ICT MCQ set 224

By | December 21, 2018

Information and Communicating Technology (ICT) MCQ QUESTION ANSWERS

Question 1
To access a Main Frame Computer Users normally use..........
A
Terminal
B
Laptop
C
Keyboard
D
POS
Question 2
In POP protocol, O stands for..........
A
Office POP-Post Office Protocol
B
Ordinary
C
One
D
None of these
Question 3
The prefix that stands for a billion is:
A
giga.
B
tera.
C
nano.
D
peta.
Question 4
The maximum size of a write file is limited to only
A
Name of the file
B
Extension of the file
C
The amount of memory in your computer
D
All of above
Question 5
Telnet is.......... based computer protocol.
A
image
B
text
C
All of these
D
None of these
Question 6
Which of the following have low failure rate?
A
mechanical devices
B
electronic devices
C
electro-mechanical devices
D
None of above
Question 7
Bit in short for..........
A
binary system
B
digital byte
C
binary digit
D
binary unit
Question 8
The OCR recognises the.......... of the characters with the help of light source.
A
Shape
B
Colour
C
None of the Above
D
All the above
Question 9
The term 'giga byte' equals to..........
A
1024 KB
B
1024 GB
C
1024 MB
D
All the above
Question 10
Yahoo was developed by:
A
Dennis Ritchie and Ken Thompson
B
Vint Cerf and Robert Kahn
C
David Filo and Jerry Yang
D
Steve Case and Jeff Bezos
Question 11
The first general purpose electronic computer in the world was
A
UNIVAC
B
EDVAC
C
ENIAC
D
All of above
Question 12
bit stands for (Dec-2009)
A
binary information term
B
binary digit
C
binary tree
D
Bivariate Theory
Question 13
Which of the following is a data-entry device..........
A
MICR
B
OMR
C
OCR
D
All of the above
Question 14
What is full form of ISDN..........
A
Integrated Services Digital Network
B
Inter Services Digital Network
C
Integrated Server Digital Network
D
None of these
Question 15
In Windows operating system shortcut for paste is
A
CTRL+C
B
CTRL+X
C
CTRL+V
D
None of these
Question 16
Spool stands for..........
A
Simultaneous Peripheral Output On-Line
B
System Protocol Optimization Outliner
C
Single Program Operating System Operation
D
All the above
Question 17
Which of the following is a network administration practice used to prevent the execution of undesirable programs?
A
Application Blacklisting
B
Attack Surface
C
All of these
D
None of these
There are 17 questions to complete.

Leave a Reply

Your email address will not be published. Required fields are marked *