0% found this document useful (0 votes)
330 views8 pages

Itc Test

This document contains 55 multiple choice questions testing knowledge of various computer hardware and software topics. The questions cover subjects such as programming languages, memory, storage devices, operating systems, networks, security, and input/output devices. Sample questions include identifying the most suitable programming language for scientific applications, defining what a compiler is, naming input and output devices, and describing how hackers create botnets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
330 views8 pages

Itc Test

This document contains 55 multiple choice questions testing knowledge of various computer hardware and software topics. The questions cover subjects such as programming languages, memory, storage devices, operating systems, networks, security, and input/output devices. Sample questions include identifying the most suitable programming language for scientific applications, defining what a compiler is, naming input and output devices, and describing how hackers create botnets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Q1.

FORTRAN programming language is more suitable for ……


A. Business Applications
B. Marketing Applications
C. Scientific Applications
D. None of the above
Q2. Mostly which of the following device is used to carry user files?
A. Floppy Disk
B. Hard Disk    
C. RAM
D. CDROM
Q3. Which device is used to backup the data?
A. Floppy Disk
B. Tape
C. Network Drive
D. All of the above
Q4. In order to play and hear sound on a computer, one needs:
A. a sound card and speakers
B. a microphone
C. all of them required
D. none of them required
Q5. Which of the following are the cheapest memory devices in terms
of Cost/Bit?
A. Semiconductor memories
B. Magnetic Disks
C. Compact Disks
D. Magnetic Tapes
Q6. Which is a semi conductor memory?
A.  Dynamic
B.  Static
C.  Bubble
D.  Both a & b
Q7. Which of the following is a read only memory storage device?
A.  Floppy Disk
B.  CD-ROM     
C.  Hard Disk
D.  None of these
Q8. Which of the following is a programming language?
A.  Lotus
B.  Pascal
C.  MS-Excel
D.  Netscape
Q9. What do you call the translator which takes assembly language program as input
& produce machine language code as output?
A.  Compiler
B.  Interpreter
C.  Debugger
D.  Assembler
Q10. What is a compiler?
A.  A compiler does a conversion line by line as the program is run
B.  A compiler converts the whole of a higher level program code into machine code in one
step
C.  A compiler is a general purpose language providing very efficient execution
D.  None of the above
Q11. Which device is used as the standard pointing device in a Graphical User
Environment?
A.  Keyboard
B.  Mouse
C.  Joystick
D.  Track ball
Q12. Which number system is usually followed in a typical 32-bit computer? 
A.  2
B.  10     
C.  16
D.  32
Q13. Which number system is usually followed in a typical 32-bit computer?
A.  Binary
B.  Decimal
C.  Hexadecimal
D.  Octal
Q14. Which of the following is not an output device?
A.  Scanner
B.  Printer
C.  Flat Screen
D.  Touch Screen
Q15. Which of the following devices have a limitation that we can only store information
to it but cannot erase or modify it?
A.  Floppy Disk
B.  Hard Disk
C.  Tape Drive
D.  CDROM
Q16. Primary memory stores
A. Data alone
B. Programs alone
C. Results alone
D. All of these
Q17. EPROM can be used for
A. Erasing the contents of ROM
B. Reconstructing the contents of ROM    
C. Erasing and reconstructing the contents of ROM
D. Duplicating ROM
Q18. Which device can understand difference between data & programs?
A. Input device
B. Output device
C. Memory
D. Microprocessor
Q19 The contents of information are stored in
A. Memory data register
B. Memory address register
C. Memory arithmetic registers
D. Memory access register
Q20. Memory unit is one part of
A. Input device
B. Control unit
C. Output device
D. Central Processing Unit
Q21. Punched cards were first introduced by
A. Powers
B. Pascal
C. Jacquard
D. Herman Hollerith
Q22. Computers built before the First Generation of computers were:
A. Mechanical
B. Electro-mechanical   
C. Electrical
D. None of these
Q23. Word length of a Personal Computer is ___
A. 4 bits
B. 8 bits
C. 16 bits
D. 64 bits
Q24. Size of the primary memory of a PC ranges between
A. 2KB to 8KB
B. 64KB & 256KB
C. 256KB & 640KB
D. None of these
Q25. CPU speed of a personal computer is
A. 32 KIPS
B. 100 KIPS
C. 1 MIPS
D. None of these
Q26. What do you call the programs that are used to find out possible faults and their
causes?
A. Operating system extensions
B. Cookies
C. Diagnostic software
D. Boot diskettes
Q27. Which programming languages are classified as low level languages?
A. Basic, COBOL, FORTRAN
B. Prolog 2, Expert Systems
C. Knowledge based Systems
D. Assembly Languages
Q28. Which of the following is not anti-viruses software?
A. NAV
B. F-Prot
C. Oracle
D. McAfee
Q29. Which device is required for the Internet connection?
A. Joystick
B. Modem
C. CD Drive
D. NIC Card
Q30. What does DMA stand for?
A. Distinct Memory Access
B. Direct Memory Access
C. Direct Module Access
D. Direct Memory Allocation
Q31. The Second Generation Computer was based on ________.
A. Vacuum Tube
B. Silicon Chips
C. Transistor
D. Bio Chips
Q32. The Third Generation Computer was made with ________.
A. Vacuum Tube
B. Discrete Components
C. IC
D. Bio Chips
Q33. The BIOS is the abbreviation of ________.
A. Basic Input Output System
B. Best Input Output System
C. Basic Input Output Symbol
D. Base Input Output System
Q34. What do you call a single point on a computer screen?
A. Cell
B. Element
C. Pixel
D. Bit
Q35. RJ45 UTP cable has ________ Cables.
A. 2 pair
B. 3 pair
C. 4 pair
D. 5 pair
Q36. MICR stands for
A.  Magnetic Ink Character Reader
B.  Magnetic Ink Code Reader
C.  Magnetic Ink Case Reader
D.  None of the above
Q37.  Which access method is used to access cassette tape?
A.  Direct
B.  Sequential        
C.  Both of the above
D.  None of the above
Q38.  EEPROM stands for
A.  Electrically Erasable Programmable Read Only Memory
B.  Electronic Erasable Programmable Read Only Memory
C.  Easily Erasable Programmable Read Only Memory
D.  Easily Erasable Programmable Read Only Memory
Q39. Which of the following memories need refresh?
A.  SRAM
B.  DRAM
C.  ROM
D.  All of the above
Q40. ASCII stands for
A.  American Standard Code for Information Interchange
B.  American Scientific Code for International Interchange
C.  American Standard Code for Intelligence Interchange
D.  American Scientific Code for Information Interchange
Q41. Which of the following Language that Computer can
Understand & Execute?
A.  Machine Language
B.  C Programming Language
C.  Java Programming Language
D.  None of the Above
Q42. Who is credited for using punch cards to control patterns of a
weaving machine?
A.  Blaise Pascal
B.  Herman Hollerith        
C.  Jacquard
D.  Charles Babbage
Q43. Dedicated Computer means
A. Doesn’t have OS
B. Used by single person
C. Assigned to one and only one task D. All of Above
Q44. Computer Keyboard can be classified as __________ Device?
A.  Memory
B.  Input
C.  Output
D.  Storage
Q45. Physical connection between Microprocessor Memory and
other parts is called _________
A.  Path
B.  Hub
C.  Address bus
D.  None of the above
Q46. What is Unicode?
A. Standard Font
B. Software
C. Character Encoding System
D. Keyboard Layout
Q47. In Computer System Scanner is ______ Device?
A. Input
B. Output        
C. Both
D. None
Q48. Which of the following memory has the shortest access time?
A. Virtual Memory
B. Cache Memory
C. External Memory
D. Register
Q49. Speed of Laser Printer is measured in
A. LPM
B. PPM
C. DPI
D. DPS
Q50. Which of the following device cannot be shared in Network?
A. CD Drive
B. Printer
C. Mouse
D. Hard Disk
Q51. Fault-tolerant computers contain redundant hardware, software,
and power supply components.
A. True
B. False
Q52. An authentication token is a(n)
A. Device the size of a credit card that contains access permission data.
B. Type of smart card.
C. Gadget that displays passcodes.
D. Electronic marker attached to a digital authorization file.
Q53. Specific security challenges that threaten the communications
lines in a client/server environment include
A. tapping; sniffing; message alteration; radiation.
B. Hacking; vandalism; denial of service attacks.
C. Theft, copying, alteration of data; hardware or software failure.
D. Unauthorized access; errors; spyware.
Q54. How do hackers create a botnet?
A. by infecting Web search bots with malware
B. by using Web search bots to infect other computers
C. by causing other people's computers to become "zombie" PCs following a
master computer
D. by infecting corporate servers with "zombie" Trojan horses that allow
undetected access through a back door
Q55. A firewall allows the organization to
A. Enforce a security policy on traffic between its network and the Internet.
B. Check the accuracy of all transactions between its network and the Internet.
C. Create an enterprise system on the Internet.
D. Check the content of all incoming and outgoing e-mail messages.

You might also like