0% found this document useful (0 votes)
23 views15 pages

Information Technology 25

The document outlines the significance of IT tools in business, emphasizing their role in enhancing efficiency, productivity, and decision-making. It includes multiple-choice questions that define IT tools, their applications, and benefits across various business operations. Key topics covered include automation, collaboration, data analysis, and the impact of IT tools on communication and project management.

Uploaded by

Taha Zaidi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views15 pages

Information Technology 25

The document outlines the significance of IT tools in business, emphasizing their role in enhancing efficiency, productivity, and decision-making. It includes multiple-choice questions that define IT tools, their applications, and benefits across various business operations. Key topics covered include automation, collaboration, data analysis, and the impact of IT tools on communication and project management.

Uploaded by

Taha Zaidi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Course: IT Skills

Course Code: SEC281


Overview of IT Tools and Their Importance in Business

1. Which of the following best defines an IT tool in a business context?


A) A machine used for manufacturing B) Software or hardware used to process information
C) A tool used only for communication D) A filing cabinet
Answer: B
2. What is one of the primary reasons businesses use IT tools?
A) To increase paper documentation B) To make communication slower
C) To enhance efficiency and productivity D) To reduce competition
Answer: C
3. Which of the following is NOT typically considered an IT tool?
A) Email software B) Word processor
C) Pen and paper D) Spreadsheet software
Answer: C
4. How do IT tools benefit decision-making in businesses?
A) By making decisions more time-consuming B) By eliminating the need for data
C) By providing timely and accurate information D) By avoiding technology
Answer: C
5. Which of the following IT tools is primarily used for data analysis?
A) MS Word B) MS Excel
C) MS Paint D) Adobe Reader
Answer: B
6. Why is it important for small businesses to adopt IT tools?
A) To complicate operations B) To reduce digital presence
C) To remain competitive and grow D) To avoid online marketing
Answer: C
7. Which of the following tools is best for business presentations?
A) Notepad B) MS Excel
C) MS PowerPoint D) MS Access
Answer: C
8. What does “IT” stand for?
A) Internet Technology B) Information Technology
C) Internal Telecommunication D) International Tools
Answer: B
9. Which IT tool is commonly used for accounting and budgeting?
A) Word processor B) Spreadsheet software
C) Graphic editor D) Presentation tool
Answer: B
10. Cloud computing is an IT tool used for:
A) Manual data entry B) Offline processing only
C) Online storage and access D) Typewriting
Answer: C
11. Which of the following is a benefit of using IT tools in business?
A) Increased paper usage B) Delayed communication
C) Enhanced data security D) Reduced transparency
Answer: C
12. An example of collaborative IT software is:
A) MS Paint B) Google Docs
C) Solitaire D) VLC Media Player
Answer: B
13. Which of the following is a key feature of IT tools in business operations?
A) Inflexibility B) Automation
C) Manual effort D) High error rates
Answer: B
14. Which IT tool is used for managing emails in business?
A) MS Word B) Adobe Photoshop
C) Outlook D) VLC Player
Answer: C
15. The use of IT tools in business leads to:
A) Decreased productivity B) Slower processes

C) Improved communication D) Higher manual workload


Answer: C

16. Which of the following is not a business IT tool?


A) ERP Software B) CRM Software
C) Projector D) Hammer
Answer: D
17. Which software is used for writing and editing documents?
A) MS Excel B) MS Word
C) MS Access D) Adobe Acrobat
Answer: B
18. The application of IT in business helps to:
A) Maintain manual records B) Increase redundancy
C) Enable real-time data access D) Promote isolation
Answer: C
19. Which of the following best explains the term “automation” in IT tools?
A) Manual data updates B) Automatic execution of repetitive tasks
C) Removal of machines D) Eliminating computers
Answer: B
20. Which is the most commonly used tool for business data visualization?
A) MS Word B) Notepad
C) MS Excel D) Task Manager
Answer: C
21. Which IT tool helps track and manage tasks and projects?
A) Google Calendar B) Windows Media Player
C) Adobe Reader D) Paint
Answer: A
22. One of the critical uses of IT in business is to:
A) Avoid customer feedback B) Slow down transactions
C) Enhance customer engagement D) Discourage digital marketing
Answer: C
23. Using IT tools for storing data ensures:
A) Physical damage to records B) Better organization and accessibility
C) Paper-based filing D) Slower retrieval of information
Answer: B
24. A benefit of IT in business inventory management is:
A) Frequent manual counts B) Automatic stock updates
C) No tracking needed D) Higher error probability
Answer: B
25. Which of the following sectors has NOT significantly benefited from IT tools?
A) Retail B) Education
C) Manufacturing D) None of the above
Answer: D
26. Which of the following is a key reason business use IT tools?
A) To increase workload B) To reduce efficiency
C) To automate repetitive tasks D) To eliminate digital data
Answer: C
27. What is the effect of automation through IT tools on productivity?
A) Increases manual work B) Decreases speed
C) Reduces errors and saves time D) Makes operations more complex
Answer: C
28. Which IT tool allows real-time collaboration on documents?
A) MS Paint B) Google Docs
C) Windows Media Player D) WinZip
Answer: B
29. A productivity suite like Microsoft 365 includes:
A) Gaming software B) Antivirus programs
C) Word, Excel, PowerPoint D) Operating system drivers
Answer: C
30. How do IT tools improve communication efficiency?
A) Through handwritten letters B) Through instant messaging and emails
C) By removing communication platforms D) By delaying information sharing
Answer: B
31. Which of the following is an example of a task automation tool?
A) Google Chrome B) Excel Macros
C) VLC Media Player D) Paint
Answer: B
32. What is the impact of IT tools on business response time?
A) Slows it down B) No impact
C) Speeds it up D) Makes it difficult
Answer: C
33. Customer Relationship Management (CRM) tools help in:
A) Drawing graphics B) Managing sales leads and customer data
C) Creating music D) Playing videos
Answer: B
34. What is one direct result of using IT tools in office tasks?
A) Lower output B) Time-saving
C) Increased paperwork D) More clerical staff
Answer: B
35. Which tool helps businesses schedule tasks and track progress?
A) Photoshop B) Excel
C) Trello D) WinRAR
Answer: C
36. Using spreadsheets in business helps to:
A) Visualize and analyze data efficiently B) Design websites
C) Record voice D) Browse social media
Answer: A
37. Which IT tool is essential for managing employee payroll efficiently?
A) MS Paint B) Payroll software
C) Windows Calculator D) Media Player
Answer: B
38. Which of these enhances productivity in remote work?
A) WordPad B) Remote desktop software
C) Notepad D) Snipping Tool
Answer: B
39. Which of the following can help reduce human errors in business tasks?
A) Manual accounting B) IT-based automated systems
C) Handwritten logs D) Filing cabinets
Answer: B
40. Using video conferencing tools leads to:
A) Higher travel expenses B) Decreased meeting flexibility
C) Improved communication across locations D) More in-person meetings
Answer: C
41. Which is a popular cloud-based collaboration tool?
A) Paint B) Zoom
C) WinRAR D) VLC
Answer: B
42. How do IT tools affect data retrieval in business?
A) Make it slower B) Make it faster and more accurate
C) Require manual indexing D) Need more paper records
Answer: B
43. The use of IT in scheduling helps in:
A) Causing confusion B) Improving resource allocation
C) Manual planning D) Avoiding calendars
Answer: B
44. An advantage of using databases in business is:
A) Incomplete records B) Disorganized storage
C) Efficient data management and querying D) Time-consuming access
Answer: C
45. Slack, Microsoft Teams, and Google Chat are tools for:
A) Music streaming B) Team communication
C) Graphic editing D) Game development
Answer: B
46. The use of dashboards in IT tools allows:
A) Display of irrelevant data B) Real-time data visualization
C) Only text-based reporting D) No analytics
Answer: B
47. Using IT tools for inventory control results in:
A) Inaccurate stock levels B) Real-time tracking and alerts
C) Manual stock checking D) Delayed stock updates
Answer: B
48. How do IT tools impact multitasking in business?
A) Prevent multitasking B) Reduce task efficiency
C) Facilitate handling multiple tasks at once D) Cause delays
Answer: C
49. Which IT feature helps managers monitor employee performance?
A) CCTV B) Timesheet software
C) Antivirus D) PDF viewer
Answer: B
50. In terms of business output, IT tools generally result in:
A) Reduced accuracy B) Lower quality
C) Increased productivity D) Higher operational cost
Answer: C
51. Which of the following is an example of an email client?
A) MS Excel B) Adobe Photoshop
C) Microsoft Outlook D) VLC Media Player
Answer: C
52. What is the primary function of instant messaging tools in business?
A) Create graphics B) Real-time text communication
C) Video editing D) Data storage
Answer: B
53. Which of the following is commonly used for business video conferencing?
A) Adobe Acrobat B) Zoom
C) WinZip D) Canva
Answer: B
54. Which tool allows document version control?
A) MS Paint B) Google Docs
C) Windows Media Player D) Calculator
Answer: B
55. Which of the following tools is most suitable for team collaboration and messaging?
A) Trello B) Notepad
C) Slack D) Windows Defender
Answer: C
56. Email attachments are used to:
A) Send files with messages B) Block spam
C) Install antivirus software D) Format hard drives
Answer: A
57. What feature in email helps organize and manage incoming messages?
A) Filters and folders B) Video calling
C) Spamming D) Voice recognition
Answer: A
58. Which of the following allows multiple people to edit a document in real-time?
A) MS Word (offline) B) Notepad
C) Google Docs D) VLC
Answer: C
59. Which is a benefit of using collaboration tools in virtual teams?
A) Delayed communication B) Mismanagement
C) Improved coordination D) Increased paperwork
Answer: C
60. Which protocol is commonly used for sending emails?
A) FTP B) HTTP C) SMTP D) IP
Answer: C
61. A web conferencing tool must support:
A) File encryption B) Graphic design
C) Audio and video communication D) Antivirus scanning
Answer: C
62. Which of the following is not a collaboration tool?
A) Microsoft Teams B) Slack C) Paint D) Zoom
Answer: C
63. Which of the following tools helps manage tasks and projects collaboratively?
A) Trello B) VLC C) Outlook D) Calculator
Answer: A
64. The "Reply All" option in email does what?
A) Sends the email only to the sender B) Deletes all emails
C) Sends the email to all recipients of the original message D) Blocks the sender
Answer: C
65. Google Drive allows:
A) Only document editing B) File sharing and storage
C) Only video sharing D) Music creation
Answer: B
66. Microsoft Teams combines which of the following features?
A) Only messaging B) Only video calls
C) Chat, video, file sharing D) Only document writing
Answer: C
67. One advantage of version control in shared documents is:
A) Reduced access B) Tracking changes and edits
C) Slower performance D) Manual backups only
Answer: B
68. Which online tool is often used for scheduling and calendar sharing?
A) VLC B) Google Calendar C) Paint D) WordPad
Answer: B
69. Video conferencing helps reduce:
A) Online collaboration B) Internet use
C) Travel costs and time D) Teamwork
Answer: C
70. A benefit of cloud-based document sharing is:
A) No access from outside the office B) Real-time updates from multiple users
C) Hard disk failures D) Expensive licenses
Answer: B
71. Which platform is widely used in businesses for team chat and channel-based communication?
A) Notepad B) Slack C) MS Word D) WinRAR
Answer: B
72. What is a major risk of using email in communication?
A) No records B) Virus or phishing attacks
C) Slow speed D) Instant feedback
Answer: B
73. Document version history in cloud tools helps users to:
A) Lose data permanently B) Ignore updates
C) Restore previous versions D) Prevent file access
Answer: C
74. Which tool helps manage shared folders and access rights in business?
A) Windows Media Player B) SharePoint C) Calculator D) VLC
Answer: B
75. In a virtual meeting, the "mute" feature is used to:
A) Disconnect from the call B) Hide the video
C) Silence background noise D) Exit the application
Answer: C
76. Which software is most commonly used for spreadsheet data analysis?
A) MS Word B) MS Excel C) Adobe Reader D) Google Chrome
Answer: B
77. What is the main purpose of a spreadsheet in business?
A) Image editing B) Data entry and analysis
C) Playing media files D) Drawing diagrams
Answer: B
78. Which of the following is a spreadsheet function to calculate the sum of numbers?
A) =COUNT() B) =SUM() C) =IF() D) =MIN()
Answer: B
79. What is a Pivot Table used for in Excel?
A) Drawing charts B) Sending emails
C) Summarizing and analyzing data D) Formatting text
Answer: C
80. Which formula returns the highest value in a range in Excel?
A) =MAX() B) =LARGE() C) =BIG() D) =HIGH()
Answer: A
81. Which of the following is a relational database management system?
A) MS Paint B) VLC Player C) MySQL D) PowerPoint
Answer: C
82. Which of the following is a field in a database?
A) Row B) Column C) Cell D) Attribute
Answer: D
83. Which data type is suitable for storing numbers in a database?
A) VARCHAR B) INTEGER C) CHAR D) TEXT
Answer: B
84. What does SQL stand for?
A) Simple Query Language B) Standard Quality Language
C) Structured Query Language D) System Quality Logic
Answer: C
85. Which of the following is a popular database software?
A) Oracle B) Photoshop C) Illustrator D) Excel
Answer: A
86. Which spreadsheet function is used to count only numeric values?
A) =COUNT() B) =COUNTA() C) =COUNTIF() D) =COUNTBLANK()
Answer: A
87. In Excel, which symbol is used to start a formula?
A) $ B) = C) # D) @
Answer: B
88. Which function returns the number of non-empty cells in a range?
A) =COUNTBLANK() B) =COUNTA() C) =COUNT() D) =IF()
Answer: B
89. Which of the following is used for visualizing data in a spreadsheet?
A) Pivot Chart B) WordArt C) Header/Footer D) Page Break
Answer: A
90. In database design, a "primary key" is:
A) A backup key B) A unique identifier for each record
C) A hyperlink D) A table header
Answer: B
91. Which of the following is a Business Intelligence tool?
A) Tableau B) GIMP C) Paint D) Flash
Answer: A
92. Power BI is developed by:
A) Google B) Microsoft C) Oracle D) IBM
Answer: B
93. Which of the following can be used to perform what-if analysis in Excel?
A) Solver B) Word Count C) Flash Fill D) Grammar Check
Answer: A

94. What is the function of VLOOKUP in Excel?


A) Formats cells B) Looks up data vertically in a table
C) Calculates averages D) Creates graphs
Answer: B
95. Which of the following is NOT a valid Excel function?
A) =SUMIF() B) =AVERAGE() C) =NOW() D) =PAINT()
Answer: D
96. Which command is used to extract data from a database using SQL?
A) PUT B) POST C) SELECT D) INSERT
Answer: C
97. Which of these is used to create dashboards in business analytics?
A) PowerPoint B) Tableau C) Paint D) Excel only
Answer: B
98. In Excel, conditional formatting is used to:
A) Print documents B) Apply styles based on conditions
C) Encrypt files D) Add tables
Answer: B
99. Which DBMS tool allows SQL queries to be run on large datasets for analysis?
A) Adobe XD B) MySQL C) Photoshop D) MS Word
Answer: B
100. What is data analytics used for in business?
A) Making documents B) Editing videos
C) Supporting decision-making using data D) Drawing logos
Answer: C
101. What does CRM stand for in business tools?
A) Customer Research Method
B) Client Resource Model
C) Customer Relationship Management
D) Custom Report Module
Answer: C
102. Which of the following is a popular CRM system?
A) Canva B) Salesforce C) VLC D) Audacity
Answer: B
103. The primary purpose of a CRM tool is to:
A) Send newsletters
B) Manage customer interactions and data
C) Create spreadsheets
D) Design logos
Answer: B
104. Which tool automates email campaigns and marketing workflows?
A) MS Word B) HubSpot C) Paint D) Excel
Answer: B
105. Which of the following is an example of a marketing automation tool?
A) Notepad B) Zoom C) Mailchimp D) VLC
Answer: C
106. What is the function of email marketing tools?
A) Video editing
B) Creating charts
C) Sending bulk promotional emails
D) Encrypting documents
Answer: C
107. Which of these tools helps in analysing website traffic and user behaviour?
A) Google Analytics B) Skype C) Illustrator D) OneNote
Answer: A
108. Which of the following refers to improving a website’s visibility on search engines?
A) CMS B) SEO C) ERP D) HRIS
Answer: B
109. In SEO, what does the term “keyword” refer to?
A) Encryption code
B) A command in coding
C) Words or phrases users search for online
D) Passwords
Answer: C
110. Which tool is commonly used for search engine optimization (SEO)?
A) SEMrush B) Zoom C) Discord D) Excel
Answer: A
111. What is HRIS used for?
A) Email marketing B) Managing HR-related data and tasks
C) Designing websites D) Video editing
Answer: B
112. Which of the following is an HRIS tool?
A) Trello B) BambooHR C) Photoshop D) GIMP
Answer: B
113. Which email marketing tool is known for its drag-and-drop editor?
A) Mailchimp B) Google Forms C) Excel D) Firefox
Answer: A
114. What is lead nurturing in marketing automation?
A) Replacing leads with new ones B) Ignoring unqualified leads
C) Developing relationships with potential customers D) Emailing all contacts
Answer: C
115. What does “bounce rate” in web analytics indicate?
A) Number of ads shown B) Percentage of visitors who leave without interacting
C) Number of forms filled D) Email open rate
Answer: B
116. Which metric indicates how many users clicked a link in an email?
A) Bounce rate B) Click-through rate (CTR) C) Page views D) Impressions
Answer: B
117. Which of the following is NOT a function of HRIS?
A) Payroll processing B) Attendance tracking
C) Keyword research D) Employee database management
Answer: C
118. Which of the following is NOT a CRM platform?
A) Salesforce B) Zoho CRM C) Freshsales D) WordPad
Answer: D
119. The use of automation in marketing helps in:
A) Increasing manual tasks B) Reducing customer reach
C) Streamlining repetitive tasks D) Decreasing efficiency
Answer: C
120. Which HR tool provides applicant tracking functionality?
A) Google Analytics B) BambooHR C) Adobe Reader D) MS Word
Answer: B
121. In CRM, what does "lead scoring" refer to?
A) Assigning sales targets B) Scoring performance of employees
C) Ranking leads based on potential to convert D) Counting email clicks
Answer: C
122. A/B testing in email marketing is used to:
A) Print documents B) Compare two versions of a campaign
C) Backup customer data D) Encrypt emails
Answer: B
123. Which SEO metric measures how long visitors stay on a website?
A) Domain Authority B) Page Load Time
C) Average Session Duration D) Bounce Rate
Answer: C
124. Which of the following tools combines CRM and marketing automation features?
A) WhatsApp B) HubSpot C) Notepad++ D) VLC
Answer: B
125. The primary benefit of web analytics is:
A) Drawing illustrations B) Analyzing user interaction and improving website performance
C) Editing audio files D) Watching videos
Answer: B

Cybersecurity and IT Governance – MCQ Set

1. Why is cybersecurity important for businesses?


A. It increases the internet speed
B. It helps reduce operational costs
C. It protects sensitive data from unauthorized access
D. It eliminates the need for employees to follow security protocols
Answer: C
2. Which of the following is considered a cyber threat?
A. Phishing
B. Installing antivirus software
C. Using strong passwords
D. Regular software updates
Answer: A
3. What does a firewall primarily do?
A. Increases processing speed
B. Monitors and controls incoming and outgoing network traffic
C. Deletes all cookies
D. Encrypts files on a device
Answer: B
4. What is the purpose of data encryption?
A. To compress large files
B. To protect data by converting it into unreadable format for unauthorized users
C. To store backup copies of data
D. To speed up data transfer
Answer: B
5. Which risk assessment method is commonly used in cybersecurity?
A. SWOT Analysis
B. Risk Matrix
C. Pareto Analysis
D. Fishbone Diagram
Answer: B
6. What is the most common method used in phishing attacks?
A. Using complex algorithms
B. Sending fraudulent emails impersonating a trusted entity
C. Exploiting weak passwords
D. Using social media analytics
Answer: B
7. Which type of cyber-attack involves overwhelming a network with excessive traffic?
A. Trojan attack
B. Distributed Denial of Service (DDoS) attack
C. SQL injection
D. Malware infection
Answer: B
8. What is IT governance primarily focused on?
A. Increasing network speed
B. Ensuring IT aligns with business goals and regulatory compliance
C. Reducing software development costs
D. Removing outdated software
Answer: B
9. What is a VPN used for in network security?
A. Creating network congestion
B. Encrypting internet connections for secure communication
C. Preventing physical access to servers
D. Deleting browsing history automatically
Answer: B
10. Which compliance standard is commonly followed in IT governance?
A. ISO 27001
B. HTTP
C. TCP/IP
D. JPEG
Answer: A
11. What is a key advantage of multi-factor authentication (MFA)?
A. It speeds up login times
B. It reduces the risk of unauthorized access
C. It replaces encryption
D. It eliminates the need for passwords
Answer: B
12. What does an Intrusion Detection System (IDS) do?
A. Blocks incoming malware
B. Monitors and detects suspicious activities on a network
C. Automatically updates security software
D. Encrypts files before transmission
Answer: B
13. Which cybersecurity measure helps protect a company against ransomware attacks?
A. Regular data backups
B. Increasing internet bandwidth
C. Using weak passwords
D. Disabling antivirus software
Answer: A
14. What is the primary goal of IT risk management?
A. To eliminate all IT threats
B. To identify, assess, and mitigate IT risks
C. To ensure unlimited access to all data
D. To increase network latency
Answer: B
15. What is considered an attack vector in cybersecurity?
A. A method used by attackers to exploit vulnerabilities
B. A secure data storage solution
C. A programming language for security software
D. A cybersecurity training program
Answer: B
16. Which security measure helps prevent unauthorized access to company emails?
A. Using a firewall
B. Implementing email encryption
C. Restricting internet access
D. Increasing Wi-Fi signal strength
Answer: B
17. What does GDPR primarily regulate?
A. Hardware maintenance
B. Data privacy and protection
C. Internet bandwidth allocation
D. System performance monitoring
Answer: B
18. Which type of malware self-replicates and spreads across networks?
A. Trojan horse
B. Worm
C. Spyware
D. Ransomware
Answer: B
19. What is the role of a Chief Information Security Officer (CISO)?
A. Manage HR-related tasks
B. Oversee and implement cybersecurity policies
C. Develop social media strategies
D. Improve office productivity tools
Answer: B
20. How can businesses defend against SQL injection attacks?
A. Using strong passwords
B. Implementing input validation and parameterized queries
C. Increasing internet speed
D. Removing network firewalls
Answer: B
21. Which cybersecurity concept refers to limiting access rights based on user roles?
A. Least Privilege
B. Open Access
C. Free Data Sharing
D. Public Domain Security
Answer: A
22. What type of cyber threat targets specific individuals using personalized attacks?
A. Generic phishing
B. Spear phishing
C. Worm infection
D. Keylogging
Answer: B
23. What does the CIA triad in cybersecurity stand for?
A. Confidentiality, Integrity, Availability
B. Control, Investigation, Authentication
C. Cybersecurity, Internet, Access
D. Cryptography, Information, Algorithms
Answer: A
24. What is an example of social engineering in cybersecurity?
A. Breaking into a data center
B. Trick users into revealing confidential information through deception
C. Using an encrypted email service
D. Installing antivirus software
Answer: B
25. What is one function of an endpoint security solution?
A. It tracks employee work hours
B. It protects devices from cyber threats
C. It increases processing speed
D. It encrypts emails for marketing campaigns
Answer: B

1.The term “Information Technology” can be summarized as:


(a) Computers + connectivity (b) Computers + Network
(c) Connectivity + Hardware (d) Hardware + Software
Answer: D
2. Which represents the expression of size and form of particular thinking?
(a) Data (b) Information
(c) Both (a) & (b) (d) None of these
Answer: B
3.Which of the following has the characteristic of Information?
(a) Timeliness (b) Purpose
(c) Mode (d) All of these
Answer: D
4. When the sender is informed that the message has been received in its real sense, this is called the
process of:
(a) Feedback (b) Feed front
(c) Experience (d) None of these
Answer: A
5. Which special software programs used for data analysis:
(a) MS-Word (b) Spreadsheet
(c) Corel (d) Paint brush
Answer: B
6. The technology used to store, manipulate, distribute create information is:
(a) Industrial Technology (b) Information Technology
(c) Both (a) & (b) (d) None of these
Answer: B
7. Which organise various kinds of data future use?
(a) Database management system (b) spreadsheet
(c) Word processor (d) None of these
Answer: A
8. The software which are used in offices and shops for writing letters, applications, reports is:
(a) Database management system (b) spreadsheet
(c) Word processor (d) None of these
Answer: C
9.A set of programs that is used to manage the various resources and overall operations of a computer
system is:
(a) Virus (b) Operating system
(c) Program (d) None of these
Answer: B
10. Which one is not the property of Information?
(a) Timeliness (b) Conciseness
(c) Accuracy (d) Length
Answer: D
11. The instructions that tell computer how to carry out the precessing tasks are referred to as computer
is:
(a) programs (b) processors
(c) input devices (d) memory modules
Answer: A
12. Data that has been organized or presented in a meaningful fashion is termed as:
(a) A process (b) Storage
(c) Software (d) Information
Answer: D
13.Which one of the following is not one of the major types of e-commerce?
A. C2B. B. B2C.
C. B2B. D. C2C
Answer: A
14. Compared to B2C e-commerce, B2B e-commerce is ______.
A. of equal size. B. slightly smaller.
C. slightly larger. D. much larger
Answer: D
15. All of the following are major B2C business models except ______.
A. content provider. B. industry consortium.
C. transaction broker. D. service provider
Answer: B
16. Communication is a ______________
A. one way process. B. two way process.
C. three way process. D. four way process.
Answer: B
17. The term communis derived from ______________ word.
A. Greek. B. Latin.
C. Chinese. D. English.
Answer: B
18. Communication is the ______________ of business.
A. Backbone. B.life blood.
C. nervous system. D.both (1) & (2).
Answer: A
19. CRM stands for:
a) Customer Relations Management
b) Customer Relationship Management
c) Both a & b d) None of the above
Answer: B
20. Malicious programs that damages your computer is called
A. Virus B. Bacteria
C. Bugs D.Worms
Answer: A

21. Which of the following cannot work as an input unit?

A. keyboard. B. trackball.
C. lightpen. D. floppy.
Answer: B
22. Some websites proved chat rooms to interact with an individual or a group is called ____
(A) Usenet (B) Newsgroup
(C) Chatting (D) E-mail
Answer: C
23. What does "CC" stand for in the context of email communication?
A. Carbon Copy B. Copy Content
C. Communication Centre D. Common Correspondence
Answer: A.
24. What is the purpose of the "BCC" field in an email message?
A. To specify the recipient's email address
B. To send a blind copy of the email to recipients
C. To provide a subject for the email
D. To attach files to the email
Answer: B
25.What is the term for a short, automated response sent in reply to an incoming email or instant
message?
A. Emoji B. Signature
C. Autoresponder D. Attachment
Answer: C
26. What is the function of the "Subject" field in an email message?
A. To specify the recipient's email address
B. To attach files
C. To provide a brief description of the email's content
D. To send emoticons and emojis
Answer: C
27. Which of the following is a common email attachment file format?
A. PDF (Portable Document Format)
B. ZIP (Compressed Archive)
C. HTML (Hypertext Markup Language)
D. MP3 (MPEG Audio Layer III)
Answer: A
28.Which of the following social media platforms is primarily focused on professional networking and job
searching?
A. Facebook B. Instagram
C. LinkedIn D. Snapchat
Answer: C
29.Which of the following is NOT a common feature of online collaboration tools?
A. Real-time chat C. Version control
B. Video streaming D. File sharing
Answer: B
30. What is the purpose of an email attachment?
A. To format email messages
B. To provide a summary of the email
C. To attach files or documents to an email
D. To send emoticons and emojis
Answer: C
31. Which of the following is NOT a common feature of online collaboration tools for document editing
and sharing?
A. Real-time collaboration
B. Version history
C. Social media integration
D. File synchronization
Answer: C
32. Which of the following is an essential element of good communication in teamwork?
a) Active listening. b) Dominating the conversation.
c) Avoiding conflict. d) share idea’s
Answer: A
33.Sending an E-mail is similar to ____________
A. writing a letter B. drawing a picture
C. talking on the phone D. sending a package
Answer: A
34. Which of the following is the appropriate format of URL of e-mail?
a. www_mail.com b.www@mail.com
c. WWW@mail.com d. www.mail.com
Answer: B
35. Match the following.
List 1 List 2
A Virus I. They are hard to detect
B Worms II. It is copied itself
C Trojan III. Non-self-replicating type of malware
Select the correct match using the codes given below:
A. A-II, B-I, C-III B. A-I, B-II, C-III
C. A-II, B-III, C-I D. A-I, B-III, C-II
Answer: A
36. An unsolicited e-mail, message sent to many recipients at once is a___
a. worm b. Virus
c. threat d. spam
Answer: D
37. An antivirus is a(n)_____
A. program code B. computer
C. company name D. application software
Answer: D
38. A term used to describe the location or folder where E-mail is stored before being sent.
A. Inbox B. Draft
C. Outbox D. Sent items
Answer: C
39. Given the following e-mails fields, which of the email addresses will swami be able to see when he
received the messages
To... ram@test.com
Cc... raj@test.com, ravi@test.com
Bcc… Swami@test.com , rama@test.com
Options are:
A. ram@test.com
B. ram@test.com , raj@test.com, ravi@test.com
C. ram@test.com , rama@test.com
D. raj@test.com, ravi@test.com , ram@test.com , rama@test.com
Answer: B
40. Which of the following enables us to send the same letter to the different people in MS Word?
A. Mail join B. Mail copy
C. Mail insert D. Mail Merge
Answer: D
41. Code Red is a type of ________
A. An Antivirus Program B. A photo editing software
C. A computer virus D. A video editing software
Answer: A
42. Which one of the following can be considered as the class of computer threats?
A. Dos Attack B. Phishing
C. Soliciting D. Both A and C
Answer: A
43. What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber-attacks
d) All of the mentioned
Answer: D
44. What does cyber security protect?
a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the mentioned
Answer: B
45. Which of the following is a type of cyber security?
a) Cloud Security b) Network Security
c) Application Security d) All of the above
Answer: D
46. Which of the following is a component of cyber security?
a) Internet Of Things b) AI
c) Database d) Attacks
Answer: A
47. Governments hired some highly skilled hackers for providing cyber security for the country or state.
These types of hackers are termed as _______
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
Answer: A
48. Which of the following actions compromise cyber security?
a) Vulnerability b) Attack
c) Threat d) Exploit
Answer: C
49. IT security in any firm or organization is maintained and handled by ____________________
a) Software Security Specialist
b) CEO of the organization
c) Security Auditor
d) IT Security Engineer
Answer: D
50. What is the existence of weakness in a system or network is known as?
a) Attack b) Exploit
c) Vulnerability d) Threat
Answer: C

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy