ICT Skills II
Worksheet I
Multiple Choice Questions:
1) The virus which replicates themselves and spread all files once they attach on computer and very
difficult to remove them. This Virus is known as
a) Trojan Horse ( ) b) File Virus ( ) c) Worm ( ) d) Ransomware ( )
2) Bitlocker is an example of –
a) Firewall ( ) b) Backup and restore ( ) c) Encryption ( ) d) Ransomware ( )
3) Choose the strong password from the following : -
a) 12345 ( ) b) Aprfd@2021! ( ) c) hello 123 ( ) d) password ( )
4) Each file stored in the computer has :-
a) File name and Extension ( ) b) Data and Information ( )
c) Particular size and Location ( ) d) all of these ( )
5) The file name and extension are separated by
a) . (Period) ( ) b) , (Comma) ( ) c) __ (Underscore) ( ) d) ‘ (Single quote) ( )
6) The shortcut key to open run window :-
a)Ctrl + R ( ) b) Shift + R ( ) c)Alt + R ( ) d) Windows + R ( )
7) What is responsible for performing POST (Power On Self Test)?
a) the user ( ) b) Operating System ( ) c) Dekstop ( ) d) BIOS ( )
8) Identify the operating system of the following:
a) Google Chrome ( ) (b) Adobe Photoshop ( )
c) Microsoft Windows ( ) (d) Adobe Dreamweaver ( )
9 The function key is used to get help in most programs :-
a) F12 ( ) b) F2 ( ) c) F3 ( ) d) F1( )
10) ICT stands for
a) Information and Contact Technology ( ) b) Information and Connection Technology ( )
c) Information and Communication Technology ( )
d) Information Communication Terminology ( )
11) All the methods, tools, concepts related to storing, recording and sending digital information is
called _____
a) ICT ( ) b) IT ( ) c) ITC ( ) d) ITS ( )
12) ICT helps everyone to :-
a) Stay connected with each other ( ) b) run the business smoothly ( )
c) share the knowledge on public domain ( ) d) all of the above ( )
13) recognise me: When the computer is started, I perform some basic processes/ functions to check all
the devices are running properly or not.
a) power on self test ( ) b) welcome screen ( ) . c) dekstop ( ) d) login screen ( )
14) Extension of notepad file is :-
a).doc ( ) b) .txt ( ) c .mp3 ( ) d) .text ( )
15) Extension of sound file is :-
a) .mp3 ( ) b) .mp4 ( ) c) .xlsx ( ) d) None ( )
16) There is it talent contest in your town. For participating in the audition, you have to send a
recording of a song. What would you connect to your computer to record your song?
a) keyboard ( ) b) microphone ( ) c) scanner ( ) d) headphone ( )
17) Which one of the following shortcut key is used to paste a file ?
a) Ctrl + C ( ) b) ctrl + p ( ) c) ctrl + v ( ) d) ctrl + x ( )
18) Which ki do you use to copy something ?
a) ctrl + c ( ) b) ctrl + p ( ) c) ctrl + v ( ) d) ctrl + x ( )
19) Which of the following functions is not perform using a mouse ?
a) turn on ( ) b) hover ( ) c) right click ( ) d) drag and drop ( )
20) What is the term used when you press and hold the left mouse key and move the mouse around ?
a) highlighting ( ) b) dragging ( ) c) selecting ( ) d) moving ( )
21) How can an antivirus protect your device ?
a) it can protect it from overheating ( ) b) it can increase its performance ( )
c) it can prevent data from getting corrupt ( ) d) it can backup data ( )
22) which option is not required to keep a device cool ?
a) is the device unplugged when in use ( ) b) do not cover a laptop with a blanket ( )
c) make sure computers CPU fan is working ( ) d) avoid leaving the device in the sun ( )
23) What should you do to ensure secured online transactions ?
a) lock your computer ( ) b) give credit card or bank details only on safe websites ( )
c) use antivirus ( ) d) do not use pirated software ( )
24) Which of the following trap small children into appropriate relations ?
a) online predators ( ) b) worms ( ) c) trojan horse ( ) d) anti-virus ( )
25) What should a strong password consist of ?
a) only letters ( ) b) name of a person ( ) c) number and special characters ( )
d) Letters, numbers and special characters ( )
26) The cleaning of software installed in the computer cannot be achieved by _____ .
a) disk cleanup ( ) b) cleaning CPU cabinet ( ) c) backup ( ) d) installing anti-virus software ( )
27) ______ acts as an interface between user and computer hardware.
a) operating system ( ) b) MS Excel ( ) c) hardware ( ) d) software ( )
28) GPS stands for : -
a) general packet service ( ) b) global pointer system ( ) c) global positioning system ( )
d) general positioning system ( )
29) ______ action with mouse is used to show the details of the file.
a) roll over or hover ( ) b) point and check ( ) c) drag and drop ( ) d) double click ( )
30) ____ is a navigation system that helps you to navigate, find directions and maps to specific locations.
a) cellular network ( ) b) GPRS ( ) c) GPS ( ) d) Wi-Fi ( )
31) All information institute in a computer is kept in ______.
a) extension ( ) b) files ( ) c) both a and b ( ) d) none ( )
32) ______ is a location whore a group of files can be stored.
a) Extension ( ) c) Files ( ) c) Folder ( ) d) None
33) ________ software helps us to clean up the unnecessary files and increase the computer
performance
a) Back up ( ) b) Disk Cleaner ( ) c) System Software ( ) d) All of these ( )
34) In GUI Operating System, GUI stands for______ .
a) Graphical User Interface ( ) b) Graphics User Identity ( )
c) Graphical User Serviced ( ) d) Graphical Unity Service ( )
35) System performance can be increased by.
a) Increasing RAM ( ) (b) Disk Defragmentation ( ) c) Both a & b ( ) d) None ( )
36) The extension of temporary files is
a) .bmp ( ) b) .exe ( ) c) .tmp ( ) d) .del (. )
37) What command will you write in the Open Text Box to open the Temp folder?
a) _temp_ ( ) b) %temp% ( ) c) .tepm ( ) d) @temp@ ( )
38) Which of the following a temporary file?
a) Project.docx ( ) b) Mathsite.tmp ( ) c) setup.exe ( ) d) temp.bmp ( )
39) How the can you select all the files in a folders using keyboard ?
a) Ctrl + s ( ) b) Ctrl + A ( ) c) Ctrl+E ( ) d) Ctrl + Z ( )
40 ) Deleted files or folders gets stored in _______ .
a) Trash ( ) b) Start button ( ) c) recycle bin ( ) d) Network ( )
41) Name the icon that provides access to all the drives, files and folders on a computer.
a) This PC or My Computer ( ) b) start button ( ) c) recycle bin ( ) d) network ( )
42) What is the name given to the screen that appears after windows operating system is loaded ?
a) desktop ( ) b) wallpaper ( ) c) screensaver ( ) d) none ( )
43) A _____ operating system runs on a set of computers that are interconnected by a network.
a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )
44) AA _____ operating system is used to control machinery, scientific instruments like robot, in
complex animations and computer control animated machines.
a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )
45) A _____ operating system enables multiple uses to work on a same computer at different times or
simultaneously.
a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )
46) The backspace key is used to erase the characters typed on the ____ side of the cursor.
a) left ( ) b) right ( ) c) both a and b ( ) d) None ( )
47) _____ is a software or hardware device that monitors and controls incoming and outgoing traffic
based on user defined security rules.
a) anti-virus ( ) b) malware ( ) c) firewall ( ) d) spyware ( )
48) The delete ki is used to erase the characters typed on the ____ side of the cursor.
a) left ( ) b) right ( ) c) both a and b ( ) d) None ( )
49) Which of the following is an input device ?
a) printer ( ) b) speaker ( ) c) mouse mouse ( ) d) monitor ( )
50) BIOS stands for :-
a) basic input output system ( ) b) built input output system ( )
c) basic input output service ( ) d) build in input output service ( )
51) To protect our data from theft and viruses, which measures can be taken ?
a) use passwords to login to your computer ( )
b) install antivirus and firewall ( )
c) encrypt data ( ) d) visit secure sites having https protocol ( )
e) all of these ( )
52) A ____ distinguishes itself i.e. it appears to be a useful to Be a useful program but once it reaches a
computer it starts behaving like a virus and destroying data .
a) worm ( ) b) trojan horse ( ) c) virus ( ) d) None ( )