Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

Class-10 Information Technology (402)

Book- Employability Skill


Unit 3 Information and Communication Technology Skills

BOOKBACK EXERCISES
Session 1 Basic Computer Operations
A. Multiple choice questions
Read the questions carefully and circle the letter (a), (b), (c) or (d) that best
answers the question.
1. Which of the following functions is not performed using a mouse?
(a) Turn on                                                                 (b) Hover
(c) Right click                                                              (d) Drag and Drop
Ans: (a) Turn on
2. What is the term used when you press and hold the left mouse key and
move the mouse around?
(a) Highlighting                                                          (b) Dragging
(c) Selecting                                                                (d) Moving
Ans: (b) Dragging
3. Here are the steps that take place when starting a computer. Rearrange
the steps in the correct order.
(a) Desktop appears after login                               (b) Login screen appears
(c) Power on Self-Test (POST) starts                       (d) Operating system starts
(e) Welcome screen appears
Ans: (c) Power on Self-Test (POST) starts –
(d) Operating system starts –
(e) Welcome screen appears—
(b) Login screen appears—
(a) Desktop appears after login
Session 2 Performing Basic File Operations
A. Multiple choice questions
Read the questions carefully and circle the letter (a), (b), (c) or (d) that best
answers the question.
1. Which one of the following shortcut keys is used to paste a file?
(a) Ctrl + C                                                                  (b) Ctrl + P
(c) Ctrl + V                                                                  (d) Ctrl + X
Ans: (c) Ctrl + v
2. Which of the following is a valid file extension for Notepad file?
(a) .jpg                                                                         (b) .doc
(c) .text                                                                        (d) .txt
Ans: (d) .txt
3. What keys do you use to copy something?
(a) Ctrl+X                                                                    (b) Ctrl+C
(c) Ctrl+Z                                                                     (d) Ctrl+Y
Ans: (b) Ctrl+C

Session 3 Computer Care and Maintenance


A. Multiple choice questions
Read the questions carefully and circle the letter (a), (b), (c) or (d) that best
answers the question.
1. What happens if you leave a device plugged in even after it is charged
100%?
(a) It can break.                                                          (b) It can stop functioning.
(c) It can over-heat.                                                   (d) Data can get corrupt.
Ans: (c) It can over-heat.
2. How can an anti-virus protect your device?
(a) It can protect it from over-heating.                    (b) It can increase its
performance.
(c) It can prevent data from getting corrupt.          (d) It can backup data.
Ans: (c) It can prevent data from getting corrupt.
3. Which option is not required to keep a device cool?
(a) Keep the device unplugged when in use.         
(b) Do not cover a laptop with a blanket.
(c) Make sure computer’s CPU fan is working.
(d) Avoid leaving the device in the sun.
Ans: (a) Keep the device unplugged when in use.
4. Which of the following is essential for maintaining keyboard?
(a) Turn the keyboard upside down and shake it to remove foreign material.
(b) Blow dust and other particles with help of a blower.
(c) Use a very dilute combination of soap and water applied with a non-
abrasive cloth to remove stains from the keycaps.
(d) All of the above.
Ans: (d) All of the above.
Session 4 Computer Security and Privacy
A. Multiple choice questions
Read the questions carefully and circle the letter (a), (b), (c) or (d) that best
answers the question
1. What should you do to ensure secure online transactions?
(a) Lock your computer
(b) Give credit card or bank details only on safe websites
(c) Use anti-virus
(d) Do not use pirated software
Ans: (b) Give credit card or bank details only on safe websites
2. Which of the following trap small children into inappropriate relations?
(a) Online predators                                                                         (b) Worms
(c) Trojan Horse                                                                                (d) Anti-Virus
Ans: (a) Online predators
3. What should a strong password consist of?
(a) Only letters                                                                                    (b) Numbers and
special characters
(c) Name of a person                                                                      
(d) Letters, numbers and special characters
Ans: (d) Letters, numbers and special characters

ADDITIONAL MCQs

Q1. ICT stands for _______________


a. Information and Communication Technology
b. Information and Communication Terminology
c. Information and Common Technology
d. Information to Communication Technology
ANSWER  a. Information and Communication Technology

Q2. A computer is an _____________ machine


a. mechanical
b. electrical
c. electronic
d. None of the above
ANSWER  c. electronic

Q3. ICT refers to all the methods, tools, concepts related to


a. storing digital information.
b. recording digital information.
c. sending digital information.
d. All of the above
ANSWER  d. All of the above

Q4. Which of the following ways are used to record or store information?
a. handwritten on paper
b. written using a typewriter
c. typed in computer
d. All of the above
ANSWER  d. All of the above

Q5. Physical part of computer is called ___________


a. Hardware
b. Software
c. Shareware
d. None of the above
ANSWER  a. Hardware

Q6. Which of the following is not computer hardware?


a. RAM
b. Keyboard
c. MS Paint
d. Monitor
ANSWER  c. MS Paint

Q7. Which of the following is/are examples of software?


a. MS Word
b. MS Excel
c. OpenOffice Calc
d. All of the above
ANSWER  d. All of the above

Q8. ______ act as an interface between the user and the computer.


a. Operating System
b. Ms Excel
c. Impress
d. Digital Documentation
ANSWER  a. Operating System

Q9. Software that starts working as soon as we switch on a computer is


a. RAM
b. ROM
c. Operating System
d. None of the above
ANSWER  c. Operating System

Q10. Hardware would not be able to function without ___________


a. Shareware
b. Freeware
c. Software
d. None of the above
ANSWER  c. Software

Q11. Which of the following is an output device?


a. Monitor
b. Speaker
c. Printer
d. All of the above
ANSWER  d. All of the above

Q12. Which of the following are mobile operating system?


a. Apple iOS
b. Android
c. Both of the above
d. None of the above
ANSWER  c. Both of the above

Q13. BIOS stands for


a. Basic Input/Output System
b. Base Input/Output System
c. Basic Input and Output Systematic
d. None of the above
ANSWER  a. Basic Input/Output System

Q14. Identify the input device


a. Printer
b. Speaker
c. Mouse
d. Monitor
ANSWER  c. Mouse

Q15. A __________ is a device used to type text, numbers and commands into
the computer.
a. Mouse
b. Keyboard
c. Joystick
d. None of the above
ANSWER  b. Keyboard

Q16. Keys labeled from F1 to F12 are __________ keys


a. Input
b. System
c. Function
d. Help
ANSWER  c. Function

Q17. The function of the F1 key in most programs is to ___________


a. open save as dialog box
b. open help
c. delete a file
d. None of the above
ANSWER  b. open help

Q18. You use the _______________ key to move the cursor to the beginning of
a new line.
a. Enter
b. Return
c. Both of the above
d. None of the above
ANSWER  c. Both of the above

Q19. Navigation keys are


a. Arrow Keys
b. Page Up
c. Page down
d. All of the above
ANSWER  d. All of the above

Q20. When the INSERT key is turned ON, it helps you overwrite characters to
the ______ of the cursor
a. left
b. right
c. both of the above
d. None of the above
ANSWER  b. right

Q21. DELETE key is used to remove typed text on the _______ side of the
cursor.
a. left
b. right
c. both of the above
d. None of the above
ANSWER  b. right
Q22. Backspace key is used to remove typed text on the _____ side of the
cursor.
a. left
b. right
c. Both of the above
d. None of the above
ANSWER  a. left

Q23. _____________ key opens the start menu.


a. Arrow
b. Ctrl
c. Windows
d. None of the above
ANSWER  c. Windows

Q24. A _____________ is a device that you can use to move, select and open
items on your computer screen.
a. Mouse
b. Joystick
c. Scanner
d. None of the above
ANSWER  a. Mouse

Q25. When you click a particular file by mouse, it may gets __


a. Selected
b. Deselected
c. Both of the above
d. None of the above
ANSWER  c. Both of the above

Q26. When you move the item to the new location with the help of mouse.
This is called ________________
a. Move and drop
b. Move and leave
c. Drag and drop
d. None of the above
ANSWER  c. Drag and drop

Q27.Double-clicking means to quickly click the ______ mouse button twice


a. right
b. left
c. both of the above
d. None of the above
ANSWER  b. left

Q28. We can ___ a file by mouse by double click on file.


a. Close
b. Save
c. Open
d. Delete
ANSWER  c. Open

Q29. ______functions is performed by mouse?


a. Click
b. Double Click
c. Drag and Drop
d. All of the above
ANSWER  d. All of the above

Q30. Prevent others from using your computer by __________


a. using username and password
b. using antivirus
c. using UPS
d. using internet
ANSWER  a. using username and password

Q31. Electronic files in computer can be ____________


a. Copied
b. Moved
c. Rename
d. All of the above
ANSWER  d. All of the above

Q32. Each file in computer has _______________


a. Name
b. Extension
c. Both of the above
d. None of the above
ANSWER  c. Both of the above

Q33. The file name and file name extension are separated by a _______
a. period
b. comma
c. semi colon
d. None of the above
ANSWER  a. period

Q34. Sneha created a file in Notepad and saved the file by name “hello” so the
complete name of file will be _____________
a. hello.doc
b. hello.docx
c. hello.txt
d. hello.jpg
ANSWER  c. hello.txt

Q35. The extension of image file is _____________


a. .xls
b. .jpg
c. .doc
d. .docx
ANSWER  b. .jpg

Q36. A __________ is a location where a group of files can be stored.


a. folder
b. main file
c. super file
d. none of the above
ANSWER  a. folder
Q37. When a student, Neha, joins a class, the teacher creates a file on the
computer to store Neha’s information, such as name, address, phone number.
In which of the following application, we can store such information?
a. Notepad
b. Wordpad
c. MS Word
d. All of the above
ANSWER  d. All of the above

Q38. Which of the following is a text editor?


a. MS Excel
b. MS Paint
c. Notepad
d. All of the above
ANSWER  c. Notepad

Q39. Shortcut to save file is ________________


a. Ctrl + S
b. Ctrl + F1
c. Alt + S
d. None of the above
ANSWER  a. Ctrl + S

Q40. We need to protect our computer from ____________


a. Air
b. Dust
c. Both of the above
d. None of the above
ANSWER  b. Dust

Q41. We should avoid _______ to protect our computer/laptop.


a. Eating near computer
b. Keeping a glass of water near computer
c. Dropping laptop
d. All of the above
ANSWER  d. All of the above

Q42. The CPU has an ______________ to keep it cool.


a. internal fan
b. external fan
c. cooling pipe
d. None of the above
ANSWER  a. internal fan

Q43. Overcharge your mobile/laptop battery will _______ the battery life.


a. increase
b. decrease
c. no change
d. None of the above
ANSWER  b. decrease

Q44. Backing up data means to save the information present on your computer
on another device.(T/F)
a. True
b. False
ANSWER  a. True
Q45. ___________ is used to protect our computer from virus.
a. Worm
b. Anti Spyware
c. Anti virus
d. None of the above
ANSWER  c. Anti virus

Q46. __________ software, help us to clean up the unnecessary files.


a. Data Cleaner
b. Disk Cleaner
c. Cleaner
d. None of the above
ANSWER  b. Disk Cleaner

Q47. Unwanted mails are called ______________


a. A-SPAM
b. SPM
c. SPAM
d. N-SPAM
ANSWER  c. SPAM

Q48. What happens if you plugged in mobile/laptop even after 100% charge?
a. Device will break
b. Device will stop working
c. Device will over heat
d. None of the above
ANSWER  c. Device will over heat

Q49. Pressing ____________ key opens the Start menu.


a. Windows
b. Alt + Windows
c. Ctrl + Windows
d. None of the above
ANSWER  a. Windows

Q50. ________ key helps to move the cursor to the beginning of a new line.
a. Ctrl + Home
b. Ctrl + End
c. Enter
d. None of the above
ANSWER  c. Enter

Q60. Press ______ to select all files.


a. Ctrl + S
b. Ctrl + A
c. Ctrl + D
d. Ctrl + P
ANSWER  b. Ctrl + A

Q62. A _________ is a software program that attaches itself to other programs


and alters their behaviour.
a. Cookie
b. Computer virus
c. Firewall
d. None of the above
ANSWER  b. Computer virus

Q63. A computer virus can infect only ________


a. Hardware
b. Software
c. Both of the above
d. None of the above
ANSWER  b. Software

Q64. A computer can get infected with virus by


a. Infected files
b. Infected pen drives
c. Infected file attachment of e-mails
d. All of the above
ANSWER  d. All of the above

Q66. Common signs of a virus attack is/are :


a. Computer runs very slow
b. There is change in the file size
c. Computer restarts on its own
d. All of the above
ANSWER  d. All of the above

Q67. To prevent virus infection we should


a. Install and use anti-virus software.
b. not open e-mails of an unknown person/sender
c. not allow any untrustworthy person to use your system.
d. All of the above
ANSWER  d. All of the above

Q68. Which of the following is an Antivirus?


a. Norton AntiVirus
b. Quick Heal
c. McAfee VirusScan
d. All of the above
ANSWER  d. All of the above

Q71. Regular care and maintenance of computer is required


a. to detect any issues at an early stage
b. so that system works efficiently
c. to avoid a condition of System Failure
d. All of the above
ANSWER  d. All of the above

Q72. Regular maintenance of the system includes


a. installing updates of the software
b. check the security of the system
c. taking backups of important files and documents
d. All of the above
ANSWER  d. All of the above

Q73. Precaution to be taken while cleaning the computer components are :


a. Power Off the computer before cleaning
b. Never spray cleaning fluid directly on the component of the computer.
c. Both of the above
d. None of the above
ANSWER  c. Both of the above

Q74. We should never spray any liquid cleaner directly on


a. Keyboard
b. Monitor
c. Mouse
d. All of the above
ANSWER  d. All of the above

Q75. Disk defragmentation help to


a. remove the virus from the system
b. use the disc space at an optimal level.
c. Both of the above
d. None of the above
ANSWER  b. use the disc space at an optimal level.

Q76. System Performance can be increased by


a. increasing RAM
b. disk defragmentation
c. Both of the above
d. None of the above
ANSWER  c. Both of the above
Q77. __________parts of the computer system should be cleaned so that it
can work properly.
a. Internal
b. External
c. Both internal and external
d. None of the above
ANSWER  c. Both internal and external

Q78. ________________ operating system is an example of an interactive


operating system.
a. Windows
b. DOS
c. Linux
d. None of the above
ANSWER  a. Windows

Q81. Examples of Mobile operating Systems is :


a. Android
b. Symbian
c. iOS
d. All of the above
ANSWER  d. All of the above

Q82. The first screen that appears on monitor after loading OS is


called ________________
a. Icons
b. Desktop
c. Wall paper
d. None of the above
ANSWER  b. Desktop

Q83. Everything we store in computer is stored in the form of a __________


a. Folder
b. Sub folder
c. File
d. None of the above
ANSWER  c. File

Q84. Deleted files and folders are stored in _______________


a. Recycle bin
b. My Computer
c. Control Panel
d. None of the above
ANSWER  a. Recycle bin

You might also like