MCQs > IT & Programming > Information Technology (IT) MCQs > Basic Information Technology (IT) MCQs

Basic Information Technology (IT) MCQ

1. Digital certificates can be used for each of these except _____.

Answer

Correct Answer: To verify the authenticity of the Registration Authorizer

Note: This Question is unanswered, help us to find answer for this one

2. When you turn on a computer, windows starts and displays a ____ consisting of the time and date.

Answer

Correct Answer: Lock screen

Note: This Question is unanswered, help us to find answer for this one

3. ____ is an attempt by opposing attorneys to prevent you from serving on an important case.

Answer

Correct Answer: Conflicting out

Note: This Question is unanswered, help us to find answer for this one

4. A _____ printer heats specially coated paper to produce an image.

Answer

Correct Answer: Thermal

Note: This Question is unanswered, help us to find answer for this one

5. 5g standards are expected to have a target speed of _____ to mobile devices.

Answer

Correct Answer: 1 Gbps

Note: This Question is unanswered, help us to find answer for this one

6. To round off any of the four corners of a border, the _____ property should be applied.

Answer

Correct Answer: ​border-width

Note: This Question is unanswered, help us to find answer for this one

7. To erase an entire entry in a cell and then reenter the data from the beginning, press the ____ key

Answer

Correct Answer: Esc

Note: This Question is unanswered, help us to find answer for this one

8. Server virtualization in windows server 2012 r2 is based on a module called the _________.

Answer

Correct Answer: Hyper-v

Note: This Question is unanswered, help us to find answer for this one

9. In the past 10 years, the digital divide in the united states has ____.

Answer

Correct Answer: Shrunk

Note: This Question is unanswered, help us to find answer for this one

10. In pcdata, the ____ symbol is used to mark the beginning of an element tag.

Answer

Correct Answer: *

Note: This Question is unanswered, help us to find answer for this one

11. Types of risky behaviors of free and paid mobile apps include all of the following except ________.

Answer

Correct Answer: Decrypting messages

Note: This Question is unanswered, help us to find answer for this one

12. Software designed specifically for a highly specialized industry is called ____.

Answer

Correct Answer: Horizontal market software

Note: This Question is unanswered, help us to find answer for this one

13. A keyblock is _____________________

Answer

Correct Answer: Used to create a black outline before the color is added

Note: This Question is unanswered, help us to find answer for this one

14. ______________________ is the point of view that is most like a video camera recording events.

Answer

Correct Answer: Objective

Note: This Question is unanswered, help us to find answer for this one

15. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.

Answer

Correct Answer: Reporting analysis

Note: This Question is unanswered, help us to find answer for this one

16. ______ refers to the deliberate falsification of information.

Answer

Correct Answer: Disinformation

Note: This Question is unanswered, help us to find answer for this one

17. ______ is data that is entered into a computer. ______ is the result produced by a computer.

Answer

Correct Answer: Input, Output

Note: This Question is unanswered, help us to find answer for this one

18. _____ was invented to standardize computer interfaces around one type of connection.

Answer

Correct Answer: The USB port

Note: This Question is unanswered, help us to find answer for this one

19. A ________ divides presentation content into meaningful groups of slides.

Answer

Correct Answer: Section

Note: This Question is unanswered, help us to find answer for this one

20. ________ tools enable people to connect and exchange ideas.

Answer

Correct Answer: Social media

Note: This Question is unanswered, help us to find answer for this one

21. If you are balancing a checkbook, you would most likely use ____ software.

Answer

Correct Answer: Spreadsheet

Note: This Question is unanswered, help us to find answer for this one

22. An organization that provides a wide range of support services to users is called a(n) ____.

Answer

Correct Answer: User support center

Note: This Question is unanswered, help us to find answer for this one

23. According to nist sp 800-14's security principles, security should ________.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

24. A kindle ebook reader is an example of a(n) _____ computer.

Answer

Correct Answer: Special Purpose

Note: This Question is unanswered, help us to find answer for this one

25. A ____ can also indicate the encoding used in an xhtml document.

Answer

Correct Answer: Meta element

Note: This Question is unanswered, help us to find answer for this one

26. In scene 1, creon suspects __________ motivated the person who buried polyneices.

Answer

Correct Answer: Money

Note: This Question is unanswered, help us to find answer for this one

27. I am brave, i am _____ i am who i'm meant to be, this is me

Answer

Correct Answer: Bruised

Note: This Question is unanswered, help us to find answer for this one

28. If your hand is on the keyboard, use the ribbon for formatting. _________________________

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

29. The speed of a level of cache memory is impacted by ________.

Answer

Correct Answer: The chip's proximity to the CPU

Note: This Question is unanswered, help us to find answer for this one

30. Windows did not become popular until ___________ was released in 1992.

Answer

Correct Answer: Version 3.1

Note: This Question is unanswered, help us to find answer for this one

31. ___________ domain is reserved for the u.s. military.

Answer

Correct Answer: .mil

Note: This Question is unanswered, help us to find answer for this one

32. A(n) _________ refers to a fixed cell location that never changes.

Answer

Correct Answer: Absolute referance

Note: This Question is unanswered, help us to find answer for this one

33. In 2015, around ____ percent of the worlds population had an internet connections.

Answer

Correct Answer: 46%

Note: This Question is unanswered, help us to find answer for this one

34. Genetically modified papayas have been created to __________.

Answer

Correct Answer: Increase resistance to disease

Note: This Question is unanswered, help us to find answer for this one

35. An economy that uses new technology _______.

Answer

Correct Answer: Experiences an increase in its standard living but does not overcome scarcity

Note: This Question is unanswered, help us to find answer for this one

36. A petaflop represents _____ floating-point operations.

Answer

Correct Answer: One thousand trillion

Note: This Question is unanswered, help us to find answer for this one

37. A _____ is an audio output device that converts text to speech.

Answer

Correct Answer: Voice Synthesizer

Note: This Question is unanswered, help us to find answer for this one

38. ______ information can be proved as correct or incorrect.

Answer

Correct Answer: Verifiable

Note: This Question is unanswered, help us to find answer for this one

39. After a workers h-1b visa expires, the foreigner must _____.

Answer

Correct Answer: Remain outside the United States for one year before another H-1B petition will be approved

Note: This Question is unanswered, help us to find answer for this one

40. _____ was one of the first to offer saas for crm software.

Answer

Correct Answer: Salesforce.com

Note: This Question is unanswered, help us to find answer for this one

41. Businesses should consider twitter as a social network where the dominant focus is on ________.

Answer

Correct Answer: Status updates

Note: This Question is unanswered, help us to find answer for this one

42. The web page displayed when a user first visits a site is called a(n) _____.

Answer

Correct Answer: Splash screen

Note: This Question is unanswered, help us to find answer for this one

43. The "fathers of the internet" are vinton cerf and ________.

Answer

Correct Answer: Robert Kahn

Note: This Question is unanswered, help us to find answer for this one

44. Character entity references are inserted using the syntax _____.

Answer

Correct Answer: &char

Note: This Question is unanswered, help us to find answer for this one

45. Cd-rom is an example of a(n) _______ type of storage medium.

Answer

Correct Answer: Optical disc

Note: This Question is unanswered, help us to find answer for this one

46. Border widths can be expressed using the keywords ____, medium, or thick.

Answer

Correct Answer: Thin

Note: This Question is unanswered, help us to find answer for this one

47. An uninvited email solicitation to buy something is an example of ________.

Answer

Correct Answer: Spam

Note: This Question is unanswered, help us to find answer for this one

48. An agency that offers accreditation for health-oriented websites is ____.

Answer

Correct Answer: URAC

Note: This Question is unanswered, help us to find answer for this one

49. An ________________ modifies or further describes the function of an element.

Answer

Correct Answer: Attribute

Note: This Question is unanswered, help us to find answer for this one

50. All of the following are tips for professional e-mail etiquette except ________.

Answer

Correct Answer: use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter

Note: This Question is unanswered, help us to find answer for this one

51. Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.

Answer

Correct Answer: Smart phone

Note: This Question is unanswered, help us to find answer for this one

52. According to mcafee, ________ now pose the greatest security risks.

Answer

Correct Answer: Mobile devices

Note: This Question is unanswered, help us to find answer for this one

53. ________ can cause data to arrive at uneven intervals on wireless networks.

Answer

Correct Answer: Multiple propagation modes

Note: This Question is unanswered, help us to find answer for this one

54. ____ allows you to specify multiple images and their properties in a comma-separated list.

Answer

Correct Answer: CSS

Note: This Question is unanswered, help us to find answer for this one

55. Clerical workers using computers for word-processing tasks is an example of job _____.

Answer

Correct Answer: Job virtualization

Note: This Question is unanswered, help us to find answer for this one

56. A computer program that imitates human thinking is a(n) ________.

Answer

Correct Answer: Expert system

Note: This Question is unanswered, help us to find answer for this one

57. Isp stands for ________.

Answer

Correct Answer: Internet Service Provider

Note: This Question is unanswered, help us to find answer for this one

58. A(n) ______ database is a huge database used to analyze transactions.

Answer

Correct Answer: Data warehouse

Note: This Question is unanswered, help us to find answer for this one

59. ____ are the characteristics that define an object as part of a class.

Answer

Correct Answer: Both a & b

Note: This Question is unanswered, help us to find answer for this one

60. If an organization opts for software as a service (saas), it will have to ________.

Answer

Correct Answer: Transfer data and develop procedures

Note: This Question is unanswered, help us to find answer for this one

61. Todos los lunes yo ______________ la ropa. (planchar)

Answer

Correct Answer: Planchaban

Note: This Question is unanswered, help us to find answer for this one

62. _____ reduces the customer's need for software maintenance, operation, and support.

Answer

Correct Answer: Software as a Service

Note: This Question is unanswered, help us to find answer for this one

63. An example of a(n) _____ is unix.

Answer

Correct Answer: Operating system

Note: This Question is unanswered, help us to find answer for this one

64. A ____ should be a derived attribute

Answer

Correct Answer: Person's age

Note: This Question is unanswered, help us to find answer for this one

65. A derived attribute ____.

Answer

Correct Answer: Need not be physically stored within the database

Note: This Question is unanswered, help us to find answer for this one

66. ________ is used to undo unwanted database changes.

Answer

Correct Answer: Rollback

Note: This Question is unanswered, help us to find answer for this one

67. _____ is a relational set operator.

Answer

Correct Answer: MINUS

Note: This Question is unanswered, help us to find answer for this one

68. The ____ query combines rows from two queries and excludes duplicates.

Answer

Correct Answer: UNION

Note: This Question is unanswered, help us to find answer for this one

69. ________ information is information that directly pertains both to the context and to the subject.

Answer

Correct Answer: Relevant

Note: This Question is unanswered, help us to find answer for this one

70. _______ are the fundamental activities that organizations use to do work and achieve their goals.

Answer

Correct Answer: Processes

Note: This Question is unanswered, help us to find answer for this one

71. The control variable of a counter-controlled loop should be declared as ________to prevent errors.

Answer

Correct Answer: Int

Note: This Question is unanswered, help us to find answer for this one

72. When loops are nested, _____.

Answer

Correct Answer: None of the above

Note: This Question is unanswered, help us to find answer for this one

73. A single spreadsheet document is often called a ____.

Answer

Correct Answer: Worksheet

Note: This Question is unanswered, help us to find answer for this one

74. A ________ is a personal journal posted on the web

Answer

Correct Answer: Blog

Note: This Question is unanswered, help us to find answer for this one

75. On a wiring diagram, s110 with a ".8 brn/blk" means ________.

Answer

Correct Answer: A splice of a brown with black stripe, wire size being 0.8 mm 2 (18 gauge AWG)

Note: This Question is unanswered, help us to find answer for this one

76. The web was introduced in _______.

Answer

Correct Answer: 1989

Note: This Question is unanswered, help us to find answer for this one

77. The term big data refers to the ________.

Answer

Correct Answer: Exponential growth of structured and unstructured data that are difficult to process using traditional database techniques

Note: This Question is unanswered, help us to find answer for this one

78. The set of possible values for an attribute is a ____.

Answer

Correct Answer: Domain

Note: This Question is unanswered, help us to find answer for this one

79. The vga standard offers _______________ colors at a resolution of 640 × 480 pixels.

Answer

Correct Answer: 16

Note: This Question is unanswered, help us to find answer for this one

80. The _____ system is used to represent rgb color in digital graphics.

Answer

Correct Answer: Hexadecimal

Note: This Question is unanswered, help us to find answer for this one

81. Your computer needs a(n) _____ to access a network.

Answer

Correct Answer: NIC

Note: This Question is unanswered, help us to find answer for this one

82. You relate tables to one another by using _______ fields.

Answer

Correct Answer: Common

Note: This Question is unanswered, help us to find answer for this one

83. The organizational structure of the files and folders on a computer is the _______,

Answer

Correct Answer: File directory

Note: This Question is unanswered, help us to find answer for this one

84. The period of time that exist between wireless frames is called __________.

Answer

Correct Answer: Carrier Sense

Note: This Question is unanswered, help us to find answer for this one

85. To move files between drives, you can use all of the following except ________.

Answer

Correct Answer: Hold down the Shift key while dragging

Note: This Question is unanswered, help us to find answer for this one