ICT MCQ set 36

By | December 20, 2018

Information and Communicating Technology (ICT) MCQ QUESTION ANSWERS

Question 1
Related fields in a database are grouped to form a..........
A
data record
B
menu
C
bank
D
All the above
Question 2
.......... is a register for Short-term, intermediate storage of arithmetic and logic data in a Computer's CPU.
A
Accumulator
B
Buffer
C
None of the Above
D
All the above
Question 3
Which of the following methods cannot be used to enter data in a cell
A
Pressing an arrow key
B
Pressing the Tab key
C
Pressing the Esc key
D
Clicking on the formula bar
Question 4
Which of the following provides a means of printing out feature notes with a miniature slide on a printed page?
A
Slide with animation
B
Outline view
C
Notes page
D
Audience handout
Question 5
Line spacing refers to
A
The space between the lines of text
B
The height of the line
C
The length of the line
D
a and c
Question 6
Which of the following shortcut key is used for insert a new slide?
A
Ctrl + S
B
Ctrl + F
C
Ctrl + M
D
None of the above
Question 7
The blinking symbol on the computer screen:
A
Mouse
B
Cursor
C
Character
D
Blinker
Question 8
Which of the following terms is the most closely related to main memory?
A
Non volatile
B
Permanent
C
Control unit
D
Temporary
Question 9
Budget represents..........
A
Estimation
B
Forecasting
C
Assumption
D
All of these
Question 10
A.......... is a flash memory storage device that plugs into a USB port.
A
USB flash drive
B
USB memory maker drive
C
All
D
None of these
Question 11
Errors in computer programmes are called: (Dec-2008)
A
Follies
B
Mistakes
C
Bugs
D
Spam
Question 12
The binary equivalent of (-19)10 in signed magnitude system is
A
11101100
B
11101101
C
10010011
D
None of these
Question 13
Bubble Memory is
A
nonvolatile
B
volatile
C
permanent
D
None of these
Question 14
Which among the following was India's first Teraflop supercomputer?
A
PARAM 10000
B
PARAM Yuva
C
PARAM Padma
D
PARAM 9000/ss
Question 15
.......... is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses.
A
Memory shaving
B
Synflooding
C
Software Piracy
D
None of these
Question 16
.......... is a way of interlinking related Web sites so that people can visit many similar Web sites.
A
Web Ring
B
Web Host
C
None of the Above
D
All the above
Question 17
Firewalls are used to protect a communication network system against
A
Unauthorized attacks
B
Virus attacks
C
Data-driven attacks
D
Fire-attacks
There are 17 questions to complete.

Leave a Reply

Your email address will not be published. Required fields are marked *