Information Communication Technology System Maintenance Multiple Choice Questions
1. The maximum number of active devices in a Piconet is:
A. 4
B. 6
C. 7
D. 8
Answer: D
2. Which of the following is a private network?
A. LAN
B. WAN
C. MAN
D. None of the above
Answer: A
3. The IEEE standard for Wireless LAN is:
A. IEEE 802.3
B. IEEE 802.4
C. IEEE 802.11
D. IEEE 802.7
Answer: C
4. A protocol that allows non-ASCII messages to be sent through e-mails:
A. MIME
B. IMAP
C. POP3
D. SMTP
Answer: A
5. A sniffer is
A. A protocol
B. A virus
C. A program that monitors and analyzes network traffic
D. None of the above
Answer: C
6. Providing, managing and maintaining hardware, software, content integrity, security and reliable high speed connection for a website is called:
A. Web hosting
B. Web Browsing
C. Web Crawling
D. Navigation
Answer: A
7. The system that helps users to identify host computers in a network by their names instead of their IP addresses is:
A. TCP
B. DNS
C. PPP
D. ARP
Answer: B
8. A computer virus that copies itself to the beginning of the hard disk, where it is automatically executed when the system is turned ON is called
A. Worm
B. Trojan Horse
C. Boot sector virus
D. None of the above
Answer: C
9. What is a trap door in a program?
A. A security hole inserted while writing the program, which is intended for later use
B. An error in the program
C. Security hole in a network
D. None of the above
Answer: A
10. Honeypot is an example for
A. Security auditing software
B. Intrusion detection software
C. Encryption software
D. Virus
Answer: B
11. The input and output ports of a router perform the layer functions:
A. Physical and Data link
B. Network
C. Both (A) and (B)
D. None of the above
Answer: A
12. Transport Layer is responsible for delivery of data:
A. Node to node
B. Process to process
C. Hop to hop
D. All of the above
Answer: B
13. A firewall is used in a network to:
A. Prevent fire in a network
B. To scan for viruses in files
C. Prevent unauthorized access to the network
D. None of the above
Answer: C
14. Which feature of cloud computing allows the service to change in size or volume in order to meet user’s needs?
A. Scalability
B. Security
C. Virtualization
D. Cost savings
Answer: A
15. A dynamic web page is
A. Displayed the same every time
B. Generated on demand by a program on a request from browser
C. Both (A) and (B)
D. None of the above
Answer: B
16. Which of the following is NOT TRUE about PHP?
A. PHP can be used to develop web applications
B. PHP makes a website dynamic
C. PHP applications cannot be compiled
D. PHP cannot be embedded into HTML
Answer: D
17. PHP scripts are enclosed with
A. <php>…</php>
B. <?php…?>
C. ?php…?php
D. <p>…</p>
Answer: B
18. Which of the following is the correct statement to create an array in PHP?
state[0] = “Kerala”;
$state[ ] = array(“Kerala”);
$state[0] = “Kerala”;
$state = array(“Kerala”);
A. (iii) and (iv)
B. (ii) and (iii)
C. Only (iv)
D. (ii), (iii) and (iv)
Answer: A
19. Which one of the following PHP functions allow user-defined functions to accept variable length argument lists?
A. func_get_argv()
B. func_get_args()
C. get_argv()
D. get_args()
Answer: B
20. is the concatenation operator in PHP
A. .(dot)
B. +
C. =
D. ^
Answer: A
21. DoS is the acronym for
A. Denial of Security
B. Delivery of Service
C. Denial of Service
D. Delivery of Security
Answer: C
22. Which among the following is NOT a web browser?
A. Microsoft Edge
B. Google Chrome
C. Mozilla Firefox
D. None of the above
Answer: D
23. URL stands for
A. Universal Resource Locator
B. Uniform Resource Locator
C. Unified Resource Locator
D. Universal Route Locator
Answer: A
24. What should be the first tag in any HTML document?
A. <head>
B. <title>
C. <document>
D. <html>
Answer: D
25. Domain names used by commercial establishments usually have the suffix
A. .com
B. .org
C. .ac.in
D. .gov.in
Answer: A
26. Where do PC store CMOS settings?
A. RAM
B. Flash ROM
C. South bridge
D. NVRAM
Answer: B
27. Marquee is a tag in HTML used to:
A. Mark the list of items to maintain in queue
B. Mark the text so that it is hidden in browser
C. Display text with scrolling effect
D. None of the Above
Answer: C
28. CSS is an acronym for
A. Cascading Style Sheet
B. Cascading Style System
C. Cascading server Sheet
D. None of the above
Answer: A
29. Which of the following statements is TRUE about JavaScript?
A. JavaScript is designed to add style to HTML pages
B. JavaScript is designed to add interactivity to HTML pages
C. JavaScript is used to perform server side scripting operations
D. None of the Above
Answer: B
30. is a built-in JavaScript function which can be used to execute another function after a given time interval.
A. Timeout( )
B. TimeInterval( )
C. setTimeout( )
D. All of the above
Answer: C
31. The statement is used in SQL for authorization
A. implement
B. revoke
C. grant
D. none of these
Answer: C
32. is executed when a table is modified
A. procedure
B. function
C. trigger
D. none of these
Answer: C
33. Which of the following command is used to delete a particular column in a relation?
A. DELETE
B. ALTER
C. UPDATE
D. DROP
Answer: B
34. A transaction completes its execution is said to be
A. Saved
B. Rolled
C. Committed
D. Loaded
Answer: C
35. The language used in application program to request for data from DBMS is
A. DDL
B. DML
C. DCL
D. all of these
Answer: B
36. Which of the following is NOT related to OOP?
A. Encapsulation
B. Data Abstraction
C. Data Hiding
D. Data Dictionary
Answer: D
37. In a class defined using an Object Oriented Programming language:
A. All data and functions should be public to maximise flexibility and ease of use
B. Nearly all data should be private and most functions should be public
C. Nearly all data should be public and most functions should be private
D. All data must be private, but functions are neither private nor public
Answer: B
38. Which among the following is an Object-Oriented Programming language?
A. Java
B. Simula 67
C. Smalltalk
D. All the above
Answer: D
39. are the basic run times entities in an object-oriented system.
A. Objects
B. Classes
C. Functions
D. All the above
Answer: A
40. Operator Overloading
A. Defines a new meaning to an existing operator
B. Enables operators to work with objects
C. Implements polymorphism
D. All of the above
Answer: D
41. Private members of a class are accessible to:
A. Member functions of that class
B. Friend functions of that class
C. All functions in the program
D. Both (A) and (B)
Answer: D
42. A class which is not used to create objects, but is designed to act as a base class to be inherited by other classes is called:
A. Abstract class
B. Virtual base class
C. Template class
D. None of the above
Answer: A
43. Which of the following programs in UNIX helps us to configure a machine as a proxy server?
A. Apache
B. Poff
C. Synaptic
D. Squid
Answer: D
44. The maximum number of class A networks possible according to the IPv4 addressing scheme is:
A. 32
B. 64
C. 126
D. 256
Answer: C
45. 172.0.14.87 is a Class address
A. Class A
B. Class B
C. Class C
D. Class D
Answer: B
46. In IPv6 address is a bit address
A. 32
B. 64
C. 128
D. 256
Answer: C
47. How fast can CAT 6 cable transfer data?
A. Upto 10 Mbps
B. Upto 100 Mbps
C. Upto 1 Gbps
D. Upto 10 Gbps
Answer: D
48. The number of half duplex links required to connect five computers in mesh topology is:
A. 25
B. 20
C. 10
D. 15
Answer: B
49. A network device that connects dissimilar networks by providing the translation from one set of protocols to another is:
A. Switch
B. Router
C. Gateway
D. Modem
Answer: C
50. Which among the following protocols is used for translating from IP address to MAC address?
A. ICMP
B. ARP
C. RARP
D. IGRP
Answer: B
51. What are the active devices of I generation computer
A. Vacuum tubes
B. Transister
C. Integrated Circuits
D. Microprocessor
Answer: A
52. Which of the following is not a language translator
A. Assembler
B. Interpreter
C. Compiler
D. Application
Answer: D
53. 1 Kilobyte = bits
A. 8 bits
B. `2^(10)`bits
C. `8xx2^(10)` bits
D. `8xx2^(16)` bits
Answer: C
54. Which one of the following is a volatile memory?
A. ROM
B. RAM
C. EPROM
D. EEPROM
Answer: B
55. Which of the following is an extension of image file?
A. exe
B. txt
C. jpeg
D. doc
Answer: C
56. Which of the following is a special database that holds key information about your system including the device drivers?
A. BOOT.INI
B. CONFIG.SYS
C. SYSTEM.INI
D. Registry
Answer: D
57. IDE cables have how many pins?
A. 24
B. 32
C. 40
D. 64
Answer: C
58. Which controller support an external CD drive?
A. ESDI
B. MFM
C. SCSI
D. ARLL
Answer: C
59. Which of the following describes a fragmented hard disk?
A. Files are corrupted
B. Clusters of data are damaged
C. Storage media is damaged
D. Files are not stored in consecutive clusters
Answer: D
60. A 16 bit address bus can generate addresses.
A. 65536
B. 32768
C. 32767
D. None of these
Answer: A
61. The size of registers of 8086 microprocessor.
A. 12 bits
B. 8 bits
C. 16 bits
D. 32 bits
Answer: C
62. If there is a carry from lowest nibble during addition, flag is set.
A. Carry flag
B. Overflow Flag
C. Auxiliary carry
D. Sign flag
Answer: C
63. The number of address and data lines of 8086
A. 8 and 8
B. 16 and 16
C. 20 and 16
D. 16 and 20
Answer: C
64. Which directory contains configuration files in linux?
A. /bin/
B. /etc/
C. /root/
D. /dev/
Answer: B
65. What values does the count(*)function ignore?
A. null values
B. Integer
C. character
D. none of these
Answer: A
66. Virtual function in C++ implements
A. Inheritance
B. Polymorphism
C. Data hiding
D. None of the above
Answer: B
67. Multiple inheritance can be achieved in Java using
A. Applets
B. Servlets
C. Interface
D. Swing
Answer: C
68. Which of the following statements is TRUE about constructors?
A. Constructors are automatically invoked when objects of the class are created
B. Constructors can be overloaded
C. The return type of constructors is void ( )
D. Both (A) and (B)
Answer: D
69. Wrapping up of data and associated functions into one single unit is called
A. Abstraction
B. Encapsulation
C. Data Hiding
D. Polymorphism
Answer: B
70. Which among the following OOP feature promotes code reusability?
A. Data Hiding
B. Polymorphism
C. Inheritance
D. Late Binding
Answer: C
71. The term “Pentium” relates to
A. Operating system
B. Microprocessor
C. Hard disk
D. Output device
Answer: B
72. Which of the following is not a flavor of Linux?
A. Redhat
B. Ubuntu
C. Suse
D. OS/2
Answer: D
73. Which of the following is used to keep a process running in background even after the user logout from shell?
A. bg
B. hup
C. &
D. nohup
Answer: D
74. On successful execution, fork returns to parent process
A. 0
B. 1
C. Child process id
D. Parent process id
Answer: C
75. Which of the following is used to display the content of a file in octal format?
A. cat
B. oct
C. od
D. octal
Answer: C
76. Default return type of a function is
A. null
B. void
C. int
D. float
Answer: C
77. Which of the following is the last character of a string
A. \0
B. \n
C. \t
D. none of these
Answer: A
78. Name of an array returns
A. First element of the array
B. Size of the array
C. Number of elements of the array
D. Base address of the array
Answer: D
79. Power-on self-test checks all of the flowing except
A. CPU
B. Memory
C. Modem
D. Video
Answer: C
80. Default storage class of a variable declaration is
A. auto
B. extern
C. static
D. register
Answer: A
81. Fast access to data items available in a database file can be provided through
A. Index file
B. data file
C. data dictionary
D. metadata file
Answer: C
82. The term is used to refer to a row in a table
A. fields
B. attributes
C. Tuple
D. none of these
Answer: C
83. Which one of the follow is not a RDBMS?
A. Foxpro
B. Oracle
C. Mysql
D. Sql server
Answer: A
84. Which one of the following is used to create a virtual relation for storing a query?
A. view
B. function
C. procedure
D. table
Answer: A
85. which one of the following option clause is used with view to reject the tuples that do not satisfy the “where condition”?
A. with
B. with check
C. check
D. none of these
Answer: B
86. When using Foreign Key, the of one relation is referenced in another relation
A. Foreign Key
B. Primary Key
C. Check constraint
D. None of these
Answer: B
87. is the preferred method for enforcing data integrity
A. Constraints
B. Triggers
C. Cursors
D. Stored Procedure
Answer: A