Information Technology MCQ
Information Technology MCQ
solution
2
solution
solution
solution
solution
6
solution
solution
solution
solution
10
solution
11
solution
12
solution
13
solution
14
solution
15
solution
16
solution
17
solution
18
solution
19
solution
20
solution
21
solution
22
solution
23
solution
24
solution
25
solution
26
solution
27
solution
28
solution
29
solution
30
solution
31
solution
32
solution
33
solution
34
solution
35
solution
36
solution
37
solution
38
solution
39
solution
40
solution
41
solution
42
solution
43
solution
44
solution
45
solution
46
solution
47
solution
48
solution
49
solution
50
solution
51
solution
52
solution
53
solution
54
solution
55
solution
56
solution
57
solution
58
solution
59
solution
60
solution
61
solution
62
solution
63
solution
64
solution
65
solution
66
solution
67
solution
68
solution
69
solution
70
solution
71
solution
72
solution
73
solution
74
solution
75
solution
76
solution
77
solution
78
solution
79
solution
80
solution
81
solution
82
solution
83
solution
84
solution
85
solution
86
solution
87
solution
88
solution
89
solution
90
solution
91
solution
92
solution
93
solution
94
solution
95
solution
96
solution
97
solution
98
solution
99
solution
100
solution
MCA 104 Information Technology
c
What is wireless communication?
a) Sending data from one location to with the use of physical medium
b) Sending data from one location to another without the use of physical medium
c) Sending data from one location to another without the use of virtual medium
d) None of the mentioned
b
Which of the following is the world’s first cellular system to specify digital modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
a
Which of the following should be replaced with question mark in the figure shown below?
a) SMTP
b) HTTP
c) SIP
d) None of the mentioned
c
Each IS-95 channel occupies ___________ of spectrum on each one way link.
a) 1.25 MHz
b) 1.25 kHz
c) 200 kHz
d) 125 kHz
a
Which ofsignature
a)Digital the following, dubbed Sunburst, was used by nation-state actors to bypass SolarWinds' security mechanisms and gai
b)Backdoor
c)Buffer overflow
d)Adware
b
A firewall is installed at the point where the secure internal network and untrusted external network meet which is also know
a) Chock point
b) Meeting point
c) Firewall point
d) Secure point
a
In _________________ attacks, the attacker manages to get an application to execute an SQL query created by the attacker.
a) SQL injection
b) SQL
c) Direct
d) Application
a
A single ______________ further allows the user to be authenticated once, and multiple applications can then verify the user’
service without requiring reauthentication.
a) OpenID
b) Sign-on system
c) Security Assertion Markup Language (SAML)
d) Virtual Private Database (VPD)
b
The __________ standard is an alternative for single sign-on across organizations, and has seen increasing acceptance in rece
a) OpenID
b) Single-site system
c) Security Assertion Markup Language (SAML)
d) Virtual Private Database (VPD)
a
The stock market services offered via mobile devices is knows as …………..
a) Mobile Brokerage
b) M-Brokerage
c) Brokerage
d) E-com
a
The most commonly used network protection barrier between the company's network and the outside world is a………………
a) Firewall
b) Anti virus
c) Virus
d) Worm
a
What’s the key benefit of using deep learning for tasks like recognizing images?
a) They need less training data than other methods.
b) They’re easier to explain and understand than other models.
c) They can learn complex details from the data on their own.
d) They work faster and are more efficient computationally.
c
Which one of the following models is a generative model used in machine learning?
a) Support vector machines
b) Naïve Bayes
c) Logistic Regression
d) Linear Regression
b
An artificially intelligent car decreases its speed based on its distance from the car in front of it. Which algorithm is used?
a) Naïve-Bayes
b) Decision Tree
c) Linear Regression
d) Logistic Regression
c
What is IoT?
a) network of physical objects embedded with sensors
b) network of virtual objects
c) network of objects in the ring structure
d) network of sensors
a
Which of the following is used to capture data from the physical world in IoT devices?
a) Sensors
b) Actuators
c) Microprocessors
d) Microcontrollers
a
Which of the following command is used to trigger the Amazon echo IOT device?
a) Hello
b) Suri
c) Alexa
d) Hey
c
Which of the following is not a feature of the Raspberry PI model B IoT device?
a) It has 256 MB SDRAM
b) It has a single USB connector
c) It has its own operating system
d) It has an Ethernet port
a
Applications and services that run on a distributed network using virtualized resources is known as ___________
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing
d
Which of the following is an example of a PaaS cloud service?
a) Heroku
b) AWS Elastic Beanstalk
c) Windows Azure
d) All of the above
d
Which of the following model attempts to categorize a cloud network based on four dimensional factors?
a) Cloud Cube
b) Cloud Square
c) Cloud Service
d) All of the mentioned
a
b) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
c) Service model defines the purpose of the cloud and the nature of how the cloud is located
d) All of the mentioned
b
Which architectural layer is used as a backend in cloud computing?
a) cloud
b) soft
c) client
d) all of the mentioned
a
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.
a) noise
b) propagation
c) latency
d) all of the mentioned
c
Which of the following architectural standards is working with cloud computing industry?
a) Web-application frameworks
b) Service-oriented architecture
c) Standardized Web services
d) All of the mentioned
b
What is the correct formula to calculate the cost of a cloud computing deployment?
a) CostCLOUD = Σ(UnitCostCLOUD / (Revenue + CostCLOUD))
b) CostCLOUD = Σ(UnitCostCLOUD / (Revenue – CostCLOUD))
c) CostCLOUD = Σ(UnitCostCLOUD x (Revenue – CostCLOUD))
d) None of the mentioned
b)