UNIT-3 Information and Communication Technology Skills
MCQ WITH ANSWERS
Session 1: Basic Computer Operations
Q-1. ICT Stands for _____________.
a. Inform and Communicate technology
b. Information and Communication technology
c. Inform and Communication technology
d. Information and Communicate technology
Right Answer is ⟵
b. Information and Communication technology
Q-2. In a business, the best approach to keep records is ____________.
a. Handwritten on paper
b. Written using a typewriter
c. Written using a Computer
d. None of the above
Right Answer is ⟵
c. Written using a Computer
Q-3. ICT Skills help us to ________________, run our business and stay connected with our family and friends.
a. Communicate
b. Entertainment
c. Both a) and b)
d. None of the above
Right Answer is ⟵
Q-4. A computer system consists of two main parts __________ and _________.
a. Hardware
b. Software
c. Antivirus
d. Both a) and b)
Right Answer is ⟵
d. Both a) and b)
Q-5. The physical parts that we can see and touch are called _________.
a. Hardware
b. Software
c. Antivirus
d. None of the above
Right Answer is ⟵
a. Hardware
Q-5. Mobile devices, such as __________ and ____________ are also computer systems with hardware and software.
a. Mouse and Keyboard
b. Smartphone and Tablets
c. Typewriter and Pen
d. None of the above
Right Answer is ⟵
b. Smartphone and Tablets
Q-6. The most important software in any computer is the _________________.
a. Operating System
b. Antivirus
c. Office Package
d. Photo Editing Software
Right Answer is ⟵
a. Operating System
Q-7. Mobile devices also have an operating system like ___________.
a. Apple iOS
b. Android
c. Both a) and b)
d. None of the above
Right Answer is ⟵
c. Both a) and b)
Q-8. BIOS stands for ____________.
a. Basic Input/Output System
b. Basic In/Out System
c. Based on In/Out System
d. None of the above
Right Answer is ⟵
a. Basic Input/Output System
Q-9. Keyboard is an ___________ device.
a. Output device
b. Input device
c. Outer device
d. Inner device
Right Answer is ⟵
b. Input device
Q-10. __________ helps the computer to close all the applications, Operating system and turn off the computer.
a. Sleep
b. Shut down
c. Hibernate
d. None of the above
Right Answer is ⟵
b. Shut down
Q-11. SHIFT, SPACEBAR, ALT, CAPS LOCK are ________ keys which perform special functions.
a. Enter Key
b. Function Key
c. Control Key
d. Navigation Key
Right Answer is ⟵
c. Control Key
Q-12. __________ keys help to move the cursor to the beginning of a new line.
a. Enter Key
b. Return Key
c. Both a) and b)
d. None of the above
Right Answer is ⟵
c. Both a) and b)
Q-13. ____________ keys known as punctuation keys.
a. Colon
b. Semicolon
c. Question mark
d. All of the above
Right Answer is ⟵
d. All of the above
Q-14. Example of navigation keys ___________.
a. Home
b. End
c. Page Up & Page Down
d. All of the above
Right Answer is ⟵
d. All of the above
Q-15. Example of command keys___________.
a. Insert
b. Delete
c. Backspace
d. All of the above
Right Answer is ⟵
d. All of the above
Q-16. Which of the following does not require the use of a mouse?
a. Turn on
b. Right click
c. Hover
d. Drag and Drop
Right Answer is ⟵
a. Turn on
Q-17. What is the term used when you press and hold the left mouse key and move the mouse around?
a. Highlighting
b. Selecting
c. Dragging
d. Moving
Right Answer is ⟵
c. Dragging
Q-18. The following are the stages involved in starting a computer. Rearrange the stages in the proper sequence.
i. Desktop appears after login
ii. Login screen appears
iii. Power on Self-Test (POST) starts
iv. Operating system starts
v. Welcome screen appears
a. i), ii), iii), iv), v)
b. ii), i), v), iii), iv)
c. iii), iv), v), ii), i)
d. iii), ii), i), iv), v)
Right Answer is ⟵
c. iii), iv), v), ii), i)
Session 2: Performing Basic File Operations
Q-19. Extension of notepad file _________.
a. .txt
b. .bmp
c. .jpg
d. .psd
Right Answer is ⟵
a. .txt
Q-20. Extension of image file _________.
a. .bmp
b. .jpg
c. Both a) and b)
d. None of the above
Right Answer is ⟵
c. Both a) and b)
Q-21. Which one of the following shortcut keys is used to paste a file?
a. Ctrl + c
b. Ctrl + p
c. Ctrl + v
d. Ctrl + x
Right Answer is ⟵
c. Ctrl + v
Q-22. Which of the following is a valid file extension for Notepad file?
a. .jpg
b. .doc
c. .text
d. .txt
Right Answer is ⟵
d. .txt
Q-23. What keys do you use to copy something?
a. Ctrl+x
b. Ctrl+c
c. Ctrl+z
d. Ctrl+y
Right Answer is ⟵
b. Ctrl+c
Session 3: Computer Care and Maintenance
Q-24. What are the best options for caring for computer devices?
a. Keeping a Device Clean
b. Prepare a Maintenance Schedule
c. Do not overcharge your battery
d. All of the above
Right Answer is ⟵
d. All of the above
Q-25. You can take backup in the following devices_________.
a. CD/DVD
b. Flash Drive
c. External Drive
d. All of the above
Right Answer is ⟵
c. External Drive
Q-26. To clean the computer from the virus we required __________.
a. Antivirus
b. Office Package
c. Photoshop
d. Operating System
Right Answer is ⟵
a. Antivirus
Q-27. If we are using a computer for a long time we have to __________ unnecessary files and data from the computer.
a. Delete
b. Save
c. Backup
d. None of the above
Right Answer is ⟵
a. Delete
Q-28. Sometimes we get mails from companies who are advertising a product or trying to attract you to their website. Such mails are called ________.
a. Trash
b. Inbox
c. Spam
d. None of the above
Right Answer is ⟵
c. Spam
Q-29. What happens if you keep a device plugged in after it has been fully charged?
a. It can break.
b. It can overheat.
c. It can stop functioning.
d. Data can get corrupt.
Right Answer is ⟵
b. It can overheat.
Q-30. What role does antivirus play in protecting your device?
a. It can increase its performance.
b. It can protect it from overheating.
c. It can prevent data from getting corrupt.
d. It can backup data.
Right Answer is ⟵
c. It can prevent data from getting corrupt.
Q-31. Which option does not need to be enabled in order to keep a device cool?
a. Make sure the computer’s CPU fan is working.
b. Keep the device unplugged when in use.
c. Do not cover a laptop with a blanket.
d. Avoid leaving the device in the sun.
Right Answer is ⟵
b. Keep the device unplugged when in use.
Q-32. Which of the following is required for keyboard maintenance?
a. Use a very dilute combination of soap and water applied with a non-abrasive cloth to remove stains from the keycaps.
b. Turn the keyboard upside down and shake it to remove foreign material.
c. Blow dust and other particles with the help of a blower.
d. All of the above.
Right Answer is ⟵
d. All of the above
Session 4: Computer Security and Privacy
Q-33. Computer security helps to protect computers from ___________.
a. Security Break
b. Protect from Threats
c. Protecting your data
d. All of the above
Right Answer is ⟵
d. All of the above
Q-34. What do you mean by Threats ___________.
a. Theft
b. Virus
c. Both a) and b)
d. None of the above
Right Answer is ⟵
c. Both a) and b)
Q-35. __________ are computer programmes that can corrupt data and software programmes, as well as steal information from a computer.
a. Virus
b. Theft
c. Both a) and b)
d. None of the above
Right Answer is ⟵
a. Virus
Q-36. If someone steals your desktop computer or laptop, it is referred to as _________ theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above
Right Answer is ⟵
a. Physical
Q-37. When a hacker takes your personal information and assumes your identity, this is referred to as____________ theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above
Right Answer is ⟵
b. Identity
Q-38. _________ hits the computer, it acts like a virus, deleting data.
a. Trojan House
b. Online Predator
c. Theft
d. None of the above
Right Answer is ⟵
a. Trojan House
Q-39. __________ are persons who try to attract you into inappropriate relationships.
a. Trojan House
b. Online Predator
c. Theft
d. None of the above
Right Answer is ⟵
b. Online Predator
Q-40. Sometimes you may receive very attractive offers saying you have won a huge amount of money in a lottery and that you can claim the prize by depositing a certain amount of money known as ___________.
a. Trojan House
b. Online Predator
c. Theft
d. Internet Scams
Right Answer is ⟵
d. Internet Scams
Q-41. To protect our data from theft and viruses we can take ___________ measures.
a. Use passwords to login
b. Install Anti – Virus and firewall
c. Encrypt Data
d. All of the above
Right Answer is ⟵
d. All of the above
Q-42. Banks and companies usually keep their data in ___________ format.
a. Encrypted
b. Firewall
c. Using Password
d. All of the above
Right Answer is ⟵
a. Encrypted
Q-43. If you want to create a secure password you have to use _________ in the password.
a. Small and Capital letter
b. Numbers
c. Special Characters
d. All of the above
Right Answer is ⟵
d. All of the above
Q-44. We can check secure websites using __________.
a. http://
b. https://
c. Www
d. None of the above
Right Answer is ⟵
b. https://
Q-45. What can you do to make sure your internet transactions are safe?
a. Lock your computer
b. Do not use pirated software
c. Give credit card or bank details only on safe websites
d. Use anti-virus
Right Answer is ⟵
c. Give credit card or bank details only on safe websites
46. Which of the following is a trap for small children into unsuitable relationships?
a. Trojan Horse
b. Online predators
c. Worms
d. Anti-Virus
Right Answer is ⟵
b. Online predators
Q-47. What should a strong password consist of?
a. Name of a person
b. Only letters
c. Letters, numbers and special characters
d. Numbers and special characters
Right Answer is ⟵
c. Letters, numbers and special characters
For any queries or suggestion kindly send an email to cutekids285@gmail.com
Follow this link to join my WhatsApp group for more updates: JOIN US