Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Basic ICT skills MCQ class 10

1. ICT stands for


o Information and Contact Technology
o Information and Connection Technology
o Information and Communication Technology
o Information and Call Technology
2. All the methods, tools, concepts related to storing, recording and sending digital
information is called _____________
o ICT
o IT
o ITC
o ITS
3. The information can be recorded or stored through
o handwritten on paper
o written using type writer
o soft copy on computer
o all of the above
4. When the information is stored or recorded on electronic devices, refers to
____________
o raw form
o digital form
o paper form
o paper back form
5. Which of the following is considered as ICT device?
o Smart TV
o FM radio
o Tablet
o Multi meter
6. ICT helps everyone to
o stay connected with each other
o run the business smoothly
o share the knowledge on public domain
o all of the above
7. Aryan is confused about hardware and software. Which of the following you suggest to
clear his confusion:
o Any device which tangible and can be touched is hardware and a program
that makes hardware function is software
o Any device that is very hard is hardware and any device that is very soft is
software
o A device used on a hard surface is hardware and a device used on a soft surface is
software
o A program is very hard to understand is hardware and a program is very easy to
understand is software
8. Which of the following is hardware?
Basic ICT skills MCQ class 10
o Opera
o Notepad
o Monitor
o Ccleaner
9. Which of the following is software?
o Printer
o Projector
o Hard Disk
o Ccleaner
10. Read the following statements:
o Statement A: The software and hardware both are required to work upon ICT
devices
o Statement B: All ICT devices are very small in size and can be carried anywhere
 Statement A is True but statement B is False
 Statement B is True but statement A is False
 Both are False
 Both are True
11. Which of the following programs starts as soon as computer gets turned on?
o MS Office
o Text Editor
o Operating System
o Windows Explorer
12. Which of the following in one of the mobile operating system?
o Linux
o Unix
o Mac OS
o iOS
13. Recognize me:When the computer is started, I perform some basic processes/functions to
check all the devices are running properly or not
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
14. Enter your username and password, I allow to open your computer to work upon
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
15. I am capable to store and display all icons available in PC
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
Basic ICT skills MCQ class 10
16. What is responsible for performing the POST (Power On Self Test)?
o The User
o Operating System
o Desktop
o BIOS
17. Identify the operating system out of the following:
o Google Chrome
o Adobe Photoshop
o Microsoft Windows
o Adobe Dreamweaver
18. Which of the following item is not present on desktop?
o Folder
o Disk drive
o Icon
o Taskbar
19. The login screen appears after
o POST
o Welcome Screen
o Windows Start Screen
o BIOS Screen
20. The ________ function key is used to get help in most programs.
o F12
o F2
o F3
o F1
21. Manisha pressed a key on keyboard that moved the cursor to the begining of a new line.
But she did not know which key has been presses by her. Identify the key pressed by her:
o Enter
o Shift
o Ctrl
o Windows
22. Rekha wants to move the cursor to the begining of the line to the left side. Select a key
which she should press:
o Left Arrow
o End
o Home
o Page Up
23. Which of the following statement is correct for delete and backspace key?
o Any key can be used to remove the text from center
o Delete erases characters from left side where as Backspace erases characters from
right side
o Delete erases characters from right side where as Backspace erases
characters from left side
Basic ICT skills MCQ class 10
o Anyone can overwrite the content selected by use
24. When the mouse is dragged on the file or icon it displays the information about the file.
This process is known as
o Left Click
o Right Click
o Mouse Hover
o Drag and Drop
25. Each file stored in the computer has
o Filename and Extension
o Data and Information
o Particular Size and Location
o All of these
26. The filename and extension are separated by
o . (Period)
o , (Comma)
o _ (Underscore)
o ‘ (Single Quote)
27. A _________ is location or container in which the files can be stored.
o Folder
o Recycle Bin
o Library
o Utility
28. The shortcut key to open run command is :
o ctrl + r
o shift + r
o ctrl + r
o windows + r
29. The shortcut key to copy the file or folder is
o ctrl + c
o window + c
o alt + c
o shift + c
30. The short cut key to open a new file in notepad is
o ctrl + e
o ctrl + n
o ctrl + w
o alt + n
31. Which command is used to reverse the previous work done by the user?
o Redo
o Undo
o Paste
o Cut
32. You should always protect your computer from
Basic ICT skills MCQ class 10
o dust and damage
o not to use more that 2 or 3 hours
o not install a software
o not to turn on in the morning or late night
33. To clean the keyboard, you can
o use ashing Powder and Water then wash it
o keep a soft brush to remove crumbs and dust particles
o use wet cloth and wipe on it
o use acid to clean it
34. How to remove the finger marks from the screen?
o wipe the screen with soft cloth
o use wet cloth and wipe it
o keep water and glass near to computer and wash it as and when needed
o use colin or harpik and spray it on the screen
35. Which of the following can be followed to keep the laptop cool?
o Keep snow around the laptop
o Use external Cooling fan
o Keep the laptop inside freezer
o Keep the room cool then start the laptop
36. Running to many programs at a time can cause
o computer can become slow and crush
o damage the hard disk
o geenrate lots of heat
o computer can work efficientely
37. Which of the following is one of the process for daily maintanance ?
o download email attachments in to the folders
o backup your data
o full system virus scan
o update operating system
38. How can an anti-virus protect your device?
o It can protect it from over-heating.
o It can increase its performance.
o It can protect against the virus
o It can backup data.
39. What happens if you leave a device plugged in even after it is charged 100%?
o It can break.
o It can stop functioning.
o It can over-heat.
o Data can get corrupt.
40. Which of the following trap small children into inappropriate relations?
o Online predators
o Worms
o Trojan Horse
Basic ICT skills MCQ class 10
o Anti-Virus
41. What type of care should be taken while transacting online?
o Always lock your computer when you are going away
o Give credit card and debit card or UPI information on secured sites
o Save the passwords on cloud
o Use pirated software
42. A hacker can try to misuse your data and information and perform illegeal activity. This
is considered as
o Physical Theft
o Identity theft
o Software Piracy
o Virus
43. Manoj received a call and informed about lottery for winning huge amount. This type of
activity is considered as
o Trojan Horse
o Online Predator
o Internet Scams
o Encryption
44. The virus which replicates themselves and spread all files once they attack on computer
and very difficult to remove them. This virus is known as
o Trojan Horse
o File Virus
o WORM
o Ransomware
45. A __________ is seems useful software but reacts like a virus and destroying data.
o Trojan Horse
o File Virus
o WORM
o Ransomware
46. Choose the strong password out of the following:
o 12345
o Aprfd@2021!
o hello123
o password
47. Which of the following is one of the security measures that monitor incoming and
outgoing data?
o Firewall
o Windows Login
o Device Manager
o Google Chrome
48. Bit locker is an example of
o Backup and restore
o Firewall
Basic ICT skills MCQ class 10
o Encryption
o Ransomware
49. The identity of secure websites are
o Indicates a lock in front of the URL and begins https:
o Asks to login using OTP
o Asks to login using email id and password
o Website requires biometics to login
50. Software piracy refers to
o Stealing software and distributing the unlicensed copies
o Opersource software
o Gain access of a website and perform illegal activity
o Selling software online with a proper license key

You might also like