it_pqiuestions
Transcript of it_pqiuestions
-
8/17/2019 it_pqiuestions
1/12
DIPLOMA IN
INFORMATION
TECHNOLOGY
www.iqnglobal.com
Practice Questions
january 2016
-
8/17/2019 it_pqiuestions
2/12
Practice Questions Information Technology
7. The payment system which is set up by the account holder and the bank itself is called
A) Direct Debit
B) Standing Order
C)
Invoice Discounting
D) Charity Trust
8. The environment in an operating system that works as a base on which applications are run is
called
A) Software Base
B) Software House
C)
Software Platform
D) Software Station
9. The system used by sales department to improve customer relationship is known as
A) Customer Relationship Management
B) Customer Service Management
C)
Customer Management System
D) Customer Based System
10. Which of the following choices is NOT necessarily a benefit of an integrated system?
A) Easier backup
B) Easier specialization
C)
Improved security
D) Increased Reliability
11. The documentation that a developer writes so that other developers can read it is called
A) Internal Documentation
B) Technical Documentation
C)
User DocumentationD) Development Documentation
12. Following terms include the three building blocks of JSP EXCEPT
A) Sequence
B) Iteration
C) Fixation
D) Selection
-
8/17/2019 it_pqiuestions
3/12
Practice Questions Information Technology
13. Quality of a programming code depends on which of the following factors?
A) Portability
B)
Reliability
C) Maintainability
D) All of the above
14. The boundary of a programming problem is termed as the _______ of it.
A) scope
B) belt
C)
tip
D) apex
15. Which of the followings is not a valid software devising tool used in an IDE
A) A compiler
B) A text editor
C)
A compass
D) A linker
16. The management of recovering lost information due to natural or unnatural disaster is known to
be
A) disaster management
B)
risk management
C) recovery management
D) lost and found management
17. Which of the following security methods can be used in order to ensure that a person is not
involved in a work process from the beginning to end?
A)
Closed-Circuit TelevisionB) Separation of Duty
C) Biometrics
D) Firewalls
18. Software which is distributed freely for limited period after which a price is charged is called
A) Shareholder
B) Softshare
C) Shareware
D)
Sharetech
-
8/17/2019 it_pqiuestions
4/12
Practice Questions Information Technology
19. Common threats to the IT sector include each of the following theft EXCEPT
A)
Customer Phishing
B) Webpage defacement
C) Debugging
D) None of the above
20. A ______________ software is the one where the user can modify the programming source
code.
A)
freeware
B) shareware
C)
softpad
D) open-source
21. The software that facilitates a developer to view the end result of internet pages or interfaces.
A)
WDERING
B) WSCTIOU
C) WSDRTYI
D)
WYSIWYG
22. The elaborated form of FTP is
A)
Flextime Protocol
B) File Terminating Protocol
C) Floor Transforming Protocol
D)
File Transfer Protocol
23. The benefits of e-commerce for organizations are each of the following terms EXCEPT
A)
international scope of operationB) ceaseless (24/7) operation
C) low running cost
D) All of the above
24. A ________ is a program placed in the search engine which reads the web contents to
facilitate
search result.
A) Octopus
B)
OwlC) Spider
-
8/17/2019 it_pqiuestions
5/12
-
8/17/2019 it_pqiuestions
6/12
Practice Questions Information Technology
31. XSS (Cross-Site scripting) is a __________ technique.
A) networking
B) hacking
C) web designing
D) browsing
32. _________ is a small program carried in an executed file and intends to destroy other files.
A)
Spider
B) Firewall
C) Virus
D)
Trojan
33. Which of the following addresses is a possible IP address of the popular search engine Google?
A) www. google.com
B)
64.233.183.103
C) 233.google.103
D)
All of the above
34. The protocol https:// refers to __________ web servers.
A) Sedimentary
B)
Social
C) Secure
D)
Software
35.
HTTP is an abbreviated form of _______ ________ ________ ________.
A) Hypertext Terminal Protocol
B) Hypertext Transfer Protocol
C) Hypertext Tertiary Protocol
D) Hypertext Tangent Protocol
36. The reason behind the fact that trafficking of counterfeit goods through P2P networks is
difficult is
A)
it is cheapB) it is global
-
8/17/2019 it_pqiuestions
7/12
Practice Questions Information Technology
C) it is decentralized
D) it is counterfeited itself
37. The elaborated form of HTML is
A) Hyper Text Markup Language
B) Hypertension Markup Language
C) Hybrid Text Markup Language
D) Hyper Text Modified Language
38. The special computer that stores website content is called
A) Web page
B) Web developer
C)
Web server
D) Homepage
39. A user needs a ____________ to access the internet contents.
A)
Website
B) Web browser
C)
MozillaD) Web server
40. According to surveys, the most used browser in the world is
A)
Mozilla Firefox
B) Microsoft Internet Explorer
C)
Google Chrome
D) Apple Safari
41. If an internet user needs a specific content he needs to search in a __________.
A) Search Engine
B) Google
C) Search Bar
D) Search Machine
42. The commonly used technology by the Local Area Networks is
A)
EthernetB) Ethermetrics
-
8/17/2019 it_pqiuestions
8/12
Practice Questions Information Technology
C) Etheronics
D) Ethertool
43. ____________ is a non permanent connection used for light and periodic data set.
A) SVC
B) VCR
C) SPL
D) QPR
44.
Topologies can be either physical or _________.
A) Longitudinal
B)
Psychological
C) Logical
D) Abstract
45. The seven layers in an OSI model include each of the below EXCEPT
A) Application Layer
B)
Transport LayerC) Physical Layer
D) Connectivity Layer
46. The parts of an IP address that belong to host or network are determined by the ___________.
A) Sub zero
B)
Subatomic level
C) Subnet Mask
D) Sub gradients
47. A Wi-Fi is commonly but mistakenly understood as
A) Wireless Frequency
B) Wireless Fidelity
C) Wireless Fire system
D) Wireless Fiat
48. ____________ is a term to represent programs composed in visual languages
A) Blackboard
-
8/17/2019 it_pqiuestions
9/12
Practice Questions Information Technology
B) Storyboard
C) Mainboard
D) Whiteboard
49. The __________ conversion strategy allows the system to be checked one segment after
another.
A) Phased
B) Parallel
C) Corrective
D)
Perfective
50. When a system is checked for fine modification even after having performed as expected a
____________ strategy is taken.
A) Parallel
B) Corrective
C)
Perspective
D) Perfective
51. One of the reasons behind the decay of a system can be
A) Increase of number of users
B) Requirement of more capacity
C)
Availability of new technology
D) All of the above
52. The investigative techniques used to obtain information regarding the systems include each of
the following techniques EXCEPT
A) Observation
B)
MeetingC) Interview
D) Retrospect
53. Some organizations ask employees to sign ___________, which mean that the employee is not
allowed to discuss sensitive and confidential information with individuals or groups who are
outside the organization, either while employed by the organization or after they leave.
A) nondisclosure agreements
B) nonconforming agreements
C)
nondeliverable agreementsD) nonconductive agreements
-
8/17/2019 it_pqiuestions
10/12
Practice Questions Information Technology
54. _______ skills are that you take with you from employer to employer and which can be applied
regardless of your job.
A)
Transmitting
B) Transparent
C) Transferable
D) Critical
55. ______ is a particular structure used in integrated circuit transistor manufacture.
A) CMOS
B) GAMA
C) TEBS
D) ETHOS
56. The general equation for obtaining the value of bus multiplier is
A) maximum processor speed = processor bus speed + maximum multiplier
B) maximum processor speed = processor bus speed - maximum multiplier
C) maximum processor speed = processor bus speed x maximum multiplier
D) maximum processor speed = processor bus speed / maximum multiplier
57. Which decisions are decisions about what will happen within the organisation in the next five
years or so?
A) Operational
B) Tactical
C) Strategic
D) Regulative
58. Data being _____ is the most fundamental characteristic of good data/information.
A) valid
B) plenty
C) formalD) countable
59. ________ is used to help managers predict the future, using ‘what if?’ scenarios, so that they
can, as far as possible, see the consequences of decisions that they make.
A) Decision support software
B) Management Information System
C) Middleware
D) E-commerce
-
8/17/2019 it_pqiuestions
11/12
Practice Questions Information Technology
60. A ______ is a specialist software application that requests web pages (and their assets e.g.
images) from a remote web server, downloads them and then renders them onto your computer
system’s (or mobile device’s) screen.
A) Modem
B) RAM
C) Motherboard
D) Browser
-
8/17/2019 it_pqiuestions
12/12
Practice Questions Information Technology
Answer
1 B 21 D 41 A2 C 22 D 42 B
3 C 23 D 43 A
4 B 24 C 44 C5 D 25 B 45 D6 A 26 B 46 C7 B 27 A 47 B8 C 28 A 48 B9 A 29 B 49 A10 B 30 C 50 D11 B 31 B 51 D12 C 32 C 52 D13 D 33 B 53 A14 A 34 C 54 C15 C 35 B 55 A16 C 36 C 56 C17 B 37 A 57 B18 C 38 C 58 A19 C 39 B 59 A20 D 40 B 60 D