You are on page 1of 2

Q1.

When you bring the mouse over a file in File Explorer, it will show the
details of that file. This is known as (a) Drag and drop (b) Double click (c)
Hover (d) Single click
(c) Hover
Q2.What is the term used when you quickly click the left mouse button
twice? (a) Hover (b) Drag and drop (c) Double clicking (d) Moving
(c) Double clicking
Q3.Here are the steps that take place when starting a computer. Rearrange
the steps in the correct order.
i) Desktop appears after login
ii) Login screen appears
iii) Power on Self-Test (POST) starts
iv) Operating system starts
v) Welcome screen appears
a) i) -> ii) -> iii) -> iv) -> v)
b) ii) -> iv) -> iii) -> v) -> i)
c) iii) -> iv) -> v) -> ii) -> i)
d) iii) -> v) -> iv) -> ii) -> i)
Ans: c
Q4Which one of the following is an example of Operating System?
a) Microsoft Word b) Microsoft Windows c) Microsoft Excel d)
Microsoft Access
Q5.A ______________is a software program that attaches itself to other
programs and alters their behavior.
a) Operating system
b) Firewall
c) Antivirus
d) Computer Virus
Q6.“The Trojan Horse was a wooden horse said to have been used by the
Greeks during the Trojan War to enter the city of Troy and win the war”.
What does Trojan horse mean in computer terminology?
ANS: A Trojan Horse is a type of malware which disguises itself i.e., it
appears to be a useful software program but once it reaches a computer it
starts behaving like a virus and destroys data.
Q7.Enlist any two methods to protect our data on the computer.
ANS: Two methods to protect our data on the computer:
1. Use passwords to login to your computer.
2. Install Anti-virus and Firewall
3. Encrypt Data
4. Secure sites
Q8.What are antivirus? Name any 2 antiviruses.
Ans:  Antivirus software is a program designed to detect and remove
malicious programs from the computer.
 Examples:
Microsoft Security essentials, Microsoft Defender, McAfee Virus Scan,
Norton AntiVirus, Quick Heal.

You might also like