ICT Skills II
Multiple Choice Question
1. The official mascot of Linux operating system is ................................ .
  i. Tux-The Penguin                       ii. Camel                        iii. Shark                   iv. None of these
2. Which of the following is the latest version of Android OS?
  i. Pie             ii. Android 11                         iii. Lollipop                       iv. None of these
3. Which of the following is used to move the contents towards up-down or left-right of a page?
 i. Scroll Bar                 ii. Status Bar                         iii. Restore                     iv. None of these
4. Deleted files are stored in:
  i. Recycle Bin                   ii. Trash                    iii. Both (i) and (ii)                        iv. None of these
5. Which of the following refers to an unwanted and unsolicited message?
 i. Spam                ii. MBR                      iii. Boot Sector Virus                            iv. None of these
6. How can an antivirus protect your device?
  i. It can protect it from overheating.
  ii. It can increase its performance.
  iii. It can prevent data from getting corrupt.
 iv. It can backup data.
7. To open temp folder type ................................ in Run dialog box.
  i. temp%                  ii. %temp%                           iii. #temp#                         iv. None of these
8. A computer virus can infect only ................................ .
  i. Hardware                    ii. Software                       iii. Both I and ii                       iv. None of these
9. Which of the following is an Antivirus?
  i. Norton Antivirus                      ii. Quick Heal                iii. McAfee Virus Scan iv. All of the above
10. Which of the following statements is correct?
  i. Virus is a part of software.
  ii. Virus is an operating system.
  iii. Internet does not allow the virus to spread.
 iv. Virus improves the speed of processing information through computer.
11. Virus improves the speed of processing information through computer.
  i. Turn on                 ii. Hover                     iii. Right click                       iv. Drag and Drop
12. What is the term used when you press and hold the left mouse key and move the mouse around?
  i. Highlighting                    ii. Dragging                       iii. Selecting                     iv. Moving
13. Which of the following is a valid file extension for image file?
  i. jpg             ii. doc                    iii. text                       iv. txt
14. What happens if you leave a device plugged in even after it is charged 100%? [NCERT]
  i. It can break           ii. It can stop functioning.                          iii. It can over-heat.           iv. Data can get corrupt.
15. How can an anti-virus protect your device? [NCERT]
  i. It can protect it from over-heating.                                        ii. It can increase its performance.
  iii. It can prevent data from getting corrupt.                                     iv. It can backup data.
16. Which option is not required to keep a device cool? [NCERT]
  i. Keep the device unplugged when in use.
  ii. Do not cover a laptop with a blanket.
  iii. Make sure computer’s CPU fan is working.
  iv. Avoid leaving the device in the sun.
17. Which of the following is essential for maintaining keyboard? [NCERT]
  i. Turn the keyboard upside down and shake it to remove foreign material.
                                                                                                                                               1
   ii. Blow dust and other particles with help of a blower.
   iii. Use a very dilute combination of soap and water applied with a non-abrasive cloth to remove stains
   from the keycaps.
   iv. All of the above.
18. Which application provides basic the basic information about files, folder, and drives?
   i. Windows Developer                         ii. Windows Explorer
   iii. Windows Detective                        iv. Windows Finder
19. Which of the following option is used to recall a file from recycle Bin?
   i. Restore                   ii. Recall                   iii. Refresh                      iv. Renew
20. CUI refers to ................................ .
   i. Character User Interface                         ii. Common User Interface
   iii. Clever User Interface                         iv. Create User Interface
21. What does C stand for in ICT?
   i. Communication                      ii. Computer                            iii. Concept                   iv. Command
22. Which of the following is not possible through ICT?
   i. Online Examination                 ii. Virtual Class                     iii. Video Conference                 iv. None of these
23. Which of the following is an ICT tool?
   i. Tablet                ii. Mobile Phone                            iii. Radio                 iv. All of these
24. Which of the following is a mobile app store?
   i. Play Store                  ii. Cold Store                         iii. General Store                     iv. Shopping Store
25. Which part of the CPU performs mathematical calculations?
   i. CU               ii. ALU                   iii. MU                       iv. All of these
26. The D-shaped sub connector consisting of 15 pins in 3 rows is called …………………… .
   i. DE-153                  ii. DE-315                       iii. DE-15                     iv. None of these
27. Which of the following is an example of application software?
   i. Linux                ii. Compiler                        iii. iOS                  iv. OpenOffice Writer
28. Which of the following parts of an email is called domain name?
   i. After the @ sign                    ii. Before the @ sign
   iii. Both (i) and (ii)                 iv. None of these
29. Which of the following is an example of e-mail service provider?
  i. Gmail                 ii. Yahoo                     iii. Hotmail                        iv. All of these
30. Writing an e-mail is also called…………………… .
   i. Composing an e-mail                          ii. Typing an e-mail
   iii. Sending an e-mail                     iv. All of these
31. In which of the following folders, all the deleted e-mails stored?
   i. Trash                ii. Inbox                    iii. Sent                      iv. Draft
32. By default, all the …………………… E-mail appears in the inbox folder.
   i. received                  ii. deleted                       iii. junk/spam                      iv. none of these
33. Which of the following is the size limit for an e-mail attachment in Gmail?
   i. 20MB                  ii. 25MB                    iii. 50MB                        iv. There is no limit
34. Which of the following options is used to send a received e-mail to someone who was not one of the
original recipients?
   i. Reply                ii. Forward                        iii. Reply to all                        iv. Delete
35. Which of the following is essential for maintaining a keyboard?
   i. Turn the keyboard upside down and shake it to remove foreign material
   ii. Blow dust and other particles with the help of a blower.
   iii. Use a very dilute combination of soap and water applied with a non-abrasive cloth to remove stains
                                                                                                                                         2
    from the keycaps.
    iv. All of the above
36. What should you do to ensure secure online transactions?
    i. Lock your computer           ii. Give credit card or bank details only on safe websites
    iii. Use anti-virus           iv. Do not use pirated software
Fill in the blanks.
37. A ................................ operating system provides access to a single user at a time.
38. ....................... is the process of coordinating and controlling the use of memory in a computer system.
39. Physical part of computer is called ................................ .
40. ................................ act as an interface between the user and the computer.
41. BIOS stands for ................................ .
42. …………………… the computer and other peripherals attached to it keeps it in a good working condition.
43. …………………… is used to move the contents towards up-down or left-right of a page.
44. A/An ……… are remedial software that scan, detect, clean and remove virus from a computer system.
45. A …………… is a form of software that enables a hardware device to be compatible with the computer.
46. …………………… refers to an unwanted and unsolicited message which is received in the inbox of a person’s
email account or newsgroups.
47. ……….. is the process of loading operating system in the primary memory from the boot sector.
48. ………………………….. are junk files which become redundant once the task is completed.
49. A ………………………….. virus is a type of malware that infects the executable files of a program with the
intention of causing permanent damage or making the program useless.
50. We can rename a file by right-clicking on it and selecting the ………………………….. option.
51. ………………………. does housekeeping functions.
52. ………………………. is one of the oldest, text based, single user operating systems.
53. ................................ is a portable operating system.
54. ................................ is the latest version of Windows OS.
55. The arrangement of files in the form of folders is known as ................................ .
56. ................................ is the coding that constitutes the core of operating system.
57. Information Technology refers to the use of ................................ for storage, retrieval, processing and
distributing information of many kinds.
58. ........ is the area on the document window where a user works. One can type in text or insert graphics.
Short answer type questions.
59. How does operating system act as a messenger between hardware and application program?
60. What is Time Sharing OS?
61. List the names of any five operating systems.
62. List the name of five Linux distributions.
63. Here are the steps that take place when starting a computer. Rearrange the steps in the correct order.
  a) Welcome screen appears b) Login screen appears            c) Desktop appears after login
  d) Power on Self-Test (POST) starts         e). Operating system starts
64. What is Spyware?
65. How is a computer file system similar to our physical file system in a school? [NCERT]
66. Why does a computer need maintenance?
67. What is spam? How is it harmful?
68. How do you copy a file or folder using drag and drop method?
69. Why should regular disk defragmentation be done?
70. Can computer viruses infect hardware?
                                                                                                                      3
71. How are temporary files created on the computer?
72. What is a Disk Operating System?
Long answer type questions.
73. Write any four functions of OS.
74. Write short notes on: a) Open Source OS b) Operating System          c) Real-time OS    d) Device Driver
e) Taskbar f) Desktop
75. Define the basic components of interface screen.
76. Write the steps to create a new file.
77. What is Boot Sector Virus? Explain in detail.
78. Explain how Trojan Horse works. [NCERT]
79. List the various ways you can use to protect your data. [NCERT]
80. Explain the various ways of protecting a computer against virus. Also, name some of the popular
antivirus software.
81. Guess, who am I?
a) I am the Indian distribution of Linux.
b) I am an icon on the desktop of Windows operating system that represents the waste basket and stores
deleted files.
c) I am among the first known operating system that has been in use in mainframes, minicomputers and
microcomputers.
d) I am a type of operating system that supports simultaneous processing of more than one program.
e) I am a widely used graphical user interface operating system for personal computers & mobiles developed
by Microsoft.
f) I am a type of operating system that processes instruction and produces a response within a specified time.
g) I am a type of user interface which provides menus and buttons.
h) I am an extension of an Open Document Spreadsheet.
i) I am a type of operating system that provides access to a single user at a time.
82. Where is the taskbar located? What are its important components?
83. How will you prevent others from using your computer?
84. What do these abbreviations stand for:
   a) PnP b) PIM c) CDAC d) FSF e) CUI f) MBR g) GNU h) PDA i) BOSS j) GUI
85. Differentiate between CUI and GUI.
Application based/Competency based/Case based questions.
86. Vaibhav is playing a game on his computer and listening to his favourite songs at the background. At the
same time, his mother has asked him to check the mail. Which feature of an operating system has enabled
Vaibhav to do many tasks at the same time?
87. Harry has accidentally deleted some important files. He wants those files back. How can she retrieve
those files?
88. Aradya is making a presentation on her computer and listening to her favourite songs at the same time,
her boss has asked her to check the mail. Which feature of an operating system has enabled Aradya to do
many tasks at the same time on her computer?
89. Ashmita’s computer is not able to start as it cannot boot operating system from the hard disk. Help her
identify the type of program which may not be working properly.
90. Niharika wants to install free antivirus software to protect her system from virus attacks. But she does
                                                                                                                 4
not know any free antivirus. Suggest her any one good antivirus software that is available free to use. 91.
Ashmita is a DTP operator and works most of the time on her computer. Windows 10 is installed on her
computer system. She is not very organised and forgets things easily. Suggest a way using which she can
prepare a 'To do list' on her computer.