Important NTS MCQs of I.T Skills
2.
programs designed to perform specific tasks is known as
a. system software
b. application software
c. utility programs
d. operating system
b. application software
c. utility programs
d. operating system
ans.b. application software
3.
perforated paper used as input of output media is known as
a. paper tapes
b. magnetic tape
c. punched papers tape
d. card punch
b. magnetic tape
c. punched papers tape
d. card punch
ans.a. paper tapes
4.
Time during which a job is processed by the computer is
a. Delay times
b. Real time
c. Execution time
d. Down time
b. Real time
c. Execution time
d. Down time
ans.c. Execution time
5.
a computer which CPU speed around 100 million instruction
per second and with the word length of around 64 bits is known as
a. Super computer
b. Mini computer
c. Micro computer
d. Macro computer
b. Mini computer
c. Micro computer
d. Macro computer
ans.a. Super computer
6.
An approach that permits the computer to work on several programs instead of
one is
a. On-line thesaurus
b. Multiprogramming
c. Over lapped processing
d. Outline processor
b. Multiprogramming
c. Over lapped processing
d. Outline processor
ans.a. Super computer
7.
A directly accessible appointment calendar is feature of a … resident package
a. CPU
b. Memory
c. Buffer
d. ALU
b. Memory
c. Buffer
d. ALU
ans.b. Memory
8.
The term gigabyte refers to
a. 1024 bytes
b. 1024 kilobytes
c. 1024 megabytes
d. 1024 gigabyte
b. 1024 kilobytes
c. 1024 megabytes
d. 1024 gigabyte
ans.1024 megabytes
9.
Which of the following processors use RISC technology?
a. 486dx
b. Power PC
c. 486sx
d. 6340
b. Power PC
c. 486sx
d. 6340
ans.b. Power PC
10.
A/n …. Device is any device that provides information, which is sent to the CPU
a. Input
b. Output
c. CPU
d. Memory
b. Output
c. CPU
d. Memory
ans.a. Input
11.
Current SIMMs have either … or … connectors (pins)
a. 9 or 32
b. 30 or 70
c. 28 or 72
d. 30 or 72
b. 30 or 70
c. 28 or 72
d. 30 or 72
ans.d. 30 or 72
12.
The storage subsystem in a microcomputer consists mainly of … or … media with
varying capacities
a. Memory or video
b. Magnetic or optical
c. Optical or memory
d. Video or magnetic
b. Magnetic or optical
c. Optical or memory
d. Video or magnetic
ans.b. Magnetic or optical
13.
Which of the following is not an input device?
a. OCR
b. Optical scanners
c. Voice recognition device
d. COM (Computer Output to Microfilm)
b. Optical scanners
c. Voice recognition device
d. COM (Computer Output to Microfilm)
ans.d. COM (Computer Output to
Microfilm)
14.
The central processing unit (CPU) consists of
a. Input, output and processing
b. Control unit, primary storage, and secondary storage
c. Control unit, arithmetic-logic unit and primary storage
d. Control unit, processing, and primary storage
b. Control unit, primary storage, and secondary storage
c. Control unit, arithmetic-logic unit and primary storage
d. Control unit, processing, and primary storage
ans.c. Control unit, arithmetic-logic
unit and primary storage
15.
EBCDIC can code up to how many different characters?
a. 256
b. 16
c. 32
d. 64
b. 16
c. 32
d. 64
ans.a. 256
16.
Which is considered a direct entry input device?
a. Optical scanner
b. Mouse and digitizer
c. Light pen
d. All of the above
b. Mouse and digitizer
c. Light pen
d. All of the above
ans.d. All of the above
17.
Which is used for manufacturing chips?
a. Bus
b. Control unit
c. Semiconductors
d. A and b only
b. Control unit
c. Semiconductors
d. A and b only
ans.c. Semiconductors
18.
The computer code for the interchange of information between terminals is
a. ASCII
b. BCD
c. EBCDIC
d. All of above
b. BCD
c. EBCDIC
d. All of above
ans.a. ASCII
19.
A byte consists of
a. One bit
b. Four bits
c. Eight bits
d. Sixteen bits
b. Four bits
c. Eight bits
d. Sixteen bits
ans.c. Eight bits
20.
A hybrid computer
a. Resembles digital computer
b. Resembles analog computer
c. Resembles both a digital and analog computer
d. None of the above
b. Resembles analog computer
c. Resembles both a digital and analog computer
d. None of the above
21. A ____________ is approximately one billion
bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that
you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are located in
the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of input
devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of an
input device?
A. scanner
B. speaker
C. CD
D. printer
A. scanner
B. speaker
C. CD
D. printer
27. The 0 and 1 in the binary numbering system are
called binary digits or …….
(a) bytes (b) kilobytes (c) decimal bytes (d) bits (e) nibbles
Ans (D)
(a) bytes (b) kilobytes (c) decimal bytes (d) bits (e) nibbles
Ans (D)
28. A monitor’s …… is the distance between the holes in
the mask behind the screen. This helps determine how sharp the dots appear.
(a) refresh rate (b) dot pitch (c) resolution
(d) colour depth (e) None of the above
Ans (B)
(a) refresh rate (b) dot pitch (c) resolution
(d) colour depth (e) None of the above
Ans (B)
29. A directly accessible appointment calendar is a
feature of a ……. resident package.
(a) CPU (b) memory (c) Buffer (d) ALU (e) None of the above
Ans (B)
(a) CPU (b) memory (c) Buffer (d) ALU (e) None of the above
Ans (B)
30. Perforated paper used as input or output media is
known as
(a) Paper tape (b) Magnetic tape (c) Punched paper tape
(d) Card punch (e) None of the above
Ans (A)
(a) Paper tape (b) Magnetic tape (c) Punched paper tape
(d) Card punch (e) None of the above
Ans (A)
31. The invention of the slide rule is attributed to
(a) Babbage (b) Oughtred (c) Pascal
(d) Napier (e) None of the above
Ans (B)
(a) Babbage (b) Oughtred (c) Pascal
(d) Napier (e) None of the above
Ans (B)
32. Which of the following is not an advantage of
magnetic disk storage.
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
(e) None of the above
Ans (e)
(a) The access time of magnetic disk is much less than that of magnetic tape
(b) Disk storage is longer lasting than magnetic tape
(c) Disk storage is less expensive than tape storage
(d) All of the above
(e) None of the above
Ans (e)
33. The memory sizes in mainframe computers and advanced
technology micro computer are expressed as
(a) Bytes (b) Kilo-bytes (c) Bits
(d) Megabytes (e) None of the above
Ans (d)
(a) Bytes (b) Kilo-bytes (c) Bits
(d) Megabytes (e) None of the above
Ans (d)
34. A prefix for billion which is equal to …. is called
as billi.
(a) 100 (b) 10000 (c) 1000 (d) 10 (e) None of the above
Ans (d)
(a) 100 (b) 10000 (c) 1000 (d) 10 (e) None of the above
Ans (d)
35. Each model of a computer has a unique
(a) Assembly language (b) Machine language
(c) High level language (d) All of the above
(e) None of the above
Ans (b)
(a) Assembly language (b) Machine language
(c) High level language (d) All of the above
(e) None of the above
Ans (b)
36. One kilobyte = ____ byte.
(a) 1250 (b) 2088 (c) 1024 (d) 1000
Ans (c)
(a) 1250 (b) 2088 (c) 1024 (d) 1000
Ans (c)
37-All of the following are examples of real
security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
38- A process known as ____________ is used by
large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
38. ____________terminals (formerly known as cash
registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
39. A(n) ____________ system is a small, wireless
handheld computer that scans an item’s tag and pulls up the current price
(and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
40. The ability to recover and read deleted or
damaged files from a criminal’s computer is an example of a law enforcement
specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
41-. Which of the following is NOT one of the four
major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
42-. ____________ tags, when placed on an animal,
can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
43-. Surgeons can perform delicate operations by
manipulating devices through computers instead of manually. This technology is
known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
44-. Technology no longer protected by copyright,
available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
45-. ____________ is the study of molecules and
structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
Status : Offline 11. ____________ is the science
that attempts to produce machines that display the same type of intelligence
that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
46. ____________ is data that has been organized or
presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
A. A process
B. Software
C. Storage
D. Information
Answer: D
47. The name for the way that computers manipulate
data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
48. Computers gather data, which means that they
allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
A. present
B. input
C. output
D. store
Answer: B
49. After a picture has been taken with a digital
camera and processed appropriately, the actual print of the picture is
considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
A. data.
B. output.
C. input.
D. the process.
Answer: B
50. Computers use the ____________ language to
process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
52. Computers process data into information by
working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
53. In the binary language each letter of the alphabet,
each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
54. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
55. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
0 comments:
Post a Comment