ITI Computer Hardware and Networking Questions and Answers

ITI Computer Hardware and Networking previous year question papers help the aspirants in the preparation. Also, check the exam pattern and syllabus details before going to the ITI Computer Hardware and Networking. ITI Computer Hardware and Networking exam model question papers are here.

ITI Computer Hardware and Networking Questions and Answers

Aspirants can find the respective download links for ITI Computer Hardware and Networking Previous Papers Pdf. Check the latest ITI Computer Hardware and Networking recruitment details on our page. Find the subjects need to cover to crack the examinations in our ITI Computer Hardware and Networking Syllabus page.

Later, download the previous year Paper given below and start your preparation.

Questions and Answers for ITI Computer Hardware and Networking

1. How many instances of an abstract class can be created?
(A) 1
(B) 10
(C) 0
(D) 4

2. Which of the following is the 2’s compliment of 1011?
(A) 1010
(B) 1100
(C) 0101
(D) 0111

3. Which of the following commands is used to update access and modification?
(A) we
(B) touch
(C) grep
(D) cat

4. A high speed device used in CPU for temporary storage during processing is called
(A) A Registrar
(B) A Data bus
(C) A Bus
(D) All of the above

5. Which of the following statement is correct?
(A) Base class pointer cannot point to derived class
(B) Derived class pointer cannot point to base class
(C) Pointer to derived class cannot be created
(D) Pointer to base class cannot be created

6. Bottom up parsing involves:
(A) Shift reduce
(B) Operator check
(C) Handle Pruning
(D) (A) and (B)

7. Which of the following cannot be friend?
(A) Function
(B) Object
(C) Class
(D) Operator Function

8. Which is a valid keyword in Java?
(A) Interface
(B) Float
(C) String
(D) Unsigned

9. The average time necessary for the correct sector of a disk to arrive at the read write head as
(A) Down time
(B) Latency time
(C) Seek time
(D) Access time

10. Type checking is normally done during:
(A) Lexical analysis
(B) Code Generation
(C) Syntax Analysis
(D) Syntax directed translation

11. Which command is used to remove a file?
(A) Remove
(B) mv
(C) rm
(D) del

12. Which of the following is considered as DBMS?
(A) Foxpro
(B) MS Access
(C) Oracle
(D) All of the above

13. Which of the following is not a type of oonstructor?
(A) Copy constructor
(B) Default Constructor
(C) Friend Constructor
(D) Parameterized Constructor

14. Which of the following System software resides in the main memory always?
(A) Text Editor
(B) Assembler
(C) Linker
(D) Loader

15. When was Apple Macintosh II micro computer introduced in the market?
(A) 1964
(B) 1983
(C) 1970
(D) 1986

16. FDDI is a:
(A) Ring Network
(B) Mesh Network
(C) star Network
(D) Bus Network

17. Which command is used to display the top of the file?
(A) Cat
(B) Head
(C) More
(D) Grep

18. Which of the following device is used to connect two systems, especially if the systems use different protocols?
(A) Hub
(B) Bridge
(C) Gateway
(D) Repeater

19. EBCDIC can code up to how many different characters:
(A) 8
(B) 32
(C) 64
(D) 256

20. Which 32-bit microprocessor is used in IBM’s PS/2 model-80 computer?
(A) 8088
(B) 80286
(C) 80386
(D) 80486

Questions for ITI Jobs

Refrigeration and Air Conditioner Carpenter
Automobile Engineering Lineman
Printing Technology Wireman
Tool and Die Maker Electrician
Boiler Operator Electrical
Pump Operator Mechanic
Architectural Draftsman Surveyor
Draughtsman Civil Instrument Mechanic
Masonry Electronics Mechanic
Welder Information Technology
Fitter Computer Hardware
Turner Steel Fabricator
Plumber Electroplater

21. The Boolean expression X = A + B + C + is logically equivalent to what. single gate:
(A) NAND
(B) NOR
(C) AND
(D) OR

22. What php stands for?
(A) Pre Hypertext processor
(B) Hyper text Preprocessor
(C) Pre Hyper processor
(D) Pre Hyper text process

23. Which of the following statement is correct?
(A) Class is an instance of object
(B) Object is an instance of a class
(C) Class is an instance of data type
(D) Object is an instance of data type

24. Which of the following is an abstract data type?
(A) Int
(B) Double
(C) String
(D) Class

25. Which of the following is the address of the router?
(A) The IP address
(B) The TCP address
(C) The subnet mask
(D) The default gateway

26. The ______________ layer is the layer closest to the transmission medium.
(A) Transport
(B) Physical
(C) Network
(D) Datalink

27. ASCII stands for:
(A) All purpose Scientific Code for Information Interchange
(B) American Standard Code for Information Interchange
(C) American Security Code for Information Interchange
(D) American Scientific Code for Information Interchange

28. 1024 Kilobytes represent a:
(A) 1 MB
(B) 1KB
(C) 1 GB
(D) None of these

29. The ASCII code for the character J is:
(A) 1001 0001
(B) 0100 1010
(C) 1001 1010
(D) 1010 0001

30. Which of the following is not a function of DBA?
(A) Network maintenance
(B) Schema Definition
(C) Routine Maintenance
(D) Authorization for data access

31. A system program that combines the separately compiled modules of a program into a form suitable for execution:
(A) Assembler
(B) Cross compiler
(C) Linking Loader
(D) Load and Go

32. The software used to convert source program instructions to object instruction is known as
(A) Compiler
(B) Interpreter
(C) Assembler
(D) Language Processor

33. To copy the hidden system files of DOS to another disk you can use the command:
(A) Copy
(B) Ren
(C) Sys
(D) Diskcopy

34. Which of the following is a group of one or more attributes that uniquely identifies a row?
(A) Key
(B) Domain
(C) Tuple
(D) Relation

35. A full binary tree with 2n +1 nodes contain:
(A) n leaf nodes
(B) n non leaf nodes
(C) n-1 leaf nodes
(D) n-1 non leaf nodes

36. What docs Belady’s Anomaly related to?
(A) Page Replacement Algorithm
(B) Memory Management Algorithm
(C) Deadlock prevention Algorithm
(D) Disk scheduling Algorithm

37. In Which year the first operating system was developed:
(A) 1910
(B) 1940
(C) 1950
(D) 1980

38. The geostationary satellite used for communication systems:
(A) Rotates with the earth
(B) Remains stationary relative to the earth
(C) ls positioned over equator
(D) All of the above

39. What is the port number of POP3?
(A) 80
(B) 110
(C) 90
(D) 49

40. A relation is in this form if it is in BCNF and has no multivalued dependencies:
(A) Second normal form
(B) Third normal form
(C) Fourth normal form
(D) Domain/Key normal form

41. Who programmed the first computer game spacewar in 1962?
(A) Steel Russell
(B) Konard Zuse
(C) Alan Emtage
(D) Tim Berners-lee

42. Which access method is used for obtaining a record from a cassette lap?
(A) Direct
(B) Random
(C) Sequential
(D) All of the above

43. A technique for direct search is:
(A) Linear search
(B) Hashing
(C) Binary search
(D) Tree Search

44. The postfix form of the expression:
(A+ B)*(C*D-E)*F/G is
(A) AB+CD*E-FG/*”
(B) AB+CD*E-*F*G/
(C) AB+CD*E-F**G/
(D) AB+CDE*-*F*G/

45. What does PPTP stands for?
(A) Point to Point Transmission Protocol
(B) Point to Point Tunneling Protocol
(C) Point to Point Transfer Protocol
(D) Point to Point Traffic Protocol

46. Which of the following statement is correct?
(A) C++ allows static type checking
(B) C++ allows dynamic type checking
(C) C++ allows static member function be of type const
(D) Both (A) and (B)

47. Which is a reserved word in the Java programming language?
(A) Method
(B) Reference
(C) Native
(D) subclass

48. The communication mode that supports two-way traffic but only one direction at time is
(A) Simplex
(B) Halfduplex
(C) Duplex
(D) multiplex

49. What is thrashing?
(A) A high paging activity is called thrashing
(B) A high executing activity is called thrashing
(C) A extremely long process is called thrashing
(D) A extremely long virtual memory is called thrashing

50. Linux Torvalds develop which operating system:
(A) Windows
(B) Mac OS
(C) UNIX
(D) Linux

51. Which operating system is developed and used by Apple Inc?
(A) Windows
(B) Android
(C) iOS
(D) UNIX

52. Which one is the current fastest super computer in India?
(A) Param Padma
(B) SAGA-220
(C) PARAM YUVA II
(D) EKA

53. Which of the following concepts means wrapping up of data and functions together?
(A) Abstraction
(B) Encapsulation
(C) Inheritance
(D) Polymorphism

54. One solution to the multivalued dependency constraint problem is to:
(A) Split the relation into two relations each with a single theme
(B) Change the theme
(C) Create a new theme
(D) Add a composite key

55. Which of the following algorithm solves the pair shortest path problem?
(A) Floyd’s algorithm
(B) Warshall’s algorithm
(C) Prim’s algorithm
(D) Dijkstra’s algorithm

56. Which of the following is an invalid visibility label while inheriting a class?
(A) Public
(B) Private
(C) Protected
(D) friend

57. What does SSL stands for?
(A) System Socket Layer
(B) Secure System Login
(C) Secure Socket Layer
(D) Secure System Layer

58. What hardware architectures are not supported by Red Hat?
(A) SPARC
(B) IBM-COMPATIBLE
(C) Alpha
(D) Macintosh

59. How many types of Polymorphisms are supported by C++?
(A) 1
(B) 2
(C) 3
(D) -1

60. Which address is the loop hack address?
(A) 0.0.0.1
(B) 127.0.0.0
(C) 127.0.0.1
(D) 255.255.255.255

61. Process are classified into different groups in:
(A) Multilevel queue scheduling algorithm
(B) Priority scheduling algorithm
(C) Round robin scheduling algorithm
(D) Shortest job scheduling algorithm

62. Which keys can be used to pressed quit without saving in DOS?
(A) Ctrl + A
(B) Ctrl + B
(C) Ctrl + D
(D) Ctrl + C

63. The OS of a computer may periodically collect all the Cree memory space to form continuous block of free space. This is called: _
(A) Garbage collection
(B) Concatenation
(C) Collision
(D) Dynamic Memory Allocation

64. Who was the father of Punched Card processing?
(A) J. Presper Eckert
(B) Charles Babbage
(C) Dr. Herman Holleritli
(D) Blaise Pascal

65. What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers?
(A) 16
(B) 9
(C) 8
(D) 4

66. India’s first super computer param 8000 was installed in:
(A) 1988
(B) 1982
(C) 1995
(D) 1991

67. The number of interchanges required w sort 5, 1, 6, 2, 4 in ascending order using Bubble sort is:
(A) 6
(B) 5
(C) 7
(D) 8

68. Modem is used data transmission when was it invented and in which country:
(A) 1963, USA
(B) 1965, Germany
(C) 1950, USA
(D) 1950, Japan

69. In Php variable name starts with:
(A) !
(B) &
(C) #
(D) $

70. The person contributes the idea of the stored program was:
(A) Charles Babbage
(B) Howard Aiken
(C) Jon Von Neuman
(D) Winton Cerf

71. Father of Java programming language:
(A) Dennis Richi
(B) James Goslin
(C) Simer Crey
(D) James Russel

72. A semaphore:
(A) is a binary mutex
(B) Must be accessed from only one process
(C) Can be accessed from multiple process
(D) None of these

73. In OSI model, which of the following layer provides error-free delivery of data:
(A) Data link
(B) Network
(C) Transport
(D) Session

74. Which of the following is not a level of data abstraction?
(A) Physical layer
(B) Critical level
(C) Logical level
(D) View level

75. ISP exchanges internet traffic between their networks by:
(A) Internet exchange point
(B) Subscriber end point
(C) ISP end point
(D) None of the above

76. What are the most commonly used transmission speeds in BPS used in data communication?
(A) 300
(B) 1200
(C) 2400
(D) 9600

77. Which of the following is a data model?
(A) Entity—Relationship model
(B) Relational data model
(C) Object-Based data model
(D) All of the above

78. What is the default subnet mask for a class A network?
(A) 127.0.0.1
(B) 255.0.0.0
(C) 255.255.255.0.0
(D) 255.2552.255.0