ads

MCQ on Information Technology CPD-III (Paper-2)

 

MCQ on Information Technology CPD-III (Paper-2)

1. What is the process at the most detailed level of the data flow diagrams known as?

A.     Interfaces

B.     functional primitives

C.     data flow

D.     transform descriptions

Answer: B) The process at the most detailed level of the data flow diagrams known as functional primitives

2. Total bits used by the IPv6 address is ________

A.     64 bit

B.     256 bit

C.     128 bit

D.     32 bit

Answer: C) Total bits used by the IPv6 address is 128 bits.

3. Identify the language which is mainly used for Artificial Intelligence

A.     Java

B.     J2EE

C.     Prolog

D.     C

Answer: C) Prolog is used for Artificial Intelligence.

4. Why is a firewall used in a computer?

A.     Monitoring

B.     data transmission

C.     Authentication

D.     security

Answer: D) Firewall is used in computers for security.

5. The full form of DOM is?

A.     Document-oriented memory

B.     document object model

C.     document object memory

D.     none

Answer: B) DOM  stands for document object model.

6. How many levels are there in the architecture of the database?

A.     2

B.     3

C.     4

D.     5

Answer: B) There are three levels of architecture in the database - physical level, the view level, and user level.

7. Among the following which is not a database management software

A.     MySQL

B.     COBOL

C.     Sybase

D.     Oracle

Answer: B) COBOL  is not a database management software

8. Identify the total standard color names that HTML supports.

A.     30

B.     70

C.     140

D.     120

Answer: C) HTML supports a total of 140 standard color names.

 

9. Choose the port number of FTP.

A.     23

B.     21

C.     110

D.     143

Answer: B) The port number of FTP is 21

10. Total number of layers in OSI model is ___________

A.     5

B.     7

C.     9

D.     11

Answer: B) The total number of layers in the OSI model is 7.

11. UNIX is written in which language?

A.     C#

B.     C++

C.     C

D.     .Net

Answer: C) UNIX is written in C language. It was developed in the 1970s at AT & T Bell laboratories.

12. Identify the different features of Big Data Analytics.

A.     open source

B.     data recovery

C.     Scalability

D.     All of the above

Answer: D)  All of the above are features of Big Data Analytics

 

13. Which of the following is an extension of image file?

A.     .mkv

B.     .gif

C.     .txt

D.     .vdf

Answer: B)  .gif is an extension of image file.

14. Dbase III is?

A.     Hardware

B.     Firmware

C.     application software

D.     operating system

Answer: C) dBase III is Application software.

15. The main memory of a computer system is?

A.     Non-volatile

B.     Volatile

C.     Restricted

D.     Unrestricted

Answer: B) Main memory of a computer system is volatile

16. Identify among the following servers which allow LAN users to share data.

A.     Communication server

B.     Point server

C.     Data server

D.     File server

Answer: D) File server allows LAN users to share data.

 

 

17. URL stands for _______________

A.     Uninterrupted data locator

B.     Uninterrupted record locator

C.     uniform record locator

D.     uniform resource locator

Answer: D) The full form of URL is a uniform resource locator.

18. SSLstands for _______________

A.     secure socket layer

B.     secure secret level

C.     secure system level

D.     section security layer

Answer: A) The full form of SSL is a secure socket layer.

19. Which of the following is not a SQL command?

A.     DELETE

B.     ORDER BY

C.     SELECT

D.     WHERE

Answer: A) DELETE is not a SQL command

20. Identify the range of byte data types in JavaScript

A.     -10 to 9

B.     128 to 127

C.     -32768 to 32767

D.     -2147483648 to 2147483647

Answer: B) the range of byte data type is - 128 to 127.

 

 

21. Computer word size is a multiple of ______ bits

A.     4 bits

B.     10 bits

C.     16 bits

D.     1024 bits

Answer: C) Computer word size is a multiple of 16 bits

22. OCR stands for _____________

A.     Online computer retrieval

B.     office cash receiver

C.     optical character reader

D.     optical card reader

Answer: D) OCR stands for optical card reader.

23. Testing of program’s corporate is known as?

A.     System testing

B.     isolation testing

C.     pilot testing

D.     unit-testing

Answer: D) Testing of program’s corporate is known as unit testing.

24. Information in computer read-only memory stored by

A.     Engineer

B.     Programmer

C.     Manufacturer

D.     user

Answer: C) Information in computer read-only memory is stored by the manufacturer.

 

 

25. Device driver required in?

A.     Register

B.     Main memory

C.     Disk

D.     Cache

Answer: C) A disk drive is a device driver that allows a specific disk drive to communicate with the remainder of the computer. A good example of this driver is a floppy disk drive.

26. Identify the call which never returns an error?

A.     fork

B.     getpid

C.     ioctl

D.     open

Answer: B) The call getpid never returns an error

27. The total view of a database is known as?

A.     Physical view

B.     Internal view

C.     Conceptual view

D.     External view

Answer: C) The conceptual view is referred to as the total view of a database

28. Which of the following does computer hardware consist of?

A.     storage devices

B.     CPU

C.     I/O devices

D.     all of the above

 

Answer: D) computer hardware consists of All of the above.

29. In what terms is Computer memory measured?

A.     Units

B.     Bits

C.     Cells

D.     bytes

Answer: D) Computer memory is measured in terms of bytes.

30. Which of the following memory of the computer is volatile?

A.     EEPROM

B.     RAM

C.     ROM

D.     CMOS

Answer: B) RAM is volatile.

31. Which of the following computer memory users cannot write any information or instruction?

A.     EEPROM

B.     RAM

C.     ROM

D.     CMOS

Answer: B) Users cannot write any information or instruction on ROM.

32. Which of the following commands in UNIX is used to send a signal?

A.     send

B.     kill

C.     sigsend

D.     none

Answer: B) kill is used to send a signal in UNIX

 

33. Using which of the following is the interconnection of the computer possible?

A.     communication links

B.     Cables

C.     information technology

D.     processing

Answer: C) Using information technology, interconnection of computer is possible.

34. Where is computer firmware present?

A.     Cache memory

B.     non-volatile memory

C.     Volatile memory

D.     RAM

Answer: B) Computer firmware is present in non-volatile memory.

35. LPT stands for ______________

A.     Low print typewriter

B.     line per text

C.     line printer

D.     laser printer

Answer: C) LPT stands for Line printer.

36. What are modern computers based on?

A.     Microchip

B.     Microprocessor

C.     I/O devices

D.     both a and b

 

Answer: B) Modern computers are based on both microchips and

microprocessors.

37. What else is a command interpreter called?

A.     prompt

B.     kernel

C.     command

D.     shell

Answer: D) A command interpreter is also called the shell.

38. The computer system which uses a drum plotter is known as?

A.     mini computer

B.     Mainframe computer

C.     Both A and B

D.     none

Answer: C) Computer system which uses drum plotter is known as both mini and mainframe computer.

39. Which of the following is known as an uninterruptible unit?

A.     single

B.     static

C.     atomic

D.     none of the mentioned

Answer: C) Atomic is known as an uninterruptible unit. That is, whenever a process start executes, it doesn’t terminate or context switch until its complete execution

40. Where can the data be updated?

A.     Informational environment

B.     Data warehouse environment

C.     Operational environment

D.     Data mining environment

Answer: C) Data can be updated in an operational environment

 

41. Identify the one which is not a networking device.

A.     Switch

B.     Traffic analyzer

C.     Bridge

D.     Router

Answer: B) Traffic analyzer is not a networking device

42. The standard length of the MAC address is

A.     16 bits

B.     48 bits

C.     32 bits

D.     8 bits

Answer: B) Standard length of MAC address is 48 bits

43. Which of the following is not an operating system?

A.     Linux

B.     DOS

C.     Oracle

D.     Windows

Answer: C) Oracle is not an operating system. It is a relational database management system, also known as Oracle Database

44. Through API, _____ service portability is enabled.

A.     device

B.     network

C.     services

D.     systems

 

Answer: D) Through API, systems service portability is enabled

45. What is a table joined with itself called?

A.     Join

B.     Self-join

C.     Outer join

D.     Equi join

Answer: B) Table joined with self is known as Self Join

46. Which of the following is a single-user operating system?

A.     Windows

B.     Ms-DOS

C.     MAC

D.     None

Answer: B) Ms-DOS is a single-user operating system.

47. Choose among the following, which is the most common internet protocol.

A.     PPP

B.     FTP

C.     TCP/IP

D.     SMTP

Answer: D) SMTP is the most commonly used internet protocol.

48. Full form of SBC is?

A.     Standard business center

B.     Smart business center

C.     Standard building center

D.     Smart building center

Answer: B) SBC stands for Smart business center

 

 

49. Another name of reading operation in?

A.     store operations

B.     access operation

C.     Fetch operation

D.     control operation

Answer: C) Read operation is also known as fetch operation.

50. What is the total number of users that can use a microprocessor at a time?

A.     Single users

B.     Multi-user

C.     particular user

D.     professional user

 

Answer: A) Only a single user can use a microprocessor at a time



Post a Comment

0 Comments