MCQOPTIONS
Saved Bookmarks
This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 351. |
All keys which are used to identify particular item must be |
| A. | same |
| B. | different |
| C. | lengthy |
| D. | short |
| Answer» C. lengthy | |
| 352. |
sign and magnitude' method represents negatives and positives as |
| A. | 1 for negative and 0 for positive |
| B. | 0 for negative and 1 for positive |
| C. | 1 for negative and 2 for positive |
| D. | 2 for negative and 1 for positive |
| Answer» B. 0 for negative and 1 for positive | |
| 353. |
The arranging of data in a logical sequence is called |
| A. | Sorting |
| B. | Summarizing |
| C. | Classifying |
| D. | Reproducing |
| Answer» B. Summarizing | |
| 354. |
To connect several computers together, one generally needs to be running a(n) __________operating system. |
| A. | network |
| B. | Internet |
| C. | stand-alone |
| D. | embedded |
| Answer» B. Internet | |
| 355. |
The "desktop" of a computer refers to |
| A. | the visible screen |
| B. | the area around the monitor |
| C. | the top of the mouse pad |
| D. | the inside of a folder |
| Answer» B. the area around the monitor | |
| 356. |
Which of the following is not one of the four primary focuses of e-government? |
| A. | G2G |
| B. | G2B |
| C. | IG2G |
| D. | IG2B |
| Answer» E. | |
| 357. |
Type of field in which record are reserved set number of characters is classified as |
| A. | variable length |
| B. | fixed length |
| C. | stable length |
| D. | file length |
| Answer» C. stable length | |
| 358. |
A computer programmer |
| A. | Can enter input data quickly |
| B. | Can draw only flowchart |
| C. | Does all the thinking for a computer |
| D. | Can operate all types of computer equipments |
| Answer» D. Can operate all types of computer equipments | |
| 359. |
Files deleted from the hard disk are sent to the …………… |
| A. | recycle Bin |
| B. | floppy disk |
| C. | clipboard |
| D. | motherboard |
| Answer» B. floppy disk | |
| 360. |
Basic operations of a computer can be classified into |
| A. | Four types |
| B. | Five types |
| C. | Six types |
| D. | Seven types |
| Answer» C. Six types | |
| 361. |
Set of numbers used to check all characters in decimal digits is classified as |
| A. | type check |
| B. | range check |
| C. | variable check |
| D. | decimal check |
| Answer» B. range check | |
| 362. |
World has become a global village because of |
| A. | information technology |
| B. | networking |
| C. | chatting |
| D. | transferring information |
| Answer» B. networking | |
| 363. |
…………. are often delivered to a PC through an email attachment and are often designed to do harm. |
| A. | Viruses |
| B. | Spam |
| C. | Portals |
| D. | Email messages |
| Answer» B. Spam | |
| 364. |
Collecting personal information and effectively posing as another individual is known as the crime of: |
| A. | Spooling |
| B. | Identity theft |
| C. | Spoofing |
| D. | Hacking |
| Answer» C. Spoofing | |
| 365. |
What is the full form of AT in the IBM PC-AT? |
| A. | Applied Technology |
| B. | Additional Technology |
| C. | Advance Technology |
| D. | None of the above |
| Answer» D. None of the above | |
| 366. |
Which are the characteristics that if exist then the mobile computing is also called pervasive computing? |
| A. | Tranparency |
| B. | Environment sensing ability |
| C. | Application aware adaptation |
| D. | All of the above |
| Answer» E. | |
| 367. |
Which of the following device is used in a real-time processing? |
| A. | ATM |
| B. | Keyboard |
| C. | Voice-recognition device |
| D. | All of the above |
| Answer» E. | |
| 368. |
…………. shares hardware, Software, and data among authorized users. |
| A. | network |
| B. | protocol |
| C. | hyperlink |
| D. | transmitter |
| Answer» B. protocol | |
| 369. |
Which one of the following represents the binary equivalent of the decimal number 25? |
| A. | 11011 |
| B. | 10101 |
| C. | 01101 |
| D. | 11001 |
| Answer» E. | |
| 370. |
………….. may be included in other folder while making hierarchical structure folder. |
| A. | Mini folder |
| B. | Tiered folder |
| C. | Sub-folder |
| D. | Object |
| Answer» D. Object | |
| 371. |
System for organizing storage and retrieval of information is ……….. |
| A. | operating system |
| B. | database |
| C. | database program |
| D. | data warehouse |
| Answer» E. | |
| 372. |
DSL is an example for ………….. connection. |
| A. | network |
| B. | wireless |
| C. | internet |
| D. | broadband |
| Answer» E. | |
| 373. |
What is the full form of WWW in Internet ? |
| A. | World Wide Web |
| B. | World Wide Word |
| C. | World Wide Wood |
| D. | None of these |
| Answer» B. World Wide Word | |
| 374. |
'.INI' extension refers to: |
| A. | Image file |
| B. | System file |
| C. | Movie file |
| D. | Word file |
| Answer» C. Movie file | |
| 375. |
One Terabyte (TB) is equal to |
| A. | 1000 megabytes |
| B. | 2048 megabytes |
| C. | 1024 gigabytes |
| D. | 1024 megabytes |
| Answer» D. 1024 megabytes | |
| 376. |
Malicious software is known as: |
| A. | Badware |
| B. | Malware |
| C. | Maliciousware |
| D. | Illegalware |
| Answer» C. Maliciousware | |
| 377. |
What type of virus uses computer hosts to reproduce itself? |
| A. | Time bomb |
| B. | Worm |
| C. | Melissa virus |
| D. | Macro virus |
| Answer» C. Melissa virus | |
| 378. |
Product or good with magnetic code must identify |
| A. | country of origin |
| B. | manufacturer name |
| C. | item number for product |
| D. | all of above |
| Answer» E. | |
| 379. |
Straightforward allocation of storage space is consist of fixed length |
| A. | item |
| B. | advantage |
| C. | previous records |
| D. | disadvantage |
| Answer» C. previous records | |
| 380. |
When did John Napier develop logarithm? |
| A. | 1416 |
| B. | 1641 |
| C. | 1804 |
| D. | 1614 |
| Answer» E. | |
| 381. |
Features like web and e-mail access, special software, special hardware etc are included by |
| A. | laptops |
| B. | notepads |
| C. | tablets |
| D. | smart phones |
| Answer» E. | |
| 382. |
The subject of cybernetics deals with the science of |
| A. | Genetics |
| B. | Molecular biology |
| C. | Biochemistry |
| D. | Control and communication |
| Answer» E. | |
| 383. |
In the IBM PC-At, what do the words AT stand for |
| A. | Applied technology |
| B. | Advanced terminology |
| C. | Additional Terminals |
| D. | Advance technology |
| Answer» C. Additional Terminals | |
| 384. |
Which one of the following is not a linear data structure ? |
| A. | Array |
| B. | Binary Tree |
| C. | Queue |
| D. | Stack |
| Answer» C. Queue | |
| 385. |
The latest version of the Macintosh operating system is |
| A. | Mac OS IX |
| B. | Mac OS IXX |
| C. | Mac OS V |
| D. | Mac OS X |
| Answer» E. | |
| 386. |
_________________ are a series of black and white parallel and adjacent bars with spaces which represent a string of characters. |
| A. | Instruction register |
| B. | Program control register |
| C. | Barcode Readers |
| D. | Memory Address register |
| Answer» D. Memory Address register | |
| 387. |
Which of the following is an operating system that would most likely be found on a handheldcomputer? |
| A. | Windows XP |
| B. | Windows NT |
| C. | Windows 2000 |
| D. | Windows CE |
| Answer» E. | |
| 388. |
...... is collection of web pages and ...... is the very first page that we see on opening of a web-site. |
| A. | Home-page, Web-page |
| B. | Web-site, Home-page |
| C. | Web-page, Home-page |
| D. | Web-page, Web-site |
| Answer» C. Web-page, Home-page | |
| 389. |
Data is converted into useful information by basic operation of |
| A. | Processing |
| B. | Controlling |
| C. | Inputting |
| D. | Outputting |
| Answer» B. Controlling | |
| 390. |
“MAN” stands for |
| A. | Maximum Area Network |
| B. | Minimum Area Network |
| C. | Main Area Network |
| D. | Metropolitan Area Network |
| Answer» E. | |
| 391. |
Process of converting data or information into form which is readily available for processing is called |
| A. | encoding |
| B. | decoding |
| C. | translating |
| D. | data organization |
| Answer» B. decoding | |
| 392. |
Checking of data before it is processed and testing its acceptability is classified as |
| A. | program corrections |
| B. | validation |
| C. | personification |
| D. | verification |
| Answer» C. personification | |
| 393. |
The scientist who developed the idea of the WWW is |
| A. | James Gosling |
| B. | Tim Berns Lee |
| C. | Andrew Tannenbaum |
| D. | Linus Torvalds |
| Answer» C. Andrew Tannenbaum | |
| 394. |
Interconnection of computer is possible only with the help of |
| A. | cables |
| B. | information technology |
| C. | communication links |
| D. | processing |
| Answer» C. communication links | |
| 395. |
In which mode Windows starts with only the core drivers & services? |
| A. | Safe Mode |
| B. | Quick Mode |
| C. | Normal Mode |
| D. | Repair Mode |
| Answer» B. Quick Mode | |
| 396. |
Which Command is used to reboot the computer ? |
| A. | Ctrl+Shift+Del |
| B. | Ctrl+Del+End |
| C. | Ctrl+Alt+Del |
| D. | Both a and c |
| Answer» D. Both a and c | |
| 397. |
It is very important for a computer system to have the ability to communicate with the outside world, _________________. |
| A. | Receive Data |
| B. | Send Data |
| C. | Information |
| D. | All of the above |
| Answer» E. | |
| 398. |
Select the odd term out? |
| A. | Windows |
| B. | Linux |
| C. | Unix |
| D. | Internet |
| Answer» E. | |
| 399. |
A series of MS-DOS Commands can be performed by |
| A. | Typing all the commands Prompt in series by adding hyphen (-) |
| B. | Copying all the commands into single Directory |
| C. | This is not possible in MS-Dos |
| D. | Creating BAT File |
| Answer» E. | |
| 400. |
Human speech can be effectively reproduces at a rate of |
| A. | 2.5 kHz |
| B. | 5.5 kHz |
| C. | 10 kHz |
| D. | 11 kHz |
| Answer» C. 10 kHz | |