DITA MCQ | DITA MCQ Question & Answer
The Diploma in Information Technology Application (DITA) is a program designed to provide students with a foundational understanding of computer systems, software applications, and programming concepts. The program is typically offered by community colleges, technical schools, and vocational institutions, and can be completed in one to two years.
Here are some of the key details about the DITA program:
Curriculum:
The DITA program curriculum typically covers the
following topics:
- Introduction to computers and programming concepts
- Operating systems
- Database management systems
- Web design and development
- Object-oriented programming
- Software development life cycle
- Network and communication technologies
- Cybersecurity
- Project management
- Cloud computing
- The specific curriculum may vary depending on the institution offering the program.
Duration:
The DITA program typically takes one to two years
to complete, depending on the institution and the student's course load.
Students can usually complete the program on a full-time or part-time basis.
Admission Requirements:
The admission requirements for the DITA program
vary depending on the institution offering the program. Generally, students
must have a high school diploma or equivalent and meet any additional
requirements set by the institution.
Career Opportunities:
Graduates of the DITA program can pursue a variety
of entry-level positions in the field of information technology, including:
- Computer support specialist
- Help desk technician
- Network administrator
- Web developer
- Database administrator
- Software developer
- IT project manager
Salary:
The salary for graduates of the DITA program will vary depending on the specific job and location. According to data from the U.S. Bureau of Labor Statistics, the median annual salary for computer support specialists was $54,760 as of May 2020, while the median annual salary for web developers was $77,200.
Overall, the Diploma in Information Technology Application program provides students with the skills and knowledge necessary to enter the field of information technology and pursue a variety of career opportunities.
DITA MCQ | DITA MCQ Question & Answer
1. Two main measures for the
efficiency of an algorithm are_____
a) Processor and memory
b) Complexity and capacity
c) Time and space
d) Data and space
Answer: C
2. The complexity of merge
sort algorithm is_____
a) O(n)
b) O(log n)
c) O(n2)
d) O(n log n)
Answer: D
3. HTTP refers to ?
a) Hyper Text Transfer Protocol
b) Hyper Text Transmission Protocol
c) Hyper Text Tie Protocol
d) None of these
Answer: A
4. Dim a as Integer What do
you mean by integer within the given quotation_____
a) Boolean
b) Number
c) String
d) None
Answer: B
5. Which property determines
whether a control is displayed to the user?
a) Hide
b) Show
c) Visible
d) Enabled
Answer: C
6. The complexity of linear
search algorithm is_____
a) O(n)
b) O(log n)
c) O(n2)
d) O(n log n)
Answer: A
7. A world wide web contains
web pages_____
a) residing in many computers
b) created using HTML
c) with links to other web pages
d) residing in many computers linked together using HTML
Answer: D
8. Which statement about
objects is true?
a) One object is used to create one class.
b) One class is used to create one object.
c) One object can create many classes.
d) One class can create many objects.
Answer: D
9. Which is a Domain name
extension ?
a) .flv
b) .xls
c) .com
d) .rrr
Answer: C
10. An object is composed
of_____
a) properties
b) methods
c) events
d) All of the above
Answer: D
11. The complexity of the
average case of an algorithm is_____
a) Much more complicated to analyze than that of worst case
b) Much more simpler to analyze than that of worst case
c) Sometimes more complicated and some other times simpler than that of worst
case
d) None or above
Answer: A
12. What is the internet
explorer ?
a) An icon
b) a file manager
c) A browser
d) an Internet
Answer: C
13. ______ is text with
hyperlinks.
a) Lower Text
b) Upper Text
c) Toggle Text
d) Hypertext
Answer: D
14. Program flowcharts are the
parts of_____
a) operation chart
b) process chart
c) algorithms flowchart
d) system flowcharts
Answer: C
15. If you Convert Numeric to
Character expression then use_____
a) Str( )
b) Val( )
c) Instr( )
d) Len( )
Answer: A
16. How many MDI forms can be
added in a Project File ?
a) 3
b) 1
c) 2
d) 4
Answer: B
17. A module-level is available
to all the _______ in the module
a) Data
b) Procedures
c) Event.
d) Task
Answer: B
18. In the IDE, which of
following is used to design the layout of an application?
a) Form Designer window.
b) Project Explorer window.
c) Context Menu.
d) Form Layout window.
Answer: A
19. Code window consists of a
______ box and procedure list box
a) Object.
b) Event.
c) Tool.
d) Message.
Answer: A
20. Code in VB is stored
in______
a) Module.
b) Report.
c) Both (a) and (b).
d) None of above.
Answer: A
41. Tables in any database
related to one another through ______
a) Primary Key
b) Forign Key
c) Composite Key
d) Alternate Key
Answer: B
42. Internet Explorer came
into market in the year_____
a) 1994
b) 1995
c) 1996
d) 1997
Answer: B
43. Internet explorer falls
under_____
a) Operating System
b) Compiler
c) Browser
d) IP address
Answer: C
44. Firefox came into market
in the year____?
a) 2001
b) 2003
c) 2002
d) 2004
Answer: D
45. What should be minimum
requirement of random access memory (RAM) for internet access?
a) 8 MB
b) 16 MB
c) 32 MB
d) 64 MB
Answer: C
46. A person who produces or
creates new programs for industrial and business users is called____?
a) System analysts
b) Program coordinator
c) Computer coordinator
d) User interface
Answer: A
47. In a flowchart a
calculation (process) is represented by____.
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: A
48. Dim statement is used to
_____.
a) Declare only string variables.
b) Declare only integer variables.
c) Declare the variables.
d) None of these.
Answer: C
49. The Activated event is
found only in which object?
a) Form.
b) Button
c) TextBox
d) Label
Answer: A
50. Which datatype store
yes/no type data ?
a) Varient
b) Integer
c) Boolean
d) String
Answer: C
51. In Flowcharts of
algorithms, messages are classified as_____
a) steps of algorithm
b) selection of steps
c) cancellation of procedures
d) addition of steps
Answer: A
52. In flowcharts, a circle
with a vertical line drawn is a symbol used to show_____
a) systematic operation
b) manual operation
c) magnetic tape
d) display screen
Answer: C
53. Symbol used in flowchart
such as rectangle with horizontal lines on two sides is used for_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C
54. The ____ statement checks
in the module for usage of any undeclared variables and reports an error tothe
user.
a) looping
b) iteration.
c) dim
d) external
Answer: C
55. The _____property in
Visual basic is common for many a tools.
a) location.
b) Place.
c) window status.
d) name
Answer: D
56. What are the three
algorithm constructs?
a) Sequence, selection, repetition.
b) Input, output, process.
c) Input/output, decision, terminator.
d) Loop, input/output, process.
Answer: A
57. Blink the Cursor in
specific Textbox then use_____
a) Caption
b) List
c) Val( )
d) Setfocus
Answer: D
58. In order to use cable for
browsing web you will need : _____
a) A cable modem.
b) Network Interface Card (NIC).
c) Both (a) & (b).
d) None Of the above.
Answer: C
59. The space factor when
determining the efficiency of algorithm is measured by_____
a) Counting the maximum memory needed by the algorithm.
b) Counting the minimum memory needed by the algorithm.
c) Counting the average memory needed by the algorithm.
d) Counting the maximum disk space needed by the algorithm.
Answer: A
60. The time factor when
determining the efficiency of algorithm is measured by_____
a) Counting microseconds.
b) Counting the number of key operations.
c) Counting the number of statements.
d) Counting the kilobytes of algorithm.
Answer: B
61. Controls are: _____
a) Code
b) Method
c) Object
d) None
Answer: C
62. DCL Provides Commands To Perform
Actions Like_____
a) Change The Structure Of Tables.
b) Insert, Update Or Delete Records And Data Values
c) Authorizing Access And Other Control Over Database
d) None Of Above
Answer: C
63. Debug window is the same as ____ window.
a) procedure.
b) object.
c) form
d) code
Answer: D
64. Autoredraw = True Property is used for_____
a) Display Text on Command Button
b) Display Text on Label
c) Display Text on Frame
d) Display Some Text on Form Body
Answer: D
65. What is name of format : abc@rediffmail.com?
a) Email Id
b) Web site
c) WordProcessor
d) None
Answer: A
66. Which of the following sorting algorithms is of
divide-and-conquer type?
a) Bubble sort
b) Insertion sort
c) Quick sort
d) All of above
Answer: C
67. Which one is not the property of algorithm?
a) Generality
b) Infiniteness
c) Finiteness
d) Correctness
Answer: B
68. MAX Property is for_____
a) Label
b) TextBox
c) HScrollBar
d) ComboBox
Answer: C
69. What Are The Different Views To Display A Table?
a) Datasheet view
b) Design view
c) Pivot table and Pivot Chart view
d) All of above
Answer: D
70. MS-Access is a _____
a) RDBMS package.
b) Language.
c) Drawing package.
d) Operating system.
Answer: A
71. How many types of query are present in MS-Access?
a) 6
b) 3
c) 8
d) 9
Answer: D
72. Property of primary key is _______
a) Unique.
b) Not null.
c) Indexed.
d) All of above.
Answer: D
73. Following Is Not A Database Model_____
a) Network Database Model.
b) Relational Database Model.
c) Object Oriented Database Model.
d) None.
Answer: D
74. What is the difference between 'Open' and 'Open
Exclusively'?
a) Open statement opens access database files and Open
Exclusively opens database files of other program like Oracle.
b) Open Exclusive locks whole database so that no one
can access it whereas Open locks only the record that is being accessed.
c) Both Open and Open Exclusively are same.
d) Open Exclusive command does not exist in MS Access.
Answer: B
75. All components work together as a unit is
called____
a) System
b) Component classification
c) Storing system
d) Operating system
Answer: A
76. In flowchart, invert trapezoid is used to show
the____
a) On-line storage symbol
b) Manual operations
c) Communication link
d) Show annotations
Answer: B
77. Flowchart act as a guide or blue print during the
system analysis. It is a advantage is called____
a) Communication
b) Proper Debugging
c) Effective Analysis
d) Efficient Coding
Answer: D
78. DHCP stands for____
a) Dynamic Host Configuration Protocol
b) Dual Host Configuration Protocol
c) Dual Host Control Protocol
d) Dynamic Host Control Protocol
Answer: A
79. The application name always appears in the_____
a) Titlebar
b) Menubar
c) Properties window
d) Code window
Answer: A
80. In flowchart, parallelogram is used to show_____
a) General input symbol
b) Operation on data
c) Online use of keyboard
d) Output data screen
Answer: A
81. Default data type of a variable in VB is_____
a) Integer
b) String
c) Float
d) Variant
Answer: D
82. DHCP stands for_____
a) Dynamic Host Configuration Protocol.
b) Dual Host Configuration Protocol
c) Dual Host Control Protocol
d) Dynamic Host Control Protocol
Answer: A
83. Shortcut of Web page Refresh is_____
a) F4
b) F5
c) F6
d) F7
Answer: B
84. Stock maintaining control system in store which
consists hardware and software to contact and manage suppliers is called_____
a) system
b) component classification
c) information processing system
d) operating system
Answer: C
85. DNS stands for_____
a) Direct Naming System
b) Drive Naming Society
c) Domain Name System
d) Development New Society
Answer: C
86. Dynamic arrays can be declared when the user may
not know the _____of the array at design time.
a) exact column.
b) exact variable.
c) exact value.
d) exact size.
Answer: D
87. Each computer connected to the internet must_____
a) have a unique HTTP address
b) be an IBM PC
c) have a modem connection
d) Switch
Answer: B
88. E-Mail : The Inbox is collection of_____
a) Deleted Mail
b) Draft Mails
c) Spam Mails
d) Incoming Mails
Answer: D
89. E-mail addresses separate the user name from the
ISP using the __________ symbol.
a) &
b) @
c) #
d) %
Answer: B
90. Which language is not a true object-oriented
programming language?
a) VB.NET
b) VB 6
c) C++
d) Java
Answer: B
91. Uses of Internet_____
a) Communication
b) Information Retrieval.
c) Presentation of information.
d) All of the above.
Answer: D
92. A computer language for informing the DBMS
regarding the data structure used is_____
a) PASCAL
b) DDL
c) PROLOG
d) FORTRAN
Answer: B
93. A homepage is_____
a) an index on encyclopaedia articles.
b) where all internet data is store.
c) required for access to the internet.
d) the first page of a web site.
Answer: D
94. The first part of a complete URL is the __________
needed to access the web resource.
a) ADDRESS
b) NAME
c) LOCATION
d) PROTOCOL
Answer: D
95. What is an algorithm?
a) A flowchart.
b) Step by step instructions used to solve a problem.
c) A flowchart or pseudocode.
d) A decision.
Answer: B
96. A textbox is an example of_____
a) button
b) method
c) event
d) Control
Answer: D
97. In a relational database, a Referential Integrity
constraint is specified with the help of_____
a) Primary Key.
b) Foreign Key.
c) Both (a) and (b).
d) None of these.
Answer: B
98. How can you view the properties of a form?
a) Select View > Form properties form the menu.
b) Right click anywhere on the form and select
properties from the shortcut menu.
c) Double click the form selector box in the upper
left corner of the form.
d) All the Above.
Answer: B
99. How do you insert a graphic of your company's logo
on a report?
a) Design Tab -> Logo.
b) You can't MS Access won't let you insert graphics
file.
c) Database Tools -> logo.
d) Select Tools > Insert Picture from the menu.
Answer: A
100. What is a form in MS Access?
a) It is a printed page where users will write their
data to fill it up.
b) It is an input screen designed to make the viewing
and entering data easier
c) This is an important part of database used by
analysts to draw conclusions.
d) All of above.
Answer: B
101. FTP stands for_____
a) File Total Protocol.
b) Forward Total Protocol.
c) File Transfer Protocol.
d) File Transfer Project
Answer: C
102. There are _____ types of modules in visual basic
a) Three
b) Two
c) Five
d) None of these
Answer: A
103. A value that is automatically entered in a field
for a new record_____
a) Validation rule
b) Default value
c) Input mask
d) None of above
Answer: B
104. Diagram that represents steps or operations
involved in any kind of process is called_____
a) System diagram
b) Management hierarchy
c) Flowcharts
d) Convenience diagrams
Answer: C
105. In flowchart, symbol of rectangle with one curvy
side is used to show_____
a) Document printed
b) Document written
c) Data stored
d) Display output
Answer: A
106. In a flowchart an input or output insruction is
represented by_____
a) A rectangle
b) A rhombus
c) A parallelogram
d) A circle
Answer: C
107. Binary search algorithm cannot be applied to_____
a) Sorted linked list.
b) Sorted binary trees.
c) Sorted linear array.
d) Pointer array.
Answer: A
108. Connectors used to connect flowchart symbols to
each other are classified as_____
a) Arrow lines.
b) Symbols.
c) Annotation.
d) Special symbols.
Answer: B
109. An algorithm that calls itself directly or
indirectly is known as_____
a) Sub algorithm.
b) Recursion.
c) Polish notation.
d) Traversal algorithm.
Answer: B
110. The advantage of For…Next loops over Do…Loops is
that they are: _____
a) easier to read and maintain.
b) less prone to being infinite loops.
c) good for working with arrays.
d) All of the above.
Answer: D
111. what does the .com domain represent?
a) education domain
b) commercial domain
c) network
d) Browser
Answer: B
112. The browser’s _______ keeps a list of web pages
you have visited during the current session.
a) history
b) cache
c) favorites
d) trail
Answer: A
113. The complexity of Binary search algorithm is_____
a) O(n)
b) O(log )
c) O(n2)
d) O(n log n)
Answer: B
114. The complexity of Bubble sort algorithm is_____
a) O(n)
b) O(log )
c) O(n2)
d) O(n log n)
Answer: C
115. E-Mail where 'E' stands for_____
a) Electrical
b) Electronic
c) Election
d) Easy
Answer: B
116. Outlined program flowchart' shows the_____
a) detailed operations
b) general flowcharts
c) classified flowchart
d) detailed program
Answer: B
117. Part of an algorithm which is repeated for fixed
number of times is classified as_____
a) iteration
b) selection
c) sequence
d) reverse action
Answer: A
118. Repetition of statement in Jackson method is
shown by_____
a) drawing sign of equal
b) drawing sign of subtraction
c) drawing an asterisk
d) drawing an arrow
Answer: C
119. Google Chrome is a_____
a) word Processor
b) DBMS
c) Browser
d) None
Answer: C
120. MULTILINE=TRUE Property is used_____
a) Label
b) Inputbox
c) TextBox
d) Frame
Answer: C
121. Option button can be grouped in a ______control.
a) label
b) text box.
c) frame
d) check box
Answer: C
122. origin of Visual basic is_____
a) Cobol
b) Fortran
c) Basic
d) All Of the above.
Answer: C
123. In which year Hyperlink was coined?
a) 1969
b) 191
c) 1964
d) 1955
Answer: C
124. Verification of a login name and password is
known as_____
a) Configuration.
b) Accessibility.
c) Authentication.
d) Logging in.
Answer: C
125. Referential integrity of MS-Access denotes
_______
a) The data of all fields of a table must match with
the data of the related table
b) A row of one table must match with a row of the
related table.
c) All the values in foreign key field must match with
the values of the primary key field of the related table.
d) Any value in foreign key field must match with the
values of the primary key field of the related table
Answer: C
126. The relational model is concerned with _____
a) Data structure and data integrity
b) Data manipulation
c) Both (a) and (b).
d) None of these
Answer: C
127. Cylinder symbol represents ______
a) Magnetic Disk
b) Input
c) Connector
d) Annotation
Answer: A
128. The Worst case occur in linear search algorithm
when_____
a) Item is somewhere in the middle of the array.
b) Item is not in the array at all.
c) Item is the last element in the array.
d) Item is the last element in the array or is not
there at all.
Answer: D
129. To write program functions such as input four
numbers and print their sum, program refinement first level includes_____
a) input four numbers
b) calculate sum
c) print values
d) print variables
Answer: A
130. An array of controls can be populated by: _____
a) assigning existing controls to the array.
b) creating controls and assigning them to the array.
c) borrowing controls that will automatically assign
them to the array.
d) Both a and b.
Answer: D
131. An Exception is another name for a: _____
a) compile error.
b) logic error.
c) runtime error.
d) superficial error.
Answer: C
132. ARPANET stands for: _____
a) Advanced Research Policy Agency Network.
b) Advanced Research Projects Agency Network.
c) Advanced Research Projects Agency Norms.
d) Advanced Rejoin Projects Agency Norms.
Answer: B
133. Which one of the following is not a search
engine?
a) Bing
b) Google
c) Yahoo
d) Windows
Answer: D
134. Safari browser came into market in the year____
a) 2000
b) 2001
c) 2002
d) 2003
Answer: D
135. In internet terminology IP means_____
a) Internet Provider
b) Internet Protocol
c) Internet Procedure
d) Internet Processor
Answer: B
136. The Internet was originally a project for this
Government agency_____
a) ARPA
b) NSF
c) NSA
d) FCC
Answer: A
137. Moving from one website to another is called_____
a) Downloading
b) Browsing
c) Uploading
d) Attachment
Answer: B
138. Distinct parts of documentation are_____
a) Technical documentation.
b) Documentation for user.
c) Program planning.
d) Both a and b.
Answer: D
139. Diamond shaped symbol is used in flowcharts to
show the_____
a) Decision box.
b) Statement box.
c) Error box.
d) If-statement box.
Answer: A
140. The first Network_____
a) CNNET.
b) NSFNET.
c) ASAPNET.
d) ARPANET.
Answer: D
141. The extension of standard modules is_____
a) .cls
b) .res
c) .bas
d) .xls
Answer: C
142. Which of the following cases does not exist in
complexity theory?
a) Best case
b) Worst case
c) Average case
d) Null Case
Answer: D
143. What is the full form of CC option while
Compose/Sending mail ?
a) Carbon copy
b) Copy carbon
c) Copy to copy
d) Carbon to Connect
Answer: A
144. What is the minimum bandwidth required for
broadband connection?
a) 128 kbps
b) 256 kbps
c) 512 kbps
d) 2048 kbps
Answer: B
145. When flowchart direction lines are unclear then
the programmer can use
a) arrows
b) horizontal lines
c) vertical lines
d) inverted triangle
Answer: A
146. Which of the following is not the required
condition for binary search algorithm?
a) The list must be sorted.
b) There should be the direct access to the. middle
element in any sublist
c) There must be mechanism to delete and/or insert
elements in list
d) none of above
Answer: C
147. How many values a CheckBox can have ?
a) 1
b) 2
c) 3
d) 4
Answer: C
148. Key fields of the ConnectionString property
are_____
a) Provider
b) Mode
c) Provider & Data Source
d) Data Source
Answer: D
149. Link with another part of program or connectors
in flowchart are shown in_____
a) rhombus
b) parallelogram
c) circle
d) trapezoid
Answer: C
150. LIST Property is used_____
a) Command Button
b) Label
c) TextBox
d) ComboBox
Answer: D
151. MAN refers to ?
a) Mega Area Network
b) Metropolitan Area Network.
c) Mini Area Network.
d) Medium Area Network.
Answer: B
152. In a relational database, a Referential Integrity
constraint is specified with the help of_____
a) Primary Key
b) Foreign Key
c) Both (a) and (b).
d) None of these
Answer: B
153. In a URL what does .org represents_____
a) educational institute
b) military site
c) organization
d) commercial
Answer: C
0 Comments