ICT MCQ set 118

By | December 21, 2018

Information and Communicating Technology (ICT) MCQ QUESTION ANSWERS

Question 1
Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?
A
Rollback
B
Switch to duplicate database
C
Rollforward
D
All the above
Question 2
Which of the following statements is false?
A
Secondary storage is nonvolatile
B
Primary storage is volatile
C
Secondary storage contains data for immediate processing
D
When the computer is turned off, data and instructions stored in primary storage are erased
Question 3
By an Intranet we mean:
A
A Wide Area Network for all branches of an organization
B
Personal Area Network of top management of an organization
C
A network connecting all computers of an organization using Internet Protocol
D
All the above
Question 4
The Vacuum Tube was used in-
A
First Generation Computer
B
Second Generation Computer
C
Third Generation Computer
D
Fourth Generation Computer
Question 5
Pick out E-commerce application from the following
A
DTP
B
SQL
C
Tally
D
ATM
Question 6
In slide layout panel how many layouts are available for text layout by default?
A
4
B
7
C
12
D
None of above
Question 7
.......... is most often done after fixing a problem, adding a new program or making configuration change
A
Shut Down
B
Restart
C
Sleep
D
Hibernate
Question 8
You can detect spelling and grammar errors by..........
A
Press Ctrl + F7
B
Press Alt+ F7
C
Press F7
D
Press F8
Question 9
The term that we use to describe physical components of the system
A
Hardware
B
Inout
C
Software
D
None of these
Question 10
The displayed data over the internet can be classified into two types. They are..........
A
Static& Dynamic
B
Data& Voice
C
All of these
D
None of these
Question 11
A set of pre-designed formats of text or color scheme is called
A
Slide
B
Presentation scheme
C
Template
D
Schema
Question 12
Which of the following term refers to a set of values that Excel saves and can substitute automatically on your worksheet?
A
Scenario
B
Nested
C
What-if analysis
D
None of these
Question 13
.......... is a compromise mode between Shut Down and Sleep mode because it does not consume power and remembers the current state of your desktop
A
Shut Down
B
Restart
C
Sleep
D
Hibernate
Question 14
Which of the following is not a Computer language? (June-2008)
A
PASCAL
B
UNIX
C
FORTRAN
D
COBOL
Question 15
Which of the following best describes serifs?
A
Serifs on characters help to differentiate between similar looking letters
B
Serifs fonts are best for viewing test at a distance
C
Serifs are fine cross strokes that appear at the bottom and top of a letter
D
Serif font are very simple in appearance
Question 16
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as..........
A
a Trojan horse.
B
cracking.
C
a denial of service attack.
D
None of these
Question 17
Which of the following indicates a secure website?
A
HTTPS
B
SMTP
C
IMAP
D
All the above
There are 17 questions to complete.

Leave a Reply

Your email address will not be published. Required fields are marked *