Вы находитесь на странице: 1из 12

january 2016

DIPLOMA IN

INFORMAT ION
TECHNOLOGY
Practice Questions

www.iqnglobal.com

Practice Questions

Information Technology

7. The payment system which is set up by the account holder and the bank itself is called
A)
B)
C)
D)

Direct Debit
Standing Order
Invoice Discounting
Charity Trust

8. The environment in an operating system that works as a base on which applications are run is
called
A)
B)
C)
D)

Software Base
Software House
Software Platform
Software Station

9. The system used by sales department to improve customer relationship is known as


A)
B)
C)
D)

Customer Relationship Management


Customer Service Management
Customer Management System
Customer Based System

10. Which of the following choices is NOT necessarily a benefit of an integrated system?
A)
B)
C)
D)

Easier backup
Easier specialization
Improved security
Increased Reliability

11. The documentation that a developer writes so that other developers can read it is called
A)
B)
C)
D)

Internal Documentation
Technical Documentation
User Documentation
Development Documentation

12. Following terms include the three building blocks of JSP EXCEPT
A)
B)
C)
D)

Sequence
Iteration
Fixation
Selection

Practice Questions

Information Technology

13. Quality of a programming code depends on which of the following factors?


A)
B)
C)
D)

Portability
Reliability
Maintainability
All of the above

14. The boundary of a programming problem is termed as the _______ of it.


A)
B)
C)
D)

scope
belt
tip
apex

15. Which of the followings is not a valid software devising tool used in an IDE
A)
B)
C)
D)

A
A
A
A

compiler
text editor
compass
linker

16. The management of recovering lost information due to natural or unnatural disaster is known to
be
A)
B)
C)
D)

disaster management
risk management
recovery management
lost and found management

17. Which of the following security methods can be used in order to ensure that a person is not
involved in a work process from the beginning to end?
A)
B)
C)
D)

Closed-Circuit Television
Separation of Duty
Biometrics
Firewalls

18. Software which is distributed freely for limited period after which a price is charged is called
A)
B)
C)
D)

Shareholder
Softshare
Shareware
Sharetech

Practice Questions

Information Technology

19. Common threats to the IT sector include each of the following theft EXCEPT
A)
B)
C)
D)

Customer Phishing
Webpage defacement
Debugging
None of the above

20. A ______________ software is the one where the user can modify the programming source
code.
A)
B)
C)
D)

freeware
shareware
softpad
open-source

21. The software that facilitates a developer to view the end result of internet pages or interfaces.
A)
B)
C)
D)

WDERING
WSCTIOU
WSDRTYI
WYSIWYG

22. The elaborated form of FTP is


A)
B)
C)
D)

Flextime Protocol
File Terminating Protocol
Floor Transforming Protocol
File Transfer Protocol

23. The benefits of e-commerce for organizations are each of the following terms EXCEPT
A)
B)
C)
D)

international scope of operation


ceaseless (24/7) operation
low running cost
All of the above

24. A ________ is a program placed in the search engine which reads the web contents to
facilitate
search result.
A) Octopus
B) Owl
C) Spider

Practice Questions

Information Technology

D) Viper

25. A synonymous name to junk email is


A)
B)
C)
D)

Scum
Spam
Spook
Spit

26. Bandwidth is a unit of


A)
B)
C)
D)

software system
transmittable data
quality of security
all of the above

27. Optical Fibres transmits data through ________.


A)
B)
C)
D)

Light
Sound
Electricity
Heat

28. Optical Fibres can be produced into ________ & _______.


A)
B)
C)
D)

Single mode and multimode


Helix mode and dendrite mode
Open mode and closed mode
Binary mode and common mode

29. ____________ is a protocol used to exchange emails through a server.


A)
B)
C)
D)

SMC
SMTP
FTP
HTTP

30. Skype is an example of ________ technology


A)
B)
C)
D)

Instant Messaging
Blog
Voice over Internet Protocol
SMTP

Information Technology

Practice Questions

31. XSS (Cross-Site scripting) is a __________ technique.


A)
B)
C)
D)

networking
hacking
web designing
browsing

32. _________ is a small program carried in an executed file and intends to destroy other files.
A)
B)
C)
D)

Spider
Firewall
Virus
Trojan

33. Which of the following addresses is a possible IP address of the popular search engine Google?
A)
B)
C)
D)

www. google.com
64.233.183.103
233.google.103
All of the above

34. The protocol https:// refers to __________ web servers.


A)
B)
C)
D)

Sedimentary
Social
Secure
Software

35. HTTP is an abbreviated form of _______ ________ ________ ________.


A)
B)
C)
D)

Hypertext
Hypertext
Hypertext
Hypertext

Terminal Protocol
Transfer Protocol
Tertiary Protocol
Tangent Protocol

36. The reason behind the fact that trafficking of counterfeit goods through P2P networks is
difficult is
A) it is cheap
B) it is global

Practice Questions

Information Technology

C) it is decentralized
D) it is counterfeited itself

37. The elaborated form of HTML is


A)
B)
C)
D)

Hyper Text Markup Language


Hypertension Markup Language
Hybrid Text Markup Language
Hyper Text Modified Language

38. The special computer that stores website content is called


A)
B)
C)
D)

Web page
Web developer
Web server
Homepage

39. A user needs a ____________ to access the internet contents.


A)
B)
C)
D)

Website
Web browser
Mozilla
Web server

40. According to surveys, the most used browser in the world is


A)
B)
C)
D)

Mozilla Firefox
Microsoft Internet Explorer
Google Chrome
Apple Safari

41. If an internet user needs a specific content he needs to search in a __________.


A)
B)
C)
D)

Search Engine
Google
Search Bar
Search Machine

42. The commonly used technology by the Local Area Networks is


A) Ethernet
B) Ethermetrics

Practice Questions

Information Technology

C) Etheronics
D) Ethertool

43. ____________ is a non permanent connection used for light and periodic data set.
A)
B)
C)
D)

SVC
VCR
SPL
QPR

44. Topologies can be either physical or _________.


A)
B)
C)
D)

Longitudinal
Psychological
Logical
Abstract

45. The seven layers in an OSI model include each of the below EXCEPT
A)
B)
C)
D)

Application Layer
Transport Layer
Physical Layer
Connectivity Layer

46. The parts of an IP address that belong to host or network are determined by the ___________.
A)
B)
C)
D)

Sub zero
Subatomic level
Subnet Mask
Sub gradients

47. A Wi-Fi is commonly but mistakenly understood as


A)
B)
C)
D)

Wireless Frequency
Wireless Fidelity
Wireless Fire system
Wireless Fiat

48. ____________ is a term to represent programs composed in visual languages


A) Blackboard

Practice Questions

Information Technology

B) Storyboard
C) Mainboard
D) Whiteboard

49. The __________ conversion strategy allows the system to be checked one segment after
another.
A)
B)
C)
D)

Phased
Parallel
Corrective
Perfective

50. When a system is checked for fine modification even after having performed as expected a
____________ strategy is taken.
A)
B)
C)
D)

Parallel
Corrective
Perspective
Perfective

51. One of the reasons behind the decay of a system can be


A)
B)
C)
D)

Increase of number of users


Requirement of more capacity
Availability of new technology
All of the above

52. The investigative techniques used to obtain information regarding the systems include each of
the following techniques EXCEPT
A)
B)
C)
D)

Observation
Meeting
Interview
Retrospect

53. Some organizations ask employees to sign ___________, which mean that the employee is not
allowed to discuss sensitive and confidential information with individuals or groups who are
outside the organization, either while employed by the organization or after they leave.
A)
B)
C)
D)

nondisclosure agreements
nonconforming agreements
nondeliverable agreements
nonconductive agreements

Information Technology

Practice Questions

54. _______ skills are that you take with you from employer to employer and which can be applied
regardless of your job.
A) Transmitting
B) Transparent
C) Transferable
D) Critical
55. ______ is a particular structure used in integrated circuit transistor manufacture.
A) CMOS
B) GAMA
C) TEBS
D) ETHOS

56. The general equation for obtaining the value of bus multiplier is
A) maximum processor speed = processor bus speed
B) maximum processor speed = processor bus speed
C) maximum processor speed = processor bus speed
D) maximum processor speed = processor bus speed

+
x
/

maximum multiplier
maximum multiplier
maximum multiplier
maximum multiplier

57. Which decisions are decisions about what will happen within the organisation in the next five
years or so?
A) Operational
B) Tactical
C) Strategic
D) Regulative

58. Data being _____ is the most fundamental characteristic of good data/information.
A) valid
B) plenty
C) formal
D) countable
59. ________ is used to help managers predict the future, using what if? scenarios, so that they
can, as far as possible, see the consequences of decisions that they make.
A) Decision support software
B) Management Information System
C) Middleware
D) E-commerce

Practice Questions

Information Technology

60. A ______ is a specialist software application that requests web pages (and their assets e.g.
images) from a remote web server, downloads them and then renders them onto your computer
systems (or mobile devices) screen.
A) Modem
B) RAM
C) Motherboard
D) Browser

Information Technology

Practice Questions

Answer
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

B
C
C
B
D
A
B
C
A
B
B
C
D
A
C
C
B
C
C
D

21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40

D
D
D
C
B
B
A
A
B
C
B
C
B
C
B
C
A
C
B
B

41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60

A
B
A
C
D
C
B
B
A
D
D
D
A
C
A
C
B
A
A
D

Вам также может понравиться