Ict Skills Important Questions Answers
Ict Skills Important Questions Answers
Ict Skills Important Questions Answers
OBJECTIVE QUESTIONS
1. An _______ is a software that serves as an interface between the user and the computer.
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
2. Which software manages all the devices of a computer and keeps track of the status of the device,
whether it is busy or not?
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
5. An ________ manages the computer memory and keeps track of which memory space is in use by
which program and which space is free.
a. operating system
b. application software
c. anti-virus software
d. microsoft word
Answer: a. operating system
6. An ________ manages the computer memory and keeps track of which memory space is in use by
which program and which space is free.
a. operating system
b. application software
c. anti-virus software
d. disk defragmentor
Answer: a. operating system
8. An ________ keeps track of the amount of disk space used by a specific file.
a. operating system
b. application software
c. anti-virus software
d. disk defragmentor
Answer: a. operating system
9. Which software allows you to create, copy, move and delete files?
a. operating system
b. application software
c. anti-virus software
d. disk defragmentor
Answer: a. operating system
19. Which operating system allows only one user to do a task on the computer and one thing at a
time?
(a) Single-user, multi-task operating system
(b) Single-user , single-task operating system
(c) Multi-user
(d) None of the above
Answer: (b) Single-user, single-task operating system
20. Which Operating System is used to control machineries like robots in complex animations and
computer-controlled automated machines
(a) Real Time
(b) Multi-user
(c) Single-user, multi-task operating system
(d) Distributed
Answer: (a) Real Time
23. ___________ operating system enables multiple users to work on the same computer
simultaneously.
(a) Single-user , single-task operating system
(b) Single-user, multi-task operating system
(c) Multi-user
(d) None of the above
Answer: (c) Multi-user
24. Which Operating System enables single user to operate on several programs at the same time.
(a) Single-user, multi-task operating system
(b) Multi-user
(c) Single-user , single-task operating system
(d) Real Time
Answer: (a) Single-user, multi-task operating system
28. The first screen that appears on monitor after loading OS is called ________________
(a) Icons
(b) Desktop
(c) Wall paper
(d) None of the above
Answer: (b) Desktop
34. Which icons allows user to access all drives, files, and folders on the computer.
(a) Recycle Bin
(b) Computer
(c) Application
(d) Start button
Answer: (b) Computer
38. _______ is a way in which you give name to a file, store it and retrieve it.
(a) Operating System
(b) Formatting System
(c) File System
(d) None of the above
Answer: (c) File
40. A _______ may contain one or more files and sub-folders within. This allows easy accessibility
of files.
(a) Folder
(b) Directory
(c) Sub-folder
(d) None of the above
Answer: (c) Sub-folder
42. A ________ menu is appearing, when you right-click in a blank area of the desktop.
(a) Shortcut Menu
(b) Context Menu
(c) Both (a) and (b)
(d) None of these
Answer: (c) Both (a) and (b)
46. Similar types of files can be placed into a group called ___________
(a) File
(b) Folder
(c) Shortcut
(d) None of these
Answer: (b) Folder
47. To change the name of the folder, right-click and select __________ option from the Shortcut
menu.
(a) Change Name
(b) Modify Name
(c) Rename
(d) None of these
Answer: (c) Rename
48. To create a file, in the shortcut menu, click New and select the __________ of the file you want to
create.
(a) type
(b) name
(c) new
(d) None of these
Answer: (a) type
49. What is the term used when you press and hold the left mouse key and move the mouse around?
(a) Highlighting
(b) Dragging
(c) Selecting
(d) Moving
Answer: (b) Dragging
50. Which of the following ways you can use to copy / move files and folders?
(a) Shortcut Menu
(b) Drag and Drop
(c) Using Keyboard (Shortcut keys)
(d) All of the above
Answer: (d) All of the above
51. To copy a file/folder, right-click and select __________ option from the Shortcut menu.
(a) Copy
(b) Duplicate
(c) Move
(d) Cut
Answer: (a) Copy
Prepared by: M. S. KumarSwamy, TGT(Maths) Page - 7 -
52. To paste a file/folder, right-click and select __________ option from the Shortcut menu.
(a) Stick
(b) Glue
(c) Paste
(d) Cream
Answer: (c) Paste
53. To copy a file/folder using Drag and Drop method, hold down the _____ key while dragging it to
the new location.
(a) Alt
(b) Shift
(c) Ctrl
(d) Alt + Ctrl
Answer: (c) Ctrl
56. When you ______ a file or a folder, a duplicate of the original file or folder is created at the new
location, and the original remains as it is.
(a) Copy
(b) Cut
(c) Rename
(d) Delete
Answer: (a) Copy
57. When you ______ a file or a folder, the original file or folder is moved to the new location?
(a) move
(b) cut
(c) copy
(d) Either (a) or (b)
Answer: (d) Either (a) or (b)
58. You can permanently delete the contents of the Recycle Bin. Right-click the Recycle Bin icon
and then click ______.
(a) Empty
(b) Delete
(c) Empty Recycle Bin
(d) Delete Recycle Bin
Answer: (c) Empty Recycle Bin
60. To restore a file from the Recycle Bin, select the file, and click ________.
(a) Recover this item
(b) Restore this item
(c) Move this item
(d) Undelete this item
Answer: (b) Restore this item
1. What is ICT?
Answer – Information and Communication Technology (ICT) is an acronym for information and
communication technology.
ICT helps in the proper sharing, receiving, and processing of information, and an ICT device is a
device that is used for processing, storing, and delivering information to others.
Examples of ICT devices are – Laptop, Desktop, Tablets and Smartphones.
Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology
Daily Maintenance
a. Clean up your email inbox
b. Save Important attachments and save in folder
Weekly Maintenance
a. Clean your Keyboard, monitor, CPU and printer
b. Backup your data
Monthly Maintenance
a. Clean unused photographs
Prepared by: M. S. KumarSwamy, TGT(Maths) Page - 10 -
b. Clean up Download folder
c. Uninstall unused programs
d. Run full system virus scan
e. Run disk – cleaner software
b. Software Piracy – This is stealing of software and includes using or distributing unlicensed and
unauthorized copies of a computer program or software.
i. Virus – Viruses are computer programmes that can corrupt data and software applications,
as well as steal data from computers. Worms and Trojan Horses are two major forms of viruses.
ii. Worms – Worms are viruses that replicate and spread to all files on a computer once they
attack a computer. This makes it very difficult to remove them.
A Trojan Horse appears to be a useful software programme, but once it reaches a computer, it
begins to behave like a virus and destroys the data.
iii. Online Predator – Online predators are persons who use the internet to trap you into
unhealthy relationships. They could be older people appearing as your age who harass you into
doing unlawful things online.
iv. Internet Scams – You may occasionally receive highly appealing offers claiming that you
have won a large sum of money in a lottery and that you can claim your win by depositing a
specific amount of money. When you deposit money with a credit card or through online banking,
you not only lose the deposit money but your card / account information may be misused later.
Q6. Identify me
a. I am a physical part of computer.
b. I am a collection of instruction doing specific task.
c. I am the software that starts working as soon as we switch on a computer.
d. I am an input device used to type text, numbers etc
e. I am a small device that you can use to move, select and open items on your computer screen.
Ans. a. Hardware b. Software c. Operating System d. Keyboard e. Mouse
Q12. The file name and file name extension are separated by a ________________
Ans. dot ( . )
Q24. Write few tips to protect your data from online theft and viruses.
Ans. Few tips to protect our data from online theft and viruses are:
a. Use passwords to login to your computer:
b. Install Anti-virus and Firewall:
c. Use Data Encryption
d. Give details of your credit card or bank account only on secure sites
Q27. __________________ is stealing of software and using of unlicensed and unauthorized copies
of a computer software.
Ans. Software Piracy
Q31. When the ____________ key is turned ON, it helps to overwrite characters to the right of the
cursor.
Ans. INSERT
Q32. Name two keys available on keyboard which are used to remove typed text or characters.
Ans. Delete and Backspace
Q33. _________ key helps to move the cursor to the beginning of a new line.
Ans. RETURN or ENTER