0% found this document useful (0 votes)
97 views6 pages

ICT Skills II - Holiday Homework Worksheet

These are the important questions(Mcq type) for IT boards exam and viva practical questions 2024-25.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views6 pages

ICT Skills II - Holiday Homework Worksheet

These are the important questions(Mcq type) for IT boards exam and viva practical questions 2024-25.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

ICT Skills II

Worksheet I

Multiple Choice Questions:

1) The virus which replicates themselves and spread all files once they attach on computer and very
difficult to remove them. This Virus is known as

a) Trojan Horse ( ) b) File Virus ( ) c) Worm ( ) d) Ransomware ( )

2) Bitlocker is an example of –

a) Firewall ( ) b) Backup and restore ( ) c) Encryption ( ) d) Ransomware ( )

3) Choose the strong password from the following : -

a) 12345 ( ) b) Aprfd@2021! ( ) c) hello 123 ( ) d) password ( )

4) Each file stored in the computer has :-

a) File name and Extension ( ) b) Data and Information ( )

c) Particular size and Location ( ) d) all of these ( )

5) The file name and extension are separated by

a) . (Period) ( ) b) , (Comma) ( ) c) __ (Underscore) ( ) d) ‘ (Single quote) ( )

6) The shortcut key to open run window :-

a)Ctrl + R ( ) b) Shift + R ( ) c)Alt + R ( ) d) Windows + R ( )

7) What is responsible for performing POST (Power On Self Test)?

a) the user ( ) b) Operating System ( ) c) Dekstop ( ) d) BIOS ( )


8) Identify the operating system of the following:

a) Google Chrome ( ) (b) Adobe Photoshop ( )

c) Microsoft Windows ( ) (d) Adobe Dreamweaver ( )

9 The function key is used to get help in most programs :-

a) F12 ( ) b) F2 ( ) c) F3 ( ) d) F1( )

10) ICT stands for

a) Information and Contact Technology ( ) b) Information and Connection Technology ( )

c) Information and Communication Technology ( )

d) Information Communication Terminology ( )

11) All the methods, tools, concepts related to storing, recording and sending digital information is
called _____

a) ICT ( ) b) IT ( ) c) ITC ( ) d) ITS ( )

12) ICT helps everyone to :-

a) Stay connected with each other ( ) b) run the business smoothly ( )

c) share the knowledge on public domain ( ) d) all of the above ( )

13) recognise me: When the computer is started, I perform some basic processes/ functions to check all
the devices are running properly or not.

a) power on self test ( ) b) welcome screen ( ) . c) dekstop ( ) d) login screen ( )

14) Extension of notepad file is :-

a).doc ( ) b) .txt ( ) c .mp3 ( ) d) .text ( )

15) Extension of sound file is :-

a) .mp3 ( ) b) .mp4 ( ) c) .xlsx ( ) d) None ( )

16) There is it talent contest in your town. For participating in the audition, you have to send a
recording of a song. What would you connect to your computer to record your song?

a) keyboard ( ) b) microphone ( ) c) scanner ( ) d) headphone ( )

17) Which one of the following shortcut key is used to paste a file ?

a) Ctrl + C ( ) b) ctrl + p ( ) c) ctrl + v ( ) d) ctrl + x ( )


18) Which ki do you use to copy something ?

a) ctrl + c ( ) b) ctrl + p ( ) c) ctrl + v ( ) d) ctrl + x ( )

19) Which of the following functions is not perform using a mouse ?

a) turn on ( ) b) hover ( ) c) right click ( ) d) drag and drop ( )

20) What is the term used when you press and hold the left mouse key and move the mouse around ?

a) highlighting ( ) b) dragging ( ) c) selecting ( ) d) moving ( )

21) How can an antivirus protect your device ?

a) it can protect it from overheating ( ) b) it can increase its performance ( )

c) it can prevent data from getting corrupt ( ) d) it can backup data ( )

22) which option is not required to keep a device cool ?

a) is the device unplugged when in use ( ) b) do not cover a laptop with a blanket ( )

c) make sure computers CPU fan is working ( ) d) avoid leaving the device in the sun ( )

23) What should you do to ensure secured online transactions ?

a) lock your computer ( ) b) give credit card or bank details only on safe websites ( )

c) use antivirus ( ) d) do not use pirated software ( )

24) Which of the following trap small children into appropriate relations ?

a) online predators ( ) b) worms ( ) c) trojan horse ( ) d) anti-virus ( )

25) What should a strong password consist of ?

a) only letters ( ) b) name of a person ( ) c) number and special characters ( )

d) Letters, numbers and special characters ( )

26) The cleaning of software installed in the computer cannot be achieved by _____ .

a) disk cleanup ( ) b) cleaning CPU cabinet ( ) c) backup ( ) d) installing anti-virus software ( )

27) ______ acts as an interface between user and computer hardware.

a) operating system ( ) b) MS Excel ( ) c) hardware ( ) d) software ( )

28) GPS stands for : -


a) general packet service ( ) b) global pointer system ( ) c) global positioning system ( )

d) general positioning system ( )

29) ______ action with mouse is used to show the details of the file.

a) roll over or hover ( ) b) point and check ( ) c) drag and drop ( ) d) double click ( )

30) ____ is a navigation system that helps you to navigate, find directions and maps to specific locations.

a) cellular network ( ) b) GPRS ( ) c) GPS ( ) d) Wi-Fi ( )

31) All information institute in a computer is kept in ______.

a) extension ( ) b) files ( ) c) both a and b ( ) d) none ( )

32) ______ is a location whore a group of files can be stored.

a) Extension ( ) c) Files ( ) c) Folder ( ) d) None

33) ________ software helps us to clean up the unnecessary files and increase the computer
performance

a) Back up ( ) b) Disk Cleaner ( ) c) System Software ( ) d) All of these ( )

34) In GUI Operating System, GUI stands for______ .

a) Graphical User Interface ( ) b) Graphics User Identity ( )

c) Graphical User Serviced ( ) d) Graphical Unity Service ( )

35) System performance can be increased by.

a) Increasing RAM ( ) (b) Disk Defragmentation ( ) c) Both a & b ( ) d) None ( )

36) The extension of temporary files is

a) .bmp ( ) b) .exe ( ) c) .tmp ( ) d) .del (. )

37) What command will you write in the Open Text Box to open the Temp folder?

a) _temp_ ( ) b) %temp% ( ) c) .tepm ( ) d) @temp@ ( )

38) Which of the following a temporary file?

a) Project.docx ( ) b) Mathsite.tmp ( ) c) setup.exe ( ) d) temp.bmp ( )

39) How the can you select all the files in a folders using keyboard ?
a) Ctrl + s ( ) b) Ctrl + A ( ) c) Ctrl+E ( ) d) Ctrl + Z ( )

40 ) Deleted files or folders gets stored in _______ .

a) Trash ( ) b) Start button ( ) c) recycle bin ( ) d) Network ( )

41) Name the icon that provides access to all the drives, files and folders on a computer.

a) This PC or My Computer ( ) b) start button ( ) c) recycle bin ( ) d) network ( )

42) What is the name given to the screen that appears after windows operating system is loaded ?

a) desktop ( ) b) wallpaper ( ) c) screensaver ( ) d) none ( )

43) A _____ operating system runs on a set of computers that are interconnected by a network.

a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )

44) AA _____ operating system is used to control machinery, scientific instruments like robot, in
complex animations and computer control animated machines.

a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )

45) A _____ operating system enables multiple uses to work on a same computer at different times or
simultaneously.

a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )

46) The backspace key is used to erase the characters typed on the ____ side of the cursor.

a) left ( ) b) right ( ) c) both a and b ( ) d) None ( )

47) _____ is a software or hardware device that monitors and controls incoming and outgoing traffic
based on user defined security rules.

a) anti-virus ( ) b) malware ( ) c) firewall ( ) d) spyware ( )

48) The delete ki is used to erase the characters typed on the ____ side of the cursor.

a) left ( ) b) right ( ) c) both a and b ( ) d) None ( )

49) Which of the following is an input device ?

a) printer ( ) b) speaker ( ) c) mouse mouse ( ) d) monitor ( )

50) BIOS stands for :-

a) basic input output system ( ) b) built input output system ( )

c) basic input output service ( ) d) build in input output service ( )


51) To protect our data from theft and viruses, which measures can be taken ?

a) use passwords to login to your computer ( )

b) install antivirus and firewall ( )

c) encrypt data ( ) d) visit secure sites having https protocol ( )

e) all of these ( )

52) A ____ distinguishes itself i.e. it appears to be a useful to Be a useful program but once it reaches a
computer it starts behaving like a virus and destroying data .

a) worm ( ) b) trojan horse ( ) c) virus ( ) d) None ( )

You might also like