You are on page 1of 4

Information and Communication Technology Skills Class 10 MCQ b.

Android
Session 1: Basic Computer Operations c. Both a) and b)
1. ICT Stands for _____________. d. None of the above
a. Inform and Communicate technology
b. Information and Communication technology Show Answer
c. Inform and Communication technology 8. BIOS stands for ____________.
d. Information and Communicate technology a. Basic Input/Output System
b. Basic In/Out System
Show Answer c. Based on In/Out System
2. In a business, the best approach to keep records is ____________. d. None of the above
a. Handwritten on paper
b. Written using a typewriter Show Answer
c. Written using a Computer 9. Keyboard is an ___________ device.
d. None of the above a. Output device
b. Input device
Show Answer c. Outer device
3. ICT Skills help us to ________________, run our business and stay connected with our family and d. Inner device
friends.
a. Communicate Show Answer
b. Entertainment 10. __________ helps the computer to close all the applications, Operating system and turn off the
c. Both a) and b) computer.
d. None of the above a. Sleep
b. Shut down
Show Answer c. Hibernate
4. A computer system consists of two main parts __________ and _________. d. None of the above
a. Hardware
b. Software Show Answer
c. Antivirus 11. SHIFT, SPACEBAR, ALT, CAPS LOCK are ________ keys which perform special functions.
d. Both a) and b) a. Enter Key
b. Function Key
Show Answer c. Control Key
5. The physical parts that we can see and touch are called _________. d. Navigation Key
a. Hardware
b. Software Show Answer
c. Antivirus 12. __________ keys help to move the cursor to the beginning of a new line.
d. None of the above a. Enter Key
b. Return Key
Show Answer c. Both a) and b)
5. Mobile devices, such as __________ and ____________ are also computer systems with hardware d. None of the above
and software.
a. Mouse and Keyboard Show Answer
b. Smartphone and Tablets 13. ____________ keys known as punctuation keys.
c. Typewriter and Pen a. Colon
d. None of the above b. Semicolon
c. Question mark
Show Answer d. All of the above
6. The most important software in any computer is the _________________.
a. Operating System Show Answer
b. Antivirus 14. Example of navigation keys ___________.
c. Office Package a. Home
d. Photo Editing Software b. End
c. Page Up & Page Down
Show Answer d. All of the above
7. Mobile devices also have an operating system like ___________.
a. Apple iOS Show Answer
15. Example of command keys___________.
a. Insert Show Answer
b. Delete 22. Which of the following is a valid file extension for Notepad file?
c. Backspace a. .jpg
d. All of the above b. .doc
c. .text
Show Answer d. .txt
16. Which of the following does not require the use of a mouse?
a. Turn on Show Answer
b. Right click 23. What keys do you use to copy something?
c. Hover a. Ctrl+x
d. Drag and Drop b. Ctrl+c
c. Ctrl+z
Show Answer d. Ctrl+y
17. What is the term used when you press and hold the left mouse key and move the mouse around?
a. Highlighting Show Answer
b. Selecting Session 3: Computer Care and Maintenance
c. Dragging 24. What are the best options for caring for computer devices?
d. Moving a. Keeping a Device Clean
b. Prepare a Maintenance Schedule
Show Answer c. Do not overcharge your battery
18. The following are the stages involved in starting a computer. Rearrange the stages in the proper d. All of the above
sequence.
i. Desktop appears after login Show Answer
ii. Login screen appears 25. You can take backup in the following devices_________.
iii. Power on Self-Test (POST) starts a. CD/DVD
iv. Operating system starts b. Flash Drive
v. Welcome screen appears c. External Drive
d. All of the above
a. i), ii), iii), iv), v)
b. ii), i), v), iii), iv) Show Answer
c. iii), iv), v), ii), i) 26. To clean the computer from the virus we required __________.
d. iii), ii), i), iv), v) a. Antivirus
b. Office Package
Show Answer c. Photoshop
Session 2: Performing Basic File Operations d. Operating System
19. Extension of notepad file _________.
a. .txt Show Answer
b. .bmp 27. If we are using a computer for a long time we have to __________ unnecessary files and data from
c. .jpg the computer.
d. .psd a. Delete
b. Save
Show Answer c. Backup
20. Extension of image file _________. d. None of the above
a. .bmp
b. .jpg Show Answer
c. Both a) and b) 28. Sometimes we get mails from companies who are advertising a product or trying to attract you to their
d. None of the above website. Such mails are called ________.
a. Trash
Show Answer b. Inbox
21. Which one of the following shortcut keys is used to paste a file? c. Spam
a. Ctrl + c d. None of the above
b. Ctrl + p
c. Ctrl + v Show Answer
d. Ctrl + x 29. What happens if you keep a device plugged in after it has been fully charged?
a. It can break. d. None of the above
b. It can overheat.
c. It can stop functioning. Show Answer
d. Data can get corrupt. 37. When a hacker takes your personal information and assumes your identity, this is referred to
as____________ theft.
Show Answer a. Physical
30. What role does antivirus play in protecting your device? b. Identity
a. It can increase its performance. c. Software Piracy
b. It can protect it from overheating. d. None of the above
c. It can prevent data from getting corrupt.
d. It can backup data. Show Answer
38. _________ hits the computer, it acts like a virus, deleting data.
Show Answer a. Trojan House
31. Which option does not need to be enabled in order to keep a device cool? b. Online Predator
a. Make sure the computer’s CPU fan is working. c. Theft
b. Keep the device unplugged when in use. d. None of the above
c. Do not cover a laptop with a blanket.
d. Avoid leaving the device in the sun. Show Answer
39. __________ are persons who try to attract you into inappropriate relationships.
Show Answer a. Trojan House
32. Which of the following is required for keyboard maintenance? b. Online Predator
a. Use a very dilute combination of soap and water applied with a non-abrasive cloth to remove stains c. Theft
from the keycaps. d. None of the above
b. Turn the keyboard upside down and shake it to remove foreign material.
c. Blow dust and other particles with the help of a blower. Show Answer
d. All of the above. 40. Sometimes you may receive very attractive offers saying you have won a huge amount of money in a
lottery and that you can claim the prize by depositing a certain amount of money known as
Show Answer ___________.
Session 4: Computer Security and Privacy a. Trojan House
33. Computer security helps to protect computers from ___________. b. Online Predator
a. Security Break c. Theft
b. Protect from Threats d. Internet Scams
c. Protecting your data
d. All of the above Show Answer
41. To protect our data from theft and viruses we can take ___________ measures.
Show Answer a. Use passwords to login
34. What do you mean by Threats ___________. b. Install Anti – Virus and firewall
a. Theft c. Encrypt Data
b. Virus d. All of the above
c. Both a) and b)
d. None of the above Show Answer
42. Banks and companies usually keep their data in ___________ format.
Show Answer a. Encrypted
35. __________ are computer programmes that can corrupt data and software programmes, as well as b. Firewall
steal information from a computer. c. Using Password
a. Virus d. All of the above
b. Theft
c. Both a) and b) Show Answer
d. None of the above 43. If you want to create a secure password you have to use _________ in the password.
a. Small and Capital letter
Show Answer b. Numbers
36. If someone steals your desktop computer or laptop, it is referred to as _________ theft. c. Special Characters
a. Physical d. All of the above
b. Identity
c. Software Piracy Show Answer
44. We can check secure websites using __________.
a. http://
b. https://
c. Www
d. None of the above

Show Answer
45. What can you do to make sure your internet transactions are safe?
a. Lock your computer
b. Do not use pirated software
c. Give credit card or bank details only on safe websites
d. Use anti-virus

Show Answer
46. Which of the following is a trap for small children into unsuitable relationships?
a. Trojan Horse
b. Online predators
c. Worms
d. Anti-Virus

Show Answer
47. What should a strong password consist of?
a. Name of a person
b. Only letters
c. Letters, numbers and special characters
d. Numbers and special characters

You might also like