
B. Code Division Multiple Access
C. Time Division Multiple Acces
D. All of the above
Answer» E.
342.

VAN refers to ……………….

A. Virtual Analog Network
B. Value Added Network
C. Variable Address Network
D. Virtual Additional Network
Answer» C. Variable Address Network
343.

Which of the following refers to loading two or more programs in the computer main memory and executing them concurrently?

A. Multitasking
B. Multiprogramming
C. Time sharing
D. Batch processing
Answer» C. Time sharing
344.

Which of the following are the applications of mobile computing?

A. For legal purposes
B. Location awareness services
C. Travelling salesman
D. All of the above
Answer» E.
345.

Who is the father of personal computer?

A. Edward Robert
B. Allen Turing
C. Charles Babbage
D. None of these
Answer» B. Allen Turing
346.

Actual equipment of computer system that can be touched are

A. hardware
B. software
C. applications
D. bugs
Answer» B. software
347.

Extra digit used to detect error and ensures that number is changed by mistake is classified as

A. check digit
B. extra digit
C. mistake digit
D. parity digits
Answer» B. extra digit
348.

Method used to store integers is classified as

A. sign and magnitude method
B. twos complement method
C. ones complement method
D. threes complement method
Answer» C. ones complement method
349.

Person who keeps disc and tape files up to date for computer installation is called

A. file librarian
B. punch librarian
C. peripheral librarian
D. terminal librarian
Answer» B. punch librarian
350.

A device that connects to a network without the use of cables is said to be-

A. Distributed
B. free
C. centralized
D. none of these
Answer» E.