Basic ICT Skills Class 10 MCQ
Session 1: Basic Computer Operations
1. ICT Stands for _____________.
a. Inform and
Communicate technology
b. Information and Communication technology
c.
Inform and Communication technology
d. Information and Communicate
technology
2. In a business, the best approach to keep records is
____________.
a. Handwritten on paper
b. Written using a typewriter
c.
Written using a Computer
d. None of the above
3. ICT Skills help us to ________________, run our business and stay
connected with our family and friends.
a. Communicate
b. Entertainment
c. Both a) and b)
d.
None of the above
4. A computer system consists of two main parts __________ and
_________.
a. Hardware
b. Software
c. Antivirus
d. Both a) and
b)
5. The physical parts that we can see and touch are called
_________.
a. Hardware
b. Software
c. Antivirus
d. None of the
above
5. Mobile devices, such as __________ and ____________ are also computer
systems with hardware and software.
a. Mouse and Keyboard
b. Smartphone and
Tablets
c.
Typewriter and Pen
d. None of the above
6. The most important software in any computer is the
_________________.
a. Operating System
b. Antivirus
c. Office Package
d.
Photo Editing Software
7. Mobile devices also have an operating system like ___________.
a. Apple iOS
b.
Android
c. Both a) and b)
d. None of
the above
8. BIOS stands for ____________.
a. Basic Input/Output
System
b. Basic In/Out System
c. Based on In/Out System
d.
None of the above
9. Keyboard is an ___________ device.
a. Output
device
b. Input device
c. Outer device
d. Inner device
10. __________ helps the computer to close all the applications,
Operating system and turn off the computer.
a. Sleep
b. Shut down
c. Hibernate
d. None of the
above
11. SHIFT, SPACEBAR, ALT, CAPS LOCK are ________ keys which perform
special functions.
a. Enter Key
b. Function Key
c. Control Key
d.
Navigation Key
12. __________ keys help to move the cursor to the beginning of a new
line.
a. Enter Key
b. Return Key
c. Both a) and b)
d. None
of the above
13. ____________ keys known as punctuation keys.
a.
Colon
b. Semicolon
c. Question mark
d. All of the above
14. Example of navigation keys ___________.
a. Home
b.
End
c. Page Up & Page Down
d. All of the above
15. Example of command keys___________.
a. Insert
b.
Delete
c. Backspace
d. All of the above
16. Which of the following does not require the use of a mouse?
a. Turn on
b. Right click
c. Hover
d. Drag and Drop
17. What is the term used when you press and hold the left mouse key and
move the mouse around?
a. Highlighting
b. Selecting
c. Dragging
d. Moving
18. The following are the stages involved in starting a computer.
Rearrange the stages in the proper sequence.
i. Desktop appears after login
ii. Login
screen appears
iii. Power on Self-Test (POST) starts
iv. Operating system
starts
v. Welcome screen appears
a. i), ii), iii), iv), v)
b. ii), i), v), iii), iv)
c. iii), iv),
v), ii), i)
d. iii), ii), i), iv), v)
Session 2: Performing Basic File Operations
19. Extension of notepad file _________.
a. .txt
b.
.bmp
c. .jpg
d. .psd
20. Extension of image file _________.
a. .bmp
b.
.jpg
c. Both a) and b)
d. None of the above
21. Which one of the following shortcut keys is used to paste a
file?
a. Ctrl + c
b. Ctrl + p
c. Ctrl + v
d. Ctrl + x
22. Which of the following is a valid file extension for Notepad
file?
a. .jpg
b. .doc
c. .text
d. .txt
23. What keys do you use to copy something?
a. Ctrl+x
b. Ctrl+c
c. Ctrl+z
d. Ctrl+y
Session 3: Computer Care and Maintenance
24. What are the best options for caring for computer devices?
a. Keeping a Device
Clean
b. Prepare a Maintenance Schedule
c.
Do not overcharge your battery
d. All of the above
25. You can take backup in the following devices_________.
a. CD/DVD
b. Flash
Drive
c. External Drive
d. All of
the above
26. To clean the computer from the virus we required __________.
a. Antivirus
b.
Office Package
c. Photoshop
d.
Operating System
27. If we are using a computer for a long time we have to __________
unnecessary files and data from the computer.
a. Delete
b. Save
c. Backup
d.
None of the above
28. Sometimes we get mails from companies who are advertising a product
or trying to attract you to their website. Such mails are called
________.
a. Trash
b. Inbox
c. Spam
d. None of the above
29. What happens if you keep a device plugged in after it has been fully
charged?
a. It can break.
b. It can overheat.
c. It can stop
functioning.
d. Data can get corrupt.
30. What role does antivirus play in protecting your device?
a. It can increase its performance.
b. It can protect it from
overheating.
c. It can prevent data from getting corrupt.
d. It
can backup data.
31. Which option does not need to be enabled in order to keep a device
cool?
a. Make sure the computer’s CPU fan is working.
b. Keep the
device unplugged when in use.
c. Do not cover a laptop with a blanket.
d. Avoid leaving the device in the sun.
32. Which of the following is required for keyboard maintenance?
a. Use a very dilute combination of soap and water applied with a
non-abrasive cloth to remove stains from the keycaps.
b. Turn the
keyboard upside down and shake it to remove foreign material.
c. Blow
dust and other particles with the help of a blower.
d. All of the
above.
Session 4: Computer Security and Privacy
33. Computer security helps to protect computers from
___________.
a. Security Break
b. Protect from Threats
c. Protecting
your data
d. All of the above
34. What do you mean by Threats ___________.
a.
Theft
b. Virus
c. Both a) and b)
d. None of the above
35. __________ are computer programmes that can corrupt data and software
programmes, as well as steal information from a computer.
a. Virus
b. Theft
c. Both
a) and b)
d. None of the
above
36. If someone steals your desktop computer or laptop, it is referred to
as _________ theft.
a. Physical
b. Identity
c. Software Piracy
d. None of
the above
37. When a hacker takes your personal information and assumes your
identity, this is referred to as____________ theft.
a. Physical
b. Identity
c.
Software Piracy
d. None of
the above
38. _________ hits the computer, it acts like a virus, deleting
data.
a. Trojan Horse
b. Online Predator
c. Theft
d. None of
the above
39. __________ are persons who try to attract you into inappropriate
relationships.
a. Trojan House
b. Online Predator
c. Theft
d. None of
the above
40. Sometimes you may receive very attractive offers saying you have won
a huge amount of money in a lottery and that you can claim the prize by
depositing a certain amount of money known as ___________.
a. Trojan House
b. Online
Predator
c. Theft
d.
Internet Scams
41. To protect our data from theft and viruses we can take ___________
measures.
a. Use passwords to login
b. Install Anti – Virus and
firewall
c. Encrypt Data
d. All of the above
42. Banks and companies usually keep their data in ___________
format.
a. Encrypted
b. Firewall
c. Using Password
d. All of
the above
43. If you want to create a secure password you have to use _________ in
the password.
a. Small and Capital letter
b. Numbers
c. Special
Characters
d. All of the above
44. We can check secure websites using __________.
a.
http://
b. https://
c. Www
d. None of the above
45. What can you do to make sure your internet transactions are
safe?
a. Lock your computer
b. Do not use pirated software
c.
Give credit card or bank details only on safe websites
d. Use
anti-virus
46. Which of the following is a trap for small children into unsuitable
relationships?
a. Trojan Horse
b. Online predators
c. Worms
d.
Anti-Virus
47. What should a strong password consist of?
a. Name
of a person
b. Only letters
c. Letters, numbers and special
characters
d. Numbers and special characters
Competency Based Questions for Board Examination
1. GUI stands for :
a. Graphical User Interaction
b.
Graphical User Interface
c. Graphical Upper Interface
d. None of
these
2. How can an anti-virus protect your device?
a. It
can protect it from over-heating
b. It can increase its performance
c.
It can prevent data from getting corrupt
d. It can backup data
3. Which of the following functions is not performed using a
mouse?
a. Turn on
b. Hover
c. Right click
d. Drag and Drop
4. Which of the following is a valid file extension for a Notepad
file?
a. .jpg
b. .doc
c. .text
d. .txt
5. What keys do you use to copy something?
a.
Ctrl+x
b. Ctrl+c
c. Ctrl+z
d. Ctrl+y
6. Where are the Files and folders deleted by the user stored in the
computer?
a. Control Panel
b. Recycle Bin
c. Search Box
d. Menu
Bar
7. Which of the following shortcut keys is used to paste a file?
a. Ctrl + C
b. Ctrl
+ P
c. Ctrl + V
d. Ctrl + X
8. __ is a shortcut key used to undo an action.
a. Answer Shift +End
b.
Shift + Ctrl + Home
c. Ctrl + A
d.
Ctrl+Z
9. Which of the following function is not a way to protect data?
a. Password
b.
Antivirus and firewell
c. Secure sites
d.
Trojan horse
10. When the information is stored or recorded on electronic devices, it
refers to _.
a. Raw form
b. Paper form
c. Digital form
d. Paper
back form
11. Which one of the following is a control key?
a.
RETURN
b. SPACE BAR
c. TAB
d. PAGE DOWN
12. What are the small pictures on the desktop called?
a. Symbols
b. Images
c.
Icons
d. Logo
13. Which of the following software can be used to create text
files?
a. Viewer
b. WritePad
c. Notepad
d. Recorder
14. A key or set of keys on the computer keyboard, when pressed once,
evokes and performs a task quickly is called:
a. Shortcut key
b. Special key
c.
Function key
d.
System key
15. What is the keyboard shortcut for copying selected text or files in
most operating systems ?
a. Ctrl + X
b. Ctrl + Z
c. Ctrl + V
d. Ctrl + C
16. When we double-click on a file, it will open the __.
a. folder
b. C
Drive
c. D Drive
d. file
17. Operating system is a:
a. hardware
b.
software
c. humanware
d. hardware and humanware
18. The most important software in any computer is the __. This
is the software that starts working as soon as we switch on a
computer.
a. Web Browsers
b. Operating System
c. Office Software
d.
Designing Software
19. A soon as we switch on a computer, the _ starts
working.
a. Monitor
b. Output devices
c. Operating System
d.
CPU
20. Name the shortcut key which is used for “Select all” option.
a. Ctrl + A
b. Ctrl
+ C
c. Ctrl + X
d. Ctrl + Z
21. Which of the following trap small children into inappropriate
relations?
a. Online predators
b. Worms
c. Trojan Horse
d.
Anti-Virus
22. Name the operating system developed by Microsoft.
a. Windows
b. Disk Operating
System
c. Linux
d.
Firefox
23. An operating system is a software that serves as an interface
between
a. user and computers
b. server and computer
c. computer
and network
d. computer without CPU
24. Using which of the following can change settings?
a. Search box
b. Recycle
bin
c. Control panel
d.
Taskbar
25. Which is the most important software in any computer?
a. Application software.
b.
System software.
c. Operating
System (OS)
d. Programming software
26. Which key opens the start menu?
a. Ctrl key
b.
Alt key
c. Shift key
d. Windows key
28. Right clicking on File or Folder opens
a. Main
Menu
b. Shortcut Menu
c. Back Menu
d. Front Menu
29. A software program that attaches itself to other programs and alter
their behavior is called .
a. Infected file
b. Computer virus
c. Infected
drive
d.
Human virus
30. _ makes the hardware work the way we want.
a.
Software
b. Files
c. Folder
d. Data
31. A computer system consists of two main parts, the hardware and the
_
a. CP
b. Monitor
c. Software
d. Mobile device
32. Most companies their customers information to protect their
data.
a. encrypt
b. save
c. block
d. copy
33. Which of the following is a mobile operating system ?
a. Ubuntu
b. Microsoft
Windows
c. Google Android
d.
macOS
34. Installing the __ helps in increasing the performance of the
computer.
a. spam files
b. disk cleaner software
c. temporary
files
d. extra files
35. A is a device used to type text, numbers and command into the
computer.
a. Mouse
b. Keyboard
c. Joystick
d. Speakers
36. Which of the following is/are example’s of software ?
a. MS Paint
b.
Mouse
c. CPU
d. Keyboard
37. _ is the long horizontal bar present at the bottom of the
screen.
a. Taskbar
b. Menu Bar
c. Search Bar
d. Control panel
38. __ allows the user to search a file or a folder or run
executable files.
a. Shut Down
b. Control Panel
c. Search Box
d. Menu
Bar
39. __ are computer programs that can damage the data and
software programs or steal the information stored on a computer.
a. Spam
b.
Viruses
c. Junk mail
d. BIOS
40. _ is a horizontal bar present at bottom of the Windows 7
desktop.
a. Status Bar
b. Menu Bar
c. Task Bar
d. Recycle bin
41. Identify the virus that is harmful to computers.
a. COVID 19
b. Trojan
Horse
c. Herpes Simplex
d.
Chicken Pox
42. Which one of the following short-cut keys is used to copy ?
a. Ctrl+C
b.
Ctrl+P
c. Ctrl+V
d. Ctrl+X
43. These files are created when you are running programs.
a. Virus
b. Backup
files
c. System files
d. Temporary
files
44. A is a location where a group of files can be stored.
a. Hard disk
b.
Folder
c. Software
d. Hardware
45. Which of the following is a shortcut key to save a file ?
a. Ctrl+C
b.
Ctrl+P
c. Ctrl+S
d. Ctrl+V
46. __ are the ways in which personal information can be leaked
from a computer.
a. Printing
b. Scanning
c. Worms
d. Threats
47. What is a Trojan Horse ?
a. Race horse
b.
Computer virus
c. Computer game
d. An animal
48. __ is a type of operating system that runs on a set of
computers that are interconnected by a network.
a. Multi-user
b. DOS
c.
Single
d. Distributed
49. Which keys do you press to copy a file or a folder ?
a. Ctrl + X
b. Ctrl +
C
c. Ctrl + Z
d. Ctrl + Y
No comments:
Post a Comment