This document contains 55 multiple choice questions testing knowledge of various computer hardware and software topics. The questions cover subjects such as programming languages, memory, storage devices, operating systems, networks, security, and input/output devices. Sample questions include identifying the most suitable programming language for scientific applications, defining what a compiler is, naming input and output devices, and describing how hackers create botnets.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
330 views8 pages
Itc Test
This document contains 55 multiple choice questions testing knowledge of various computer hardware and software topics. The questions cover subjects such as programming languages, memory, storage devices, operating systems, networks, security, and input/output devices. Sample questions include identifying the most suitable programming language for scientific applications, defining what a compiler is, naming input and output devices, and describing how hackers create botnets.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8
Q1.
FORTRAN programming language is more suitable for ……
A. Business Applications B. Marketing Applications C. Scientific Applications D. None of the above Q2. Mostly which of the following device is used to carry user files? A. Floppy Disk B. Hard Disk C. RAM D. CDROM Q3. Which device is used to backup the data? A. Floppy Disk B. Tape C. Network Drive D. All of the above Q4. In order to play and hear sound on a computer, one needs: A. a sound card and speakers B. a microphone C. all of them required D. none of them required Q5. Which of the following are the cheapest memory devices in terms of Cost/Bit? A. Semiconductor memories B. Magnetic Disks C. Compact Disks D. Magnetic Tapes Q6. Which is a semi conductor memory? A. Dynamic B. Static C. Bubble D. Both a & b Q7. Which of the following is a read only memory storage device? A. Floppy Disk B. CD-ROM C. Hard Disk D. None of these Q8. Which of the following is a programming language? A. Lotus B. Pascal C. MS-Excel D. Netscape Q9. What do you call the translator which takes assembly language program as input & produce machine language code as output? A. Compiler B. Interpreter C. Debugger D. Assembler Q10. What is a compiler? A. A compiler does a conversion line by line as the program is run B. A compiler converts the whole of a higher level program code into machine code in one step C. A compiler is a general purpose language providing very efficient execution D. None of the above Q11. Which device is used as the standard pointing device in a Graphical User Environment? A. Keyboard B. Mouse C. Joystick D. Track ball Q12. Which number system is usually followed in a typical 32-bit computer? A. 2 B. 10 C. 16 D. 32 Q13. Which number system is usually followed in a typical 32-bit computer? A. Binary B. Decimal C. Hexadecimal D. Octal Q14. Which of the following is not an output device? A. Scanner B. Printer C. Flat Screen D. Touch Screen Q15. Which of the following devices have a limitation that we can only store information to it but cannot erase or modify it? A. Floppy Disk B. Hard Disk C. Tape Drive D. CDROM Q16. Primary memory stores A. Data alone B. Programs alone C. Results alone D. All of these Q17. EPROM can be used for A. Erasing the contents of ROM B. Reconstructing the contents of ROM C. Erasing and reconstructing the contents of ROM D. Duplicating ROM Q18. Which device can understand difference between data & programs? A. Input device B. Output device C. Memory D. Microprocessor Q19 The contents of information are stored in A. Memory data register B. Memory address register C. Memory arithmetic registers D. Memory access register Q20. Memory unit is one part of A. Input device B. Control unit C. Output device D. Central Processing Unit Q21. Punched cards were first introduced by A. Powers B. Pascal C. Jacquard D. Herman Hollerith Q22. Computers built before the First Generation of computers were: A. Mechanical B. Electro-mechanical C. Electrical D. None of these Q23. Word length of a Personal Computer is ___ A. 4 bits B. 8 bits C. 16 bits D. 64 bits Q24. Size of the primary memory of a PC ranges between A. 2KB to 8KB B. 64KB & 256KB C. 256KB & 640KB D. None of these Q25. CPU speed of a personal computer is A. 32 KIPS B. 100 KIPS C. 1 MIPS D. None of these Q26. What do you call the programs that are used to find out possible faults and their causes? A. Operating system extensions B. Cookies C. Diagnostic software D. Boot diskettes Q27. Which programming languages are classified as low level languages? A. Basic, COBOL, FORTRAN B. Prolog 2, Expert Systems C. Knowledge based Systems D. Assembly Languages Q28. Which of the following is not anti-viruses software? A. NAV B. F-Prot C. Oracle D. McAfee Q29. Which device is required for the Internet connection? A. Joystick B. Modem C. CD Drive D. NIC Card Q30. What does DMA stand for? A. Distinct Memory Access B. Direct Memory Access C. Direct Module Access D. Direct Memory Allocation Q31. The Second Generation Computer was based on ________. A. Vacuum Tube B. Silicon Chips C. Transistor D. Bio Chips Q32. The Third Generation Computer was made with ________. A. Vacuum Tube B. Discrete Components C. IC D. Bio Chips Q33. The BIOS is the abbreviation of ________. A. Basic Input Output System B. Best Input Output System C. Basic Input Output Symbol D. Base Input Output System Q34. What do you call a single point on a computer screen? A. Cell B. Element C. Pixel D. Bit Q35. RJ45 UTP cable has ________ Cables. A. 2 pair B. 3 pair C. 4 pair D. 5 pair Q36. MICR stands for A. Magnetic Ink Character Reader B. Magnetic Ink Code Reader C. Magnetic Ink Case Reader D. None of the above Q37. Which access method is used to access cassette tape? A. Direct B. Sequential C. Both of the above D. None of the above Q38. EEPROM stands for A. Electrically Erasable Programmable Read Only Memory B. Electronic Erasable Programmable Read Only Memory C. Easily Erasable Programmable Read Only Memory D. Easily Erasable Programmable Read Only Memory Q39. Which of the following memories need refresh? A. SRAM B. DRAM C. ROM D. All of the above Q40. ASCII stands for A. American Standard Code for Information Interchange B. American Scientific Code for International Interchange C. American Standard Code for Intelligence Interchange D. American Scientific Code for Information Interchange Q41. Which of the following Language that Computer can Understand & Execute? A. Machine Language B. C Programming Language C. Java Programming Language D. None of the Above Q42. Who is credited for using punch cards to control patterns of a weaving machine? A. Blaise Pascal B. Herman Hollerith C. Jacquard D. Charles Babbage Q43. Dedicated Computer means A. Doesn’t have OS B. Used by single person C. Assigned to one and only one task D. All of Above Q44. Computer Keyboard can be classified as __________ Device? A. Memory B. Input C. Output D. Storage Q45. Physical connection between Microprocessor Memory and other parts is called _________ A. Path B. Hub C. Address bus D. None of the above Q46. What is Unicode? A. Standard Font B. Software C. Character Encoding System D. Keyboard Layout Q47. In Computer System Scanner is ______ Device? A. Input B. Output C. Both D. None Q48. Which of the following memory has the shortest access time? A. Virtual Memory B. Cache Memory C. External Memory D. Register Q49. Speed of Laser Printer is measured in A. LPM B. PPM C. DPI D. DPS Q50. Which of the following device cannot be shared in Network? A. CD Drive B. Printer C. Mouse D. Hard Disk Q51. Fault-tolerant computers contain redundant hardware, software, and power supply components. A. True B. False Q52. An authentication token is a(n) A. Device the size of a credit card that contains access permission data. B. Type of smart card. C. Gadget that displays passcodes. D. Electronic marker attached to a digital authorization file. Q53. Specific security challenges that threaten the communications lines in a client/server environment include A. tapping; sniffing; message alteration; radiation. B. Hacking; vandalism; denial of service attacks. C. Theft, copying, alteration of data; hardware or software failure. D. Unauthorized access; errors; spyware. Q54. How do hackers create a botnet? A. by infecting Web search bots with malware B. by using Web search bots to infect other computers C. by causing other people's computers to become "zombie" PCs following a master computer D. by infecting corporate servers with "zombie" Trojan horses that allow undetected access through a back door Q55. A firewall allows the organization to A. Enforce a security policy on traffic between its network and the Internet. B. Check the accuracy of all transactions between its network and the Internet. C. Create an enterprise system on the Internet. D. Check the content of all incoming and outgoing e-mail messages.