Beruflich Dokumente
Kultur Dokumente
DIPLOMA IN
INFORMAT ION
TECHNOLOGY
Practice Questions
www.iqnglobal.com
Practice Questions
Information Technology
7. The payment system which is set up by the account holder and the bank itself is called
A)
B)
C)
D)
Direct Debit
Standing Order
Invoice Discounting
Charity Trust
8. The environment in an operating system that works as a base on which applications are run is
called
A)
B)
C)
D)
Software Base
Software House
Software Platform
Software Station
10. Which of the following choices is NOT necessarily a benefit of an integrated system?
A)
B)
C)
D)
Easier backup
Easier specialization
Improved security
Increased Reliability
11. The documentation that a developer writes so that other developers can read it is called
A)
B)
C)
D)
Internal Documentation
Technical Documentation
User Documentation
Development Documentation
12. Following terms include the three building blocks of JSP EXCEPT
A)
B)
C)
D)
Sequence
Iteration
Fixation
Selection
Practice Questions
Information Technology
Portability
Reliability
Maintainability
All of the above
scope
belt
tip
apex
15. Which of the followings is not a valid software devising tool used in an IDE
A)
B)
C)
D)
A
A
A
A
compiler
text editor
compass
linker
16. The management of recovering lost information due to natural or unnatural disaster is known to
be
A)
B)
C)
D)
disaster management
risk management
recovery management
lost and found management
17. Which of the following security methods can be used in order to ensure that a person is not
involved in a work process from the beginning to end?
A)
B)
C)
D)
Closed-Circuit Television
Separation of Duty
Biometrics
Firewalls
18. Software which is distributed freely for limited period after which a price is charged is called
A)
B)
C)
D)
Shareholder
Softshare
Shareware
Sharetech
Practice Questions
Information Technology
19. Common threats to the IT sector include each of the following theft EXCEPT
A)
B)
C)
D)
Customer Phishing
Webpage defacement
Debugging
None of the above
20. A ______________ software is the one where the user can modify the programming source
code.
A)
B)
C)
D)
freeware
shareware
softpad
open-source
21. The software that facilitates a developer to view the end result of internet pages or interfaces.
A)
B)
C)
D)
WDERING
WSCTIOU
WSDRTYI
WYSIWYG
Flextime Protocol
File Terminating Protocol
Floor Transforming Protocol
File Transfer Protocol
23. The benefits of e-commerce for organizations are each of the following terms EXCEPT
A)
B)
C)
D)
24. A ________ is a program placed in the search engine which reads the web contents to
facilitate
search result.
A) Octopus
B) Owl
C) Spider
Practice Questions
Information Technology
D) Viper
Scum
Spam
Spook
Spit
software system
transmittable data
quality of security
all of the above
Light
Sound
Electricity
Heat
SMC
SMTP
FTP
HTTP
Instant Messaging
Blog
Voice over Internet Protocol
SMTP
Information Technology
Practice Questions
networking
hacking
web designing
browsing
32. _________ is a small program carried in an executed file and intends to destroy other files.
A)
B)
C)
D)
Spider
Firewall
Virus
Trojan
33. Which of the following addresses is a possible IP address of the popular search engine Google?
A)
B)
C)
D)
www. google.com
64.233.183.103
233.google.103
All of the above
Sedimentary
Social
Secure
Software
Hypertext
Hypertext
Hypertext
Hypertext
Terminal Protocol
Transfer Protocol
Tertiary Protocol
Tangent Protocol
36. The reason behind the fact that trafficking of counterfeit goods through P2P networks is
difficult is
A) it is cheap
B) it is global
Practice Questions
Information Technology
C) it is decentralized
D) it is counterfeited itself
Web page
Web developer
Web server
Homepage
Website
Web browser
Mozilla
Web server
Mozilla Firefox
Microsoft Internet Explorer
Google Chrome
Apple Safari
Search Engine
Google
Search Bar
Search Machine
Practice Questions
Information Technology
C) Etheronics
D) Ethertool
43. ____________ is a non permanent connection used for light and periodic data set.
A)
B)
C)
D)
SVC
VCR
SPL
QPR
Longitudinal
Psychological
Logical
Abstract
45. The seven layers in an OSI model include each of the below EXCEPT
A)
B)
C)
D)
Application Layer
Transport Layer
Physical Layer
Connectivity Layer
46. The parts of an IP address that belong to host or network are determined by the ___________.
A)
B)
C)
D)
Sub zero
Subatomic level
Subnet Mask
Sub gradients
Wireless Frequency
Wireless Fidelity
Wireless Fire system
Wireless Fiat
Practice Questions
Information Technology
B) Storyboard
C) Mainboard
D) Whiteboard
49. The __________ conversion strategy allows the system to be checked one segment after
another.
A)
B)
C)
D)
Phased
Parallel
Corrective
Perfective
50. When a system is checked for fine modification even after having performed as expected a
____________ strategy is taken.
A)
B)
C)
D)
Parallel
Corrective
Perspective
Perfective
52. The investigative techniques used to obtain information regarding the systems include each of
the following techniques EXCEPT
A)
B)
C)
D)
Observation
Meeting
Interview
Retrospect
53. Some organizations ask employees to sign ___________, which mean that the employee is not
allowed to discuss sensitive and confidential information with individuals or groups who are
outside the organization, either while employed by the organization or after they leave.
A)
B)
C)
D)
nondisclosure agreements
nonconforming agreements
nondeliverable agreements
nonconductive agreements
Information Technology
Practice Questions
54. _______ skills are that you take with you from employer to employer and which can be applied
regardless of your job.
A) Transmitting
B) Transparent
C) Transferable
D) Critical
55. ______ is a particular structure used in integrated circuit transistor manufacture.
A) CMOS
B) GAMA
C) TEBS
D) ETHOS
56. The general equation for obtaining the value of bus multiplier is
A) maximum processor speed = processor bus speed
B) maximum processor speed = processor bus speed
C) maximum processor speed = processor bus speed
D) maximum processor speed = processor bus speed
+
x
/
maximum multiplier
maximum multiplier
maximum multiplier
maximum multiplier
57. Which decisions are decisions about what will happen within the organisation in the next five
years or so?
A) Operational
B) Tactical
C) Strategic
D) Regulative
58. Data being _____ is the most fundamental characteristic of good data/information.
A) valid
B) plenty
C) formal
D) countable
59. ________ is used to help managers predict the future, using what if? scenarios, so that they
can, as far as possible, see the consequences of decisions that they make.
A) Decision support software
B) Management Information System
C) Middleware
D) E-commerce
Practice Questions
Information Technology
60. A ______ is a specialist software application that requests web pages (and their assets e.g.
images) from a remote web server, downloads them and then renders them onto your computer
systems (or mobile devices) screen.
A) Modem
B) RAM
C) Motherboard
D) Browser
Information Technology
Practice Questions
Answer
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
B
C
C
B
D
A
B
C
A
B
B
C
D
A
C
C
B
C
C
D
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
D
D
D
C
B
B
A
A
B
C
B
C
B
C
B
C
A
C
B
B
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
A
B
A
C
D
C
B
B
A
D
D
D
A
C
A
C
B
A
A
D