ICT Related TRIVIAS
ICT Related TRIVIAS
ICT Related TRIVIAS
IT (Information Technology) encompasses all of the properly, Smart phones use operating systems, which are
technology that we use to collect, process, protect and store the basis for application development. Some smart phones
information. It refers to hardware, software (computer can be connected to an external screen and keypad, which
programs), and computer networks. creates a working environment, similar to that of a laptop or a
desktop computer. Some operating systems for Smartphone
ICT (Information and Communication Technology) This are: GoogleAndroid, Symbian, Blackberry, PalmPilot, and
concept involves transfer and use of all kinds of information. WindowsPhone.
ICT is the foundation of economy and a driving force of
social changes in the 21st century. Distance is no longer an MAIN COMPUTER PARTS
issue when it comes to accessing information; for example,
working-from-home, distance learning, e-banking, and e- Motherboard, MBO is computer's basic circuit, to which all
government are now possible from any place with an Internet computer components are connected, directly or indirectly.
connection and a computing device. Devices are connected to the motherboard through a system
bus. System bus connects all devices, ensures data flow and
Personal computer (PC), as the name suggests, is communication between different devices using predefined
intended for personal use, as opposed to the server, which is protocols.
used by a larger number of people simultaneously, from
different locations, often via terminals. If you do not intend to Central Processing Unit (CPU or processor) is a central
move your computer frequently from one place to another, part of a computer (and can be referred to as the computer’s
and at the same time you want maximal price/performance “brain”). It manages all other computer parts, monitors their
ratio, then you should use a desktop computer. In mutual communication and performs arithmetic-logical
comparison to laptops or tablet computers, it is much larger operations. Processor speed is measured in hertz (or
in size, inconvenient to carry/move, consumes more megahertz or gigahertz). Most famous manufacturers for
electricity but has a much better price/performance ratio. personal computer processors are Intel and AMD.
Also, they are much easier to upgrade.
Cache is a small capacity memory which allows quick
Laptop or tablet PC is used by individuals who have the access to data. By storing data from working memory in
need to travel with a computer or simply use them for cache, the speed of communication between processor and
aesthetic reasons when computing power is not an issue. RAM is increased. Microprocessors use three levels of fast
Laptop computers, as opposed to tablet PCs, more closely cache, L1, L2 and L3, used to store often used data.
resemble a personal computer when it comes to data input.
Data entry is done via keyboard and mouse, while the tablet ROM (Read Only Memory) is a type of permanent, internal
PC data entry is done via touch screen. Unlike desktop memory that is used solely for reading. BIOS (Basic
computers, notebooks and tablet PCs are optimized for Input/Output System), a program which is located in a
portability, low power requirements at the expense of separate ROM on the motherboard, and defines, as the
performance and can be used (for a limited period of time-i.e. name suggests, basic input/output system, is a good
until the batteries are depleted) without connection to the example. Please note that not all BIOS programs are stored
power grid. In order to prepare a laptop or a tablet computer in ROM.
for use without a power connection, it is necessary to RAM (Random Access Memory) is a working memory in
recharge the batteries. which analyzed data and programs are stored, while
computer runs. It allows reading and writing data, and is
PORTABLE DIGITAL DEVICES deleted/cleared when the computer shuts down.
PDA-Personal Digital Assistant (PALM) is a convenient
Hard Disk Drive (HDD) is a place for permanent data
small sized computer. It easily connects to mobile phones
storage (it does not delete/clear when computer shuts down).
and can prove a good solution for less demanding users. As
Its features are: large capacity, faster performance in
the name suggests, it is a device that fits in the user’s palm.
comparison to optical devices but slower in comparison to
Its name directly tells us that this computer is more of an
RAM and are used for permanent data storage. We can
assistant and not a workstation-whose name suggests the
distinguish between internal and external hard drives.
superiority in capabilities and computing power, especially in
comparison with PDA. Floppy Disk Drive is used for storing and reading data
stored on a floppy disk. Disk capacity is 1.44MB. Before
Mobile phone is a portable electronic device used for distant
memory stick and a wider usage of CD recorders, it was
communication. In recent years, mobile phone has evolved
used as data carrier. 'Modern memory sticks have a memory
from simple communication device into a multi-functional
capacity measured in GB while floppy disks only have
device. Additional functions, such as short text messaging
memory capacity of 1.44MB, indicating that floppy disks are
(SMS), electronic mail, Internet access, contact registration,
becoming obsolete.
calculator, clock, alarm, recording and photograph
displaying, recording and playback of video clips, sending/ CD-ROM (Compact Disk – Read Only Memory) drive is
receiving multimedia messages (MMS), audio recording and used for reading CD media.
playback, etc. has turned the mobile phone into an extremely
useful device, whose absence would make active DVD drive is used for reading DVD discs. DVD disc capacity
involvement and participation in a modern society not ranges from 4.7 to 18GB.
possible.
Soundcard is a device used for sound creation and
Smartphone is a device that merges functionality of phones, production by means of computer speakers.
PDAs, cameras, camcorders, and computers. To function
Graphics card is responsible for image processing and Serial port is used for example in connecting a mouse
displaying it on a monitor. It has its own graphics processor (labeled COM1 or COM2).
and memory. Image quality depends on the strength of these
components. Parallel port is used for connecting a local printer (LPT1 or
LPT2).
Modem enables computers to communicate via telephone
lines. They connect computers to the Internet. Network port is used for connecting computers to a
network.
Connectors or ports are slots visible in the back and the
front side of a computer. Firewire is used for connecting computers and audio-video
devices (digital cameras, etc.).
Common Input/Output Ports
Bit (binary digit) is the basic unit used to measure the
Universal Serial Bus (USB) is used to connect various amount of information. A byte or octet contains eight bits.
devices (mouse, keyboard, USB memory).
1 KB (kilobyte)- 1024 B (approx. 1000 B) determines the position of the cursor by touching the
1 MB (megabyte)- 1024 KB (approx. 1000 KB) touchpad.
1 GB (gigabyte) -- 1024 MB (approx. 1000 MB)
1 TB (terabyte) – 1024 GB (approx. 1000 GB) Lightpen enables handwriting on screen and can be used as
a mouse. It requires an appropriate monitor type.
BASIC TYPES OF STORAGE DEVICES Joystick: mainly used in computer games. Unlike a mouse,
it has many buttons which allow control over game objects.
CD (Compact Disc) is an optical disc used for data storage.
The standard capacity of a CD is 700MB. CD-R is used for Microphone is a device that converts sound into an
reading and writing data one time-only, while CD-RW for electrical signal, which can be stored on a computer. It is
reading and writing data multiple times. mainly used for recording sound, communication between
players in online games, in combination with a web camera
DVD (Digital Versatile Disc) is an optical disc which is, due in video conferencing, for converting voice into text on a
to the larger capacity (about 4.7 GB), mostly used for video computer (speech-to-text processing (e.g., textual files or
storage. emails), etc.
Blu-ray disc (BD) is the successor to DVD, is an optical disk Webcam is a camera that stores video signal in a format
storage, it comes in different capacities, depending on how appropriate for video transfer over the Internet in realtime.
many layers it has and the capacity of each layer. Currently,
the capacity of one layer is between 27 GB and 33 GB, while Digital camera, unlike analog, stores photographs in digital
the overall capacity is the product of the number of layers format. It can be directly connected to a computer and
and capacity of each layer. photographs can be downloaded. Photograph quality is
expressed in megapixels. More megapixels mean better
Memory card is a type of flash memory used to store data in quality of photograph, however more memory is occupied.
digital cameras, cell phones, MP3 players etc.
Output Devices
USB (Universal Serial Bus) Stick is a data storage device.
It features small dimensions, relatively high capacity, Monitor displays images from the computer, it enables us to
reliability, and speed. It belongs to the type of flash memory see, work and control computers. In other words, working on
that remembers data, even when not under voltage i.e. they a computer without a monitor would be inconceivable.
do not need electric power to maintain data integrity. Common types of monitors, with regard to manufacturing
technology, are the CRT and LCD.
Input Devices
CRT monitors have been present on the market for
Mouse is an input device that facilitates work with the a long time, and other technologies are pushing
graphical user interface (GUI). The mouse transmits hand them out. They are based on cathode tube
movements, and the screen displays the cursor (mouse technology.
pointer) movements. They are divided into mechanical and LCD monitors use liquid crystal technology. In
optical (with respect to a transfer movement), and wired and comparison with CRT monitors, LCD monitors use
wireless (with respect to connection). less electrical energy, do not emit radiation and
their price is higher, however due to smaller
Trackball, unlike a mouse, is not movable. Hand movements dimensions, more attractive design and a good
are transmitted to the screen by rolling the ball which is picture quality, they are pushing CRT monitors out
located on the upperside of the device. Keyboard is used for of the market. Monitor size is expressed by the size
data entry and issuing commands. They can also be wired or of screen diagonal and measured in inches ('').
wireless. Picture quality is expressed with the notion of
Scanner is used to load data (image, text, etc.) from the resolution, which is a number of horizontal and
printed material into a computer. The result of scanning is an vertical dots (pixels) (e.g. 1920x1080).
image, but with special programs, if we scan the text, we can Projector is a device used to project a computer image or
get a text as a result. Software used to recognize text from other images from independent devices, such as DVD
image is called a text recognition tool. players, Blu-ray player, etc. onto canvas or a wall.
Touchpad is used for transmission of hand movement, but Printer is a device used for printing data from a computer
unlike working with a mouse, the user is the one who onto a paper. We distinguish between local printer
(connected directly to the computer) and network printer Text processing software is used for creating and
(connected directly to network using a network card). Also,
forming text documents and nowadays, they can
printers also differ according to print technology: dot matrix,
laser, inkjet, thermal printer and plotter. contain images, charts and tables. Examples of such
programs are OpenOffice.org Writer (open source
Dot matrix printers are the oldest, with the lowest
price of print per paper, they are slow, make a lot of software) and Microsoft Word (proprietary software).
noise while printing, and are mostly appropriate for
printing text. Spreadsheet calculations software is used for
Laser printers are similar to photocopy devices performing various calculations and presentation of
when it comes to technology. They have results in charts. Examples of such programs are
exceptional print quality, speed and are quiet.
OpenOffice.org Calc Writer (open source software)
Downsides of laser printers are their high price and
high price of toners. and Microsoft Excel (proprietary software).
Inkjet printers have a high print quality (somewhat
lower in comparison with laser printer), they are Software for presentations is used to create
quiet while printing, and have low initial investment. professional presentations that consist of slides with
Ink price, especially color ink, can cost as much as graphical and textual elements. Such a presentation
the printer itself. Printing technology is based on ink
dispersion from container onto paper. can afterwards be displayed as a "slide show” by using
Plotter is used for printing large drawings (up to A0). a projector. Examples of such programs are
They are extremely expensive and used only for OpenOffice.org Impress (open source software) and
professional purposes, such as in designing firms
Microsoft PowerPoint (proprietary software)
for printing technical drawings (blueprints).
Thermal printer, as its name states, leaves a print Software for creating and managing database helps to
on the paper by utilizing heat. They use paper manage a collection of structured data. Examples of such
sensitive to heat, feature small dimensions; they are programs are OpenOffice.org Base (open source software)
quiet while printing and relatively cheap. They are and Microsoft Access (proprietary software).
usually used for printing receipts, and owing to that
they are called POS printer (printer of sale). Also, Common utility software installed on a computer:
they are used as calculator printers and due to their
small dimensions, as portable printer. office programs - OpenOffice.org, Microsoft Office
antivirus programs – Avira, Sophos, Kaspersky,
Software is, unlike hardware, intangible part of the computer. Antivir etc.
It consists of a sequence of commands, written according to Internet browser: Mozilla Firefox, Microsoft Internet
strict rules. Programs are written by programmers, in various Explorer, Opera, Safari etc.
programming languages. programs for image editing: Adobe Photoshop,
Canvas, CorelDraw, Draw etc.\
Software types:
Magnifier is used to enhance a part of the screen.
Operating system is a program which manages computer
hardware. First computers did not have operating systems; On-Screen Keyboard – text is entered using a mouse to
they had programs that were directly loaded into the click on the on-screen keyboard.
computer (e.g. punchcards). Today, computers have an
operating system which loads into the computer's memory Narrator is commonly used by users with visual impairment -
during its startup. Computer functions are based on its it can read text displayed on monitor, it tells current cursor
operating system. Within operating system, drivers position, and describes certain events, like warning and error
(responsible for the functioning of a computer) and various messages generated by OS.
utility programs (responsible for the functionality of a Windows Speech Recognition enables speech recognition,
computer) are installed. The most famous operating systems i.e. recognizes spoken word, transfers it to text and enters it
are: into a document; therefore it enables you to dictate a text to
1. Linux (Debian, Ubuntu, Fedora, Knoppix,...) - open source a computer, to browse the web using your voice etc.
software Computer network is comprised of at least two, connected,
2. Microsoft Windows (XP, Vista, 7,...) - proprietary software by wire or wireless, computers that can exchange data i.e.
3. Mac OS X (Cheetah, Panther, Snow Leopard,...) - communicate. Internet is the most famous and most
proprietary software widespread network with nearly2 billion users and the
number of users is still growing.
Application Software (Utility programs) are all programs
that users use to perform different tasks or for problem Types of Network according to size
solving. Users, according to his/her needs, install the
appropriate utility software. Computer functions and tasks PAN (Personal Area Network) A personal area network
that computers can perform are defined by the installed utility (PAN) is a computer network that will be useful in
software. Utility software can often cost more than computer communicating computerizes devices such as telephones
hardware unless the software is open source. and PDAs. Mostly, the PAN is communicated through
wireless network technologies such as Wireless USB,
Common utility software are: Bluetooth, Z-Wave, and IrDA. You may use PANs to
communicate among the personal devices or you may
connect even to higher level networks or to the internet.
LAN (Local Area Network) - a network that covers a Virus is a malicious program with the possibility of
relatively small geographical area- it connects computers self-replication. In a computer it seeks other files,
within a firm or household by wire, trying to infect them and the ultimate goal is to
spread to other computers. Depending on what
WLAN(Wireless Local Area Network) - a network that malicious code it contains, it may cause more or
covers a relatively small geographical area - it connects less damage to your computer.
computers within a firm or household wirelessly, Worms like viruses, they possess the ability of self-
WAN (Wide Area Network)- a network that covers a replication, however they cannot infect other
relatively large geographical area - it connects a greater programs. Their usual intent is to take control of
number of computers and local networks. your computer and allow remote control by opening,
the so-called, 'backdoor'.
MAN (Metropolitan Area Network) MAN is a network that Trojan horses can be presented in the form of
interconnect users with computer resources in a geographic games or files in e-mail attachments, with different
area or region larger than that covered by a local area purposes, such as: to allow remote control to your
network (LAN) but smaller than the area covered by wide computer, delete data, allow spreading of viruses,
area network (WAN). Further a MAN is a network that send spam from the infected computer, etc. Unlike
connects two or more Local Area Networks or Campus Area viruses and worms, it does not replicate and it
Networks together but does not extend beyond the needs to be executed, that is, it is not autonomous.
boundaries of the immediate town, city, or metropolitan area. Spyware is a program that secretly collects data
about computer users (passwords, credit card
Internet ("network of all networks") is a global system numbers, etc.), therefore it spies on users. The
comprised of interconnected computers and computer most common spyware infections usually occur
networks, which communicate by means of using TCP/IP while visiting suspicious sites with illegal or
protocols. pornographic content.
Intranet is a private network of an organization to which only Adware is a program that uses collected data about
authorized employees have access (login and password). a user in order to display advertisements in a way
regarded as intrusive. It usually manifests itself in
Extranet is part of Intranet, to which independent the form of many pop-up windows that display ads.
collaborators have access. Hoax is a false message being spread by e-mail to
deceive users. Their goal is to obtain data of, for
Download is a term that implies taking a copy of digital data instance, a bank account, or persuade users to pay
from a network computer on a local computer, and upload some fees in order to win the lottery (which they
means placing digital content on a network computer. never applied for), or pay costs of money transfers
Bitrate represents speed at which data is transferred from an exotic prince to help him withdraw money
through a modem (network). It is measured in bit/s (bit per from a country that is falling apart and, in return, will
second). bit/s is/are a measurement unit for speed of digital receive an impressive award, etc.
data flow through the network. The number of bits IP (Internet Protocol) Address. An Internet Protocol (IP)
transferred in one second tells us how many bits can be address is a numerical identification (logical address) that is
transferred through a network in one second. assigned to devices participating in a computer network
1,000 bit/s rate = 1 kbit/s (one kilobit or one thousand bits utilizing the Internet Protocol for communication between its
per second) nodes. Although IP addresses are stored as binary numbers,
1,000,000 bit/s rate = 1 Mbit/s (one megabit or one million they are often displayed in more human-readable notations,
bits per second) such as 192.168.100.1(for IPv4). The role of the IP address
1,000,000,000 bit/s rate = 1 Gbit/s (one gigabit or one billion has been characterized as follows: "A name indicates what
bits per second we seek. An address indicates where it is. A route indicates
Firewall is a software (or network device) that is used to how to get there."
control authorized access and protect against unauthorized Router is a networking device that forwards packets
access to your computer. between networks using information in protocol headers and
forwarding tables to determine the best next router for each
Malicious Programs packet. Routers work at the Network Layer of the OSI model
Malware (malicious + software) is a software, which and the Internet Layer of TCP/IP.
infiltrates an operating system in a seamless manner,
(WWW) World wide web is the computer based network of
whether by human mistake or due to shortcomings of the
information resources that a user can move through by using
operating system and software support, with malicious
links form one document to another.
intentions. Malicious software includes:
Which of the following programming language is used to Where is the headquarter of Microsoft office located
create programs like applets? (a) Texas
(a) COBOL (b) NewYork
(b) C Language (c) California
(c) Java (d) Washington
(d) BASIC Answer: (d) Washington
Answer: (c) Java
.gif is an extension of
First computer virus is known as (a) Image file
(a) Rabbit (b) Video file
(b) Creeper Virus (c) Audio file
(c) Elk Cloner (d) Word file
(d) SCA Virus Answer: (a) Image file
Answer: (b) Creeper Virus
Which one is the first fully supported 64-bit operating system
Which one programming language is exclusively used for (a) Windows Vista
artificial intelligence (b) Mac
(a) C (c) Linux
(b) Java (d) Windows XP
(c) J2EE Answer: (c) Linux
(d) Prolog
Answer: (d) Prolog Computer Hard Disk was first introduced in 1956 by
(a) Dell
Firewall in computer is used for (b) Apple
(a) Security (c) Microsoft
(b) Data Transmission (d) IBM
(c) Authentication Answer: (d) IBM
(d) Monitoring
Answer: (a) Security Which of the following is not a web browser
(a) MOSAIC
A dual layer Blue-ray Disc can store data upto (b) WWW
(a) 20GB (c) Facebook
(b) 35 GB (d) Netscape navigator
(c) 12 GB Answer: (c) Facebook
(d) 50 GB
Answer: (d) 50 GB In computer world, Trojan refer to
(a) Virus
Which of the following is not an operating system (b) Malware
(a) DOS (c) Worm
(b) Mac (d) Spyware
(c) C Answer: (b) Malware
(d) Linux
Answer: (c) C Which one of the followings is a programming language
(a) HTTP
Which of the following is not a database management (b) HTML
software (c) HPML
(a) MySQL (d) FTP
(b) Oracle Answer: (b) HTML
(c) Sybase
(d) COBOL Which protocol is used to received e-mail
Answer: (d) COBOL (a) SMTP
(b) POP3
Number of layers in the OSI (Open Systems Interconnection) (c) HTTP
Model (d) FTP
(a) 9 Answer: (b) POP3
(b) 3
(c) 7 Which protocol is used to send e-mail
(d) 11 (a) HTTP
Answer: (c) 7 (b) POP3
(c) SMTP
1024 bit is equal to how many byte (d) SSH
(a) 1 Byte Answer: (c) SMTP
(b) 128 Byte
(c) 32 Byte Which computer program converts assembly language to
(d) 64 Byte machine language
Answer: (b) 128 Byte (a) Interpreter
(b) Compiler
Mac Operating System is developed by which company (c) Assembler
(a) IBM (d) Comparator
(b) Apple Answer: (c) Assembler
(c) Microsoft
In which year ‘@’ sign was first chosen for its use in e-mail Answer: (d) Notepad
address
(a) 1976 Which one is the default ‘Word Processor’ for Microsoft
(b) 1980 Windows
(c) 1977 (a) MS Word
(d) 1972 (b) Ms Paint
Answer: (d) 1972 (c) WordPad
(d) Notepad
Which one is the latest one from PARAM SuperSries Answer: (c) WordPad
computers
(a) PARAM Yuva II What is the maximum size of a word document created
(b) PARAM 10000 (a) 1 MB
(c) PARAM Padma (b) 32 MB
(d) PARAMnet (c) 16MB
Answer: (a) PARAM Yuva II (d) 999KB
Answer: (b) 32 MB
Who is also know as the father of Indian Supercomputing
(a) Ragunath Mashelkar What is the maximum number of Primary Partitions that can
(b) Vijay Bhatkar be created on a Hard-disk
(c) Jayant Narlikar (a) 2
(d) Nandan Nilekani (b) 3
Answer: (b) Vijay Bhatkar (c) 4
(d) 1
A folder in windows computer can’t be made with the name Answer: (c) 4
(a) can
(b) con How many layers in the TCP/IP protocol layers
(c) mak (a) 7
(d) make (b) 5
Answer: (b) con (c) 4
(d) 11
A computer use which type of number system to calculate Answer: (c) 4
and to store data
(a) decimal What is the binary value of ‘A’
(b) octal (a) 01000100
(c) binary (b) 11000001
(d) hexadecimal (c) 01100001
Answer: (c) binary (d) 01000001
Answer: (d) 01000001
What is the extension type of the excel 2007 files
(a) .xls Which key combination is used to minimize all open windows
(b) .xlsx and displays in the screen
(c) .xsl (a) Alt+M
(d) None of the above (b) Shift+M
Answer: (b) .xlsx (c) Windows Key+D
(d) CTRL+D
The basic units of a excel spreedsheet where we enter data Answer: (c) Windows Key+D
is called
(a) Tab Which function key needs to be press during reboot to enter
(b) Box in Safe Mode of a Windows machine
(c) Cell (a) F8
(d) None of the above (b) F2
Answer: (c) Cell (c) F1
(d) F9
The maximum number of rows supported by Excel 2003 Answer: (a) F8
spreadsheet is
(a) 10,000 ‘Linux’ is an example of
(b) 35,356 (a) Software
(c) 55,782 (b) Application
(d) 65,536 (c) Operating System
Answer: (d) 65,536 (d) Browser
Answer: (c) Operating System
The maximum number of rows supported by Excel 2007
spreadsheet is Which key combination is used to permanently delete a file
(a) 9,68,576 or folder
(b) 12,15,857 (a) Shift+delete
(c) 13,42,554 (b) Alt+delete
(d) 10,48,576 (c) CTRL+delete
Answer: (d) 10,48,576 (d) Delete
Answer: (a) Shift+delete
Which one is a ‘text editor’ for Microsoft Windows
(a) MS Word Which is an Input device
(b) Ms Excel (a) Monitor
(c) WordPad (b) Printer
(d) Notepad (c) Mouse
(d) None of the above (d) Linkedln
Answer: (c) Mouse Answer: (a) Facebook
Which company first developed the Java programming Who developed COBOL?
language Ans : Grace Murry Hopper
(a) Microsoft
(b) Google Email was developed by……
(c) Sun Microsystems Ans : Raymond Samuel Tomlinson (Ray Tomlinson)
(d) IBM
Answer: (c) Sun Microsystems Green dam is ……
Ans : Web Filter
Mark Zuckerberg is the owner of
(a) Facebook What is the expanded form of CMOS ?
(b) Google Ans : Complementary Metal Oxide Semoconductor
(c) Linux
Who is Netizen ?
Ans : Net Citizen (Citizen who uses internet)
What is Scareware?
Ans : Fake antivirus softwares