0% found this document useful (0 votes)
37 views23 pages

ICT Skills: Information and Communication Technology

The document consists of a series of questions and answers related to Information and Communication Technology (ICT) and computer skills. It covers topics such as definitions of ICT, hardware and software distinctions, operating systems, and basic computer operations. Additionally, it addresses security measures and maintenance practices for computers.

Uploaded by

mepratibha7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views23 pages

ICT Skills: Information and Communication Technology

The document consists of a series of questions and answers related to Information and Communication Technology (ICT) and computer skills. It covers topics such as definitions of ICT, hardware and software distinctions, operating systems, and basic computer operations. Additionally, it addresses security measures and maintenance practices for computers.

Uploaded by

mepratibha7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

ICT Skills

1. ICT stands for


a. Information and Contact Technology
b. Information and Connection Technology
c. Information and Communication Technology
d. Information and Call Technology

2. All the methods, tools, concepts related to storing, recording and sending digital
information is called _____________
a. ICT
b. IT
c. ITC
d. ITS

3. The information can be recorded or stored through


a. handwritten on paper
b. written using type writer
c. soft copy on computer
d. all of the above

4. When the information is stored or recorded on electronic devices, refers to


____________
a. raw form
b. digital form
c. paper form
d. paper back form

5. Which of the following is considered as ICT device?


a. Smart TV
b. FM radio
c. Tablet
d. Multi meter

6. ICT helps everyone to


a. stay connected with each other
b. run the business smoothly
c. share the knowledge on public domain
d. all of the above

7. Aryan is confused about hardware and software. Which of the following you suggest to
clear his confusion:
a. Any device which tangible and can be touched is hardware and a program
that makes hardware functioning is software
b. Any device that is very hard is hardware and any device that is very soft is
software
c. A device used on hard surface is hardware and a device used on soft surface is
software
d. A program is very hard to understand is hardware and a program is very easy to
understand is software
8. Which of the following is a hardware?
a. Opera
b. Notepad
c. Monitor
d. Cleaner

9. Which of the following is a software?


a. Printer
b. Projector
c. Hard Disk
d. Cleaner

10. Read the following statements:


a. Statement A: The software and hardware both are required to work upon ICT
devices
b. Statement B: All ICT devices are very small in size and can be carried anywhere
i. Statement A is True but statement B is False
ii. Statement B is True but statement A is False
iii. Both are False
iv. Both are True

11. Which of the following programs starts as soon as computer gets turned on?
a. MS Office
b. Text Editor
c. Operating System
d. Windows Explorer

12. Which of the following in one of the mobile operating system?


a. Linux
b. Unix
c. Mac OS
d. iOS

13. Recognize me:When the computer is started, I perform some basic processes/functions to
check all the devices are running properly or not
a. Power On Self Test
b. Welcome Screen
c. Desktop
d. Login Screen

14. Enter your username and password, I allow to open your computer to work upon
a. Power On Self Test
b. Welcome Screen
c. Desktop
d. Login Screen

15. I am capable to store and display all icons available in PC


a. Power On Self Test
b. Welcome Screen
c. Desktop
d. Login Screen
16. What is responsible for performing the POST (Power On Self Test)?
a. The User
b. Operating System
c. Desktop
d. BIOS

17. Identify the operating system out of the following:


a. Google Chrome
b. Adobe Photoshop
c. Microsoft Windows
d. Adobe Dreamweaver

18. Which of the following item is not present on desktop?


a. Folder
b. Disk drive
c. Icon
d. Taskbar

19. The login screen appears after


a. POST
b. Welcome Screen
c. Windows Start Screen
d. BIOS Screen

20. The ________ function key is used to get help in most programs.
a. F12
b. F2
c. F3
d. F1

21. Manisha pressed a key on keyboard that moved the cursor to the begining of a new line.
But she did not know which key has been presses by her. Identify the key pressed by her:
a. Enter
b. Shift
c. Ctrl
d. Windows
22. Rekha wants to move the cursor to the begining of the line to the left side. Select a key
which she should press:
a. Left Arrow
b. End
c. Home
d. Page Up

23. Which of the following statement is correct for delete and backspace key?
a. Any key can be used to remove the text from center
b. Delete erases characters from left side where as Backspace erases characters from
right side
c. Delete erases characters from right side where as Backspace erases
characters from left side
d. Anyone can overwrite the content selected by use
24. When the mouse is dragged on the file or icon it displays the information about the file.
This process is known as
a. Left Click
b. Right Click
c. Mouse Hover
d. Drag and Drop

25. Each file stored in the computer has


a. Filename and Extension
b. Data and Information
c. Particular Size and Location
d. All of these

26. The filename and extension are separated by


a. . (Period)
b. , (Comma)
c. _ (Underscore)
d. ‘ (Single Quote)

27. A _________ is location or container in which the files can be stored.


a. Folder
b. Recycle Bin
c. Library
d. Utility

28. The shortcut key to open run command is :


a. ctrl + r
b. shift + r
c. ctrl + r
d. windows + r

29. The shortcut key to copy the file or folder is


a. ctrl + c
b. window + c
c. alt + c
d. shift + c

30. The short cut key to open a new file in notepad is


a. ctrl + e
b. ctrl + n
c. ctrl + w
d. alt + n

31. Which command is used to reverse the previous work done by the user?
a. Redo
b. Undo
c. Paste
d. Cut

32. You should always protect your computer from


a. dust and damage
b. not to use more that 2 or 3 hours
c. not install a software
d. not to turn on in the morning or late night
33. To clean the keyboard, you can
a. use washing Powder and Water then wash it
b. keep a soft brush to remove crumbs and dust particles
c. use wet cloth and wipe on it
d. use acid to clean it

34. How to remove the finger marks from the screen?


a. wipe the screen with soft cloth
b. use wet cloth and wipe it
c. keep water and glass near to computer and wash it as and when needed
d. use Colin or Harpik and spray it on the screen

35. Which of the following can be followed to keep the laptop cool?
a. Keep snow around the laptop
b. Use external Cooling fan
c. Keep the laptop inside freezer
d. Keep the room cool then start the laptop

36. Running to many programs at a time can cause


a. computer can become slow and crush
b. damage the hard disk
c. generate lots of heat
d. computer can work efficiently

37. Which of the following is one of the process for daily maintenance ?
a. download email attachments in to the folders
b. backup your data
c. full system virus scan
d. update operating system

38. How can an anti-virus protect your device?


a. It can protect it from over-heating.
b. It can increase its performance.
c. It can protect against the virus
d. It can backup data.

39. What happens if you leave a device plugged in even after it is charged 100%?
a. It can break.
b. It can stop functioning.
c. It can over-heat.
d. Data can get corrupt.

40. Which of the following trap small children into inappropriate relations?
a. Online predators
b. Worms
c. Trojan Horse
d. Anti-Virus

41. What type of care should be taken while transacting online?


a. Always lock your computer when you are going away
b. Give credit card and debit card or UPI information on secured sites
c. Save the passwords on cloud
d. Use pirated software
42. A hacker can try to misuse your data and information and perform illegeal activity. This
is considered as
a. Physical Theft
b. Identity theft
c. Software Piracy
d. Virus

43. Manoj received a call and informed about lottery for winning huge amount. This type of
activity is considered as
a. Trojan Horse
b. Online Predator
c. Internet Scams
d. Encryption

44. The virus which replicates themselves and spread all files once they attack on computer
and very difficult to remove them. This virus is known as
a. Trojan Horse
b. File Virus
c. WORM
d. Ransom ware
e.
45. A __________ is seems useful software but reacts like a virus and destroying data.
a. Trojan Horse
b. File Virus
c. WORM
d. Ransom ware
e.
46. Choose the strong password out of the following:
a. 12345
b. Aprfd@2021!
c. hello123
d. password

47. Which of the following is one of the security measures that monitor incoming and
outgoing data?
a. Firewall
b. Windows Login
c. Device Manager
d. Google Chrome

48. Bit locker is an example of


a. Backup and restore
b. Firewall
c. Encryption
d. Ransom ware

49. The identity of secure websites are


a. Indicates a lock in front of the URL and begins https:
b. Asks to login using OTP
c. Asks to login using email id and password
d. Website requires biometrics to login
50. Software piracy refers to
a. Stealing software and distributing the unlicensed copies
b. Open source software
c. Gain access of a website and perform illegal activity
d. Selling software online with a proper license key

Q1. ICT stands for _______________


a. Information and Communication Technology
b. Information and Communication Terminology
c. Information and Common Technology
d. Information to Communication Technology
Ans. a. Information and Communication Technology

Q2. A computer is an _____________ machine


a. mechanical
b. electrical
c. electronic
d. None of the above
Ans. c. electronic

Q3. ICT refers to all the methods, tools, concepts related to

a. storing digital information.


b. recording digital information.
c. sending digital information.
d. All of the above
Ans. d. All of the above

Q4. Which of the following ways are used to record or store information?
a. handwritten on paper
b. written using a typewriter
c. typed in computer
d. All of the above
Ans. d. All of the above

Q5. Physical part of computer is called ___________


a. Hardware
b. Software
c. Shareware
d. None of the above
Ans. a. Hardware

Q6. Which of the following is not computer hardware?


a. RAM
b. Keyboard
c. MS Paint
d. Monitor
Ans. c. MS Paint
Q7. Which of the following is/are examples of software?
a. MS Word
b. MS Excel
c. OpenOffice Calc
d. All of the above
Ans. d. All of the above

Q8. ______ act as an interface between the user and the computer.
a. Operating System
b. Ms Excel
c. Impress
d. Digital Documentation
Ans. a. Operating System

Q9. Software that starts working as soon as we switch on a computer is


a. RAM
b. ROM
c. Operating System
d. None of the above
Ans. c. Operating System

Q10. Hardware would not be able to function without ___________


a. Shareware
b. Freeware
c. Software
d. None of the above
Ans. c. Software

Q11. Which of the following is an output device?


a. Monitor
b. Speaker
c. Printer
d. All of the above
Ans. d. All of the above

Q12. Which of the following are mobile operating system?


a. Apple iOS
b. Android
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q13. BIOS stands for
a. Basic Input/Output System
b. Base Input/Output System
c. Basic Input and Output Systematic
d. None of the above
Ans. a. Basic Input/Output System
Q14. Identify the input device
a. Printer
b. Speaker
c. Mouse
d. Monitor
Ans. c. Mouse

Q15. A __________ is a device used to type text, numbers and commands into the computer.
a. Mouse
b. Keyboard
c. Joystick
d. None of the above
Ans. b. Keyboard

Q16. Keys labeled from F1 to F12 are __________ keys


a. Input
b. System
c. Function
d. Help
Ans. c. Function

Q17. The function of the F1 key in most programs is to ___________


a. open save as dialog box
b. open help
c. delete a file
d. None of the above
Ans. b. open help

Q18. You use the _______________ key to move the cursor to the beginning of a new line.
a. Enter
b. Return
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q19. Navigation keys are


a. Arrow Keys
b. Page Up
c. Page down
d. All of the above
Ans. d. All of the above

Q20. When the INSERT key is turned ON, it helps you overwrite characters to the ______ of the
cursor
a. left
b. right
c. both of the above
Hide Answer
Ans. b. right
Q21. DELETE key is used to remove typed text on the _______ side of the cursor.
a. left
b. right
c. both of the above
d. None of the above
Ans. b. right

Q22. Backspace key is used to remove typed text on the _____ side of the cursor.
a. left
b. right
c. Both of the above
d. None of the above
Ans. a. left

Q23. _____________ key opens the start menu.


a. Arrow
b. Ctrl
c. Windows
d. None of the above

Ans. c. Windows
Q24. A _____________ is a device that you can use to move, select and open items on your
computer screen.
a. Mouse
b. Joystick
c. Scanner
d. None of the above
Ans. a. Mouse
Q25. When you click a particular file by mouse, it may gets __
a. Selected
b. Deselected
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q26. When you move the item to the new location with the help of mouse. This is
called ________________
a. Move and drop
b. Move and leave
c. Drag and drop
d. None of the above
Ans. c. Drag and drop

Q27.Double-clicking means to quickly click the ______ mouse button twice


a. right
b. left
c. both of the above
d. None of the above
Ans. b. left
Q28. We can ___ a file by mouse by double click on file.
a. Close
b. Save
c. Open
d. Delete
Ans. c. Open

Q29. ______functions is performed by mouse?


a. Click
b. Double Click
c. Drag and Drop
d. All of the above
Ans. d. All of the above

Q30. Prevent others from using your computer by __________


a. using username and password
b. using antivirus
c. using UPS
d. using internet
Ans. a. using username and password

Q31. Electronic files in computer can be ____________


a. Copied
b. Moved
c. Rename
d. All of the above
Ans. d. All of the above

Q32. Each file in computer has _______________


a. Name
b. Extension
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q33. The file name and file name extension are separated by a _______
a. period
b. comma
c. semi colon
d. None of the above
Ans. a. period

Q34. Sneha created a file in Notepad and saved the file by name “hello” so the complete name
of file will be _____________
a. hello.doc
b. hello.docx
c. hello.txt
d. hello.jpg
Ans. c. hello.txt
Q35. The extension of image file is _____________
a. .xls
b. .jpg
c. .doc
d. .docx
Ans. b. .jpg

Q36. A __________ is a location where a group of files can be stored.


a. folder
b. main file
c. super file
d. none of the above
Ans. a. folder

Q37. When a student, Neha, joins a class, the teacher creates a file on the computer to store
Neha’s information, such as name, address, phone number. In which of the following
application, we can store such information?
a. Notepad
b. Wordpad
c. MS Word
d. All of the above
Ans. d. All of the above

Q38. Which of the following is a text editor?


a. MS Excel
b. MS Paint
c. Notepad
d. All of the above
Ans. c. Notepad

Q39. Shortcut to save file is ________________


a. Ctrl + S
b. Ctrl + F1
c. Alt + S
d. None of the above
Ans. a. Ctrl + S

Q40. We need to protect our computer from ____________


a. Air
b. Dust
c. Both of the above
d. None of the above
Ans. b. Dust

Q41. We should avoid _______ to protect our computer/laptop.


a. Eating near computer
b. Keeping a glass of water near computer
c. Dropping laptop
d. All of the above
Ans. d. All of the above
Q42. The CPU has an ______________ to keep it cool.
a. internal fan
b. external fan
c. cooling pipe
d. None of the above
Ans. a. internal fan

Q43. Overcharge your mobile/laptop battery will _______ the battery life.
a. increase
b. decrease
c. no change
d. None of the above
Ans. b. decrease
Q45. ___________ is used to protect our computer from virus.
a. Worm
b. Anti Spyware
c. Anti virus
d. None of the above
Ans. c. Anti virus
Q46. __________ software, help us to clean up the unnecessary files.
a. Data Cleaner
b. Disk Cleaner
c. Cleaner
d. None of the above
Ans. b. Disk Cleaner
Q47. Unwanted mails are called ______________
a. A-SPAM
b. SPM
c. SPAM
d. N-SPAM
Ans. c. SPAM
Q48. What happens if you plugged in mobile/laptop even after 100% charge?
a. Device will break
b. Device will stop working
c. Device will over heat
d. None of the above
Ans. c. Device will over heat
Q49. Pressing ____________ key opens the Start menu.
a. Windows
b. Alt + Windows
c. Ctrl + Windows
d. None of the above
Ans. a. Windows
Q50. ________ key helps to move the cursor to the beginning of a new line.
a. Ctrl + Home
b. Ctrl + End
c. Enter
d. None of the above
Ans. c. Enter
Q51. Extension of temporary file is ____
a) .tmp
b) .exe
c) .bmp
d) .xls
Ans. a) .tmp

Q52. Press _____ on the keyboard to open Run dialog box.


a. Ctrl + R
b. Alt + R
c. Windows button + R
d. None of the above
Ans. c. Windows button + R

Q53. To open Temp folder type ____________ in Run dialog box.


a. temp%
b. %temp%
c. #temp#
d. Any of the above
Ans. b. %temp%

Q54. A device that monitors and controls incoming and outgoing network traffic based on user-
defined security rules is ________
a. Antivirus
b. Malware
c. Firewall
d. None of the above
Ans. c. Firewall

Q55. Firewall is a _____________________


a. Software
b. Hardware
c. Hardware or Software
d. None of the above
Ans. c. Hardware or Software

Q56. ___________ are small files which are stored on a user’s computer when a user visit a
website on the internet.
a. Image
b. Cookies
c. Firewall
d. None of the above
Ans. b. Cookies

Q57. Identify which of the following is a temporary file?


a. flower.jpg
b. temporary.doc
c. temporary.docx
d. web.tmp
Ans. d. web.tmp
Q58. Cookies are always harmful.(T/F)
a. True
b. False
Ans. b. False

Q59. _______ typically contain information about your visit to the webpage or record your
login information.
a. Cookies
b. Image
c. Firewall
d. None of the above
Ans. a. Cookies

Q60. Press ______ to select all files.


a. Ctrl + S
b. Ctrl + A
c. Ctrl + D
d. Ctrl + P
Ans. b. Ctrl + A

Q61. VIRUS is an acronym for


a. Vital Information Resource Under Seize
b. Vital Information Resource Under Size
c. Vital Information Remark Under Seize
d. Vital Informative Resource Under Seize
Ans. a. Vital Information Resource Under Seize

Q62. A _________ is a software program that attaches itself to other programs and alters their
behavior.
a. Cookie
b. Computer virus
c. Firewall
d. None of the above
Ans. b. Computer virus

Q63. A computer virus can infect only ________


a. Hardware
b. Software
c. Both of the above
d. None of the above
Ans. b. Software

Q64. A computer can get infected with virus by


a. Infected files
b. Infected pen drives
c. Infected file attachment of e-mails
d. All of the above
Ans. d. All of the above
Q65. A computer virus cannot ____
a. infect files on CD or DVD, if they are closed for writing.
b. infect computer hardware like, keyboard, mouse, etc.
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q66. Common signs of a virus attack is/are :


a. Computer runs very slow
b. There is change in the file size
c. Computer restarts on its own
d. All of the above

Ans. d. All of the above

Q67. To prevent virus infection we should


a. Install and use anti-virus software.
b. not open e-mails of an unknown person/sender
c. not allow any untrustworthy person to use your system.
d. All of the above
Ans. d. All of the above

Q68. Which of the following is an Antivirus?


a. Norton AntiVirus
b. Quick Heal
c. McAfee VirusScan
d. All of the above
Ans. d. All of the above

Q69. An anti-virus program can be effective when


a. it run in the background at all times.
b. it is regularly updated
c. it scan full disk periodically
d. All of the above
Ans. d. All of the above

Q70. Characteristics of computer virus is :


a. it makes copies of itself.
b. it makes the system slow.
c. it may get activated at a certain date and time.
d. All of the above
Ans. d. All of the above

Q71. Regular care and maintenance of computer is required


a. to detect any issues at an early stage
b. so that system works efficiently
c. to avoid a condition of System Failure
d. All of the above
Ans. d. All of the above
Q72. Regular maintenance of the system includes
a. installing updates of the software
b. check the security of the system
c. taking backups of important files and documents
d. All of the above
Ans. d. All of the above

Q73. Precaution to be taken while cleaning the computer components are :


a. Power Off the computer before cleaning
b. Never spray cleaning fluid directly on the component of the computer.
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q74. We should never spray any liquid cleaner directly on


a. Keyboard
b. Monitor
c. Mouse
d. All of the above
Ans. d. All of the above

Q75. Disk defragmentation help to


a. remove the virus from the system
b. use the disc space at an optimal level.
c. Both of the above
d. None of the above
Ans. b. use the disc space at an optimal level.

Q76. System Performance can be increased by


a. increasing RAM
b. disk defragmentation
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q77. __________parts of the computer system should be cleaned so that it can work properly.
a. Internal
b. External
c. Both internal and external
d. None of the above
Ans. c. Both internal and external

Q78. DOS stands for ______________


a. Disk Operating System
b. Dot Operating System
c. Disk Open System
d. Disk Operating Secure
Ans. a. Disk Operating System
Q79. Which of the following is Microsoft Product?
a. DOS
b. Windows
c. Android
d. Linux
Ans. b. Windows

Q80. ________________ operating system is an example of an interactive operating system.


a. Windows
b. DOS
c. Linux
d. None of the above
Ans. a. Windows

Q81. GUI stands for _______________________


a. Graphical User Interface
b. Graphical User Interaction
c. Graphical User Interactive
d. None of the above
Ans. a. Graphical User Interface

Q82. Which operating system allows only one user to do a task on the computer and one thing
at a time?
a. Single-user, multi-task operating system
b. Single-user , single-task operating system
c. Multi-user
d. None of the above
Ans. b. Single-user , single-task operating system

Q83. Which Operating System is used to control machinery like robots in complex animations
and computer controlled automated machines
a. Real Time
b. Multi-user
c. Single-user, multi-task operating system
d. Distributed
Ans. a. Real Time

Q84. Examples of real-time operating systems is :


a. Windows CE
b. Lynx OS
c. Both of the above
d. None of the above
Ans. c. Both of the above
Q85. Examples of distributed operating systems is
a. Windows
b. Unix
c. Linux
d. All of the above
Ans. d. All of the above

Q86. ___________ operating system enables multiple users to work on the same computer
simultaneously.
a. Single-user , single-task operating system
b. Single-user, multi-task operating system
c. Multi-user
d. None of the above
Ans. c. Multi-user

Q87. Which Operating System enables single user to operate on several programs at the same
time.
a. Single-user, multi-task operating system
b. Multi-user
c. Single-user , single-task operating system
d. Real Time
Ans. a. Single-user, multi-task operating system

Q88. Example of Multi Tasking Operating System is


a. Windows
b. Apple MacOS
c. Both of the above
d. None of the above
Ans. c. Both of the above

Q89. An operating system in which commands can be entered by clicking/double-clicking/right-


clicking a mouse is :
a. GUI-based
b. CUI-based
c. TUI-based
d. None of the above
Ans. a. GUI-based

Q90. Examples of Mobile operating Systems is :


a. Android
b. Symbian
c. iOS
d. All of the above
Ans. d. All of the above

Q91. The first screen that appears on monitor after loading OS is called ________________
a. Icons
b. Desktop
c. Wall paper
d. None of the above
Ans. b. Desktop
Q92. Small pictures on the desktop are called _______
a. Desktop
b. Symbols
c. Icons
d. Pictures
Ans. c. Icons

Q93. Picture used for the desktop background is called __________


a. Wallpaper
b. Background image
c. Wall image
d. Desktop image
Ans. a. Wallpaper

Q94. Start button is present on _________ side of the Taskbar.


a. right
b. left
c. top
d. bottom
Ans. b. left

Q95. Bar present at the bottom of the desktop is called ____________


a. Status bar
b. Scroll bar
c. Taskbar
d. None of the above
Ans. c. Taskbar

Q96. Components of Windows 7 Desktop is/are :


a. Desktop
b. Wallpaper
c. Taskbar
d. All of the above
Ans. d. All of the above

Q97. Which icon allows user to access all drives, files, and folders on the computer.
a. Recycle Bin
b. Computer
c. Application
d. Start button
Ans. b. Computer

Q98. The main components of Taskbar is/are


a. Start button
b. Active Applications
c. Date/Time icon
d. All of the above
Ans. d. All of the above
Q99. Deleted files and folders are stored in _______________
a. Recycle bin
b. My Computer
c. Control Panel
d. None of the above
Ans. a. Recycle bin

Q100. Everything we store in computer is stored in the form of a __________


a. Folder
b. Sub folder
c. File
d. None of the above
Ans. c. File

Q1. What should you do to ensure secure online transactions?


A) Lock your computer
B) Give credit card or bank details only on safe websites
C) Use anti-virus
D) Do not use pirated software

Q2. Which of the following trap small children into inappropriate relations?
A) Online predators
B) Worms
C) Trojan Horse
D) Anti-Virus

Q3. What should a strong password consist of?


A) Only letters
B) Numbers and special characters
C) Name of a person

D) Letters, numbers, and special characters


Q4. ICT refers to all the methods, tools, concepts related to
a. storing digital information.
b. recording digital information.
c. sending digital information.
d. All of the above

Q5. Physical part of computer is called ___________


a. Hardware
b. Software
c. Shareware
d. None of the above

Q6. Which of the following is not computer hardware?


a. RAM
b. Keyboard
c. MS Paint
d. Monitor
Q7. Which of the following is/are examples of software?
a. MS Word
b. MS Excel
c. OpenOffice Calc
d. All of the above

Q8. Which option is not required to keep a device cool?


A) Keep the device unplugged when in use.
B) Do not cover a laptop with a blanket.
C) Make sure the computer’s CPU fan is working.
D) Avoid leaving the device in the sun.

Q9. Software that starts working as soon as we switch on a computer is


a. RAM
b. ROM
c. Operating System
d. None of the above

Q10. Hardware would not be able to function without ___________


a. Shareware
b. Freeware
c. Software
d. None of the above

Q11. BIOS stands for


a. Basic Input/Output System
b. Base Input/Output System
c. Basic Input and Output Systematic
d. None of the above

Q12. Which of the following is a valid file extension for Notepad file?
A) .jpg
B) .doc
C) .text (POST) starts
D) . txt

Q13. Keys labeled from F1 to F12 are __________ keys


a. Input
b. System
c. Function
d. Help
Q14. The function of the F1 key in most programs is to ___________
a. open save as dialog box
b. open help
c. delete a file
d. None of the above
Q15. You use the _______________ key to move the cursor to the beginning of a new line.
a. Enter
b. Return
c. Both A and B
d. None of the above
Q16. Which of the following functions is not performed using a mouse?
A) Turn on
B) Hover
C) Right-click
D) Drag and Drop

Q17. What is the term used when you press and hold the left mouse key and move the mouse
around?
A) Highlighting
B) Dragging
C) Selecting
D) Moving

Q18. What happens if you leave a device plugged in even after it is charged 100%?
A) It can break.
B) It can stop functioning.
C) It can overheat.
D) Data can get corrupt

Q19. Which of the following is an Antivirus?


a. Norton AntiVirus
b. Quick Heal
c. McAfee VirusScan
d. All of the above

Q20. Regular care and maintenance of computer is required


a. to detect any issues at an early stage
b. so that system works efficiently
c. to avoid a condition of System Failure
d. All of the above

Q21. DELETE key is used to remove typed text on the _______ side of the cursor.
a. left b. right c. both of the above d. None of the above

Q22. The backspace key is used to remove typed text on the _____ side of the cursor.
a. left b. right c. Both of the above d. None of the above

Q23. Identify which of the following is a temporary file?


a. flower.jpg b. temporary.doc c. temporary.docx d. web.tmp

Q24. Press ______ to select all files.


a. Ctrl + S b. Ctrl + A c. Ctrl + D d. Ctrl + P

Q25. VIRUS is an acronym for


a. Vital Information Resource Under Seize b. Vital Information Resource Under Size
c. Vital Information Remark Under Seize d. Vital Informative Resource Under Seize

You might also like