Multiple Choice Questions - Information Technology Related Questions
1. A computer virus normally attaches itself to another computer programme known as a
2. One byte consists of
3. The amount of time required by a storage device to retrieve data and programmes is its
4. ENIAC was
5. Which of these describes attempts by individuals to obtain confidential information from a computer user by falsifying their identity?
6. The first computer made available for commercial use was
7. A person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage can be called a
8. A 32-bit word computer can access _____ bytes at a time.
9. The process of transferring files from the Internet to your computer is called
10. The ____ shows all the web sites any pages that you have visited one a period of time.
11. The language which provides basic building blocks for web pages is known as
12. In the URL, http//:www.leadthecompetition.in, the portion labelled http is the ____
13. Which of the following is a read only memory storage device?
14. A repair for a known software bug usually available at no charge on the internet is called a
15. Which of the following connects the computer to a telephone line?
16. What is an e-mail attachment?
17. If a file has a '.bak' extension it refers usually to -
18. The window which shows icons for things like the mouse, sound, and display is called
19. What kind of file has an extension '.mpg'?
20. Which of the following is not real security and privacy risks?
21. Which of the following defines the ability to recover and read deleted or damaged files from a criminal’s computer?
22. The difference between people with internet access and those without it is known as the
23. The smallest unit in a digital system is a
24. Which of the following is a web browser?
25. Junk e-mail is also called ____
26. Who of the following is the founder of Facebook?
27. In which of the following areas, spreadsheet software is more useful?
28. What is windows explorer?
29. Which of the following terms refers to unwanted and unsolicited e-mails received by us?
30. A Groupware is a
31. A DVD is An example of a/an
32. A word in a web page that, when clicked opens another document is called
33. Which of the following is the most commonly used operating system?
34. Windows 7, the operating system from Microsoft Corporation has ________ Indian languages fonts.
35. A megabyte is actually equal to ______ kilobytes
36. Which of the following is an Indian social networking site launched by Patna-based brothers Nilay and Ankur Singh?
37. Which of the following was referred to as a 'three-finger salute' by Microsoft founder Mr. Bill Gates?
38. What is the full form of GUI?
39. Which command allows you to reduce fragments of file and optimize the performance of disk?
40. A communication processor that connects dissimilar networks by providing the translation from one set of protocol to another is
41. What is a fraudulent practice of extracting details of someone's bank card or account illegally via phone known as?
42. In a Database Management System (DBMS), the content and the location of the data is defined by the -
43. Which of the following is the ascending order of data hierarchy?
44. A Computer executes Programs in the sequence of:
45. The part of a computer system containing the circuitry that does the adding, subtracting, multiplying, dividing and comparing is called as