0% found this document useful (1 vote)
97 views33 pages

Information Technology MCQ

The document appears to be a list of 100 multiple choice questions related to the topic of information technology. The questions cover a wide range of IT topics including digital cellular systems, wireless communication, cellular network standards, Bluetooth, WiFi, satellite communication, ISDN, GIS, computer hardware, data encryption, public key cryptography, digital signatures, firewalls, SQL injection, single sign-on, mobile commerce, SSL, artificial intelligence, machine learning algorithms, and deep learning.

Uploaded by

Ranjana Dalwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
97 views33 pages

Information Technology MCQ

The document appears to be a list of 100 multiple choice questions related to the topic of information technology. The questions cover a wide range of IT topics including digital cellular systems, wireless communication, cellular network standards, Bluetooth, WiFi, satellite communication, ISDN, GIS, computer hardware, data encryption, public key cryptography, digital signatures, firewalls, SQL injection, single sign-on, mobile commerce, SSL, artificial intelligence, machine learning algorithms, and deep learning.

Uploaded by

Ranjana Dalwani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 33

MCA 104 Information Technology

solution
2

solution

solution

solution

solution
6

solution

solution

solution

solution

10

solution

11

solution

12
solution
13

solution

14

solution

15

solution

16

solution

17

solution

18
solution

19

solution

20

solution

21

solution

22

solution

23

solution

24

solution
25

solution

26

solution

27

solution

28

solution

29

solution

30

solution

31
solution

32

solution

33

solution

34

solution

35

solution

36

solution

37
solution

38

solution

39

solution

40

solution

41

solution

42

solution

43

solution

44
solution

45

solution

46

solution

47

solution

48

solution

49

solution

50
solution

51

solution

52

solution

53

solution

54

solution

55

solution

56

solution
57

solution

58

solution

59

solution

60

solution

61

solution

62

solution

63
solution

64

solution

65

solution

66

solution

67

solution

68

solution

69
solution

70

solution

71

solution

72

solution

73

solution

74

solution

75

solution
76

solution

77

solution

78

solution

79

solution

80

solution

81

solution

82
solution

83

solution

84

solution

85

solution

86

solution

87

solution

88

solution
89

solution

90

solution

91

solution

92

solution

93

solution

94

solution
95

solution

96

solution

97

solution

98

solution

99

solution

100

solution
MCA 104 Information Technology

US digital cellular system based on CDMA was standardized as ________


a) IS-54
b) IS-136
c) IS-95
d) IS-76

c
What is wireless communication?
a) Sending data from one location to with the use of physical medium
b) Sending data from one location to another without the use of physical medium
c) Sending data from one location to another without the use of virtual medium
d) None of the mentioned
b

Which of the following is the world’s first cellular system to specify digital modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
a

Which of the following should be replaced with question mark in the figure shown below?

a) SMTP
b) HTTP
c) SIP
d) None of the mentioned
c

An interconnected collection of piconet is called ___________


a) scatternet
b) micronet
c) mininet
d) multinet
a
Wireless networking, or Wi-Fi, can be used to connect computers in a home, and many cities are using the technology to offer
residents. What's another name for Wi-Fi? | Wifi mcqs
a). 801.12 networking
b) 801.22 networking
c)802.11 networking
d) None of the Above
c

Why wireless communication is used?


a) It enables billions of people to connect to the Internet
b) Lowers the cost of network infrastructure
c) Makes services more inexpensive
d) All of the mentioned
d

the frequency range for the broadcast satelite service is


a) 2GHZ to 4 GHZ
b) 4GHZ to 8 GHZ
c) 8GHZ to 12.5 GHZ
d)12.5 GHZ to 26.5 GHZ
d

ISDN stands for ___________


a) Integrated Services Digital Network
b) Integrated Services Discrete Network
c) Integrated Services Digital Node
d) Integrated Services Discrete Node
a

GIS uses the information from which of the following sources?


a) Non- spatial information system
b) Spatial information system
c) Global information system
d) Position information system
b

Among the following ____________ can be expressed as an example of hardware component.


a) Keyboard
b) Arc GIS
c) Auto CAD
d) Digitalization
a

Which of the following formats can be used for GIS output?


a) DXF
b) PDF
c) GIF
d) HTML
c
Which among the following is not related to GIS software’s?
a) CAD
b) Arc GIS
c) Arc View
d) STAAD Pro
d

Which among the following is a server based hardware platform of GIS?


a) Autodesk Revit
b) STAAD Pro
c) Arc GIS
d) Google-maps
d

Which type of transmission technique is employed by paging system?


a) Multicasting
b) Unicasting
c) Hybrid
d) Simulcasting
d

__________ are used to resolve and combine multipath components.


a) Equalizer
b) Registers
c) RAKE receiver
d) Frequency divider
c

Each IS-95 channel occupies ___________ of spectrum on each one way link.
a) 1.25 MHz
b) 1.25 kHz
c) 200 kHz
d) 125 kHz
a

User data in IS-95 is spread to a channel chip rate of ________


a) 1.2288 Mchip/s
b) 9.6 Mchip/s
c) 12.288 Mchip/s
d) 0.96 Mchip/s
a

Which of the following is used by IS-95?


a) DSSS
b) FHSS
c) THSS
d) Hybrid
a

CDMA is used in _____communicaiton


a) wired
b)wireless
c) satelite
d) all the above
b

Which ofsignature
a)Digital the following, dubbed Sunburst, was used by nation-state actors to bypass SolarWinds' security mechanisms and gai
b)Backdoor
c)Buffer overflow
d)Adware
b

Pretty good privacy (PGP) security system uses


a) Public key cryptosystem
b) Private key cryptosystem
c) Public & Private key cryptosystem
d) None of the mentioned
c

Public key cryptosystem is used for the encryption of


a) Messages
b) Session key
c) Session key & Messages
d) None of the mentioned
b

Data compression includes


a) Removal of redundant character
b) Uniform distribution of characters
c) Removal of redundant character & Uniform distribution of characters
d) None of the mentioned
c
PGP offers _____ block ciphers for message encryption.
a) Triple-DES
b) CAST
c) IDEA
d) All of the mentioned
d

Which operation is used in encryption using IDEA?


a) Addition modulo 216
b) Bit wise XOR
c) Addition modulo 216 & Bit wise XOR
d) None of the mentioned
c

The digital signature provides authentication to the


a) Sender
b) Message
c) Sender & Message
d) None of the mentioned
c

DSA protocol is based on


a) Discrete logarithm problem
b) Continuous logarithm problem
c) Discrete & Continuous logarithm problem
d) None of the mentioned
a

Network layer firewall works as a __________


a) Frame filter
b) Packet filter
c) Content filter
d) Virus filter
b

A firewall is installed at the point where the secure internal network and untrusted external network meet which is also know
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
a

Which of the following is / are the types of firewall?


a) Packet Filtering Firewall
b) Dual Homed Gateway Firewall
c) Screen Host Firewall
d) Dual Host Firewall
a

In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
a) SQL injection
b) SQL
c) Direct
d) Application
a

A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’
service without requiring reauthentication.
a) OpenID
b) Sign-on system
c) Security Assertion Markup Language (SAML)
d) Virtual Private Database (VPD)
b

The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in rece
a) OpenID
b) Single-site system
c) Security Assertion Markup Language (SAML)
d) Virtual Private Database (VPD)
a

Mobile commerce also known as ________.


a) M-commerce
b) M- com
c) M-COM
d) E-commerce
a

M-commerce provides the user with the advantage of…………….


a) flexibility
b) ubiquity
c) Authority
d) Both a and b
d

The stock market services offered via mobile devices is knows as …………..
a) Mobile Brokerage
b) M-Brokerage
c) Brokerage
d) E-com
a

The most commonly used network protection barrier between the company's network and the outside world is a………………
a) Firewall
b) Anti virus
c) Virus
d) Worm
a

. Which company developed SSL protocol?


a) Netscap
b) Apple
c) FSL
d) SET
a

Which is used to encrypt and decrypt a message?


a) Secret key
b) Firewall
c) Antivirus
d) Code
a

Who is known as the inventor of Artificial Intelligence?


a) Charles Babbage
b) John McCarthy
c) Alan Turing
d) Andrew Ng
b

Which is considered the branch of Artificial Intelligence?


a) Cyber Forensics
b) Machine Learning
c) Network Design
d) Full-stack Developer
b

What is the main aim of Artificial Intelligence?


a) To solve real-world issues
b) To explain different sorts of intelligence
c) To solve artificial problems
d) To obtain information about scientific causes
b

____ is the common language for AI.


a) Lisp
b) Python
c) PHP
d) Java
b

Which of the following are the proposition symbols in Artificial Intelligence?


a) true, false, and null
b) true
c) false
d) true and false
d

____ is the informed search method.


a) Memory Bound Heuristic Search
b) A * Search
c) Best First Search
d) All of the above
d

____ is a component of AI.


a) Training
b) Designing
c) Learning
d) Puzzling
c

On which approach the face recognition system is based?


a) Weak AI Approach
b) Cognitive AI Approach
c) Strong AI Approach
d) Applied AI Approach
d

The recognition system in AI is of how many types?


a) 3
b) 1
c) 5
d) 4
a

____ are the compositions for Artificial Intelligence Agents.


a) Only Program
b) Only Architecture
c) Both Program and Architecture
d) None of the above
c

What is Machine learning?


a) The selective acquisition of knowledge through the use of computer programs
b) The selective acquisition of knowledge through the use of manual programs
c) The autonomous acquisition of knowledge through the use of computer programs
d) The autonomous acquisition of knowledge through the use of manual programs
c

K-Nearest Neighbors (KNN) is classified as what type of machine learning algorithm?


a) Instance-based learning
b) Parametric learning
c) Non-parametric learning
d) Model-based learning
a

Which of the following is not a supervised machine learning algorithm?


a) K-means
b) Naïve Bayes
c) SVM for classification problems
d) Decision tree
a

What’s the key benefit of using deep learning for tasks like recognizing images?
a) They need less training data than other methods.
b) They’re easier to explain and understand than other models.
c) They can learn complex details from the data on their own.
d) They work faster and are more efficient computationally.
c

Which algorithm is best suited for a binary classification problem?


a) K-nearest Neighbors
b) Decision Trees
c) Random Forest
d) Linear Regression
b

What is the key difference between supervised and unsupervised learning?


a) Supervised learning requires labeled data, while unsupervised learning does not.
b) Supervised learning predicts labels, while unsupervised learning discovers patterns.
c) Supervised learning is used for classification, while unsupervised learning is used for regression.
d) Supervised learning is always more accurate than unsupervised learning.
a
Which of the following statements is true about AdaBoost?
a) It is particularly prone to overfitting on noisy datasets
b) Complexity of the weak learner is important in AdaBoost
c) It is generally more prone to overfitting
d) It improves classification accuracy
c

Which one of the following models is a generative model used in machine learning?
a) Support vector machines
b) Naïve Bayes
c) Logistic Regression
d) Linear Regression
b

An artificially intelligent car decreases its speed based on its distance from the car in front of it. Which algorithm is used?
a) Naïve-Bayes
b) Decision Tree
c) Linear Regression
d) Logistic Regression
c

Which of the following statements is false about Ensemble learning?


a) It is a supervised learning algorithm
b) It is an unsupervised learning algorithm
c) More random algorithms can be used to produce a stronger ensemble
d) Ensembles can be shown to have more flexibility in the functions they can represent
b

What is the full form of IoT?


a) Internet of Technology
b) Incorporate of Things
c) Internet of Things
d) Incorporate of Technology
c

What is IoT?
a) network of physical objects embedded with sensors
b) network of virtual objects
c) network of objects in the ring structure
d) network of sensors
a

Who coined the term “Internet of Things”?


a) Kevin Aston
b) John Wright
c) Edward Jameson
d) George Garton
a

When was the actual term “Internet of Things” coined?


a) 1998
b) 1999
c) 2000
d) 2002
b

Which of the following is not an IoT device?


a) Table
b) Laptop
c) Arduino
d) Tablet
a

Which of the following is false about IoT devices?


a) IoT devices use the internet for collecting and sharing data
b) IoT devices need microcontrollers
c) IoT devices use wireless technology
d) IoT devices are completely saf
d

Which of the following is not an IoT platform?


a) Amazon Web Services
b) Microsoft Azure
c) Salesforce
d) Flipkart
d

Which of the following is not an application of IoT?


a) BMP280
b) Smart home
c) Smart city
d) Self-driven cars
a

What is the full form of IIOT?


a) Index Internet of Things
b) Incorporate Internet of Things
c) Industrial Internet of Things
d) Intense Internet of Things
c

Which of the following is false about the IoT components?


a) A light sensor (photoresistor) is an analog sensor
b) A microphone is a digital sensor
c) A push button is a digital sensor
d) A keyboard is a digital sensor
b

Which of the following is used to capture data from the physical world in IoT devices?
a) Sensors
b) Actuators
c) Microprocessors
d) Microcontrollers
a

Which of the following command is used to trigger the Amazon echo IOT device?
a) Hello
b) Suri
c) Alexa
d) Hey
c

Which of the following is false about the MANET IoT network?


a) It is a self-configuring network
b) It has a low data rate
c) It doesn’t have any encryption
d) Power is readily available for complex security
d

Which of the following is not a sensor in IoT?


a) BMP280
b) DHT11
c) Photoresistor
d) LED
d

Which of the following is not an actuator in IoT?


a) Stepper motor
b) A fan
c) An LED
d) Arduino
d
What is the use of PWM signals in IoT development boards?
a) They are used by sensors to have analog input
b) They are used by sensors to have digital input
c) They are used by actuators to have analog input
d) They are used by actuators to have digital input
c

Which of the following is used to reprogram a Bootloader in IoT devices?


a) VHDL programming
b) IDE
c) ICSP
d) MANET
c

Which of the following is true about Arduino IoT devices?


a) They are open-source software
b) They can only read analog inputs
c) They have their own operating systems
d) They don’t have pre-programmed firmware
a

How many number of elements in the Open IoT Architecture?


a) 3 elements
b) 7 elements
c) 8 elements
d) 6 elements
b

Which of the following is not a feature of the Raspberry PI model B IoT device?
a) It has 256 MB SDRAM
b) It has a single USB connector
c) It has its own operating system
d) It has an Ethernet port
a

What is Cloud Computing?


a) Cloud Computing means providing services like storage, servers, database, networking, etc
b) Cloud Computing means storing data in a database
c) Cloud Computing is a tool used to create an application
d) None of the mentioned
a

Who is the father of cloud computing?


a) Sharon B. Codd
b) Edgar Frank Codd
c) J.C.R. Licklider
d) Charles Bachman
c

Which of the following is not a type of cloud server?


a) Public Cloud Servers
b) Private Cloud Servers
c) Dedicated Cloud Servers
d) Merged Cloud Servers
d

Which of the following are the features of cloud computing?


a) Security
b) Availability
c) Large Network Access
d) All of the mentioned
d

Which of the following is a type of cloud computing service?


a) Service-as-a-Software (SaaS)
b) Software-and-a-Server (SaaS)
c) Software-as-a-Service (SaaS)
d) Software-as-a-Server (SaaS)
c

Which of the following is the application of cloud computing?


a) Adobe
b) Paypal
c) Google G Suite
d) All of the above
d

Which of the following is an example of the cloud?


a) Amazon Web Services (AWS)
b) Dropbox
c) Cisco WebEx
d) All of the above
d

Applications and services that run on a distributed network using virtualized resources is known as ___________
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing
d
Which of the following is an example of a PaaS cloud service?
a) Heroku
b) AWS Elastic Beanstalk
c) Windows Azure
d) All of the above
d

Which of the following is an example of an IaaS Cloud service?


a) DigitalOcean
b) Linode
c) Rackspace
d) All of the above
d

Which of the following is the correct statement about cloud computing?


a) Cloud computing abstracts systems by pooling and sharing resources
b) Cloud computing is nothing more than the Internet
c) The use of the word “cloud” makes reference to the two essential concepts
d) All of the mentioned
a

Point out the wrong statement.


a) Azure enables .NET Framework applications to run over the Internet
b) Cloud Computing has two distinct sets of models
c) Amazon has built a worldwide network of datacenters to service its search engine
d) None of the mentioned
c

Which of the following model attempts to categorize a cloud network based on four dimensional factors?
a) Cloud Cube
b) Cloud Square
c) Cloud Service
d) All of the mentioned
a

Which of the following is the correct statement about cloud types?


a) Cloud Square Model is meant to show is that the traditional notion of a network boundary being the network’s firewall no l

b) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
c) Service model defines the purpose of the cloud and the nature of how the cloud is located
d) All of the mentioned
b
Which architectural layer is used as a backend in cloud computing?
a) cloud
b) soft
c) client
d) all of the mentioned
a

All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.
a) noise
b) propagation
c) latency
d) all of the mentioned
c

Which of the following architectural standards is working with cloud computing industry?
a) Web-application frameworks
b) Service-oriented architecture
c) Standardized Web services
d) All of the mentioned
b

Which of the following is the correct statement?


a) Cloud computing presents new opportunities to users and developers
b) Service Level Agreements (SLAs) is small aspect of cloud computing
c) Cloud computing does not have impact on software licensing
d) All of the mentioned
a

What is the correct formula to calculate the cost of a cloud computing deployment?
a) CostCLOUD = Σ(UnitCostCLOUD / (Revenue + CostCLOUD))
b) CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))
c) CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
d) None of the mentioned
b)

Which of the following is the wrong statement about cloud computing?


a) Private cloud doesn’t employ the same level of virtualization
b) Data center operates under average loads
c) Private cloud doesn’t pooling of resources that a cloud computing provider can achieve
d) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
a

You might also like