0% found this document useful (0 votes)
34 views12 pages

ES.3 ICT MCQ

Uploaded by

jinan.nabeel162
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views12 pages

ES.3 ICT MCQ

Uploaded by

jinan.nabeel162
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

PODAR PEARL SCHOOL

(Under the supervision of the Ministry of Education and Higher Education, Qatar)

EMPLOYABILITY SKILLS - ICT SKILLS MCQs


Q1. Which of the following functions is not performed using a mouse?
A) Turn on
B) Hover
C) Right-click
D) Drag and Drop
Answer (A)
Q2. What is the term used when you press and hold the left mouse key and move the
mouse around?
A) Highlighting
B) Dragging
C) Selecting
D) Moving
Answer (B)

Q3. Which of the following is a valid file extension for Notepad file?
A) .jpg
B) .doc
C) .text (POST) starts
D) .txt
Answer (D)

Q4. Which one of the following shortcut keys is used to paste a file?
A) Ctrl + c
B) Ctrl + p
C) Ctrl + v
D) Ctrl + x
Answer (C)

Q5. What keys do you use to copy something?


A) Ctrl+x
B) Ctrl+c
C) Ctrl+z
D) Ctrl+y
Answer (B)

Q6. What happens if you leave a device plugged in even after it is charged 100%?
A) It can break.
B) It can stop functioning.
C) It can overheat.
D) Data can get corrupt.
Answer (C)

Page 1 of 12
Q7. How can an antivirus protect your device?
A) It can protect it from overheating.
B) It can increase its performance.
C) It can prevent data from getting corrupt.
D) It can backup data.
Answer (C)
Q8. Which option is not required to keep a device cool?
A) Keep the device unplugged when in use.
B) Do not cover a laptop with a blanket.
C) Make sure the computer's CPU fan is working.
D) Avoid leaving the device in the sun.
Answer (A)

Q9. Which of the following is essential for maintaining a keyboard?


A) Turn the keyboard upside down and shake it to remove foreign material.
B) Blow dust and other particles with help of a blower.
C) Use a very dilute combination of soap and water applied with a non-abrasive cloth to remove
stains from the keycaps.
D) Cover the keyboard whenever not in use
Answer (D)

Q10. What should you do to ensure secure online transactions?


A) Lock your computer
B) Give credit card or bank details only on safe websites
C) Use anti-virus
D) Do not use pirated software
Answer (B)

Q11. Which of the following trap small children into inappropriate relations?
A) Online predators
B) Worms
C) Trojan Horse
D) Anti-Virus
Answer (A)

Q12. What should a strong password consist of?


A) Only letters
B) Numbers and special characters
C) Name of a person
D) Letters, numbers and special characters
Answer (D)

Q13. Which key is used to delete a slide in presentation?


A) Backspace key
B) Delete key
C) Enter key
D) Space bar
Answer (B)

Q14. Shortcut key to open a find dialog box is


A) Ctrl+V
B) Ctrl+F
Page 2 of 12
C) Ctrl+H
D) Ctrl+Z
Answer (C)
Q15. The number of alignment present are possible in MS Word
A) 2
B) 4
C) 3
D) 5
Answer (B)
(left, right, justify and center)

Q16.The concept of ICT refers to ...........


A) storing digital information.
B) recording digital information.
C) sending digital information
D) All of the above
Answer (D)

Q17. Which of the following ways are used to record or store information?
A) handwritten on paper
B) written using a typewriter
C) typed in computer
D) All of the above
Answer (D)

Q18. Deleted files and folders are stored in


A) Recycle bin
B) My Computer
C) Control Panel
D) None of the above
Answer (A)

Q19. Which icon allows the user to access all drives, files, and folders on the computer.
A) Recycle Bin
B) Computer
C) Application
D) Start button
Answer (B)

Q20. The bar present at the bottom of the desktop is called


A) Status bar
B) Scroll bar
C) Taskbar
D) None of the above
Answer (C)

Q21. Generally, the start button is present on side of the Taskbar.


A) right
B) left
C) top
D) bottom
Page 3 of 12
Answer (B)
Q22. What are the small pictures on the desktop called?
A) Desktop
B) Symbols
C) Icons
D) Pictures
Answer (C)

Q23. The first screen that appears on monitor after loading OS is called

A) Icons
B) Desktop
C) Wallpaper
D) None of the above
Answer (B)

Q24. Software piracy refers to


A) Stealing software and distributing the unlicensed copies
B) Opensource software
C) Gain access to a website and perform illegal activity
D) Selling software online with a proper license key
Answer (A)

Q25. Which of the following is one of the security measures that monitor incoming and
outgoing data?
A) Firewall
B) Firewall
C) Device Manager
D) Google Chrome
Answer (A)

Q26. Choose the strong password out of the following:


A) 12345
B) Aprfd@2021!
C) hello123
D) password
Answer (B)

Q27. The virus replicates itself and spread all files once they attack the computer and
very difficult to remove them. This virus is known as...........
A) Trojan Horse
B) File Virus
C) WORM
D) Ransomware
Answer (C)

Q28. Rakesh received a call and was informed about the lottery for winning a huge
amount. This type of activity is considered as............
A) Trojan Horse
B) Online Predator
C) Internet Scams
D) Encryption
Page 4 of 12
Answer (C)

Q29. What type of care should be taken while transacting online?


A) Always lock your computer when you are going away
B) Give credit card and debit card or UPI information on secured sites
C) Save the passwords on the cloud
D) Use pirated software
Answer (B)

Q30. Which of the following trap small children into inappropriate relations?
A) Online predators
B) Worms
C) Trojan Horse
D) Anti-Virus
Answer (A)
Q31. Examples of Mobile operating Systems is :
A) Android
B) Symbian
C) iOS
D) All of the above
Answer (D) Note: Symbian is a discontinued Mobile OS

Q32. The full form of GUI is


A) Graphical User Interface
B) Graphical User Interaction
C) Graphical User Interactive
D) None of the above
Answer (A)

Q33. operating system is an example of an interactive operating system.


A) Windows
B) DOS
C) Linux
D) None of the above
Answer (A)

Q34. Which of the following is Microsoft Product?


A) DOS
B) Windows
C) Android
D) Linux
Answer (B)

Q35. DOS stands for


A) Disk Operating System
B) Dot Operating System
C) Disk Open System
D) Disk Operating Secure
Answer (A)

Page 5 of 12
Q36. Which part of the computer system should be cleaned so that it can work properly?
A) Internal
B) External
C) Both internal and external
D) None of the above
Answer (C)

Q37. Disk defragmentation help to


A) remove the virus from the system
B) use the disc space at an optimal level.
C) Both of the above
D) None of the above
Answer (B)

Q38. We should never spray any liquid cleaner directly on


A) Keyboard
B) Monitor
C) Mouse
D) All of the above
Answer (D)

Q39. Regular maintenance of the system includes


A) installing updates of the software
B) check the security of the system
C) taking backups of important files and documents
D) All of the above
Answer (D)

Q40. Characteristics of computer virus is :


A) it makes copies of itself
B) it makes the system slow.
C) it may get activated at a certain date and time.
D) All of the above
Answer (D)

Q41. How can an anti-virus protect your device?


A) It can protect it from over-heating.
B) It can increase its performance.
C) It can protect against the virus
D) It can backup data.
Answer (C)

Q42. Which of the following is an Antivirus?


A) Norton AntiVirus
B) Quick Heal
C) McAfee VirusScan
D) All of the above
Answer (D)

Q43. A computer virus cannot


A) infect files on CD or DVD, if they are closed for writing.

Page 6 of 12
B) infect computer hardware like, keyboard, mouse, etc.
C) Both of the above
D) None of the above
Answer (C)

Q44. A is a software program that attaches itself to other programs and alters
their behaviour.
A) Cookie
B) Computer virus
C) Firewall
D) None of the above
Answer (B)

Q45. Press to select all files.


A) Ctrl + S
B) Ctrl + A
C) Ctrl + D
D) Ctrl + P
Answer (B)

Q46. Identify which of the following is a temporary file?


A) flower.jpg
B) temporary.doc
C) temporary.docx
D) web.tmp
Answer (D)

Q47. are small files which are stored on a user’s computer when a user visit
a website on the internet.
A) Image
B) Cookies
C) Firewall
D) None of the above
Answer (B)

Q48. To open Temp folder type in Run dialog box.


A) temp%
B) %temp%
C) #temp#
D) None of the above
Answer (B)

Q49. key helps to move the cursor to the beginning of a new line.
A) Ctrl + Home
B) Ctrl + End
C) Enter
D) None of the above
Answer (C)

Q50. Pressing key opens the Start menu.


A) Windows

Page 7 of 12
B) Alt + Windows
C) Ctrl + Windows
D) None of the above
Answer (A)

Q51. The short cut key to open a new file in notepad is


A) ctrl + e
B) ctrl + n
C) ctrl + w
D) alt + n
Answer (B)

Q52. The function key is used to get help in most programs.


A) F12
B) F2
C) F3
D) F1
Answer (D)

Q53. On entering your username and password, I allow the opening of your computer for
you to work. Who am I?
A) Power On Self Test
B) Welcome Screen
C) Desktop
D) Login Screen
Answer (D)

Q54. Which of the following programs starts as soon as the computer gets turned on?
A) MS Office
B) Text Editor
C) Text Editor
D) Windows Explorer
Answer (C)

Q55. Which of the following is considered as ICT device?


A) Smart TV
B) FM radio
C) Tablet
D) Multimeter
Answer (C)

Q56. Shortcut to save file is


A) Ctrl + S
B) Ctrl + F1
C) Alt + S
D) None of the above
Answer (A)

Q57. A is a location where a group of files can be stored.


A) folder
B) main file

Page 8 of 12
C) super file
D) none of the above
Answer (A)

Q58. The extension of image file is


A) .xls
B) .jpg
C) .doc
D) .docx
Answer (B)

Q59. Electronic files in computer can be


A) Copied
B) Moved
C) Rename
D) All of the above
Answer (D)

Q60. We can a file by mouse by double click on file.


A) Close
B) Save
C) Open
D) Delete
Answer (C)

Q61. A is a device that you can use to move, select and open items on
your computer screen.
A) Mouse
B) Joystick
C) Scanner
D) None of the above
Answer (A)

Q62. Navigation keys are


A) Arrow Keys
B) Page Up
C) Page down
D) All of the above
Answer (D)

Q63. Keys labeled from F1 to F12 are keys


A) Input
B) System
C) Function
D) Help
Answer (C)

Q64. Which of the following is an output device?


A) Monitor
B) Speaker

Page 9 of 12
C) Printer
D) All of the above
Answer (D)

Q65. BIOS stands for


A) Basic Input/Output System
B) Base Input/Output System
C) Basic Input and Output Systematic
D) None of the above
Answer (A)

Q66. Arrange the steps that take place when starting a computer.
A) Desktop appears after login
B) Login screen appears
C) Power on Self Test (POST) starts
D) Operating System starts
E) Welcome screen appears
Answer CDEBA

Q67. Which option is not required to keep a device cool?


A) Keep the device unplugged when in use.
B) Do not cover a laptop with a blanket.
C) Make sure computer’s CPU fan is working.
D) Avoid leaving the device in the sun.
Answer B

Q68. Which of the following is essential for maintaining keyboard?


A) Turn the keyboard upside down and shake it to remove foreign material.
B) Blow dust and other particles with help of a blower.
C) Use a very dilute combination of soap and water applied with a non-abrasive cloth to
remove stains from the keycaps.
D) All of the above.
Answer B

Q69. Which of the following is an example of Operating System?


A) Microsoft Word
B) Microsoft Windows
C) Microsoft Excel
D) Microsoft Access
Answer B

Q70. A is a software program that attaches itself to other programs and


alters their behavior.
A) Operating system
B) Firewall
C) Antivirus
D) Computer Virus
Ans: D) Computer Virus

Q71. What is the term used when you quickly click the left mouse button twice?
(a) Hover (b) Drag and drop (c) Double clicking (d) Moving

Page 10 of 22
Ans: (c)

Q72. Ravi learnt that if a laptop gets overheated, the internal parts get damaged. What
happens if he leaves his device plugged in even after it is charged 100%?
(a) It can break (b) It can stop functioning (c) It can overheat (d) Data can get corrupt
Ans: (c)

Q73. When you bring the mouse over a file in File Explorer, it will show the details of that
file. This is known as
A) Drag and drop
B) Double click
C) Hover
D) Single click
Answer C

B. Fill in the blanks

Q1. ............. is an open-source free word processor.


Ans. Open Office Writer

Q2. ............. is the top margin of each page.


Ans. Header

Q3. ......... is the shortcut key to paste.


Ans. Ctrl+V

Q4. The basic program that is run by the computer as soon as it is switched on is called
.
Ans. BIOS (Basic Input Output System)

Q5. The physical parts of the computer that can be seen and touched are
Ans. Hardware

Q6. The software that serves as an interface between user and the computer is .
Ans. Operating System

Q7. Deleted objects can be recovered from the Recycle Bin. (True/False)
Ans. True

Q8. is a collection of information that is stored on a computer under a single


name. Eg: text document, image etc
Ans. File

Q9. is a container where files are stored.


Ans. Folder

Q10. A context sensitive ment that displays relevant commands and options is .
Ans. Shortcut menu

Page 11 of 12
Q11. To change the name of the folder, right click and select option from shortcut
menu.
Ans. Rename

Q12. Files and folders deleted by the user are stored in .


Ans. Recycle Bin

Q13. option allows the user to change the various settings in the computer.
Ans. Control Panel

Q14. option is used to permanently delete a file.


Ans. Shift + delete

Q15. The shortcut key to cut the data selected is .


Ans. Ctrl+ x

Q16. The shortcut key to paste the data copied is .


Ans. Ctrl+ v

Q17. An operating system that reacts to input within a specific period of time is .
Ans. Real Time

Q18. An operating system in which commands can be entered by clicking / double


clicking / right clicking a mouse is .
Ans. GUI - based

Q19. provides access to all active applications by maintaining a row of open


application title boxes.
Ans. Task Bar

Q20. is used to browse folders and files stored in the computer.


Ans. File Explorer

Q21. Neha is receiving mails from companies who are advertising a product or trying to
attract her to their websites. Such types of mails are called .
Ans. Spam Mail

Q22. The measure to protect a computer from threats and viruses is .


Ans. Anti Virus

Q23. Software should be regularly so that it works with maximum efficiency.


Ans. Updated

Q22. The measure to protect a computer from threats and viruses is .


Ans. Anti Virus

Page 2 of 12

You might also like