ITI Information Technology & E.S.M. Engineering Questions and Answers

ITI Information Technology & E.S.M. Engineering Questions and Answers – However, the candidates who are looking for Exam Papers Information Technology can find here. Hence, here is the direct link for Previous Year Question Paper for Information Technology Exam.

ITI Information Technology & E.S.M. Engineering Questions and Answers

Here we Provide you direct link for ESM Engineering Question Paper with Answers Pdf for free of cost. ESM Engineering Previous Papers are available here to download for free. Therefore, the candidates who are preparing for Information Technology can get Information Technology Old Papers from the below links.

The candidates who had applied for ESM Engineering Exam are in search of the ESM Engineering Previous papers Solved Question Papers. For the sake of those aspirants, we have updated the Information Technology Sample Papers on our website for free of cost.

Questions and Answers on Information Technology & E.S.M. Engineering

1. Firefox. Opera, Chrome, Safari and Explorer are come under the group:
(A) Web browser
(B) Server
(C) Client
(D) OS

2. ___________ is the set of programs necessary to carry out operations for a specified application
(A) Application Software
(B) System Software
(C) Firmware
(D) Hardware

3. The radix of a hexadecimal system is:
(A) 8
(B) 3
(C) 2
(D) 16 A

4. ln which mode Windows starts with only the core drivers and services ?
(A) Safe Mode
(B) Quick Mode
(C) Normal Mode
(D) Repair Mode

5. Which of the following languages is more suited to a structured program ?
(A) PL/1
(B) FORTRAN
(C) BASIC
(D) PASCAL

6. The brain of any computer system is:
(A) Memory
(B) CPU
(C) ALL
(D) PASCAL

7. Intel 8085 microprocessor have:
(A) 8 bit data and 8 bit address
(B) 3 bit data and 16 bit address
(C) 16 bit data and 16 bit address
(D) None of the above

8. The ASCII code (in HEX) of alphabet A is:
(A) 30
(B) 31
(C) 41
(D) 40

9. End to end connectivity is provided from host to host in:
(A) Network layer
(B) Session layer
(C) Data link layer
(D) Transport layer

10. A software program stored in a ROM that cannot be changed easily is known as:
(A) Hardware
(B) Linker
(C) Editor
(D) Firmware

11. The indicator on the screen that shows where things will happen next is called:
(A) Arrow key
(B) Cursor
(C) Control key
(D) None of the above

12. Process is:
(A) Program in High level language kept on a disk
(B) Contents of main memory
(C) Program in execution
(D) A job in secondary memory

13. Memory Bus is mainly used for communication between:
(A) Process and Memory
(B) Process and input devices
(C) Input devices and Memory
(D) input devices and Output devices

14. In to which of the class of addresses does the IP address 10.0.0.1 belongs ?
(A) Class D
(B) Class C
(C) Class B
(D) Class A

15. A protocol that allows non-ASCII messages to be send through E-mails in the Internet is
(A) MIME
(B) SMS
(C) SOAP
(D) SMTP

16. A 32 bit microprocessor has the word length equal to:
(A) 2 bytes
(B) 1 byte
(C) 4 bytes
(D) 8 bytes

17. Which of the following performs modulation and demodulation ?
(A) Fibre Optic
(B) Modem
(C) Satellite
(D) Coaxial cable

18. The variables which can be accessed by all modules in a program are known as:
(A) Local variables
(B) Internal variables
(C) External variables
(D) Global variables

19. Recursive functions are executed in a:
(A) Last in First out order
(B) First in First out order
(C) Parallel Fashion
(D) All of the above

20. Approximately one Trillion bytes is a:
(A) Kilo Byte
(B) Tera Byte
(C) Giga Byte
(D) Mega Byte

Questions for ITI Jobs

Refrigeration and Air Conditioner Carpenter
Automobile Engineering Lineman
Printing Technology Wireman
Tool and Die Maker Electrician
Boiler Operator Electrical
Pump Operator Mechanic
Architectural Draftsman Surveyor
Draughtsman Civil Instrument Mechanic
Masonry Electronics Mechanic
Welder Information Technology
Fitter Computer Hardware
Turner Steel Fabricator
Plumber Electroplater

21. A list of named integer constants that once defined can be used in the place of an integer is called:
(A) Argument
(B) Register
(C) Modifier
(D) Enumeration

22. Which of the following memory is capable of operating at electronic speed ?
(A) Magnetic Disk
(B) Semi conductor Memory
(C) Magnetic Drum
(D) Magnetic Tapes

23. Microprogramming is a technique:
(A) for writing small programs effectively
(B) for programming the input output routines
(C) for programming the Microprocessor
(D) for programming the control steps of a computer

24. The Program Counter holds:
(A) Address for next instruction
(B) Address for memory
(C) Temp data
(D) Memory operand

25. Which of the following is not application software ?
(A) Word Processor
(B) Unix
(C) Spread Sheet
(D) Desktop Publishing

26. With reference to Windows a DLL is a:
(A) Distribution Level Library
(B) Distributed Library LAN
(C) Dedicated Link Library
(D) Dynamic Link Library

27. The Gateway Internet Access Services (GIAS) of India is situated in:
(A) Delhi
(B) Mumbai
(C) Chandigarh
(D) Madurai

28. A type of memory chip whose contents can be quickly changed by the computer at any time is called:
(A) VDT
(B) RUM
(C) ROM
(D) RAM

29. A computer assisted method for the recording and analyzing of existing or hypothetical systems is:
(A) Data Transmission
(B) Data flow
(C) Data Capture
(D) Data Processing

30. What difference does the 5th generation computer have from other generation computers ?
(A) Technological advancement
(B) Scientific code
(C) Object Oriented Programming
(D) All of the above

31. Which of the following computer language is used for artificial intelligence ?
(A) FORTRAN
(B) PROLOG
(C) C
(D) COBOL

32. The tracks on a disk which can be accessed without repositioning the R/ W heads is:
(A) Surface
(B) Cylinder
(C) Cluster
(D) All of the above

33. The time required for the fetching and execution of one simple machine instruction is:
(A) Delay time
(B) CPU Cycle
(C) Real time
(D) Seek time

34. Which access method is used for obtaining a record from a cassette tape ?
(A) Direct
(B) Random
(C) Sequential
(D) All of the above

35. Which type of system puts the user into direct conversation with the computer through a key-board ?
(A) Real time processing
(B) Interactive computer
(C) Batch processing
(D) Time Sharing

36. The term referring to evacuating the content of some part of the machine is known as:
(A) Dump
(B) Enhancement
(C) Compiler
(D) Down

37. A single packet on u data link is known as:
(A) Path
(B) Block
(C) Group
(D) Frame

38. The process of communicating with a file from a terminal is:
(A) Interactive
(B) Heuristic
(C) Interrogation
(D) All the above

39. A common boundary between two systems is called:
(A) Interface
(B) Interdiction
(C) Group
(D) None of the above

40. The examination and changing of single bits or small groups of his within a word is called:
(A) Bit
(B) Byte
(C) Bit Slice
(D) Bit manipulation

41. which computer has been designed to be as compact as possible ?
(A) Micro Computer
(B) Main Frame Computer
(C) Super Computer
(D) Mini Computer

42. Which method is used to connect a remote computer ?
(A) Device
(B) Dial Up
(C) Diagnostic
(D) Logic circuit

43. The symbols used in an assembly language are:
(A) Codes
(B) Mnemonics
(C) Assembler
(D) None of the above

44. The average time necessary for the correct sector of a disk to arrive at the read write head is:
(A) Down time
(B) Seek time
(C) Rotational Delay
(D) Access Time

45. ASCII stands for:
(A) American Standard Code for Information Interchange
(B) All-purpose Scientific Code for Information Interchange
(C) American Security Code for Information Interchange
(D) American Scientific Corie for Information Interchange

46. Which device of computer operation dispenses with the use of the keyboard ?
(A) Joystick
(B) Light pen
(C) Mouse
(D) Touch

47. A program that is employed in the development, repair or enhancement of other programs is known as:
(A) System Software
(B) Software Tool
(C) Application Program
(D) Utility Program

48. Which output device is used for translating information from a computer into pictorial form on paper ?
(A) Plotter
(B) Card Punch
(C) Mouse
(D) Touch Panel

49. The list of coded instructions is called:
(A) Computer Program
(B) Flow Chart
(C) Algorithm
(D) Utility Program

50. A technique used by codes to convert an analog signal into a digital bit stream is known as:
(A) Pulse Code Modulation
(B) Pulse Stretcher
(C) Query Processing
(D) Query Management

51. An optical input device that interprets pencil marks on paper media is:
(A) Punch Card Reader
(B) OMR
(C) Optical Scanners
(D) Magnetic tape

52. Any device that performs signal conversion is:
(A) Modulator
(B) Modem
(C) Keyboard
(D) Plotter

53. The complete picture of data stored in database is known as:
(A) Record
(B) Database
(C) Schema
(D) System Flow Chart

54. A device for converting handwritten impressions into coded characters and positional coordinates for input to a computer is:
(A) Touch Panel
(B) Keyboard
(C) Mouse
(D) Writing Tablet

55. Which of the following file name extension suggests that the file is a back up copy of another file ?
(A) COM
(B) BAK
(C) BAS
(D) TXT

56. What is the highest address possible if 16 bits are used for each address ?
(A) 65536
(B) 12868
(C) 16556
(D) 043897

57. When the time to establish link is large and the size of data is small, the preferred mode of data transfer is:
(A) Time division multiplexing
(B) Circuit switching
(C) Packet switching
(D) All of the above

58. Group of instructions that directs a computer is called:
(A) Storage
(B) Memory
(C) Logic
(D) Program

59. Insert Formula Sending a file from your personal computer’ s primary memory or disk to another computer is called:
(A) Uploading
(B) Downloading
(C) logging on
(D) hang on

60. The communication mode that supports two-way traffic but only one direction at a time is:
(A) Simplex
(B) Duplex
(C) Half Duplex
(D) Multiplex

61. Which of the following is not a version of the Android mobile operating system ?
(A) Cupcake
(B) Dairy-Milk
(C) Donut
(D) Eclair

62. Encryption and Decryption is the responsibility of ____________ Layer.
(A) Physical
(B) Network
(C) Application
(D) Data Link

63. In Windows, how can you delete a file without it going to the Recycle Bin first ?
(A) Delete
(B) Shift + Delete
(C) Ctrl + Delete
(D) Delete Delete

64. Which of the following is called as protocol in the URL ?
http:// www.example.com
(A) //
(B) www
(C) http
(D) .com

65. DVD stands for:
(A) Direct Visual Disc
(B) Digital Visual Daily
(C) Direct Video Disc
(D) Digital Video Disc

66. The relationship of data elements in a module is called:
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity

67. Congestion control is done at ______________.
(A) Transport Layer
(B) Network Layer
(C) Application Layer
(D) Data Link Layer

68. ln DOS, the DIR command is used to:
(A) Delete files
(B) Display list of files and sub-directories
(C) Copy file
(D) Display contents of file

69. Which of the following is a social network ?
(A) Amazon
(B) eBay
(C) Gmail
(D) Twitter

70. ___________ technology is used in second generation computer.
(A) Vacuum Tubes
(B) IC
(C) LSI
(D) Transistor

71. Which technique is used to blend two or more images to form a new image ?
(A) Rendering
(B) Wraping
(C) Morphing
(D) Animating

72. Frames from one LAN can be transmitted to another LAN via a device called:
(A) Router
(B) Bridge
(C) Repeater
(D) Modem

73. ______________ was the first general purpose micro-processor.
(A) 8008
(B) 8080
(C) 4004
(D) All of these

74. Sorting is:
(A) a process of re-arranging a given set of objects in a specific order
(B) to facilitate the later search for members of the sorted set
(C) is a relevant and essential activity, particularly in data processing
(D) All of those

75. Internal communication within institution is done through:
(A) LAN
(B) WAN
(C) MMS
(D) MAN

76. Virtual memory is:
(A) an extremely large main memory
(B) tin extremely large secondary memory.
(C) an illusion of extremely large main memory.
(D) a type of memory used in super computers.

77. A hard disk is divided into tracks which is further subdivided into:
(A) Clusters
(B) Sectors
(C) Vectors
(D) Heads

78. What is algorithm ?
(A) Set of steps for solving a particular problem
(B) Solving A problem in a finite number of steps
(C) Set of progmmming statements to solve problem
(D) Both (A) and (B)

79. ROM is needed for storing an initial program called _____________.
(A) Computer Startup Loader
(B) Boot Strap Loader
(C) OS Version
(D) None of the above

80. ISP stands for _________________.
(A) Intranet Service Pointer
(B) Internet Service Process
(C) Internet Service Provider
(D) Internet Standard Protocol