it_pqiuestions

download it_pqiuestions

of 12

Transcript of it_pqiuestions

  • 8/17/2019 it_pqiuestions

    1/12

    DIPLOMA IN

    INFORMATION

    TECHNOLOGY

    www.iqnglobal.com

    Practice Questions

    january 2016

  • 8/17/2019 it_pqiuestions

    2/12

     

    Practice Questions Information Technology

    7.  The payment system which is set up by the account holder and the bank itself is called

    A)  Direct Debit

    B)  Standing Order

    C) 

    Invoice Discounting

    D)  Charity Trust

    8.  The environment in an operating system that works as a base on which applications are run is

    called

    A)  Software Base

    B)  Software House

    C) 

    Software Platform

    D)  Software Station

    9.  The system used by sales department to improve customer relationship is known as

    A)  Customer Relationship Management

    B)  Customer Service Management

    C) 

    Customer Management System

    D)  Customer Based System

    10. Which of the following choices is NOT necessarily a benefit of an integrated system?

    A)  Easier backup

    B)  Easier specialization

    C) 

    Improved security

    D)  Increased Reliability

    11. The documentation that a developer writes so that other developers can read it is called

    A)  Internal Documentation

    B)  Technical Documentation

    C) 

    User DocumentationD)  Development Documentation

    12. Following terms include the three building blocks of JSP EXCEPT

    A)  Sequence

    B)  Iteration

    C)  Fixation

    D)  Selection

  • 8/17/2019 it_pqiuestions

    3/12

     

    Practice Questions Information Technology

    13. Quality of a programming code depends on which of the following factors?

    A)  Portability

    B) 

    Reliability

    C)  Maintainability

    D)  All of the above

    14. The boundary of a programming problem is termed as the _______ of it.

    A)  scope

    B)  belt

    C) 

    tip

    D)  apex

    15. Which of the followings is not a valid software devising tool used in an IDE

    A)  A compiler

    B)  A text editor

    C) 

    A compass

    D)  A linker

    16. The management of recovering lost information due to natural or unnatural disaster is known to

    be

    A)  disaster management

    B) 

    risk management

    C)  recovery management

    D)  lost and found management

    17. Which of the following security methods can be used in order to ensure that a person is not

    involved in a work process from the beginning to end?

    A) 

    Closed-Circuit TelevisionB)  Separation of Duty

    C)  Biometrics

    D)  Firewalls

    18. Software which is distributed freely for limited period after which a price is charged is called

    A)  Shareholder

    B)  Softshare

    C)  Shareware

    D) 

    Sharetech

  • 8/17/2019 it_pqiuestions

    4/12

     

    Practice Questions Information Technology

    19. Common threats to the IT sector include each of the following theft EXCEPT

    A) 

    Customer Phishing

    B)  Webpage defacement

    C)  Debugging

    D)  None of the above

    20. A ______________ software is the one where the user can modify the programming source

    code.

    A) 

    freeware

    B)  shareware

    C) 

    softpad

    D)  open-source

    21. The software that facilitates a developer to view the end result of internet pages or interfaces.

    A) 

    WDERING

    B)  WSCTIOU

    C)  WSDRTYI

    D) 

    WYSIWYG

    22. The elaborated form of FTP is

    A) 

    Flextime Protocol

    B)  File Terminating Protocol

    C)  Floor Transforming Protocol

    D) 

    File Transfer Protocol

    23. The benefits of e-commerce for organizations are each of the following terms EXCEPT

    A) 

    international scope of operationB)  ceaseless (24/7) operation

    C)  low running cost

    D)  All of the above

    24.  A ________ is a program placed in the search engine which reads the web contents to

    facilitate

    search result.

    A)  Octopus

    B) 

    OwlC)  Spider

  • 8/17/2019 it_pqiuestions

    5/12

  • 8/17/2019 it_pqiuestions

    6/12

     

    Practice Questions Information Technology

    31. XSS (Cross-Site scripting) is a __________ technique.

    A)  networking

    B)  hacking

    C)  web designing

    D)  browsing

    32.  _________ is a small program carried in an executed file and intends to destroy other files.

    A) 

    Spider

    B)  Firewall

    C)  Virus

    D) 

    Trojan

    33. Which of the following addresses is a possible IP address of the popular search engine Google?

    A)  www. google.com

    B) 

    64.233.183.103

    C)  233.google.103

    D) 

    All of the above

    34. The protocol https:// refers to __________ web servers.

    A)  Sedimentary

    B) 

    Social

    C)  Secure

    D) 

    Software

    35. 

    HTTP is an abbreviated form of _______ ________ ________ ________.

    A)  Hypertext Terminal Protocol

    B)  Hypertext Transfer Protocol

    C)  Hypertext Tertiary Protocol

    D)  Hypertext Tangent Protocol

    36. The reason behind the fact that trafficking of counterfeit goods through P2P networks is

    difficult is

    A) 

    it is cheapB)  it is global

  • 8/17/2019 it_pqiuestions

    7/12

     

    Practice Questions Information Technology

    C)  it is decentralized

    D)  it is counterfeited itself

    37. The elaborated form of HTML is

    A)  Hyper Text Markup Language

    B)  Hypertension Markup Language

    C)  Hybrid Text Markup Language

    D)  Hyper Text Modified Language

    38. The special computer that stores website content is called

    A)  Web page

    B)  Web developer

    C) 

    Web server

    D)  Homepage

    39. A user needs a ____________ to access the internet contents.

    A) 

    Website

    B)  Web browser

    C) 

    MozillaD)  Web server

    40. According to surveys, the most used browser in the world is

    A) 

    Mozilla Firefox

    B)  Microsoft Internet Explorer

    C) 

    Google Chrome

    D)  Apple Safari

    41. If an internet user needs a specific content he needs to search in a __________.

    A)  Search Engine

    B)  Google

    C)  Search Bar

    D)  Search Machine

    42. The commonly used technology by the Local Area Networks is

    A) 

    EthernetB)  Ethermetrics

  • 8/17/2019 it_pqiuestions

    8/12

     

    Practice Questions Information Technology

    C)  Etheronics

    D)  Ethertool

    43.  ____________ is a non permanent connection used for light and periodic data set.

    A)  SVC

    B)  VCR

    C)  SPL

    D)  QPR

    44. 

    Topologies can be either physical or _________.

    A)  Longitudinal

    B) 

    Psychological

    C)  Logical

    D)  Abstract

    45. The seven layers in an OSI model include each of the below EXCEPT

    A)  Application Layer

    B) 

    Transport LayerC)  Physical Layer

    D)  Connectivity Layer

    46. The parts of an IP address that belong to host or network are determined by the ___________.

    A)  Sub zero

    B) 

    Subatomic level

    C)  Subnet Mask

    D)  Sub gradients

    47. A Wi-Fi is commonly but mistakenly understood as

    A)  Wireless Frequency

    B)  Wireless Fidelity

    C)  Wireless Fire system

    D)  Wireless Fiat

    48.  ____________ is a term to represent programs composed in visual languages

    A)  Blackboard

  • 8/17/2019 it_pqiuestions

    9/12

     

    Practice Questions Information Technology

    B)  Storyboard

    C)  Mainboard

    D)  Whiteboard

    49. The __________ conversion strategy allows the system to be checked one segment after

    another.

    A)  Phased

    B)  Parallel

    C)  Corrective

    D) 

    Perfective

    50. When a system is checked for fine modification even after having performed as expected a

     ____________ strategy is taken.

    A)  Parallel

    B)  Corrective

    C) 

    Perspective

    D)  Perfective

    51. One of the reasons behind the decay of a system can be

    A)  Increase of number of users

    B)  Requirement of more capacity

    C) 

    Availability of new technology

    D)  All of the above

    52. The investigative techniques used to obtain information regarding the systems include each of

    the following techniques EXCEPT

    A)  Observation

    B) 

    MeetingC)  Interview

    D)  Retrospect

    53. Some organizations ask employees to sign ___________, which mean that the employee is not

    allowed to discuss sensitive and confidential information with individuals or groups who are

    outside the organization, either while employed by the organization or after they leave.

    A)  nondisclosure agreements

    B)  nonconforming agreements

    C) 

    nondeliverable agreementsD)  nonconductive agreements

  • 8/17/2019 it_pqiuestions

    10/12

     

    Practice Questions Information Technology

    54.  _______ skills are that you take with you from employer to employer and which can be applied

    regardless of your job.

    A) 

    Transmitting

    B)  Transparent

    C)  Transferable

    D)  Critical

    55.  ______ is a particular structure used in integrated circuit transistor manufacture.

    A) CMOS

    B) GAMA

    C) TEBS

    D) ETHOS

    56. The general equation for obtaining the value of bus multiplier is

    A) maximum processor speed = processor bus speed + maximum multiplier

    B) maximum processor speed = processor bus speed - maximum multiplier

    C) maximum processor speed = processor bus speed x maximum multiplier

    D) maximum processor speed = processor bus speed / maximum multiplier

    57. Which decisions are decisions about what will happen within the organisation in the next five

    years or so?

    A) Operational

    B) Tactical

    C) Strategic

    D) Regulative

    58. Data being _____ is the most fundamental characteristic of good data/information.

    A) valid

    B) plenty

    C) formalD) countable

    59.  ________ is used to help managers predict the future, using ‘what if?’ scenarios, so that they

    can, as far as possible, see the consequences of decisions that they make.

    A) Decision support software

    B) Management Information System

    C) Middleware

    D) E-commerce

  • 8/17/2019 it_pqiuestions

    11/12

     

    Practice Questions Information Technology

    60. A ______ is a specialist software application that requests web pages (and their assets e.g.

    images) from a remote web server, downloads them and then renders them onto your computer

    system’s (or mobile device’s) screen. 

    A) Modem

    B) RAM

    C) Motherboard

    D) Browser

  • 8/17/2019 it_pqiuestions

    12/12

     

    Practice Questions Information Technology

    Answer 

    1 B 21 D 41 A2 C 22 D 42 B

    3 C 23 D 43 A

    4 B 24 C 44 C5 D 25 B 45 D6 A 26 B 46 C7 B 27 A 47 B8 C 28 A 48 B9 A 29 B 49 A10 B 30 C 50 D11 B 31 B 51 D12 C 32 C 52 D13 D 33 B 53 A14 A 34 C 54 C15 C 35 B 55 A16 C 36 C 56 C17 B 37 A 57 B18 C 38 C 58 A19 C 39 B 59 A20 D 40 B 60 D