ITI Information Technology & E.S.M. Engineering Questions and Answers
ITI Information Technology & E.S.M. Engineering Questions and Answers – However, the candidates who are looking for Exam Papers Information Technology can find here. Hence, here is the direct link for Previous Year Question Paper for Information Technology Exam.
Here we Provide you direct link for ESM Engineering Question Paper with Answers Pdf for free of cost. ESM Engineering Previous Papers are available here to download for free. Therefore, the candidates who are preparing for Information Technology can get Information Technology Old Papers from the below links.
The candidates who had applied for ESM Engineering Exam are in search of the ESM Engineering Previous papers Solved Question Papers. For the sake of those aspirants, we have updated the Information Technology Sample Papers on our website for free of cost.
Questions and Answers on Information Technology & E.S.M. Engineering
1. Firefox. Opera, Chrome, Safari and Explorer are come under the group:
(A) Web browser
(B) Server
(C) Client
(D) OS
2. ___________ is the set of programs necessary to carry out operations for a specified application
(A) Application Software
(B) System Software
(C) Firmware
(D) Hardware
3. The radix of a hexadecimal system is:
(A) 8
(B) 3
(C) 2
(D) 16 A
4. ln which mode Windows starts with only the core drivers and services ?
(A) Safe Mode
(B) Quick Mode
(C) Normal Mode
(D) Repair Mode
5. Which of the following languages is more suited to a structured program ?
(A) PL/1
(B) FORTRAN
(C) BASIC
(D) PASCAL
6. The brain of any computer system is:
(A) Memory
(B) CPU
(C) ALL
(D) PASCAL
7. Intel 8085 microprocessor have:
(A) 8 bit data and 8 bit address
(B) 3 bit data and 16 bit address
(C) 16 bit data and 16 bit address
(D) None of the above
8. The ASCII code (in HEX) of alphabet A is:
(A) 30
(B) 31
(C) 41
(D) 40
9. End to end connectivity is provided from host to host in:
(A) Network layer
(B) Session layer
(C) Data link layer
(D) Transport layer
10. A software program stored in a ROM that cannot be changed easily is known as:
(A) Hardware
(B) Linker
(C) Editor
(D) Firmware
11. The indicator on the screen that shows where things will happen next is called:
(A) Arrow key
(B) Cursor
(C) Control key
(D) None of the above
12. Process is:
(A) Program in High level language kept on a disk
(B) Contents of main memory
(C) Program in execution
(D) A job in secondary memory
13. Memory Bus is mainly used for communication between:
(A) Process and Memory
(B) Process and input devices
(C) Input devices and Memory
(D) input devices and Output devices
14. In to which of the class of addresses does the IP address 10.0.0.1 belongs ?
(A) Class D
(B) Class C
(C) Class B
(D) Class A
15. A protocol that allows non-ASCII messages to be send through E-mails in the Internet is
(A) MIME
(B) SMS
(C) SOAP
(D) SMTP
16. A 32 bit microprocessor has the word length equal to:
(A) 2 bytes
(B) 1 byte
(C) 4 bytes
(D) 8 bytes
17. Which of the following performs modulation and demodulation ?
(A) Fibre Optic
(B) Modem
(C) Satellite
(D) Coaxial cable
18. The variables which can be accessed by all modules in a program are known as:
(A) Local variables
(B) Internal variables
(C) External variables
(D) Global variables
19. Recursive functions are executed in a:
(A) Last in First out order
(B) First in First out order
(C) Parallel Fashion
(D) All of the above
20. Approximately one Trillion bytes is a:
(A) Kilo Byte
(B) Tera Byte
(C) Giga Byte
(D) Mega Byte
21. A list of named integer constants that once defined can be used in the place of an integer is called:
(A) Argument
(B) Register
(C) Modifier
(D) Enumeration
22. Which of the following memory is capable of operating at electronic speed ?
(A) Magnetic Disk
(B) Semi conductor Memory
(C) Magnetic Drum
(D) Magnetic Tapes
23. Microprogramming is a technique:
(A) for writing small programs effectively
(B) for programming the input output routines
(C) for programming the Microprocessor
(D) for programming the control steps of a computer
24. The Program Counter holds:
(A) Address for next instruction
(B) Address for memory
(C) Temp data
(D) Memory operand
25. Which of the following is not application software ?
(A) Word Processor
(B) Unix
(C) Spread Sheet
(D) Desktop Publishing
26. With reference to Windows a DLL is a:
(A) Distribution Level Library
(B) Distributed Library LAN
(C) Dedicated Link Library
(D) Dynamic Link Library
27. The Gateway Internet Access Services (GIAS) of India is situated in:
(A) Delhi
(B) Mumbai
(C) Chandigarh
(D) Madurai
28. A type of memory chip whose contents can be quickly changed by the computer at any time is called:
(A) VDT
(B) RUM
(C) ROM
(D) RAM
29. A computer assisted method for the recording and analyzing of existing or hypothetical systems is:
(A) Data Transmission
(B) Data flow
(C) Data Capture
(D) Data Processing
30. What difference does the 5th generation computer have from other generation computers ?
(A) Technological advancement
(B) Scientific code
(C) Object Oriented Programming
(D) All of the above
31. Which of the following computer language is used for artificial intelligence ?
(A) FORTRAN
(B) PROLOG
(C) C
(D) COBOL
32. The tracks on a disk which can be accessed without repositioning the R/ W heads is:
(A) Surface
(B) Cylinder
(C) Cluster
(D) All of the above
33. The time required for the fetching and execution of one simple machine instruction is:
(A) Delay time
(B) CPU Cycle
(C) Real time
(D) Seek time
34. Which access method is used for obtaining a record from a cassette tape ?
(A) Direct
(B) Random
(C) Sequential
(D) All of the above
35. Which type of system puts the user into direct conversation with the computer through a key-board ?
(A) Real time processing
(B) Interactive computer
(C) Batch processing
(D) Time Sharing
36. The term referring to evacuating the content of some part of the machine is known as:
(A) Dump
(B) Enhancement
(C) Compiler
(D) Down
37. A single packet on u data link is known as:
(A) Path
(B) Block
(C) Group
(D) Frame
38. The process of communicating with a file from a terminal is:
(A) Interactive
(B) Heuristic
(C) Interrogation
(D) All the above
39. A common boundary between two systems is called:
(A) Interface
(B) Interdiction
(C) Group
(D) None of the above
40. The examination and changing of single bits or small groups of his within a word is called:
(A) Bit
(B) Byte
(C) Bit Slice
(D) Bit manipulation
41. which computer has been designed to be as compact as possible ?
(A) Micro Computer
(B) Main Frame Computer
(C) Super Computer
(D) Mini Computer
42. Which method is used to connect a remote computer ?
(A) Device
(B) Dial Up
(C) Diagnostic
(D) Logic circuit
43. The symbols used in an assembly language are:
(A) Codes
(B) Mnemonics
(C) Assembler
(D) None of the above
44. The average time necessary for the correct sector of a disk to arrive at the read write head is:
(A) Down time
(B) Seek time
(C) Rotational Delay
(D) Access Time
45. ASCII stands for:
(A) American Standard Code for Information Interchange
(B) All-purpose Scientific Code for Information Interchange
(C) American Security Code for Information Interchange
(D) American Scientific Corie for Information Interchange
46. Which device of computer operation dispenses with the use of the keyboard ?
(A) Joystick
(B) Light pen
(C) Mouse
(D) Touch
47. A program that is employed in the development, repair or enhancement of other programs is known as:
(A) System Software
(B) Software Tool
(C) Application Program
(D) Utility Program
48. Which output device is used for translating information from a computer into pictorial form on paper ?
(A) Plotter
(B) Card Punch
(C) Mouse
(D) Touch Panel
49. The list of coded instructions is called:
(A) Computer Program
(B) Flow Chart
(C) Algorithm
(D) Utility Program
50. A technique used by codes to convert an analog signal into a digital bit stream is known as:
(A) Pulse Code Modulation
(B) Pulse Stretcher
(C) Query Processing
(D) Query Management
51. An optical input device that interprets pencil marks on paper media is:
(A) Punch Card Reader
(B) OMR
(C) Optical Scanners
(D) Magnetic tape
52. Any device that performs signal conversion is:
(A) Modulator
(B) Modem
(C) Keyboard
(D) Plotter
53. The complete picture of data stored in database is known as:
(A) Record
(B) Database
(C) Schema
(D) System Flow Chart
54. A device for converting handwritten impressions into coded characters and positional coordinates for input to a computer is:
(A) Touch Panel
(B) Keyboard
(C) Mouse
(D) Writing Tablet
55. Which of the following file name extension suggests that the file is a back up copy of another file ?
(A) COM
(B) BAK
(C) BAS
(D) TXT
56. What is the highest address possible if 16 bits are used for each address ?
(A) 65536
(B) 12868
(C) 16556
(D) 043897
57. When the time to establish link is large and the size of data is small, the preferred mode of data transfer is:
(A) Time division multiplexing
(B) Circuit switching
(C) Packet switching
(D) All of the above
58. Group of instructions that directs a computer is called:
(A) Storage
(B) Memory
(C) Logic
(D) Program
59. Insert Formula Sending a file from your personal computer’ s primary memory or disk to another computer is called:
(A) Uploading
(B) Downloading
(C) logging on
(D) hang on
60. The communication mode that supports two-way traffic but only one direction at a time is:
(A) Simplex
(B) Duplex
(C) Half Duplex
(D) Multiplex
61. Which of the following is not a version of the Android mobile operating system ?
(A) Cupcake
(B) Dairy-Milk
(C) Donut
(D) Eclair
62. Encryption and Decryption is the responsibility of ____________ Layer.
(A) Physical
(B) Network
(C) Application
(D) Data Link
63. In Windows, how can you delete a file without it going to the Recycle Bin first ?
(A) Delete
(B) Shift + Delete
(C) Ctrl + Delete
(D) Delete Delete
64. Which of the following is called as protocol in the URL ?
http:// www.example.com
(A) //
(B) www
(C) http
(D) .com
65. DVD stands for:
(A) Direct Visual Disc
(B) Digital Visual Daily
(C) Direct Video Disc
(D) Digital Video Disc
66. The relationship of data elements in a module is called:
(A) Coupling
(B) Modularity
(C) Cohesion
(D) Granularity
67. Congestion control is done at ______________.
(A) Transport Layer
(B) Network Layer
(C) Application Layer
(D) Data Link Layer
68. ln DOS, the DIR command is used to:
(A) Delete files
(B) Display list of files and sub-directories
(C) Copy file
(D) Display contents of file
69. Which of the following is a social network ?
(A) Amazon
(B) eBay
(C) Gmail
(D) Twitter
70. ___________ technology is used in second generation computer.
(A) Vacuum Tubes
(B) IC
(C) LSI
(D) Transistor
71. Which technique is used to blend two or more images to form a new image ?
(A) Rendering
(B) Wraping
(C) Morphing
(D) Animating
72. Frames from one LAN can be transmitted to another LAN via a device called:
(A) Router
(B) Bridge
(C) Repeater
(D) Modem
73. ______________ was the first general purpose micro-processor.
(A) 8008
(B) 8080
(C) 4004
(D) All of these
74. Sorting is:
(A) a process of re-arranging a given set of objects in a specific order
(B) to facilitate the later search for members of the sorted set
(C) is a relevant and essential activity, particularly in data processing
(D) All of those
75. Internal communication within institution is done through:
(A) LAN
(B) WAN
(C) MMS
(D) MAN
76. Virtual memory is:
(A) an extremely large main memory
(B) tin extremely large secondary memory.
(C) an illusion of extremely large main memory.
(D) a type of memory used in super computers.
77. A hard disk is divided into tracks which is further subdivided into:
(A) Clusters
(B) Sectors
(C) Vectors
(D) Heads
78. What is algorithm ?
(A) Set of steps for solving a particular problem
(B) Solving A problem in a finite number of steps
(C) Set of progmmming statements to solve problem
(D) Both (A) and (B)
79. ROM is needed for storing an initial program called _____________.
(A) Computer Startup Loader
(B) Boot Strap Loader
(C) OS Version
(D) None of the above
80. ISP stands for _________________.
(A) Intranet Service Pointer
(B) Internet Service Process
(C) Internet Service Provider
(D) Internet Standard Protocol