MCQOPTIONS
Saved Bookmarks
This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 301. |
The rules for exchanging data between computers are called as |
| A. | Programs |
| B. | Procedures |
| C. | Protocols |
| D. | Hyperlinks |
| Answer» D. Hyperlinks | |
| 302. |
What is the full form of The Acronym ISDN in IT Basics? |
| A. | Indian Standard Digital Network |
| B. | Integrated Services Digital Network |
| C. | Intelligent Services Digital Network |
| D. | Integrated Services Data Network |
| Answer» C. Intelligent Services Digital Network | |
| 303. |
An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the keyboard. ASCII is an acronym for |
| A. | American Standard Code for Information Interchange |
| B. | American Standard Code for Intelligent Information |
| C. | American Standard Code for Information Integrity |
| D. | American Standard Code for Isolated Information |
| Answer» B. American Standard Code for Intelligent Information | |
| 304. |
The act of unauthorized copying or downloading of a program from a network and making multiple copies of it is |
| A. | Plagiarism |
| B. | Network piracy |
| C. | Software piracy |
| D. | Site-license piracy |
| Answer» D. Site-license piracy | |
| 305. |
In basic operations of computer, process of storing takes place after |
| A. | Inputting |
| B. | Processing |
| C. | Controlling |
| D. | Access arrangement |
| Answer» B. Processing | |
| 306. |
Sequencing manner in which all computer operations are performed is process of |
| A. | Storing |
| B. | Access arrangement |
| C. | Processing |
| D. | Controlling |
| Answer» E. | |
| 307. |
Process of feeding instructions into computer system is called |
| A. | Processing |
| B. | Accessing |
| C. | Inputting |
| D. | Outputting |
| Answer» D. Outputting | |
| 308. |
Process of controlling in basic operations of computer, is made after |
| A. | Processing |
| B. | Inputting |
| C. | Storing |
| D. | Outputting |
| Answer» E. | |
| 309. |
............. is the brain of a computer. |
| A. | Keyboard |
| B. | Central Processing Unit |
| C. | Monitor |
| D. | Printer |
| Answer» C. Monitor | |
| 310. |
The most common smart card application is ________. |
| A. | credit card |
| B. | atm card |
| C. | business card |
| D. | system card |
| Answer» B. atm card | |
| 311. |
The space in your computer that loads and works with data |
| A. | Cache memory |
| B. | CPU |
| C. | ROM memory |
| D. | RAM memory |
| Answer» E. | |
| 312. |
The full form of PIN in a ATM card is |
| A. | Permanent Information Number |
| B. | Personal Identification Number |
| C. | Personal Index Number |
| D. | Permanent Identification Number |
| Answer» C. Personal Index Number | |
| 313. |
Computer uses the ................ number system to store data and perform calculations. |
| A. | Binary |
| B. | Octal |
| C. | Decimal |
| D. | Hexadecimal |
| Answer» B. Octal | |
| 314. |
When is World Computer Literacy Day celebrated? |
| A. | January 22nd |
| B. | March 5th |
| C. | May 20th |
| D. | December 2nd |
| Answer» E. | |
| 315. |
What is the function of Firewall? |
| A. | Organizes the software installed in your computer |
| B. | Does complex calculations |
| C. | Edits complex documents |
| D. | Monitors and controls incoming and outgoing data traffic |
| Answer» E. | |
| 316. |
An application suitable for sequential processing is |
| A. | Payroll processing |
| B. | Processing of grades |
| C. | Both Processing of grades and Payroll processing |
| D. | All of the above |
| Answer» C. Both Processing of grades and Payroll processing | |
| 317. |
If a quantity in device is treated as different set of separate values, device is said to be |
| A. | digital |
| B. | analogues |
| C. | signals |
| D. | computer |
| Answer» B. analogues | |
| 318. |
Methods of paying an employee for his particular work includes |
| A. | salary |
| B. | hourly based rate |
| C. | bank payments |
| D. | both a and b |
| Answer» E. | |
| 319. |
Servers are computers that provide resources to other computers connected to a : |
| A. | networked |
| B. | mainframe |
| C. | supercomputer |
| D. | client |
| Answer» C. supercomputer | |
| 320. |
A program that performs a useful task while simultaneously allowing destructive acts is |
| A. | Worm |
| B. | Trojan horse |
| C. | Virus |
| D. | Macro virus |
| Answer» C. Virus | |
| 321. |
Bit string parity depends mainly on number of |
| A. | zero's |
| B. | one's |
| C. | two's |
| D. | three's |
| Answer» C. two's | |
| 322. |
File that contains suppliers data such as name, address and status of supplier is considered as |
| A. | peripheral control file |
| B. | suppliers master file |
| C. | master control file |
| D. | punching control file |
| Answer» C. master control file | |
| 323. |
Office LANS, which are scattered geographically on large scale, can be connected by the use |
| A. | CAN |
| B. | LAN |
| C. | DAN |
| D. | WAN |
| Answer» E. | |
| 324. |
When a file is saved for the first time |
| A. | a copy is automatically printed |
| B. | it must be given a name to identify it |
| C. | it does not need a name |
| D. | it only needs a name if it is not going to be printed |
| Answer» C. it does not need a name | |
| 325. |
In a Computer, a byte generally consists of: |
| A. | 4 bits |
| B. | 8 bits |
| C. | 16 bits |
| D. | 10 bits |
| Answer» C. 16 bits | |
| 326. |
BCD can represent only __________distinct character. |
| A. | 24 |
| B. | 54 |
| C. | 34 |
| D. | 64 |
| Answer» E. | |
| 327. |
What do you call the programs that are used to find out possible faults and their causes? |
| A. | Operating system extensions |
| B. | Boot diskettes |
| C. | Diagnostic software |
| D. | Cookies |
| Answer» D. Cookies | |
| 328. |
Condensing output data to exhibit specific information is |
| A. | Calculating |
| B. | Merging |
| C. | Summarizing |
| D. | Recording |
| Answer» D. Recording | |
| 329. |
An email account includes a storage area, often called a/an |
| A. | Attachment |
| B. | Hyperlink |
| C. | Mailbox |
| D. | IP address |
| Answer» D. IP address | |
| 330. |
Computer follows a simple principle called ‘GIGO’ which means: |
| A. | Good Input Good Output |
| B. | Garbage Input Good output |
| C. | Garbage In, Garbage Out |
| D. | Greater Instruction Great Output |
| Answer» D. Greater Instruction Great Output | |
| 331. |
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called: |
| A. | robotics |
| B. | simulation |
| C. | computer forensics |
| D. | animation |
| Answer» D. animation | |
| 332. |
'credit cards' and 'bank cards' are examples of |
| A. | inked stripe |
| B. | coded stripe |
| C. | magnetic stripe |
| D. | tagged stripe |
| Answer» D. tagged stripe | |
| 333. |
Useful processed information is produced as a report or usual in process named as |
| A. | Controlling |
| B. | Evaluation |
| C. | Outputting |
| D. | Processing |
| Answer» D. Processing | |
| 334. |
A CPU contains |
| A. | a card reader and a printing device |
| B. | an analytical engine and a control unit |
| C. | a control unit and an arithmetic logic unit |
| D. | an arithmetic logic unit and a card reader |
| Answer» D. an arithmetic logic unit and a card reader | |
| 335. |
The best products to sell in B2C e-commerce are |
| A. | Fresh products |
| B. | Digital products |
| C. | Small products |
| D. | Specialty products |
| Answer» C. Small products | |
| 336. |
If (y)x represents a number y in base x, then which of the following numbers is smallest of all ? |
| A. | (1111)2 |
| B. | (1111)8 |
| C. | (1111)10 |
| D. | (1111)16 |
| Answer» B. (1111)8 | |
| 337. |
A characteristic of card systems is: |
| A. | Needing a larger DP staff |
| B. | Using cards as records of transactions |
| C. | Slowness in processing data |
| D. | All of the above |
| Answer» E. | |
| 338. |
When you are working on a document on PC, where is the document temporarily stored? |
| A. | RAM |
| B. | ROM |
| C. | CPU |
| D. | Flash Memory |
| Answer» B. ROM | |
| 339. |
The term ‘Computer’ is derived from………. |
| A. | Latin |
| B. | German |
| C. | French |
| D. | Arabic |
| Answer» B. German | |
| 340. |
Who is the father of Computer science? |
| A. | Allen Turing |
| B. | Charles Babbage |
| C. | Simur Cray |
| D. | Augusta Adaming |
| Answer» B. Charles Babbage | |
| 341. |
Which of the following methods of channelisation are used for mobile data internet working? |
| A. | Frequency Division Multiple Access |
| B. | Code Division Multiple Access |
| C. | Time Division Multiple Acces |
| D. | All of the above |
| Answer» E. | |
| 342. |
VAN refers to ………………. |
| A. | Virtual Analog Network |
| B. | Value Added Network |
| C. | Variable Address Network |
| D. | Virtual Additional Network |
| Answer» C. Variable Address Network | |
| 343. |
Which of the following refers to loading two or more programs in the computer main memory and executing them concurrently? |
| A. | Multitasking |
| B. | Multiprogramming |
| C. | Time sharing |
| D. | Batch processing |
| Answer» C. Time sharing | |
| 344. |
Which of the following are the applications of mobile computing? |
| A. | For legal purposes |
| B. | Location awareness services |
| C. | Travelling salesman |
| D. | All of the above |
| Answer» E. | |
| 345. |
Who is the father of personal computer? |
| A. | Edward Robert |
| B. | Allen Turing |
| C. | Charles Babbage |
| D. | None of these |
| Answer» B. Allen Turing | |
| 346. |
Actual equipment of computer system that can be touched are |
| A. | hardware |
| B. | software |
| C. | applications |
| D. | bugs |
| Answer» B. software | |
| 347. |
Extra digit used to detect error and ensures that number is changed by mistake is classified as |
| A. | check digit |
| B. | extra digit |
| C. | mistake digit |
| D. | parity digits |
| Answer» B. extra digit | |
| 348. |
Method used to store integers is classified as |
| A. | sign and magnitude method |
| B. | twos complement method |
| C. | ones complement method |
| D. | threes complement method |
| Answer» C. ones complement method | |
| 349. |
Person who keeps disc and tape files up to date for computer installation is called |
| A. | file librarian |
| B. | punch librarian |
| C. | peripheral librarian |
| D. | terminal librarian |
| Answer» B. punch librarian | |
| 350. |
A device that connects to a network without the use of cables is said to be- |
| A. | Distributed |
| B. | free |
| C. | centralized |
| D. | none of these |
| Answer» E. | |