Ad Code

Ticker

6/recent/ticker-posts

DITA MCQ | DITA MCQ Question & Answer

DITA MCQ | DITA MCQ Question & Answer



The Diploma in Information Technology Application (DITA) is a program designed to provide students with a foundational understanding of computer systems, software applications, and programming concepts. The program is typically offered by community colleges, technical schools, and vocational institutions, and can be completed in one to two years.

 Here are some of the key details about the DITA program: 

Curriculum: 

The DITA program curriculum typically covers the following topics:

 

  • Introduction to computers and programming concepts
  • Operating systems
  • Database management systems
  • Web design and development
  • Object-oriented programming
  • Software development life cycle
  • Network and communication technologies
  • Cybersecurity
  • Project management
  • Cloud computing
  • The specific curriculum may vary depending on the institution offering the program.


Duration: 

The DITA program typically takes one to two years to complete, depending on the institution and the student's course load. Students can usually complete the program on a full-time or part-time basis.

 

Admission Requirements: 

The admission requirements for the DITA program vary depending on the institution offering the program. Generally, students must have a high school diploma or equivalent and meet any additional requirements set by the institution.

 

Career Opportunities: 

Graduates of the DITA program can pursue a variety of entry-level positions in the field of information technology, including:

 

  1. Computer support specialist
  2. Help desk technician
  3. Network administrator
  4. Web developer
  5. Database administrator
  6. Software developer
  7. IT project manager

Salary:

 The salary for graduates of the DITA program will vary depending on the specific job and location. According to data from the U.S. Bureau of Labor Statistics, the median annual salary for computer support specialists was $54,760 as of May 2020, while the median annual salary for web developers was $77,200.

 Overall, the Diploma in Information Technology Application program provides students with the skills and knowledge necessary to enter the field of information technology and pursue a variety of career opportunities.

DITA MCQ | DITA MCQ Question & Answer

1. Two main measures for the efficiency of an algorithm are_____
a) Processor and memory
b) Complexity and capacity
c) Time and space
d) Data and space
Answer: C

2. The complexity of merge sort algorithm is_____
a) O(n)
b) O(log n)
c) O(n2)
d) O(n log n)
Answer: D

3. HTTP refers to ?
a) Hyper Text Transfer Protocol
b) Hyper Text Transmission Protocol
c) Hyper Text Tie Protocol
d) None of these
Answer: A

4. Dim a as Integer What do you mean by integer within the given quotation_____
a) Boolean
b) Number
c) String
d) None
Answer: B

5. Which property determines whether a control is displayed to the user?
a) Hide
b) Show
c) Visible
d) Enabled
Answer: C

6. The complexity of linear search algorithm is_____
a) O(n)
b) O(log n)
c) O(n2)
d) O(n log n)
Answer: A

7. A world wide web contains web pages_____
a) residing in many computers
b) created using HTML
c) with links to other web pages
d) residing in many computers linked together using HTML
Answer: D

8. Which statement about objects is true?
a) One object is used to create one class.
b) One class is used to create one object.
c) One object can create many classes.
d) One class can create many objects.
Answer: D

9. Which is a Domain name extension ?
a) .flv
b) .xls
c) .com
d) .rrr
Answer: C

10. An object is composed of_____
a) properties
b) methods
c) events
d) All of the above
Answer: D

11. The complexity of the average case of an algorithm is_____
a) Much more complicated to analyze than that of worst case
b) Much more simpler to analyze than that of worst case
c) Sometimes more complicated and some other times simpler than that of worst case
d) None or above
Answer: A

12. What is the internet explorer ?
a) An icon
b) a file manager
c) A browser
d) an Internet
Answer: C

13. ______ is text with hyperlinks.
a) Lower Text
b) Upper Text
c) Toggle Text
d) Hypertext
Answer: D

14. Program flowcharts are the parts of_____
a) operation chart
b) process chart
c) algorithms flowchart
d) system flowcharts
Answer: C

15. If you Convert Numeric to Character expression then use_____
a) Str( )
b) Val( )
c) Instr( )
d) Len( )
Answer: A

16. How many MDI forms can be added in a Project File ?
a) 3
b) 1
c) 2
d) 4
Answer: B

17. A module-level is available to all the _______ in the module
a) Data
b) Procedures
c) Event.
d) Task
Answer: B

18. In the IDE, which of following is used to design the layout of an application?
a) Form Designer window.
b) Project Explorer window.
c) Context Menu.
d) Form Layout window.
Answer: A

19. Code window consists of a ______ box and procedure list box
a) Object.
b) Event.
c) Tool.
d) Message.
Answer: A

20. Code in VB is stored in______
a) Module.
b) Report.
c) Both (a) and (b).
d) None of above.
Answer: A

41. Tables in any database related to one another through ______
a) Primary Key
b) Forign Key
c) Composite Key
d) Alternate Key
Answer: B

42. Internet Explorer came into market in the year_____
a) 1994
b) 1995
c) 1996
d) 1997
Answer: B

43. Internet explorer falls under_____
a) Operating System
b) Compiler
c) Browser
d) IP address
Answer: C

44. Firefox came into market in the year____?
a) 2001
b) 2003
c) 2002
d) 2004
Answer: D

45. What should be minimum requirement of random access memory (RAM) for internet access?
a) 8 MB
b) 16 MB
c) 32 MB
d) 64 MB
Answer: C

46. A person who produces or creates new programs for industrial and business users is called____?
a) System analysts
b) Program coordinator
c) Computer coordinator
d) User interface
Answer: A

47. In a flowchart a calculation (process) is represented by____.
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: A

48. Dim statement is used to _____.
a) Declare only string variables.
b) Declare only integer variables.
c) Declare the variables.
d) None of these.
Answer: C

49. The Activated event is found only in which object?
a) Form.
b) Button
c) TextBox
d) Label
Answer: A

50. Which datatype store yes/no type data ?
a) Varient
b) Integer
c) Boolean
d) String
Answer: C

51. In Flowcharts of algorithms, messages are classified as_____
a) steps of algorithm
b) selection of steps
c) cancellation of procedures
d) addition of steps
Answer: A

52. In flowcharts, a circle with a vertical line drawn is a symbol used to show_____
a) systematic operation
b) manual operation
c) magnetic tape
d) display screen
Answer: C

53. Symbol used in flowchart such as rectangle with horizontal lines on two sides is used for_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C

54. The ____ statement checks in the module for usage of any undeclared variables and reports an error tothe user.
a) looping
b) iteration.
c) dim
d) external
Answer: C

55. The _____property in Visual basic is common for many a tools.
a) location.
b) Place.
c) window status.
d) name
Answer: D

56. What are the three algorithm constructs?
a) Sequence, selection, repetition.
b) Input, output, process.
c) Input/output, decision, terminator.
d) Loop, input/output, process.
Answer: A

57. Blink the Cursor in specific Textbox then use_____
a) Caption
b) List
c) Val( )
d) Setfocus
Answer: D

58. In order to use cable for browsing web you will need : _____
a) A cable modem.
b) Network Interface Card (NIC).
c) Both (a) & (b).
d) None Of the above.
Answer: C

59. The space factor when determining the efficiency of algorithm is measured by_____
a) Counting the maximum memory needed by the algorithm.
b) Counting the minimum memory needed by the algorithm.
c) Counting the average memory needed by the algorithm.
d) Counting the maximum disk space needed by the algorithm.
Answer: A

60. The time factor when determining the efficiency of algorithm is measured by_____
a) Counting microseconds.
b) Counting the number of key operations.
c) Counting the number of statements.
d) Counting the kilobytes of algorithm.
Answer: B

61. Controls are: _____

a) Code

b) Method

c) Object

d) None

Answer: C

 

62. DCL Provides Commands To Perform Actions Like_____

a) Change The Structure Of Tables.

b) Insert, Update Or Delete Records And Data Values

c) Authorizing Access And Other Control Over Database

d) None Of Above

Answer: C

 

63. Debug window is the same as ____ window.

a) procedure.

b) object.

c) form

d) code

Answer: D

 

64. Autoredraw = True Property is used for_____

a) Display Text on Command Button

b) Display Text on Label

c) Display Text on Frame

d) Display Some Text on Form Body

Answer: D

 

65. What is name of format : abc@rediffmail.com?

a) Email Id

b) Web site

c) WordProcessor

d) None

Answer: A

 

66. Which of the following sorting algorithms is of divide-and-conquer type?

a) Bubble sort

b) Insertion sort

c) Quick sort

d) All of above

Answer: C

 

67. Which one is not the property of algorithm?

a) Generality

b) Infiniteness

c) Finiteness

d) Correctness

Answer: B

 

68. MAX Property is for_____

a) Label

b) TextBox

c) HScrollBar

d) ComboBox

Answer: C

 

69. What Are The Different Views To Display A Table?

a) Datasheet view

b) Design view

c) Pivot table and Pivot Chart view

d) All of above

Answer: D

 

70. MS-Access is a _____

a) RDBMS package.

b) Language.

c) Drawing package.

d) Operating system.

Answer: A

 

71. How many types of query are present in MS-Access?

a) 6

b) 3

c) 8

d) 9

Answer: D

 

72. Property of primary key is _______

a) Unique.

b) Not null.

c) Indexed.

d) All of above.

Answer: D

 

73. Following Is Not A Database Model_____

a) Network Database Model.

b) Relational Database Model.

c) Object Oriented Database Model.

d) None.

Answer: D

 

74. What is the difference between 'Open' and 'Open Exclusively'?

a) Open statement opens access database files and Open Exclusively opens database files of other program like Oracle.

b) Open Exclusive locks whole database so that no one can access it whereas Open locks only the record that is being accessed.

c) Both Open and Open Exclusively are same.

d) Open Exclusive command does not exist in MS Access.

Answer: B

 

75. All components work together as a unit is called____

a) System

b) Component classification

c) Storing system

d) Operating system

Answer: A

 

76. In flowchart, invert trapezoid is used to show the____

a) On-line storage symbol

b) Manual operations

c) Communication link

d) Show annotations

Answer: B

 

77. Flowchart act as a guide or blue print during the system analysis. It is a advantage is called____

a) Communication

b) Proper Debugging

c) Effective Analysis

d) Efficient Coding

Answer: D

 

78. DHCP stands for____

a) Dynamic Host Configuration Protocol

b) Dual Host Configuration Protocol

c) Dual Host Control Protocol

d) Dynamic Host Control Protocol

Answer: A

 

79. The application name always appears in the_____

a) Titlebar

b) Menubar

c) Properties window

d) Code window

Answer: A

80. In flowchart, parallelogram is used to show_____

a) General input symbol

b) Operation on data

c) Online use of keyboard

d) Output data screen

Answer: A

81. Default data type of a variable in VB is_____

a) Integer

b) String

c) Float

d) Variant

Answer: D

82. DHCP stands for_____

a) Dynamic Host Configuration Protocol.

b) Dual Host Configuration Protocol

c) Dual Host Control Protocol

d) Dynamic Host Control Protocol

Answer: A

 

83. Shortcut of Web page Refresh is_____

a) F4

b) F5

c) F6

d) F7

Answer: B

 

84. Stock maintaining control system in store which consists hardware and software to contact and manage suppliers is called_____

a) system

b) component classification

c) information processing system

d) operating system

Answer: C

 

85. DNS stands for_____

a) Direct Naming System

b) Drive Naming Society

c) Domain Name System

d) Development New Society

Answer: C

 

86. Dynamic arrays can be declared when the user may not know the _____of the array at design time.

a) exact column.

b) exact variable.

c) exact value.

d) exact size.

Answer: D

 

87. Each computer connected to the internet must_____

a) have a unique HTTP address

b) be an IBM PC

c) have a modem connection

d) Switch

Answer: B

 

88. E-Mail : The Inbox is collection of_____

a) Deleted Mail

b) Draft Mails

c) Spam Mails

d) Incoming Mails

Answer: D

 

89. E-mail addresses separate the user name from the ISP using the __________ symbol.

a) &

b) @

c) #

d) %

Answer: B

 

90. Which language is not a true object-oriented programming language?

a) VB.NET

b) VB 6

c) C++

d) Java

Answer: B

 

91. Uses of Internet_____

a) Communication

b) Information Retrieval.

c) Presentation of information.

d) All of the above.

Answer: D

 

92. A computer language for informing the DBMS regarding the data structure used is_____

a) PASCAL

b) DDL

c) PROLOG

d) FORTRAN

Answer: B

 

93. A homepage is_____

a) an index on encyclopaedia articles.

b) where all internet data is store.

c) required for access to the internet.

d) the first page of a web site.

Answer: D

 

94. The first part of a complete URL is the __________ needed to access the web resource.

a) ADDRESS

b) NAME

c) LOCATION

d) PROTOCOL

Answer: D

 

95. What is an algorithm?

a) A flowchart.

b) Step by step instructions used to solve a problem.

c) A flowchart or pseudocode.

d) A decision.

Answer: B

 

96. A textbox is an example of_____

a) button

b) method

c) event

d) Control

Answer: D

 

97. In a relational database, a Referential Integrity constraint is specified with the help of_____

a) Primary Key.

b) Foreign Key.

c) Both (a) and (b).

d) None of these.

Answer: B

 

98. How can you view the properties of a form?

a) Select View > Form properties form the menu.

b) Right click anywhere on the form and select properties from the shortcut menu.

c) Double click the form selector box in the upper left corner of the form.

d) All the Above.

Answer: B

 

99. How do you insert a graphic of your company's logo on a report?

a) Design Tab -> Logo.

b) You can't MS Access won't let you insert graphics file.

c) Database Tools -> logo.

d) Select Tools > Insert Picture from the menu.

Answer: A

 

100. What is a form in MS Access?

a) It is a printed page where users will write their data to fill it up.

b) It is an input screen designed to make the viewing and entering data easier

c) This is an important part of database used by analysts to draw conclusions.

d) All of above.

Answer: B

101. FTP stands for_____

a) File Total Protocol.

b) Forward Total Protocol.

c) File Transfer Protocol.

d) File Transfer Project

Answer: C

 

102. There are _____ types of modules in visual basic

a) Three

b) Two

c) Five

d) None of these

Answer: A

 

103. A value that is automatically entered in a field for a new record_____

a) Validation rule

b) Default value

c) Input mask

d) None of above

Answer: B

 

104. Diagram that represents steps or operations involved in any kind of process is called_____

a) System diagram

b) Management hierarchy

c) Flowcharts

d) Convenience diagrams

Answer: C

 

105. In flowchart, symbol of rectangle with one curvy side is used to show_____

a) Document printed

b) Document written

c) Data stored

d) Display output

Answer: A

 

106. In a flowchart an input or output insruction is represented by_____

a) A rectangle

b) A rhombus

c) A parallelogram

d) A circle

Answer: C

 

107. Binary search algorithm cannot be applied to_____

a) Sorted linked list.

b) Sorted binary trees.

c) Sorted linear array.

d) Pointer array.

Answer: A

 

108. Connectors used to connect flowchart symbols to each other are classified as_____

a) Arrow lines.

b) Symbols.

c) Annotation.

d) Special symbols.

Answer: B

 

109. An algorithm that calls itself directly or indirectly is known as_____

a) Sub algorithm.

b) Recursion.

c) Polish notation.

d) Traversal algorithm.

Answer: B

 

110. The advantage of For…Next loops over Do…Loops is that they are: _____

a) easier to read and maintain.

b) less prone to being infinite loops.

c) good for working with arrays.

d) All of the above.

Answer: D

 

111. what does the .com domain represent?

a) education domain

b) commercial domain

c) network

d) Browser

Answer: B

 

112. The browser’s _______ keeps a list of web pages you have visited during the current session.

a) history

b) cache

c) favorites

d) trail

Answer: A

 

113. The complexity of Binary search algorithm is_____

a) O(n)

b) O(log )

c) O(n2)

d) O(n log n)

Answer: B

 

114. The complexity of Bubble sort algorithm is_____

a) O(n)

b) O(log )

c) O(n2)

d) O(n log n)

Answer: C

 

115. E-Mail where 'E' stands for_____

a) Electrical

b) Electronic

c) Election

d) Easy

Answer: B

 

116. Outlined program flowchart' shows the_____

a) detailed operations

b) general flowcharts

c) classified flowchart

d) detailed program

Answer: B

 

117. Part of an algorithm which is repeated for fixed number of times is classified as_____

a) iteration

b) selection

c) sequence

d) reverse action

Answer: A

 

118. Repetition of statement in Jackson method is shown by_____

a) drawing sign of equal

b) drawing sign of subtraction

c) drawing an asterisk

d) drawing an arrow

Answer: C

 

119. Google Chrome is a_____

a) word Processor

b) DBMS

c) Browser

d) None

Answer: C

 

120. MULTILINE=TRUE Property is used_____

a) Label

b) Inputbox

c) TextBox

d) Frame

Answer: C

121. Option button can be grouped in a ______control.

a) label

b) text box.

c) frame

d) check box

Answer: C

 

122. origin of Visual basic is_____

a) Cobol

b) Fortran

c) Basic

d) All Of the above.

Answer: C

 

123. In which year Hyperlink was coined?

a) 1969

b) 191

c) 1964

d) 1955

Answer: C

 

124. Verification of a login name and password is known as_____

a) Configuration.

b) Accessibility.

c) Authentication.

d) Logging in.

Answer: C

 

125. Referential integrity of MS-Access denotes _______

a) The data of all fields of a table must match with the data of the related table

b) A row of one table must match with a row of the related table.

c) All the values in foreign key field must match with the values of the primary key field of the related table.

d) Any value in foreign key field must match with the values of the primary key field of the related table

Answer: C

 

126. The relational model is concerned with _____

a) Data structure and data integrity

b) Data manipulation

c) Both (a) and (b).

d) None of these

Answer: C

 

127. Cylinder symbol represents ______

a) Magnetic Disk

b) Input

c) Connector

d) Annotation

Answer: A

 

128. The Worst case occur in linear search algorithm when_____

a) Item is somewhere in the middle of the array.

b) Item is not in the array at all.

c) Item is the last element in the array.

d) Item is the last element in the array or is not there at all.

Answer: D

 

129. To write program functions such as input four numbers and print their sum, program refinement first level includes_____

a) input four numbers

b) calculate sum

c) print values

d) print variables

Answer: A

 

130. An array of controls can be populated by: _____

a) assigning existing controls to the array.

b) creating controls and assigning them to the array.

c) borrowing controls that will automatically assign them to the array.

d) Both a and b.

Answer: D

 

131. An Exception is another name for a: _____

a) compile error.

b) logic error.

c) runtime error.

d) superficial error.

Answer: C

 

132. ARPANET stands for: _____

a) Advanced Research Policy Agency Network.

b) Advanced Research Projects Agency Network.

c) Advanced Research Projects Agency Norms.

d) Advanced Rejoin Projects Agency Norms.

Answer: B

 

133. Which one of the following is not a search engine?

a) Bing

b) Google

c) Yahoo

d) Windows

Answer: D

 

134. Safari browser came into market in the year____

a) 2000

b) 2001

c) 2002

d) 2003

Answer: D

 

135. In internet terminology IP means_____

a) Internet Provider

b) Internet Protocol

c) Internet Procedure

d) Internet Processor

Answer: B

 

136. The Internet was originally a project for this Government agency_____

a) ARPA

b) NSF

c) NSA

d) FCC

Answer: A

 

137. Moving from one website to another is called_____

a) Downloading

b) Browsing

c) Uploading

d) Attachment

Answer: B

 

138. Distinct parts of documentation are_____

a) Technical documentation.

b) Documentation for user.

c) Program planning.

d) Both a and b.

Answer: D

 

139. Diamond shaped symbol is used in flowcharts to show the_____

a) Decision box.

b) Statement box.

c) Error box.

d) If-statement box.

Answer: A

 

140. The first Network_____

a) CNNET.

b) NSFNET.

c) ASAPNET.

d) ARPANET.

Answer: D

141. The extension of standard modules is_____

a) .cls

b) .res

c) .bas

d) .xls

Answer: C

 

142. Which of the following cases does not exist in complexity theory?

a) Best case

b) Worst case

c) Average case

d) Null Case

Answer: D

 

143. What is the full form of CC option while Compose/Sending mail ?

a) Carbon copy

b) Copy carbon

c) Copy to copy

d) Carbon to Connect

Answer: A

 

144. What is the minimum bandwidth required for broadband connection?

a) 128 kbps

b) 256 kbps

c) 512 kbps

d) 2048 kbps

Answer: B

 

145. When flowchart direction lines are unclear then the programmer can use

a) arrows

b) horizontal lines

c) vertical lines

d) inverted triangle

Answer: A

 

146. Which of the following is not the required condition for binary search algorithm?

a) The list must be sorted.

b) There should be the direct access to the. middle element in any sublist

c) There must be mechanism to delete and/or insert elements in list

d) none of above

Answer: C

 

147. How many values a CheckBox can have ?

a) 1

b) 2

c) 3

d) 4

Answer: C

 

148. Key fields of the ConnectionString property are_____

a) Provider

b) Mode

c) Provider & Data Source

d) Data Source

Answer: D

 

149. Link with another part of program or connectors in flowchart are shown in_____

a) rhombus

b) parallelogram

c) circle

d) trapezoid

Answer: C

 

150. LIST Property is used_____

a) Command Button

b) Label

c) TextBox

d) ComboBox

Answer: D

 

151. MAN refers to ?

a) Mega Area Network

b) Metropolitan Area Network.

c) Mini Area Network.

d) Medium Area Network.

Answer: B

 

152. In a relational database, a Referential Integrity constraint is specified with the help of_____

a) Primary Key

b) Foreign Key

c) Both (a) and (b).

d) None of these

Answer: B

 

153. In a URL what does .org represents_____

a) educational institute

b) military site

c) organization

d) commercial

Answer: C


Post a Comment

0 Comments