Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 434 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

351.

All keys which are used to identify particular item must be

A. same
B. different
C. lengthy
D. short
Answer» C. lengthy
352.

sign and magnitude' method represents negatives and positives as

A. 1 for negative and 0 for positive
B. 0 for negative and 1 for positive
C. 1 for negative and 2 for positive
D. 2 for negative and 1 for positive
Answer» B. 0 for negative and 1 for positive
353.

The arranging of data in a logical sequence is called

A. Sorting
B. Summarizing
C. Classifying
D. Reproducing
Answer» B. Summarizing
354.

To connect several computers together, one generally needs to be running a(n) __________operating system.

A. network
B. Internet
C. stand-alone
D. embedded
Answer» B. Internet
355.

The "desktop" of a computer refers to

A. the visible screen
B. the area around the monitor
C. the top of the mouse pad
D. the inside of a folder
Answer» B. the area around the monitor
356.

Which of the following is not one of the four primary focuses of e-government?

A. G2G
B. G2B
C. IG2G
D. IG2B
Answer» E.
357.

Type of field in which record are reserved set number of characters is classified as

A. variable length
B. fixed length
C. stable length
D. file length
Answer» C. stable length
358.

A computer programmer

A. Can enter input data quickly
B. Can draw only flowchart
C. Does all the thinking for a computer
D. Can operate all types of computer equipments
Answer» D. Can operate all types of computer equipments
359.

Files deleted from the hard disk are sent to the ……………

A. recycle Bin
B. floppy disk
C. clipboard
D. motherboard
Answer» B. floppy disk
360.

Basic operations of a computer can be classified into

A. Four types
B. Five types
C. Six types
D. Seven types
Answer» C. Six types
361.

Set of numbers used to check all characters in decimal digits is classified as

A. type check
B. range check
C. variable check
D. decimal check
Answer» B. range check
362.

World has become a global village because of

A. information technology
B. networking
C. chatting
D. transferring information
Answer» B. networking
363.

…………. are often delivered to a PC through an email attachment and are often designed to do harm.

A. Viruses
B. Spam
C. Portals
D. Email messages
Answer» B. Spam
364.

Collecting personal information and effectively posing as another individual is known as the crime of:

A. Spooling
B. Identity theft
C. Spoofing
D. Hacking
Answer» C. Spoofing
365.

What is the full form of AT in the IBM PC-AT?

A. Applied Technology
B. Additional Technology
C. Advance Technology
D. None of the above
Answer» D. None of the above
366.

Which are the characteristics that if exist then the mobile computing is also called pervasive computing?

A. Tranparency
B. Environment sensing ability
C. Application aware adaptation
D. All of the above
Answer» E.
367.

Which of the following device is used in a real-time processing?

A. ATM
B. Keyboard
C. Voice-recognition device
D. All of the above
Answer» E.
368.

…………. shares hardware, Software, and data among authorized users.

A. network
B. protocol
C. hyperlink
D. transmitter
Answer» B. protocol
369.

Which one of the following represents the binary equivalent of the decimal number 25?

A. 11011
B. 10101
C. 01101
D. 11001
Answer» E.
370.

………….. may be included in other folder while making hierarchical structure folder.

A. Mini folder
B. Tiered folder
C. Sub-folder
D. Object
Answer» D. Object
371.

System for organizing storage and retrieval of information is ………..

A. operating system
B. database
C. database program
D. data warehouse
Answer» E.
372.

DSL is an example for ………….. connection.

A. network
B. wireless
C. internet
D. broadband
Answer» E.
373.

What is the full form of WWW in Internet ?

A. World Wide Web
B. World Wide Word
C. World Wide Wood
D. None of these
Answer» B. World Wide Word
374.

'.INI' extension refers to:

A. Image file
B. System file
C. Movie file
D. Word file
Answer» C. Movie file
375.

One Terabyte (TB) is equal to

A. 1000 megabytes
B. 2048 megabytes
C. 1024 gigabytes
D. 1024 megabytes
Answer» D. 1024 megabytes
376.

Malicious software is known as:

A. Badware
B. Malware
C. Maliciousware
D. Illegalware
Answer» C. Maliciousware
377.

What type of virus uses computer hosts to reproduce itself?

A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer» C. Melissa virus
378.

Product or good with magnetic code must identify

A. country of origin
B. manufacturer name
C. item number for product
D. all of above
Answer» E.
379.

Straightforward allocation of storage space is consist of fixed length

A. item
B. advantage
C. previous records
D. disadvantage
Answer» C. previous records
380.

When did John Napier develop logarithm?

A. 1416
B. 1641
C. 1804
D. 1614
Answer» E.
381.

Features like web and e-mail access, special software, special hardware etc are included by

A. laptops
B. notepads
C. tablets
D. smart phones
Answer» E.
382.

The subject of cybernetics deals with the science of

A. Genetics
B. Molecular biology
C. Biochemistry
D. Control and communication
Answer» E.
383.

In the IBM PC-At, what do the words AT stand for

A. Applied technology
B. Advanced terminology
C. Additional Terminals
D. Advance technology
Answer» C. Additional Terminals
384.

Which one of the following is not a linear data structure ?

A. Array
B. Binary Tree
C. Queue
D. Stack
Answer» C. Queue
385.

The latest version of the Macintosh operating system is

A. Mac OS IX
B. Mac OS IXX
C. Mac OS V
D. Mac OS X
Answer» E.
386.

_________________ are a series of black and white parallel and adjacent bars with spaces which represent a string of characters.

A. Instruction register
B. Program control register
C. Barcode Readers
D. Memory Address register
Answer» D. Memory Address register
387.

Which of the following is an operating system that would most likely be found on a handheldcomputer?

A. Windows XP
B. Windows NT
C. Windows 2000
D. Windows CE
Answer» E.
388.

...... is collection of web pages and ...... is the very first page that we see on opening of a web-site.

A. Home-page, Web-page
B. Web-site, Home-page
C. Web-page, Home-page
D. Web-page, Web-site
Answer» C. Web-page, Home-page
389.

Data is converted into useful information by basic operation of

A. Processing
B. Controlling
C. Inputting
D. Outputting
Answer» B. Controlling
390.

“MAN” stands for

A. Maximum Area Network
B. Minimum Area Network
C. Main Area Network
D. Metropolitan Area Network
Answer» E.
391.

Process of converting data or information into form which is readily available for processing is called

A. encoding
B. decoding
C. translating
D. data organization
Answer» B. decoding
392.

Checking of data before it is processed and testing its acceptability is classified as

A. program corrections
B. validation
C. personification
D. verification
Answer» C. personification
393.

The scientist who developed the idea of the WWW is

A. James Gosling
B. Tim Berns Lee
C. Andrew Tannenbaum
D. Linus Torvalds
Answer» C. Andrew Tannenbaum
394.

Interconnection of computer is possible only with the help of

A. cables
B. information technology
C. communication links
D. processing
Answer» C. communication links
395.

In which mode Windows starts with only the core drivers & services?

A. Safe Mode
B. Quick Mode
C. Normal Mode
D. Repair Mode
Answer» B. Quick Mode
396.

Which Command is used to reboot the computer ?

A. Ctrl+Shift+Del
B. Ctrl+Del+End
C. Ctrl+Alt+Del
D. Both a and c
Answer» D. Both a and c
397.

It is very important for a computer system to have the ability to communicate with the outside world, _________________.

A. Receive Data
B. Send Data
C. Information
D. All of the above
Answer» E.
398.

Select the odd term out?

A. Windows
B. Linux
C. Unix
D. Internet
Answer» E.
399.

A series of MS-DOS Commands can be performed by

A. Typing all the commands Prompt in series by adding hyphen (-)
B. Copying all the commands into single Directory
C. This is not possible in MS-Dos
D. Creating BAT File
Answer» E.
400.

Human speech can be effectively reproduces at a rate of

A. 2.5 kHz
B. 5.5 kHz
C. 10 kHz
D. 11 kHz
Answer» C. 10 kHz