0% found this document useful (0 votes)
21 views23 pages

Wordpad - Plus - Untitled Document

Fuck you u asked me to upload 4 but I uploaded 6

Uploaded by

rashroshan5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views23 pages

Wordpad - Plus - Untitled Document

Fuck you u asked me to upload 4 but I uploaded 6

Uploaded by

rashroshan5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

IT and Biotechnology MCQs

1. What does HTML stand for?


A) Hypertext Markup Language
B) High-Level Text Markup Language
C) Hyperlink and Text Markup Language
D) Hypertextual Markup Language
Answer: A

2. Which of the following is a programming language primarily used for web


development?
A) Python
B) C++
C) JavaScript
D) Ruby
Answer: C

3. What is the primary purpose of a firewall?


A) To accelerate internet speed
B) To prevent unauthorized access to a network
C) To manage data storage
D) To monitor website traffic
Answer: B

4. Which company developed the Windows operating system?


A) Apple
B) Microsoft
C) IBM
D) Google
Answer: B

5. What does IoT stand for?


A) Internet of Things
B) Integration of Technology
C) Internet of Technology
D) Interconnected Online Technologies
Answer: A

6. Which protocol is used for sending emails?


A) HTTP
B) FTP
C) SMTP
D) SNMP
Answer: C

7. What is the main function of a CPU?


A) Store data
B) Execute instructions
C) Manage memory
D) Connect to the internet
Answer: B

8. What is CRISPR used for in biotechnology?


A) Data storage
B) Gene editing
C) Protein synthesis
D) DNA sequencing
Answer: B

9. Which of the following is a NoSQL database?


A) MySQL
B) Oracle
C) MongoDB
D) SQLite
Answer: C

10. What does VPN stand for?


A) Virtual Private Network
B) Virtual Public Network
C) Variable Private Network
D) Verified Private Network
Answer: A

11. Which programming language is known for its simplicity and readability?
A) Python
B) C
C) Java
D) Ruby
Answer: A

12. What does the term 'Big Data' refer to?


A) Small data sets
B) Large volumes of structured and unstructured data
C) Data with low velocity
D) Only statistical data
Answer: B

13. What is a common use of artificial intelligence in business?


A) Web browsing
B) Customer service chatbots
C) Data entry
D) Email management
Answer: B

14. Which of the following is a type of cloud computing service?


A) IaaS
B) PaaS
C) SaaS
D) All of the above
Answer: D

15. What does 'SEO' stand for?


A) Search Engine Optimization
B) Search Engine Operations
C) Systematic Email Operations
D) Search Email Optimization
Answer: A

16. Which database is known as a NoSQL database?


A) MySQL
B) MongoDB
C) PostgreSQL
D) SQLite
Answer: B

17. What technology does the term '5G' refer to?


A) The fifth generation of mobile network technology
B) A type of cybersecurity threat
C) A new internet protocol
D) A software development framework
Answer: A

18. Which company introduced the concept of the 'Metaverse' recently?


A) Google
B) Amazon
C) Facebook (Meta)
D) Tesla
Answer: C

19. What does the acronym 'API' stand for?


A) Application Programming Interface
B) Application Process Integration
C) Automated Programming Interface
D) Application Protocol Interface
Answer: A

20. Which programming language is primarily used for Android app development?
A) Swift
B) Java
C) C++
D) Kotlin
Answer: D

21. What is the function of a compiler?


A) Translate source code to machine code
B) Run applications
C) Debug programs
D) Manage memory
Answer: A
22. Which of the following is a benefit of using open-source software?
A) Lower cost
B) No support
C) Limited features
D) Less community involvement
Answer: A

23. What is the primary role of a system administrator?


A) Develop software
B) Manage and maintain computer systems
C) Design networks
D) Analyze data
Answer: B

24. What does 'UI' stand for in software design?


A) User Input
B) User Interface
C) Unified Information
D) Universal Interaction
Answer: B

25. Which technology is used for contactless payments?


A) QR Code
B) NFC
C) Bluetooth
D) Wi-Fi
Answer: B

26. What is the purpose of data encryption?


A) Protect sensitive information
B) Increase file size
C) Compress data
D) Format data
Answer: A

27. Which programming paradigm emphasizes functions and their application?


A) Procedural programming
B) Object-oriented programming
C) Functional programming
D) Declarative programming
Answer: C

28. Which of the following is a popular framework for building mobile applications?
A) Django
B) Laravel
C) React Native
D) Flask
Answer: C
29. Which technology allows devices to connect to the internet wirelessly?
A) Bluetooth
B) Wi-Fi
C) Ethernet
D) NFC
Answer: B

30. What is the main goal of data mining?


A) Store data
B) Extract patterns from data
C) Analyze data
D) Secure data
Answer: B

31. What is a common method for data visualization?


A) Text
B) Charts
C) Audio
D) Video
Answer: B

32. Which technology uses algorithms to analyze and interpret human behavior?
A) AI
B) Big Data
C) Cloud Computing
D) Internet of Things
Answer: A

33. Which of the following is an example of a web browser?


A) Windows
B) Linux
C) Chrome
D) Android
Answer: C

34. What does the term 'augmented reality' refer to?


A) Virtual experiences
B) Enhanced real-world experiences
C) Text-based interactions
D) Static images
Answer: B

35. What is a common use case for natural language processing?


A) Data entry
B) Chatbots
C) Web scraping
D) Game development
Answer: B

36. What is the main advantage of quantum computing?


A) Quantum bits
B) High speed
C) Parallel processing
D) All of the above
Answer: D

37. Which of the following is a key component of the Internet of Things (IoT)?
A) Actuators
B) Sensors
C) Networking
D) All of the above
Answer: D

38. Which technology is known for enabling the creation and management of digital
currencies like Bitcoin?
A) Artificial Intelligence
B) Blockchain
C) Quantum Computing
D) Internet of Things
Answer: B

39. What is the main advantage of using cloud storage?


A) Accessibility
B) Speed
C) Cost
D) Security
Answer: A

40. What is the primary use of artificial intelligence in healthcare?


A) Treatment
B) Diagnostics
C) Patient care
D) Billing
Answer: B

41. What is the purpose of a debugger in programming?


A) Speed up code
B) Identify and fix errors
C) Compile code
D) Enhance graphics
Answer: B

42. Which cybersecurity term refers to malicious software?


A) Virus
B) Malware
C) Spyware
D) Ransomware
Answer: B

44. What is the primary function of a database management system (DBMS)?


A) Store data
B) Retrieve data
C) Manage data integrity
D) All of the above
Answer: D

45. Which type of software is used to create and manage databases?


A) Operating System
B) Web Browser
C) Database Management System
D) Programming Language
Answer: C

46. What does the term 'machine learning' refer to?


A) Programming machines to perform tasks
B) Algorithms that enable computers to learn from data
C) Manual coding of algorithms
D) Hardware improvements
Answer: B

47. Which of the following is a common programming language for data analysis?
A) Java
B) Python
C) HTML
D) CSS
Answer: B

48. What is a 'blockchain'?


A) A type of database
B) A type of encryption
C) A method of data storage
D) A programming language
Answer: A

49. What does 'HTTP' stand for?


A) Hypertext Transfer Protocol
B) High Transfer Text Protocol
C) Hyper Transfer Text Protocol
D) Hypertext Transmission Protocol
Answer: A

50. Which of the following is a characteristic of cloud computing?


A) On-demand self-service
B) Limited access
C) High maintenance cost
D) Fixed resources
Answer: A

51. Which of the following is an example of a cyber attack?


A) Phishing
B) Data entry
C) Software development
D) Hardware maintenance
Answer: A

52. What is the primary benefit of using version control systems?


A) Store data
B) Keep track of changes in code
C) Improve performance
D) Enhance security
Answer: B

53. What does the acronym 'SQL' stand for?


A) Structured Query Language
B) Simple Query Language
C) Standard Query Language
D) Sequential Query Language
Answer: A

54. What type of malware encrypts a user's files and demands payment for decryption?
A) Adware
B) Spyware
C) Ransomware
D) Trojan
Answer: C

55. Which of the following is a programming language primarily used for statistical
analysis?
A) Python
B) Java
C) R
D) C++
Answer: C

56. What does 'DNS' stand for?


A) Domain Name System
B) Dynamic Network System
C) Data Name Service
D) Domain Network Service
Answer: A

57. Which of the following best describes 'phishing'?


A) Hacking into a system
B) Sending fraudulent emails to obtain sensitive information
C) Virus distribution
D) Creating fake websites
Answer: B

58. What is a 'DDoS' attack?


A) A direct hacking method
B) A data encryption method
C) A distributed denial-of-service attack
D) A data destruction attack
Answer: C

59. Which programming language is used for web server-side scripting?


A) HTML
B) PHP
C) CSS
D) JavaScript
Answer: B

60. What does 'UI/UX' stand for?


A) User Interface/User Experience
B) User Input/User Experience
C) Universal Interface/Universal Experience
D) User Integration/User Experience
Answer: A

61. What is the primary function of an operating system?


A) Manage hardware and software resources
B) Perform calculations
C) Create databases
D) Run applications only
Answer: A

62. Which type of network topology connects all devices to a central hub?
A) Star
B) Ring
C) Mesh
D) Bus
Answer: A

63. What is the main function of an IP address?


A) Secure data
B) Identify devices on a network
C) Provide internet speed
D) Encrypt data
Answer: B

64. Which of the following is not a programming language?


A) Python
B) Java
C) HTML
D) SQL
Answer: C

65. What does 'B2B' stand for in e-commerce?


A) Business to Business
B) Business to Buyer
C) Buyer to Buyer
D) Business to Bank
Answer: A

66. Which of the following technologies allows for remote access to data and
applications?
A) Cloud computing
B) Local storage
C) Networking
D) Data mining
Answer: A

67. What is the role of a network administrator?


A) Design software
B) Manage and maintain networks
C) Create websites
D) Analyze data
Answer: B

68. What is a 'virtual machine'?


A) A physical computer
B) An emulation of a computer system
C) A type of malware
D) A software application
Answer: B

69. What is the purpose of a router in a network?


A) Store data
B) Forward data packets
C) Encrypt data
D) Manage software
Answer: B

70. Which of the following is a function of data warehousing?


A) Real-time data processing
B) Historical data storage
C) Data encryption
D) Data visualization
Answer: B

71. What is the main goal of cybersecurity?


A) Increase internet speed
B) Protect systems and data from threats
C) Develop new technologies
D) Manage software updates
Answer: B

72. What does 'SaaS' stand for?


A) Software as a Service
B) Security as a Service
C) System as a Service
D) Storage as a Service
Answer: A

73. What is the main feature of augmented reality?


A) Complete immersion in a virtual environment
B) Overlaying digital information on the real world
C) Text-based interactions
D) Static images
Answer: B

74. Which of the following is an example of a database?


A) Microsoft Word
B) Oracle Database
C) Adobe Photoshop
D) Windows OS
Answer: B

75. What does the term 'cybersecurity' encompass?


A) Protection of computer systems from theft or damage
B) Development of new software
C) Maintenance of hardware
D) Creation of websites
Answer: A

76. What is the primary benefit of using a virtual private network (VPN)?
A) Faster internet speed
B) Enhanced security and privacy
C) Unlimited bandwidth
D) Access to public Wi-Fi
Answer: B

77. Which programming language is primarily used for iOS app development?
A) C++
B) Swift
C) Java
D) Python
Answer: B

78. What is the role of an application programmer?


A) Design networks
B) Write software applications
C) Manage systems
D) Provide technical support
Answer: B

79. Which type of data model is used in a relational database?


A) Hierarchical
B) Network
C) Tabular
D) Object-oriented
Answer: C

80. What does the acronym 'LAN' stand for?


A) Local Area Network
B) Large Area Network
C) Long Area Network
D) Limited Area Network
Answer: A

81. What is the primary purpose of software testing?


A) Ensure software is user-friendly
B) Identify and fix bugs
C) Increase performance
D) Develop new features
Answer: B

82. What is the main advantage of using a content management system (CMS)?
A) Only programmers can use it
B) Simplifies website management
C) Increases coding complexity
D) Requires extensive coding knowledge
Answer: B

83. Which of the following is a common programming error?


A) Debugging
B) Syntax error
C) Code optimization
D) Data validation
Answer: B

84. What does 'AI' stand for?


A) Automated Integration
B) Artificial Intelligence
C) Application Interface
D) Advanced Information
Answer: B

85. What is the purpose of a 'bug tracker'?


A) Store data
B) Track and manage software bugs
C) Enhance software performance
D) Compile code
Answer: B

86. Which of the following is a popular web development framework?


A) Angular
B) Java
C) Fortran
D) COBOL
Answer: A

87. What is the main function of a proxy server?


A) Speed up internet connection
B) Act as an intermediary between client and server
C) Store files
D) Secure networks
Answer: B

88. Which of the following describes 'open-source software'?


A) Software with limited access
B) Software that can be modified and distributed
C) Commercial software
D) Proprietary software
Answer: B

89. What does 'BI' stand for in the context of data analysis?
A) Business Intelligence
B) Binary Information
C) Basic Integration
D) Business Integration
Answer: A

90. Which of the following is not a cloud computing service model?


A) IaaS
B) PaaS
C) SaaS
D) BaaS
Answer: D

91. What is 'malware'?


A) Malicious software designed to harm or exploit any programmable device
B) Software that enhances system performance
C) Software that manages hardware
D) A type of network security
Answer: A

92. What does 'URL' stand for?


A) Uniform Resource Locator
B) Universal Resource Locator
C) Uniform Retrieval Locator
D) Universal Retrieval Locator
Answer: A

93. Which type of data is unstructured?


A) Text documents
B) Databases
C) Excel spreadsheets
D) XML files
Answer: A
94. What is the primary function of a search engine?
A) Store web pages
B) Index and retrieve information from the web
C) Provide web hosting
D) Encrypt data
Answer: B

95. What is the purpose of a digital certificate?


A) To enhance internet speed
B) To verify the identity of a website or user
C) To store passwords
D) To create digital content
Answer: B

96. Which of the following is a programming paradigm that uses objects?


A) Procedural programming
B) Functional programming
C) Object-oriented programming
D) Logic programming
Answer: C

97. What is the function of a web server?


A) Host websites and deliver web pages to clients
B) Manage databases
C) Provide internet connectivity
D) Store applications
Answer: A

98. Which of the following is an example of a mobile operating system?


A) Windows
B) Linux
C) Android
D) macOS
Answer: C

99. What does '2FA' stand for in cybersecurity?


A) Two Factor Authentication
B) Two File Authorization
C) Two Frequency Authentication
D) Two Feature Access
Answer: A

100. What is the main function of an operating system?


A) Develop applications
B) Manage hardware and software resources
C) Design user interfaces
D) Create databases
Answer: B
101. Which of the following describes 'cloud storage'?
A) Storage on a local device
B) Remote storage accessible via the internet
C) Physical storage in a data center
D) Storage in a computer’s hard drive
Answer: B

102. What does 'KPI' stand for in business analytics?


A) Key Performance Indicator
B) Key Process Integration
C) Knowledge Performance Indicator
D) Key Project Initiative
Answer: A

103. Which programming language is primarily used for data analysis and visualization?
A) C#
B) R
C) Java
D) PHP
Answer: B

104. What is 'data mining'?


A) Collecting and analyzing data
B) Storing data in a database
C) Visualizing data
D) Encrypting data
Answer: A

105. Which of the following is a widely used database management system?


A) Notepad
B) MySQL
C) Microsoft Paint
D) Google Chrome
Answer: B

106. What is the purpose of 'encryption'?


A) Increase file size
B) Secure data by converting it into a coded format
C) Speed up data transmission
D) Organize data
Answer: B

107. What does 'RPA' stand for in business automation?


A) Robotic Process Automation
B) Real-time Process Analysis
C) Remote Process Automation
D) Robotic Performance Analysis
Answer: A

108. Which of the following is a primary function of an ERP system?


A) Manage customer relationships
B) Streamline business processes
C) Perform market analysis
D) Conduct financial audits
Answer: B

109. What is a common use of 'chatbots'?


A) Personalizing email marketing
B) Automating customer service interactions
C) Designing websites
D) Managing social media accounts
Answer: B

110. Which of the following is a common cloud service provider?


A) Microsoft Azure
B) Adobe Photoshop
C) MySQL
D) GitHub
Answer: A

111. What is the primary role of an IT consultant?


A) Develop software
B) Provide expert advice on technology solutions
C) Manage networks
D) Create hardware
Answer: B

112. What does 'malware' stand for?


A) Malicious software
B) Management software
C) Maintenance software
D) Multimedia software
Answer: A

113. Which of the following is a common data visualization tool?


A) Microsoft Word
B) Tableau
C) Notepad
D) Visual Studio
Answer: B

114. What is the main purpose of a 'content delivery network' (CDN)?


A) Increase bandwidth
B) Deliver content faster by caching it closer to users
C) Store data
D) Monitor website traffic
Answer: B

115. What is 'digital marketing'?


A) Marketing of physical products
B) Promoting products using digital channels
C) Direct mail marketing
D) Television advertising
Answer: B

116. What is the function of a 'data warehouse'?


A) Store large amounts of data for analysis and reporting
B) Manage real-time data
C) Encrypt sensitive information
D) Create databases
Answer: A

117. Which technology allows for the creation of smart contracts?


A) Cloud computing
B) Blockchain
C) AI
D) IoT
Answer: B

118. What is a common format for data interchange between web services?
A) XML
B) JPEG
C) MP3
D) GIF
Answer: A

119. Which of the following is a characteristic of agile methodology?


A) Rigid project scope
B) Iterative development
C) Long-term planning
D) Fixed timelines
Answer: B

120. What does 'BYOD' stand for in workplace policies?


A) Bring Your Own Device
B) Build Your Own Data
C) Bring Your Own Data
D) Build Your Own Device
Answer: A

121. Which of the following is a benefit of using a virtual private server (VPS)?
A) Shared resources with other users
B) Increased control and customization
C) No cost
D) Limited performance
Answer: B

122. What is the primary use of the 'HTTP' protocol?


A) Secure file transfers
B) Send and receive web pages
C) Connect databases
D) Encrypt emails
Answer: B

123. Which of the following is an example of an input device?


A) Monitor
B) Keyboard
C) Printer
D) Projector
Answer: B

161. Which of the following is a key benefit of cloud computing?


A) Increased upfront costs
B) Scalability and flexibility in resource usage
C) Limited access to data
D) Requires constant hardware upgrades
Answer: B

162. What is the purpose of 'data encryption'?


A) To improve data quality
B) To convert data into a secure format to prevent unauthorized access
C) To increase data storage capacity
D) To enhance data retrieval speed
Answer: B

163. What does 'SaaS' stand for?


A) Software as a Service
B) System as a Software
C) Service as a Software
D) Software and System as a Service
Answer: A

164. Which of the following is a common file format for images on the web?
A) DOCX
B) PDF
C) JPEG
D) TXT
Answer: C

165. What is 'phishing'?


A) A legitimate data retrieval method
B) A method of fraudulently obtaining sensitive information by masquerading as a
trustworthy entity
C) A secure data transfer protocol
D) A software testing technique
Answer: B

166. What does 'IoT' enable in smart homes?


A) Only manual control of devices
B) Remote monitoring and control of home appliances
C) Increased energy consumption
D) Limited connectivity between devices
Answer: B

167. Which programming language is known for its simplicity and readability?
A) C++
B) Java
C) Python
D) Assembly
Answer: C

168. What does 'SQL' stand for?


A) Structured Query Language
B) Simple Query Language
C) Sequential Query Language
D) Standard Query Language
Answer: A

169. What is a 'malware attack'?


A) An attack that enhances system performance
B) An attack that uses malicious software to disrupt, damage, or gain unauthorized access
to computer systems
C) A method of optimizing software
D) A type of data storage
Answer: B

170. What does 'data visualization' involve?


A) Writing complex algorithms
B) Creating graphical representations of data to help interpret and understand it
C) Storing data in databases
D) Encrypting sensitive information
Answer: B

171. What is a 'data breach'?


A) Authorized access to data
B) Unauthorized access and retrieval of sensitive information
C) Backup of data
D) Data optimization process
Answer: B

172. Which of the following is an example of a cybersecurity measure?


A) Data backup
B) Installing antivirus software
C) Using strong passwords
D) All of the above
Answer: D

173. What does 'serverless computing' refer to?


A) Running applications without the need for physical servers
B) Hosting websites on a local server
C) Using dedicated servers for every application
D) Manually configuring servers
Answer: A

174. Which of the following describes 'Agile methodology'?


A) A linear approach to project management
B) An iterative approach focused on collaboration and customer feedback
C) A fixed-scope project methodology
D) A method that emphasizes documentation over interaction
Answer: B

175. What does 'UX' stand for in design?


A) User Experience
B) User Expansion
C) Universal Exchange
D) Unique Expression
Answer: A

176. What is the main goal of search engine optimization (SEO)?


A) Increase website loading time
B) Improve the visibility of a website in search engine results
C) Create web applications
D) Manage social media accounts
Answer: B

177. Which of the following is an example of a relational database?


A) MongoDB
B) Oracle Database
C) Redis
D) Cassandra
Answer: B

178. What does 'latency' refer to in networking?


A) The amount of data transmitted
B) The delay before a transfer of data begins following an instruction
C) The speed of data transfer
D) The total volume of data in a network
Answer: B

179. Which of the following describes the role of a 'business analyst'?


A) Writing code for applications
B) Analyzing business needs and providing solutions
C) Managing IT infrastructure
D) Performing database administration
Answer: B

180. What is 'virtual reality'?


A) A simulated experience that can be similar to or completely different from the real
world
B) A method of data visualization
C) A type of computer programming
D) A cloud computing service
Answer: A

181. What does 'API' stand for?


A) Application Programming Interface
B) Advanced Programming Integration
C) Application Performance Indicator
D) Automated Program Interface
Answer: A

182. What is a 'script'?


A) A type of database
B) A set of instructions written in a programming language
C) A method of data analysis
D) A form of software documentation
Answer: B

183. What is 'software testing'?


A) A method to increase software costs
B) The process of evaluating a software application to ensure it meets requirements and
functions correctly
C) A technique to write software code
D) A way to backup data
Answer: B

184. What does '5G' refer to?


A) The fifth generation of mobile network technology
B) The fifth generation of wireless technology
C) The fifth generation of computer programming
D) The fifth generation of database technology
Answer: A

185. What is 'data analytics'?


A) The science of analyzing raw data to make conclusions about that information
B) A method for data storage
C) A way to enhance data security
D) A technique for data entry
Answer: A

186. Which of the following is an example of a software development methodology?


A) Agile
B) SQL
C) HTML
D) CSS
Answer: A

187. What does 'wireless communication' enable?


A) Communication through physical cables
B) Transfer of data without physical connections
C) Limited data transfer
D) Only short-distance communication
Answer: B

188. What is a 'network protocol'?


A) A set of rules that govern data communication over a network
B) A type of computer hardware
C) A method for data storage
D) A software application
Answer: A

189. Which of the following is a characteristic of 'open-source software'?


A) Limited access to the source code
B) Free to use, modify, and distribute
C) Requires a paid license
D) Only available on specific platforms
Answer: B

190. What is 'machine vision'?


A) The ability of machines to interpret visual data from the world
B) A type of programming language
C) A method for designing user interfaces
D) A form of digital marketing
Answer: A

191. What does 'DNS' stand for?


A) Domain Name System
B) Data Network System
C) Digital Network Service
D) Domain Navigation Service
Answer: A

192. Which of the following is a common use of 'blockchain' technology?


A) Centralized data storage
B) Secure and transparent transaction recording
C) Simple data management
D) Only for cryptocurrency
Answer: B

193. What is 'data normalization'?


A) The process of organizing data to reduce redundancy
B) A method of data analysis
C) A technique for data encryption
D) The process of creating backups
Answer: A

194. What does 'DDoS' stand for?


A) Distributed Denial of Service
B) Direct Denial of Service
C) Distributed Data of Service
D) Direct Data of Service
Answer: A

195. Which of the following is a benefit of using agile project management?


A) Reduced flexibility
B) Faster delivery of products
C) Increased documentation requirements
D) Longer project timelines
Answer: B

196. What is 'cybersecurity'?


A) Protecting computer systems from theft or damage
B) A method of enhancing software performance
C) A way to create software
D) A type of hardware
Answer: A

197. Which of the following is a common type of cloud service model?


A) IaaS (Infrastructure as a Service)
B) PaaS (Platform as a Service)
C) SaaS (Software as a Service)
D) All of the above
Answer: D

198. What does 'latency' measure in a network?


A) The total data capacity
B) The delay in data transmission
C) The maximum speed of data transfer
D) The quality of the data being transmitted
Answer: B

199. Which programming paradigm focuses on the use of functions?


A) Object-Oriented Programming
B) Procedural Programming
C) Functional Programming
D) Event-Driven Programming
Answer: C

200. What is the purpose of a 'version control system'?


A) To keep track of changes in software code
B) To manage hardware configurations
C) To increase network security
D) To optimize database queries
Answer: A

You might also like