300+ MCQs on Information Communication Technology System Maintenance

Information Communication Technology System Maintenance Multiple Choice Questions

1. The maximum number of active devices in a Piconet is:

A. 4
B. 6
C. 7
D. 8

Answer: D

2. Which of the following is a private network?

A. LAN
B. WAN
C. MAN
D. None of the above

Answer: A

3. The IEEE standard for Wireless LAN is:

A. IEEE 802.3
B. IEEE 802.4
C. IEEE 802.11
D. IEEE 802.7

Answer: C

4. A protocol that allows non-ASCII messages to be sent through e-mails:

A. MIME
B. IMAP
C. POP3
D. SMTP

Answer: A

5. A sniffer is

A. A protocol
B. A virus
C. A program that monitors and analyzes network traffic
D. None of the above

Answer: C

6. Providing, managing and maintaining hardware, software, content integrity, security and reliable high speed connection for a website is called:

A. Web hosting
B. Web Browsing
C. Web Crawling
D. Navigation

Answer: A

7. The system that helps users to identify host computers in a network by their names instead of their IP addresses is:

A. TCP
B. DNS
C. PPP
D. ARP

Answer: B

8. A computer virus that copies itself to the beginning of the hard disk, where it is automatically executed when the system is turned ON is called

A. Worm
B. Trojan Horse
C. Boot sector virus
D. None of the above

Answer: C

9. What is a trap door in a program?

A. A security hole inserted while writing the program, which is intended for later use
B. An error in the program
C. Security hole in a network
D. None of the above

Answer: A

10. Honeypot is an example for

A. Security auditing software
B. Intrusion detection software
C. Encryption software
D. Virus

Answer: B

11. The input and output ports of a router perform the layer functions:

A. Physical and Data link
B. Network
C. Both (A) and (B)
D. None of the above

Answer: A

12. Transport Layer is responsible for delivery of data:

A. Node to node
B. Process to process
C. Hop to hop
D. All of the above

Answer: B

13. A firewall is used in a network to:

A. Prevent fire in a network
B. To scan for viruses in files
C. Prevent unauthorized access to the network
D. None of the above

Answer: C

14. Which feature of cloud computing allows the service to change in size or volume in order to meet user’s needs?

A. Scalability
B. Security
C. Virtualization
D. Cost savings

Answer: A

15. A dynamic web page is

A. Displayed the same every time
B. Generated on demand by a program on a request from browser
C. Both (A) and (B)
D. None of the above

Answer: B

16. Which of the following is NOT TRUE about PHP?

A. PHP can be used to develop web applications
B. PHP makes a website dynamic
C. PHP applications cannot be compiled
D. PHP cannot be embedded into HTML

Answer: D

17. PHP scripts are enclosed with

A. <php>…</php>
B. <?php…?>
C. ?php…?php
D. <p>…</p>

Answer: B

18. Which of the following is the correct statement to create an array in PHP?

state[0] = “Kerala”;
$state[ ] = array(“Kerala”);
$state[0] = “Kerala”;
$state = array(“Kerala”);

A. (iii) and (iv)
B. (ii) and (iii)
C. Only (iv)
D. (ii), (iii) and (iv)

Answer: A

19. Which one of the following PHP functions allow user-defined functions to accept variable length argument lists?

A. func_get_argv()
B. func_get_args()
C. get_argv()
D. get_args()

Answer: B

20. is the concatenation operator in PHP

A. .(dot)
B. +
C. =
D. ^

Answer: A

21. DoS is the acronym for

A. Denial of Security
B. Delivery of Service
C. Denial of Service
D. Delivery of Security

Answer: C

22. Which among the following is NOT a web browser?

A. Microsoft Edge
B. Google Chrome
C. Mozilla Firefox
D. None of the above

Answer: D

23. URL stands for

A. Universal Resource Locator
B. Uniform Resource Locator
C. Unified Resource Locator
D. Universal Route Locator

Answer: A

24. What should be the first tag in any HTML document?

A. <head>
B. <title>
C. <document>
D. <html>

Answer: D

25. Domain names used by commercial establishments usually have the suffix

A. .com
B. .org
C. .ac.in
D. .gov.in

Answer: A

26. Where do PC store CMOS settings?

A. RAM
B. Flash ROM
C. South bridge
D. NVRAM

Answer: B

27. Marquee is a tag in HTML used to:

A. Mark the list of items to maintain in queue
B. Mark the text so that it is hidden in browser
C. Display text with scrolling effect
D. None of the Above

Answer: C

28. CSS is an acronym for

A. Cascading Style Sheet
B. Cascading Style System
C. Cascading server Sheet
D. None of the above

Answer: A

29. Which of the following statements is TRUE about JavaScript?

A. JavaScript is designed to add style to HTML pages
B. JavaScript is designed to add interactivity to HTML pages
C. JavaScript is used to perform server side scripting operations
D. None of the Above

Answer: B

30. is a built-in JavaScript function which can be used to execute another function after a given time interval.

A. Timeout( )
B. TimeInterval( )
C. setTimeout( )
D. All of the above

Answer: C

31. The statement is used in SQL for authorization

A. implement
B. revoke
C. grant
D. none of these

Answer: C

32. is executed when a table is modified

A. procedure
B. function
C. trigger
D. none of these

Answer: C

33. Which of the following command is used to delete a particular column in a relation?

A. DELETE
B. ALTER
C. UPDATE
D. DROP

Answer: B

34. A transaction completes its execution is said to be

A. Saved
B. Rolled
C. Committed
D. Loaded

Answer: C

35. The language used in application program to request for data from DBMS is

A. DDL
B. DML
C. DCL
D. all of these

Answer: B

36. Which of the following is NOT related to OOP?

A. Encapsulation
B. Data Abstraction
C. Data Hiding
D. Data Dictionary

Answer: D

37. In a class defined using an Object Oriented Programming language:

A. All data and functions should be public to maximise flexibility and ease of use
B. Nearly all data should be private and most functions should be public
C. Nearly all data should be public and most functions should be private
D. All data must be private, but functions are neither private nor public

Answer: B

38. Which among the following is an Object-Oriented Programming language?

A. Java
B. Simula 67
C. Smalltalk
D. All the above

Answer: D

39. are the basic run times entities in an object-oriented system.

A. Objects
B. Classes
C. Functions
D. All the above

Answer: A

40. Operator Overloading

A. Defines a new meaning to an existing operator
B. Enables operators to work with objects
C. Implements polymorphism
D. All of the above

Answer: D

41. Private members of a class are accessible to:

A. Member functions of that class
B. Friend functions of that class
C. All functions in the program
D. Both (A) and (B)

Answer: D

42. A class which is not used to create objects, but is designed to act as a base class to be inherited by other classes is called:

A. Abstract class
B. Virtual base class
C. Template class
D. None of the above

Answer: A

43. Which of the following programs in UNIX helps us to configure a machine as a proxy server?

A. Apache
B. Poff
C. Synaptic
D. Squid

Answer: D

44. The maximum number of class A networks possible according to the IPv4 addressing scheme is:

A. 32
B. 64
C. 126
D. 256

Answer: C

45. 172.0.14.87 is a Class address

A. Class A
B. Class B
C. Class C
D. Class D

Answer: B

46. In IPv6 address is a bit address

A. 32
B. 64
C. 128
D. 256

Answer: C

47. How fast can CAT 6 cable transfer data?

A. Upto 10 Mbps
B. Upto 100 Mbps
C. Upto 1 Gbps
D. Upto 10 Gbps

Answer: D

48. The number of half duplex links required to connect five computers in mesh topology is:

A. 25
B. 20
C. 10
D. 15

Answer: B

49. A network device that connects dissimilar networks by providing the translation from one set of protocols to another is:

A. Switch
B. Router
C. Gateway
D. Modem

Answer: C

50. Which among the following protocols is used for translating from IP address to MAC address?

A. ICMP
B. ARP
C. RARP
D. IGRP

Answer: B

51. What are the active devices of I generation computer

A. Vacuum tubes
B. Transister
C. Integrated Circuits
D. Microprocessor

Answer: A

52. Which of the following is not a language translator

A. Assembler
B. Interpreter
C. Compiler
D. Application

Answer: D

53. 1 Kilobyte = bits

A. 8 bits
B. `2^(10)`bits
C. `8xx2^(10)` bits
D. `8xx2^(16)` bits

Answer: C

54. Which one of the following is a volatile memory?

A. ROM
B. RAM
C. EPROM
D. EEPROM

Answer: B

55. Which of the following is an extension of image file?

A. exe
B. txt
C. jpeg
D. doc

Answer: C

56. Which of the following is a special database that holds key information about your system including the device drivers?

A. BOOT.INI
B. CONFIG.SYS
C. SYSTEM.INI
D. Registry

Answer: D

57. IDE cables have how many pins?

A. 24
B. 32
C. 40
D. 64

Answer: C

58. Which controller support an external CD drive?

A. ESDI
B. MFM
C. SCSI
D. ARLL

Answer: C

59. Which of the following describes a fragmented hard disk?

A. Files are corrupted
B. Clusters of data are damaged
C. Storage media is damaged
D. Files are not stored in consecutive clusters

Answer: D

60. A 16 bit address bus can generate addresses.

A. 65536
B. 32768
C. 32767
D. None of these

Answer: A

61. The size of registers of 8086 microprocessor.

A. 12 bits
B. 8 bits
C. 16 bits
D. 32 bits

Answer: C

62. If there is a carry from lowest nibble during addition, flag is set.

A. Carry flag
B. Overflow Flag
C. Auxiliary carry
D. Sign flag

Answer: C

63. The number of address and data lines of 8086

A. 8 and 8
B. 16 and 16
C. 20 and 16
D. 16 and 20

Answer: C

64. Which directory contains configuration files in linux?

A. /bin/
B. /etc/
C. /root/
D. /dev/

Answer: B

65. What values does the count(*)function ignore?

A. null values
B. Integer
C. character
D. none of these

Answer: A

66. Virtual function in C++ implements

A. Inheritance
B. Polymorphism
C. Data hiding
D. None of the above

Answer: B

67. Multiple inheritance can be achieved in Java using

A. Applets
B. Servlets
C. Interface
D. Swing

Answer: C

68. Which of the following statements is TRUE about constructors?

A. Constructors are automatically invoked when objects of the class are created
B. Constructors can be overloaded
C. The return type of constructors is void ( )
D. Both (A) and (B)

Answer: D

69. Wrapping up of data and associated functions into one single unit is called

A. Abstraction
B. Encapsulation
C. Data Hiding
D. Polymorphism

Answer: B

70. Which among the following OOP feature promotes code reusability?

A. Data Hiding
B. Polymorphism
C. Inheritance
D. Late Binding

Answer: C

71. The term “Pentium” relates to

A. Operating system
B. Microprocessor
C. Hard disk
D. Output device

Answer: B

72. Which of the following is not a flavor of Linux?

A. Redhat
B. Ubuntu
C. Suse
D. OS/2

Answer: D

73. Which of the following is used to keep a process running in background even after the user logout from shell?

A. bg
B. hup
C. &
D. nohup

Answer: D

74. On successful execution, fork returns to parent process

A. 0
B. 1
C. Child process id
D. Parent process id

Answer: C

75. Which of the following is used to display the content of a file in octal format?

A. cat
B. oct
C. od
D. octal

Answer: C

76. Default return type of a function is

A. null
B. void
C. int
D. float

Answer: C

77. Which of the following is the last character of a string

A. \0
B. \n
C. \t
D. none of these

Answer: A

78. Name of an array returns

A. First element of the array
B. Size of the array
C. Number of elements of the array
D. Base address of the array

Answer: D

79. Power-on self-test checks all of the flowing except

A. CPU
B. Memory
C. Modem
D. Video

Answer: C

80. Default storage class of a variable declaration is

A. auto
B. extern
C. static
D. register

Answer: A

81. Fast access to data items available in a database file can be provided through

A. Index file
B. data file
C. data dictionary
D. metadata file

Answer: C

82. The term is used to refer to a row in a table

A. fields
B. attributes
C. Tuple
D. none of these

Answer: C

83. Which one of the follow is not a RDBMS?

A. Foxpro
B. Oracle
C. Mysql
D. Sql server

Answer: A

84. Which one of the following is used to create a virtual relation for storing a query?

A. view
B. function
C. procedure
D. table

Answer: A

85. which one of the following option clause is used with view to reject the tuples that do not satisfy the “where condition”?

A. with
B. with check
C. check
D. none of these

Answer: B

86. When using Foreign Key, the of one relation is referenced in another relation

A. Foreign Key
B. Primary Key
C. Check constraint
D. None of these

Answer: B

87. is the preferred method for enforcing data integrity

A. Constraints
B. Triggers
C. Cursors
D. Stored Procedure

Answer: A

Information Communication Technology System Maintenance Objective Questions with Answers Pdf Download

Leave a Reply

Your email address will not be published. Required fields are marked *