Basic Information Technology (IT) MCQ
1. Digital certificates can be used for each of these except _____.
Answer
Correct Answer:
To verify the authenticity of the Registration Authorizer
Note: This Question is unanswered, help us to find answer for this one
2. When you turn on a computer, windows starts and displays a ____ consisting of the time and date.
Answer
Correct Answer:
Lock screen
Note: This Question is unanswered, help us to find answer for this one
3. ____ is an attempt by opposing attorneys to prevent you from serving on an important case.
Answer
Correct Answer:
Conflicting out
Note: This Question is unanswered, help us to find answer for this one
4. A _____ printer heats specially coated paper to produce an image.
Note: This Question is unanswered, help us to find answer for this one
5. 5g standards are expected to have a target speed of _____ to mobile devices.
Note: This Question is unanswered, help us to find answer for this one
6. To round off any of the four corners of a border, the _____ property should be applied.
Answer
Correct Answer:
border-width
Note: This Question is unanswered, help us to find answer for this one
7. To erase an entire entry in a cell and then reenter the data from the beginning, press the ____ key
Note: This Question is unanswered, help us to find answer for this one
8. Server virtualization in windows server 2012 r2 is based on a module called the _________.
Note: This Question is unanswered, help us to find answer for this one
9. In the past 10 years, the digital divide in the united states has ____.
Note: This Question is unanswered, help us to find answer for this one
10. In pcdata, the ____ symbol is used to mark the beginning of an element tag.
Note: This Question is unanswered, help us to find answer for this one
11. Types of risky behaviors of free and paid mobile apps include all of the following except ________.
Answer
Correct Answer:
Decrypting messages
Note: This Question is unanswered, help us to find answer for this one
12. Software designed specifically for a highly specialized industry is called ____.
Answer
Correct Answer:
Horizontal market software
Note: This Question is unanswered, help us to find answer for this one
13. A keyblock is _____________________
Answer
Correct Answer:
Used to create a black outline before the color is added
Note: This Question is unanswered, help us to find answer for this one
14. ______________________ is the point of view that is most like a video camera recording events.
Answer
Correct Answer:
Objective
Note: This Question is unanswered, help us to find answer for this one
15. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.
Answer
Correct Answer:
Reporting analysis
Note: This Question is unanswered, help us to find answer for this one
16. ______ refers to the deliberate falsification of information.
Answer
Correct Answer:
Disinformation
Note: This Question is unanswered, help us to find answer for this one
17. ______ is data that is entered into a computer. ______ is the result produced by a computer.
Answer
Correct Answer:
Input, Output
Note: This Question is unanswered, help us to find answer for this one
18. _____ was invented to standardize computer interfaces around one type of connection.
Answer
Correct Answer:
The USB port
Note: This Question is unanswered, help us to find answer for this one
19. A ________ divides presentation content into meaningful groups of slides.
Note: This Question is unanswered, help us to find answer for this one
20. ________ tools enable people to connect and exchange ideas.
Answer
Correct Answer:
Social media
Note: This Question is unanswered, help us to find answer for this one
21. If you are balancing a checkbook, you would most likely use ____ software.
Answer
Correct Answer:
Spreadsheet
Note: This Question is unanswered, help us to find answer for this one
22. An organization that provides a wide range of support services to users is called a(n) ____.
Answer
Correct Answer:
User support center
Note: This Question is unanswered, help us to find answer for this one
23. According to nist sp 800-14's security principles, security should ________.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
24. A kindle ebook reader is an example of a(n) _____ computer.
Answer
Correct Answer:
Special Purpose
Note: This Question is unanswered, help us to find answer for this one
25. A ____ can also indicate the encoding used in an xhtml document.
Answer
Correct Answer:
Meta element
Note: This Question is unanswered, help us to find answer for this one
26. In scene 1, creon suspects __________ motivated the person who buried polyneices.
Note: This Question is unanswered, help us to find answer for this one
27. I am brave, i am _____ i am who i'm meant to be, this is me
Note: This Question is unanswered, help us to find answer for this one
28. If your hand is on the keyboard, use the ribbon for formatting. _________________________
Note: This Question is unanswered, help us to find answer for this one
29. The speed of a level of cache memory is impacted by ________.
Answer
Correct Answer:
The chip's proximity to the CPU
Note: This Question is unanswered, help us to find answer for this one
30. Windows did not become popular until ___________ was released in 1992.
Answer
Correct Answer:
Version 3.1
Note: This Question is unanswered, help us to find answer for this one
31. ___________ domain is reserved for the u.s. military.
Note: This Question is unanswered, help us to find answer for this one
32. A(n) _________ refers to a fixed cell location that never changes.
Answer
Correct Answer:
Absolute referance
Note: This Question is unanswered, help us to find answer for this one
33. In 2015, around ____ percent of the worlds population had an internet connections.
Note: This Question is unanswered, help us to find answer for this one
34. Genetically modified papayas have been created to __________.
Answer
Correct Answer:
Increase resistance to disease
Note: This Question is unanswered, help us to find answer for this one
35. An economy that uses new technology _______.
Answer
Correct Answer:
Experiences an increase in its standard living but does not overcome scarcity
Note: This Question is unanswered, help us to find answer for this one
36. A petaflop represents _____ floating-point operations.
Answer
Correct Answer:
One thousand trillion
Note: This Question is unanswered, help us to find answer for this one
37. A _____ is an audio output device that converts text to speech.
Answer
Correct Answer:
Voice Synthesizer
Note: This Question is unanswered, help us to find answer for this one
38. ______ information can be proved as correct or incorrect.
Answer
Correct Answer:
Verifiable
Note: This Question is unanswered, help us to find answer for this one
39. After a workers h-1b visa expires, the foreigner must _____.
Answer
Correct Answer:
Remain outside the United States for one year before another H-1B petition will be approved
Note: This Question is unanswered, help us to find answer for this one
40. _____ was one of the first to offer saas for crm software.
Answer
Correct Answer:
Salesforce.com
Note: This Question is unanswered, help us to find answer for this one
41. Businesses should consider twitter as a social network where the dominant focus is on ________.
Answer
Correct Answer:
Status updates
Note: This Question is unanswered, help us to find answer for this one
42. The web page displayed when a user first visits a site is called a(n) _____.
Answer
Correct Answer:
Splash screen
Note: This Question is unanswered, help us to find answer for this one
43. The "fathers of the internet" are vinton cerf and ________.
Answer
Correct Answer:
Robert Kahn
Note: This Question is unanswered, help us to find answer for this one
44. Character entity references are inserted using the syntax _____.
Note: This Question is unanswered, help us to find answer for this one
45. Cd-rom is an example of a(n) _______ type of storage medium.
Answer
Correct Answer:
Optical disc
Note: This Question is unanswered, help us to find answer for this one
46. Border widths can be expressed using the keywords ____, medium, or thick.
Note: This Question is unanswered, help us to find answer for this one
47. An uninvited email solicitation to buy something is an example of ________.
Note: This Question is unanswered, help us to find answer for this one
48. An agency that offers accreditation for health-oriented websites is ____.
Note: This Question is unanswered, help us to find answer for this one
49. An ________________ modifies or further describes the function of an element.
Answer
Correct Answer:
Attribute
Note: This Question is unanswered, help us to find answer for this one
50. All of the following are tips for professional e-mail etiquette except ________.
Answer
Correct Answer:
use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
Note: This Question is unanswered, help us to find answer for this one
51. Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.
Answer
Correct Answer:
Smart phone
Note: This Question is unanswered, help us to find answer for this one
52. According to mcafee, ________ now pose the greatest security risks.
Answer
Correct Answer:
Mobile devices
Note: This Question is unanswered, help us to find answer for this one
53. ________ can cause data to arrive at uneven intervals on wireless networks.
Answer
Correct Answer:
Multiple propagation modes
Note: This Question is unanswered, help us to find answer for this one
54. ____ allows you to specify multiple images and their properties in a comma-separated list.
Note: This Question is unanswered, help us to find answer for this one
55. Clerical workers using computers for word-processing tasks is an example of job _____.
Answer
Correct Answer:
Job virtualization
Note: This Question is unanswered, help us to find answer for this one
56. A computer program that imitates human thinking is a(n) ________.
Answer
Correct Answer:
Expert system
Note: This Question is unanswered, help us to find answer for this one
57. Isp stands for ________.
Answer
Correct Answer:
Internet Service Provider
Note: This Question is unanswered, help us to find answer for this one
58. A(n) ______ database is a huge database used to analyze transactions.
Answer
Correct Answer:
Data warehouse
Note: This Question is unanswered, help us to find answer for this one
59. ____ are the characteristics that define an object as part of a class.
Answer
Correct Answer:
Both a & b
Note: This Question is unanswered, help us to find answer for this one
60. If an organization opts for software as a service (saas), it will have to ________.
Answer
Correct Answer:
Transfer data and develop procedures
Note: This Question is unanswered, help us to find answer for this one
61. Todos los lunes yo ______________ la ropa. (planchar)
Answer
Correct Answer:
Planchaban
Note: This Question is unanswered, help us to find answer for this one
62. _____ reduces the customer's need for software maintenance, operation, and support.
Answer
Correct Answer:
Software as a Service
Note: This Question is unanswered, help us to find answer for this one
63. An example of a(n) _____ is unix.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
64. A ____ should be a derived attribute
Answer
Correct Answer:
Person's age
Note: This Question is unanswered, help us to find answer for this one
65. A derived attribute ____.
Answer
Correct Answer:
Need not be physically stored within the database
Note: This Question is unanswered, help us to find answer for this one
66. ________ is used to undo unwanted database changes.
Note: This Question is unanswered, help us to find answer for this one
67. _____ is a relational set operator.
Note: This Question is unanswered, help us to find answer for this one
68. The ____ query combines rows from two queries and excludes duplicates.
Note: This Question is unanswered, help us to find answer for this one
69. ________ information is information that directly pertains both to the context and to the subject.
Note: This Question is unanswered, help us to find answer for this one
70. _______ are the fundamental activities that organizations use to do work and achieve their goals.
Answer
Correct Answer:
Processes
Note: This Question is unanswered, help us to find answer for this one
71. The control variable of a counter-controlled loop should be declared as ________to prevent errors.
Note: This Question is unanswered, help us to find answer for this one
72. When loops are nested, _____.
Answer
Correct Answer:
None of the above
Note: This Question is unanswered, help us to find answer for this one
73. A single spreadsheet document is often called a ____.
Answer
Correct Answer:
Worksheet
Note: This Question is unanswered, help us to find answer for this one
74. A ________ is a personal journal posted on the web
Note: This Question is unanswered, help us to find answer for this one
75. On a wiring diagram, s110 with a ".8 brn/blk" means ________.
Answer
Correct Answer:
A splice of a brown with black stripe, wire size being 0.8 mm 2 (18 gauge AWG)
Note: This Question is unanswered, help us to find answer for this one
76. The web was introduced in _______.
Note: This Question is unanswered, help us to find answer for this one
77. The term big data refers to the ________.
Answer
Correct Answer:
Exponential growth of structured and unstructured data that are difficult to process using traditional database techniques
Note: This Question is unanswered, help us to find answer for this one
78. The set of possible values for an attribute is a ____.
Note: This Question is unanswered, help us to find answer for this one
79. The vga standard offers _______________ colors at a resolution of 640 × 480 pixels.
Note: This Question is unanswered, help us to find answer for this one
80. The _____ system is used to represent rgb color in digital graphics.
Answer
Correct Answer:
Hexadecimal
Note: This Question is unanswered, help us to find answer for this one
81. Your computer needs a(n) _____ to access a network.
Note: This Question is unanswered, help us to find answer for this one
82. You relate tables to one another by using _______ fields.
Note: This Question is unanswered, help us to find answer for this one
83. The organizational structure of the files and folders on a computer is the _______,
Answer
Correct Answer:
File directory
Note: This Question is unanswered, help us to find answer for this one
84. The period of time that exist between wireless frames is called __________.
Answer
Correct Answer:
Carrier Sense
Note: This Question is unanswered, help us to find answer for this one
85. To move files between drives, you can use all of the following except ________.
Answer
Correct Answer:
Hold down the Shift key while dragging
Note: This Question is unanswered, help us to find answer for this one
Information Technology (IT) MCQs | Topic-wise