0% found this document useful (0 votes)
97 views11 pages

Unit 3 Class 10 All Solved Ex.

The document is a collection of multiple-choice questions (MCQs) and answers related to Basic ICT Skills for Class 10, covering topics such as computer operations, hardware and software, and internet safety. It includes questions about the definitions, functions, and maintenance of computer systems, as well as the advantages and disadvantages of Information and Communication Technology (ICT). Additionally, it addresses keyboard functions, file management, and security measures to protect data from threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views11 pages

Unit 3 Class 10 All Solved Ex.

The document is a collection of multiple-choice questions (MCQs) and answers related to Basic ICT Skills for Class 10, covering topics such as computer operations, hardware and software, and internet safety. It includes questions about the definitions, functions, and maintenance of computer systems, as well as the advantages and disadvantages of Information and Communication Technology (ICT). Additionally, it addresses keyboard functions, file management, and security measures to protect data from threats.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Basic ICT Skills Class 10 MCQ

Session 1: Basic Computer Operations


1. ICT Stands for _____________.
a. Inform and Communicate technology
b. Information and Communication technology
c. Inform and Communication technology
d. Information and Communicate technology
Essential Study Skills Guide
CBSE Board Exam Revision Guides
Hide Answer ⟵
b. Information and Communication technology
2. In a business, the best approach to keep records is ____________.
a. Handwritten on paper
b. Written using a typewriter
c. Written using a Computer
d. None of the above
Show Answer ⟶
3. ICT Skills help us to ________________, run our business and stay connected with
our family and friends.
a. Communicate
b. Entertainment
c. Both a) and b)
d. None of the above
Essential Study Skills Guide
Hide Answer ⟵
. Communicate
4. A computer system consists of two main parts __________ and _________.
a. Hardware
b. Software
c. Antivirus
d. Both a) and b)
Hide Answer ⟵
d. Both a) and b)
5. The physical parts that we can see and touch are called _________.
a. Hardware
b. Software
c. Antivirus
d. None of the above
Hide Answer ⟵
a. Hardware
5. Mobile devices, such as __________ and ____________ are also computer systems
with hardware and software.
a. Mouse and Keyboard
b. Smartphone and Tablets
c. Typewriter and Pen
d. None of the above
Hide Answer ⟵
b. Smartphone and Tablets
6. The most important software in any computer is the _________________.
a. Operating System
b. Antivirus
c. Office Package
d. Photo Editing Software
Hide Answer ⟵
a. Operating System
7. Mobile devices also have an operating system like ___________.
a. Apple iOS
b. Android
c. Both a) and b)
d. None of the above
Hide Answer ⟵
c. Both a) and b)
8. BIOS stands for ____________.
a. Basic Input/Output System
b. Basic In/Out System
c. Based on In/Out System
d. None of the above
Hide Answer ⟵
a. Basic Input/Output System
9. Keyboard is an ___________ device.
a. Output device
b. Input device
c. Outer device
d. Inner device
Hide Answer ⟵
b. Input device
10. __________ helps the computer to close all the applications, Operating system and
turn off the computer.
a. Sleep
b. Shut down
c. Hibernate
d. None of the above
Hide Answer ⟵
b. Shut down
11. SHIFT, SPACEBAR, ALT, CAPS LOCK are ________ keys which perform special
functions.
a. Enter Key
b. Function Key
c. Control Key
d. Navigation Key
Hide Answer ⟵
c. Control Key
12. __________ keys help to move the cursor to the beginning of a new line.
a. Enter Key
b. Return Key
c. Both a) and b)
d. None of the above
Hide Answer ⟵
c. Both a) and b)
13. ____________ keys known as punctuation keys.
a. Colon
b. Semicolon
c. Question mark
d. All of the above
Hide Answer ⟵
d. All of the above
14. Example of navigation keys ___________.
a. Home
b. End
c. Page Up & Page Down
d. All of the above
Hide Answer ⟵
d. All of the above
15. Example of command keys___________.
a. Insert
b. Delete
c. Backspace
d. All of the above
Hide Answer ⟵
d. All of the above
16. Which of the following does not require the use of a mouse?
a. Turn on
b. Right click
c. Hover
d. Drag and Drop
Hide Answer ⟵
a. Turn on
17. What is the term used when you press and hold the left mouse key and move the
mouse around?
a. Highlighting
b. Selecting
c. Dragging
d. Moving
Hide Answer ⟵
c. Dragging
18. The following are the stages involved in starting a computer. Rearrange the stages
in the proper sequence.
i. Desktop appears after login
ii. Login screen appears
iii. Power on Self-Test (POST) starts
iv. Operating system starts
v. Welcome screen appears
a. i), ii), iii), iv), v)
b. ii), i), v), iii), iv)
c. iii), iv), v), ii), i)
d. iii), ii), i), iv), v)
Hide Answer ⟵
c. iii), iv), v), ii), i)
19. Extension of notepad file _________.
a. .txt
b. .bmp
c. .jpg
d. .psd
Hide Answer ⟵
a. .txt
20. Extension of image file _________.
a. .bmp
b. .jpg
c. Both a) and b)
d. None of the above
Hide Answer ⟵
c. Both a) and b)
21. Which one of the following shortcut keys is used to paste a file?
a. Ctrl + c
b. Ctrl + p
c. Ctrl + v
d. Ctrl + x
Hide Answer ⟵
c. Ctrl + v
22. Which of the following is a valid file extension for Notepad file?
a. .jpg
b. .doc
c. .text
d. .txt
Hide Answer ⟵
d. .txt
23. What keys do you use to copy something?
a. Ctrl+x
b. Ctrl+c
c. Ctrl+z
d. Ctrl+y
Hide Answer ⟵
b. Ctrl+c
24. What are the best options for caring for computer devices?
a. Keeping a Device Clean
b. Prepare a Maintenance Schedule
c. Do not overcharge your battery
d. All of the above
Hide Answer ⟵
d. All of the above
25. You can take backup in the following devices_________.
a. CD/DVD
b. Flash Drive
c. External Drive
d. All of the above
Hide Answer ⟵
c. External Drive
26. To clean the computer from the virus we required __________.
a. Antivirus
b. Office Package
c. Photoshop
d. Operating System
Hide Answer ⟵
a. Antivirus
27. If we are using a computer for a long time we have to __________ unnecessary files
and data from the computer.
a. Delete
b. Save
c. Backup
d. None of the above
Hide Answer ⟵
a. Delete
28. Sometimes we get mails from companies who are advertising a product or trying to
attract you to their website. Such mails are called ________.
a. Trash
b. Inbox
c. Spam
d. None of the above
Hide Answer ⟵
c. Spam
29. What happens if you keep a device plugged in after it has been fully charged?
a. It can break.
b. It can overheat.
c. It can stop functioning.
d. Data can get corrupt.
Hide Answer ⟵
b. It can overheat.
30. What role does antivirus play in protecting your device?
a. It can increase its performance.
b. It can protect it from overheating.
c. It can prevent data from getting corrupt.
d. It can backup data.
Hide Answer ⟵
c. It can prevent data from getting corrupt.
31. Which option does not need to be enabled in order to keep a device cool?
a. Make sure the computer’s CPU fan is working.
b. Keep the device unplugged when in use.
c. Do not cover a laptop with a blanket.
d. Avoid leaving the device in the sun.
Hide Answer ⟵
b. Keep the device unplugged when in use.
32. Which of the following is required for keyboard maintenance?
a. Use a very dilute combination of soap and water applied with a non-abrasive cloth to
remove stains from the keycaps.
b. Turn the keyboard upside down and shake it to remove foreign material.
c. Blow dust and other particles with the help of a blower.
d. All of the above.
Hide Answer ⟵
d. All of the above
33. Computer security helps to protect computers from ___________.
a. Security Break
b. Protect from Threats
c. Protecting your data
d. All of the above
Hide Answer ⟵
d. All of the above
34. What do you mean by Threats ___________.
a. Theft
b. Virus
c. Both a) and b)
d. None of the above
Hide Answer ⟵
c. Both a) and b)
35. __________ are computer programmes that can corrupt data and software
programmes, as well as steal information from a computer.
a. Virus
b. Theft
c. Both a) and b)
d. None of the above
Hide Answer ⟵
a. Virus
36. If someone steals your desktop computer or laptop, it is referred to as _________
theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above
Hide Answer ⟵
a. Physical
37. When a hacker takes your personal information and assumes your identity, this is
referred to as____________ theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above
Hide Answer ⟵
b. Identity
38. _________ hits the computer, it acts like a virus, deleting data.
a. Trojan Horse
b. Online Predator
c. Theft
d. None of the above
Hide Answer ⟵
a. Trojan Horse
39. __________ are persons who try to attract you into inappropriate relationships.
a. Trojan House
b. Online Predator
c. Theft
d. None of the above
Hide Answer ⟵
b. Online Predator
40. Sometimes you may receive very attractive offers saying you have won a huge
amount of money in a lottery and that you can claim the prize by depositing a certain
amount of money known as ___________.
a. Trojan House
b. Online Predator
c. Theft
d. Internet Scams
Hide Answer ⟵
d. Internet Scams
41. To protect our data from theft and viruses we can take ___________ measures.
a. Use passwords to login
b. Install Anti – Virus and firewall
c. Encrypt Data
d. All of the above
Hide Answer ⟵
d. All of the above
42. Banks and companies usually keep their data in ___________ format.
a. Encrypted
b. Firewall
c. Using Password
d. All of the above
Hide Answer ⟵
a. Encrypted
43. If you want to create a secure password you have to use _________ in the
password.
a. Small and Capital letter
b. Numbers
c. Special Characters
d. All of the above
Hide Answer ⟵
d. All of the above
44. We can check secure websites using __________.
a. http://
b. https://
c. Www
d. None of the above
Hide Answer ⟵
b. https://
45. What can you do to make sure your internet transactions are safe?
a. Lock your computer
b. Do not use pirated software
c. Give credit card or bank details only on safe websites
d. Use anti-virus
Hide Answer ⟵
c. Give credit card or bank details only on safe websites
46. Which of the following is a trap for small children into unsuitable relationships?
a. Trojan Horse
b. Online predators
c. Worms
d. Anti-Virus
Hide Answer ⟵
b. Online predators
47. What should a strong password consist of?
a. Name of a person
b. Only letters
c. Letters, numbers and special characters
d. Numbers and special characters
Hide Answer ⟵
c. Letters, numbers and special characters

1. What is ICT?
Answer – Information and Communication Technology (ICT) is an acronym for information
and communication technology. ICT helps in the proper sharing, receiving, and processing of
information, and an ICT device is a device that is used for processing, storing, and delivering
information to others.
Examples of ICT devices are – Laptop, Desktop, Tablets and Smartphones.
2. Objectives of Information and communication technology?
Advantages and disadvantages of ICT.
Answer – Full form of ICT is Information and communication technology. The goal of ICT is to
bridge the gap between parents, educators, and students by encouraging sustainable,
cooperative, and transparent communication methods.
Advantages of ICT
 Enhanced the modes of communication
 Independent learning platforms Cost – efficient
 Enhanced data and information security
 Paperless – Eliminate the usage of paper
 Better teaching and learning methods
 Web – based LMS tools
Disadvantages of ICT
 Traditional books and handwritten methods are at risk.
 Managing courses online is difficult
 Teachers require experience to handle ICT
 Risk of cyber-attacks and hacks
 Misuse of technology

. Difference between Hardware and Software?


Answer – A computer system consists of two main parts – Hardware and Software
 Hardware – Hardware is a physical part of a computer system. We can feel and touch
the hardware devices. example – CPU, Mother Board, Hard Disk, Keyboard, Mouse,
Printer etc.
 Software – Software related to the programs which perform different types of tasks on
the computer system. Program is a collection of Instructions. It also helps the computer
to perform the specific task. Example – Open Office Base, Spreadsheet, Presentation
etc.
4. What is BIOS?
Answer – BIOS stands for Basic Input/ Output System, It helps the computer system to
identify (Self-test) the paraperaphal devices which are connected to the computer system and
helps computers to load Operating System properly.
5. What are the different types of keys in Keyboard?
Answer – The different types of key in keyboard are –
 Function keys – F1 to F12 are function keys in the keyboard, function keys are used
for specific purposes.
 Control keys – SHIFT, CONTROL (CTRL),ALT, SPACEBAR, TAB AND CAPS LOCK
are known as a control key, these keys are used as per the demand.
 Enter key – ENTER or RETURN keys are known as Enter key, depending on the
brand of computer that you are using.
 Punctuation keys – It includes keys for punctuation marks, such as colon (:),
semicolon (;), question mark (?), single quotation marks (‘ ’), and double quotation
marks (“ ”).
 Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys are known
as navigation keys, these keys are used to move up, down, left or right in the
document.
 Command keys – BACKSPACE, INSERT (INS) and DELETE(DEL) are known as
command keys. INSERT key allows you to overwrite characters to the right side.
 Delete keys – The DELETE command key and BACKSPACE key are used to remove
typed text, character, or any other objects from the right and left side of the cursor.
 Windows key – Windows key is used to open the Start menu.

6. What is the purpose of Mouse?


Answer – The purpose of the mouse is –
 Roll Over or Hover – Whenever we bring the mouse over the files, it shows the details
of the file.
 Click or Double Click – Mouse allows you to select, open or delete files and folders
from the computer system.
 Drag and Drop – Click on the file and drag and drop your file where you want.
7. What are files and folders in a computer system?
Answer – Files and folders are –
 File – File is a collection of information different types of files store different types of
information. Every file has a file name and extension that identifies the type of file.
 Folder – Folder is a collection of files or a group of files.

8. How to maintain a computer system?


Answer – Some simple ways to take care of computer system are –
 Keeping a Device Clean – Always keep a device clean, such as the keyboard, the
screen, and the mouse. Handle your gadget with care, keep it cool, and don’t overload
your battery.
 Prepare a Maintenance Schedule – Make a schedule for computer maintenance.
Daily Maintenance
 Clean up your email inbox
 Save Important attachments and save in folder
Weekly Maintenance
 Clean your Keyboard, monitor, CPU and printer
 Backup your data
Monthly Maintenance
 Clean unused photographs
 Clean up Download folder
 Uninstall unused programs
 Run full system virus scan
 Run disk – cleaner software
Yearly / Annual Maintenance
 Clean up social media accounts
 Clean up e-mail contact list
 Update your operating System

9. How to increase Computer performance?


Answer – We frequently install a large number of applications, which slows down
the computer. Always attempt to uninstall unnecessary applications, temporary files, and
antivirus software updates.
10. What is a Security Break?
Answer – Security break is leakage of information stored in a computer.
Your personal information can be lost or leaked in two ways –
 We are not cautious when it comes to disclosing personal information via the internet.
We share our account information and passwords on unsafe websites.
 A person gets unauthorized access to our computer. This can happen at work if we
don’t log out before leaving the computer.
11. What are the threats?
Answer – Threats are ways in which personal information from a computer can be released
without our knowledge.
a. Theft – Theft means stealing of information or hardware. These maybe of three types:
 Physical – Where a person may steal your desktop computer or laptop.
 Identity – A hacker gets your personal information and uses it to impersonate you.
The hacker can use this fake identity to get access to your account information or
engage in illegal activity.
b. Software Piracy – This is stealing of software and includes using or distributing unlicensed
and unauthorized copies of a computer program or software.
 Virus – Viruses are computer programmes that can corrupt data and software
applications, as well as steal data from computers. Worms and Trojan Horses are two
major forms of viruses.
 Worms – Worms are viruses that replicate and spread to all files on a computer once
they attack a computer. This makes it very difficult to remove them.
 Trojon Horse – A Trojan Horse appears to be a useful software programme, but once
it reaches a computer, it begins to behave like a virus and destroys the data.
iii. Online Predator – Online predators are persons who use the internet to trap you into
unhealthy relationships. They could be older people appearing as your age who harass you
into doing unlawful things online.
iv. Internet Scams – You may occasionally receive highly appealing offers claiming that
you have won a large sum of money in a lottery and that you can claim your win by depositing
a specific amount of money. When you deposit money with a credit card or through online
banking, you not only lose the deposit money, but your card / account information may be
misused later.
12. How can we protect our data?
Answer – To protect our data from theft and viruses we can take the following measures –
 Use Strong password in your account – Make your passwords difficult to guess.
When creating a new password, attempt to use a combination of
 Small Character
 Capital Character
 Special Character
 Number
 Install Antivirus and Firewall –Anti-virus software and a firewall protect your data
from virus and from hackers.
 Encrypt your data – Keep your information in an encrypted format to keep it safe from
unauthorized users.
 Open only secure site – Before visiting a website, make sure the address begins with
https://. A website that begins with https:// is a secure website.

You might also like