Information Technology (IT) MCQs

Information Technology (IT) MCQs

These Information Technology (IT) multiple-choice questions and their answers will help you strengthen your grip on the subject of Information Technology (IT). You can prepare for an upcoming exam or job interview with these 80+ Information Technology (IT) MCQs.
So scroll down and start answering.

1: To move files between drives, you can use all of the following except ________.

A.   Hold down the Shift key while dragging

B.   Use the Cut and Copy commands

C.   Drag while holding down the right mouse key

D.   Use the Ctrl + M keys

2: The period of time that exist between wireless frames is called __________.

A.   Duration/ID field.

B.   NAV Value.

C.   Interframe Space.

D.   Carrier Sense

3: The organizational structure of the files and folders on a computer is the _______,

A.   Start Menu

B.   Menu folder

C.   File folder

D.   File directory

4: You relate tables to one another by using _______ fields.

A.   Common

B.   Source

C.   Criteria

D.   Starting

5: Your computer needs a(n) _____ to access a network.

A.   SMS

B.   LTE

C.   NIC

D.   Bot

6: The _____ system is used to represent rgb color in digital graphics.

A.   Hexadecimal

B.   Cloud computers

C.   Not decimal

D.   Battery life

7: The vga standard offers _______________ colors at a resolution of 640 × 480 pixels.

A.   16

B.   24

C.   32

D.   64

8: The set of possible values for an attribute is a ____.

A.   Key

B.   Set

C.   Range

D.   Domain

9: The term big data refers to the ________.

A.   Concerns about reactions to privacy infringement

B.   Identify customers and get to know them in as much detail as possible

C.   Exponential growth of structured and unstructured data that are difficult to process using traditional database techniques

D.   Customize some aspects of the products or services offered to each customer

10: The web was introduced in _______.

A.   1989

B.   1929

C.   1971

D.   1924

11: On a wiring diagram, s110 with a ".8 brn/blk" means ________.

A.   Circuit #.8, spliced under the hood

B.   A connector with 0.8 mm 2 wire

C.   A splice of a brown with black stripe, wire size being 0.8 mm 2 (18 gauge AWG)

D.   Both a and b

12: A ________ is a personal journal posted on the web

A.   Blog

B.   Podcast

C.   Wiki

D.   Webcast

13: A single spreadsheet document is often called a ____.

A.   Cell

B.   Database

C.   Workbook

D.   Worksheet

14: When loops are nested, _____.

A.   Both must be the same type—definite or indefinite

B.   One must end before the other begins

C.   They typically share a loop control variable

D.   None of the above

15: The control variable of a counter-controlled loop should be declared as ________to prevent errors.

A.   Int

B.   Float

C.   Double

D.   Any of the above

16: _______ are the fundamental activities that organizations use to do work and achieve their goals.

A.   Inputs

B.   Processes

C.   Operations

D.   Tasks

17: ________ information is information that directly pertains both to the context and to the subject.

A.   Measurable

B.   Relevant

C.   Expensive

D.   Timely

18: The ____ query combines rows from two queries and excludes duplicates.

A.   UNION

B.   UNION ALL

C.   INTERSECT

D.   MINUS

19: _____ is a relational set operator.

A.   MINUS

B.   PLUS

C.   ALL

D.   EXISTS

20: ________ is used to undo unwanted database changes.

A.   Rollback

B.   Rollforward

C.   Restart

D.   Encryption

21: A derived attribute ____.

A.   Has many values

B.   Must be stored physically within the database

C.   Must be based on the value of three or more attributes

D.   Need not be physically stored within the database

22: A ____ should be a derived attribute

A.   Person's name

B.   Person's age

C.   Person's social security number

D.   Person's phone number

23: An example of a(n) _____ is unix.

A.   Operating system

B.   SAN

C.   RAID

D.   Server

24: _____ reduces the customer's need for software maintenance, operation, and support.

A.   Hardware as a Help

B.   Software as a Service

C.   Processing as a Product

D.   Storage as a Solution

25: Todos los lunes yo ______________ la ropa. (planchar)

A.   Escribían

B.   El conductor

C.   Planchaban

D.   None of these

26: If an organization opts for software as a service (saas), it will have to ________.

A.   Install an operating system on the server

B.   Purchase licenses for software replication

C.   Transfer data and develop procedures

D.   Install a database management system

27: ____ are the characteristics that define an object as part of a class.

A.   Attributes

B.   Features

C.   Both a & b

D.   Non ot above

28: A(n) ______ database is a huge database used to analyze transactions.

A.   Object-oriented

B.   Relational

C.   Data warehouse

D.   Distributed

29: Isp stands for ________.

A.   Internet Survey Period

B.   Integrated Service Provider

C.   Internet Security Protocol

D.   Internet Service Provider

30: A computer program that imitates human thinking is a(n) ________.

A.   Information interface

B.   Decision support system

C.   Enterprise resource planning system

D.   Expert system

31: Clerical workers using computers for word-processing tasks is an example of job _____.

A.   Job rotation

B.   Job deskilling

C.   Job upgrading

D.   Job virtualization

32: ____ allows you to specify multiple images and their properties in a comma-separated list.

A.   CSS3

B.   Cover

C.   Auto

D.   CSS

33: ________ can cause data to arrive at uneven intervals on wireless networks.

A.   Multiple propagation modes

B.   Crosstalk

C.   Subnet mask

34: According to mcafee, ________ now pose the greatest security risks.

A.   Databases

B.   Software as a service

C.   Email

D.   Mobile devices

E.   Social media

35: Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.

A.   Smart phone

B.   Laptop

C.   Computer

D.   None of these

36: All of the following are tips for professional e-mail etiquette except ________.

A.   Be concise and to the point

B.   Use spell-checker and proofread before sending

C.   use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter

D.   Include a meaningful subject line

37: An ________________ modifies or further describes the function of an element.

A.   Tag

B.   Doctype

C.   Attribute

D.   None of the above

38: An agency that offers accreditation for health-oriented websites is ____.

A.   Cancer.gov

B.   CAPHIS

C.   URAC

D.   PCPFS

39: An uninvited email solicitation to buy something is an example of ________.

A.   Flaming

B.   Spam

C.   Pharming

D.   Instant messaging

40: Border widths can be expressed using the keywords ____, medium, or thick.

A.   Thin

B.   Auto

C.   Average

D.   Slim

41: Cd-rom is an example of a(n) _______ type of storage medium.

A.   Head crash

B.   Optical disc

C.   Nonvolatile storage

D.   Cloud storage

42: Character entity references are inserted using the syntax _____.

A.  

B.   Charset=”encoding”

C.   &char

D.   “charset=utf-8”

43: Hr apps are leased in __________ arrangements.

A.   Social networks

B.   ERM

C.   SaaS

D.   Virtual

44: The "fathers of the internet" are vinton cerf and ________.

A.   Robert Cailliau

B.   Bill Gates

C.   Tim Berners-Lee

D.   Robert Kahn

45: The web page displayed when a user first visits a site is called a(n) _____.

A.   Push technology

B.   Splash screen

C.   Optical center

D.   Display/banner

46: Businesses should consider twitter as a social network where the dominant focus is on ________.

A.   Status updates

B.   Local news

C.   Customer experience

D.   Generating sales

47: _____ was one of the first to offer saas for crm software.

A.   Microsoft

B.   Salesforce.com

C.   Oracle

D.   SAP

48: After a workers h-1b visa expires, the foreigner must _____.

A.   Remain outside the United States for one year before another H-1B petition will be approved

B.   Work in specialty occupations that require at least a four-year bachelors degree

C.   Even if contractors sign an agreement indicating that they are contractors and not employees

D.   None of the above

49: ______ information can be proved as correct or incorrect.

A.   Accurate

B.   Useful

C.   Verifiable

D.   Organized

50: A _____ is an audio output device that converts text to speech.

A.   Custom

B.   Voice Synthesizer

C.   Programming

D.   System

51: A petaflop represents _____ floating-point operations.

A.   One thousand trillion

B.   10 billion

C.   One million

D.   100 billion

52: An economy that uses new technology _______.

A.   Experiences an increase in its standard living but does not overcome scarcity

B.   All economic activity is coordinated by markets

C.   Factors of production from households to firms and the flow of goods and services from firms to households

D.   None of the above

53: Genetically modified papayas have been created to __________.

A.   Improve the flavor of the fruit

B.   Increase the amount of fruit

C.   Increase resistance to disease

D.   Improve the nutritional value of the fruit

54: In 2015, around ____ percent of the worlds population had an internet connections.

A.   50%

B.   25%

C.   46%

D.   30%

55: A(n) _________ refers to a fixed cell location that never changes.

A.   Record

B.   Cell address

C.   Format

D.   Absolute referance

56: ___________ domain is reserved for the u.s. military.

A.   .mil

B.   .com

C.   .us

D.   None of these

A.   Version 4

B.   Version 97.1

C.   Version 4.1

D.   Version 3.1

58: The speed of a level of cache memory is impacted by ________.

A.   The chip's proximity to the CPU

B.   The size of the hard drive

C.   The physical size of the chip

D.   The amount of storage space on the chip

59: If your hand is on the keyboard, use the ribbon for formatting. _________________________

A.   False

B.   True

60: I am brave, i am _____ i am who i'm meant to be, this is me

A.   Bruised

B.   Phone

C.   Ground

D.   Heading

61: In scene 1, creon suspects __________ motivated the person who buried polyneices.

A.   Conscience

B.   Money

C.   Loyalty

D.   Love

62: A ____ can also indicate the encoding used in an xhtml document.

A.   Meta element

B.   MIME element

C.   Title element

D.   Anchor element

63: A kindle ebook reader is an example of a(n) _____ computer.

A.   White-Hat

B.   Web Server

C.   Special Purpose

D.   Zombie

64: According to nist sp 800-14's security principles, security should ________.

A.   Support the mission of the organization

B.   Require a comprehensive and integrated approach

C.   Be cost-effective

D.   All of the above

65: An organization that provides a wide range of support services to users is called a(n) ____.

A.   Help desk

B.   Peer support

C.   Hotline

D.   User support center

66: If you are balancing a checkbook, you would most likely use ____ software.

A.   Spreadsheet

B.   Word processing

C.   Database

D.   Presentation

67: ________ tools enable people to connect and exchange ideas.

A.   Affective computing

B.   Social media

C.   Debugging

D.   Computer forensics

68: A ________ divides presentation content into meaningful groups of slides.

A.   Section

B.   Slice

C.   Sector

D.   Segment

69: _____ was invented to standardize computer interfaces around one type of connection.

A.   The expansion card

B.   The USB port

C.   Blu-ray

D.   OLED

70: ______ is data that is entered into a computer. ______ is the result produced by a computer.

A.   Supercomputer

B.   Input, Output

C.   Dot pitch

D.   Oleophobic

71: ______ refers to the deliberate falsification of information.

A.   Disinformation

B.   Key-word

C.   Narrative

D.   Two to seven

72: ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.

A.   Push publishing

B.   Reporting analysis

C.   Cloud computing

D.   Publish results

73: ______________________ is the point of view that is most like a video camera recording events.

A.   First Person

B.   Objective

C.   Limited Omniscent

D.   Omniscent

74: A keyblock is _____________________

A.   A flat surface with layers of material cut away to create an image

B.   Used to create a black outline before the color is added

C.   Found on the surface of a wooden block where the carving is done

D.   A triangular shaped printmaking tool used to produce a rounded line

75: Software designed specifically for a highly specialized industry is called ____.

A.   Horizontal market software

B.   Mass-market software

C.   Vertical market software

D.   Industry standard software

76: Types of risky behaviors of free and paid mobile apps include all of the following except ________.

A.   Location tracking

B.   Accessing the device's address book or contact list

C.   Decrypting messages

D.   Sharing data with ad networks and analytics companies

77: In pcdata, the ____ symbol is used to mark the beginning of an element tag.

A.   >

B.   <

C.   &

D.   ;

E.   *

78: In the past 10 years, the digital divide in the united states has ____.

A.   Energy Star

B.   Shrunk

C.   Accessibility

D.   None of these

79: Server virtualization in windows server 2012 r2 is based on a module called the _________.

A.   Virtual architecture

B.   Hyper-v

C.   Hypervisor

D.   Virtual machine

80: To erase an entire entry in a cell and then reenter the data from the beginning, press the ____ key

A.   Alt

B.   Esc

C.   Ctrl

D.   Tab

81: To round off any of the four corners of a border, the _____ property should be applied.

A.   ​border-width

B.   ​border-style

C.   ​border-radius

D.   Border-image

82: 5g standards are expected to have a target speed of _____ to mobile devices.

A.   1 Gbps

B.   2 Gbps

C.   3 Gbps

D.   4 Gbps

83: A _____ printer heats specially coated paper to produce an image.

A.   Magnetic

B.   Thermal

C.   Several

D.   Megahertz

84: ____ is an attempt by opposing attorneys to prevent you from serving on an important case.

A.   Conflicting out

B.   Direct examination

C.   Exculpatory

D.   Deposition

85: When you turn on a computer, windows starts and displays a ____ consisting of the time and date.

A.   User name screen

B.   Start screen

C.   Sign-in screen

D.   Lock screen

86: Digital certificates can be used for each of these except _____.

A.   To encrypt channels to provide secure communication between clients and servers

B.   To encrypt messages for secure email communications

C.   To verify the authenticity of the Registration Authorizer

D.   To verify the identity of clients and servers on the Web