0% found this document useful (0 votes)
21 views6 pages

Ict Skills Practice

The document contains a series of multiple-choice and short answer questions focused on Information and Communication Technology (ICT) skills. Key topics include the definition of ICT, the role of software and hardware, the importance of antivirus, and the advantages and disadvantages of ICT in education. It also addresses maintenance of computer systems, data protection, and various threats to computer security.

Uploaded by

joshimanoj8829
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views6 pages

Ict Skills Practice

The document contains a series of multiple-choice and short answer questions focused on Information and Communication Technology (ICT) skills. Key topics include the definition of ICT, the role of software and hardware, the importance of antivirus, and the advantages and disadvantages of ICT in education. It also addresses maintenance of computer systems, data protection, and various threats to computer security.

Uploaded by

joshimanoj8829
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

ICT SKILLS

Objectives and Basic Questions of ICT Skills


Q1. One of the most important contributions of ICT in the field of 1
education……….
a. Easy access to teaching
b. Easy access to books
c. Easy access to learning
d. Easy access to workload
Ans: c
Q2. Internet Explorer is a ……... 1
a. Internet
b. Web browser
c. Search Engine
d. Service Provide
Ans: b
Q3. ICT stands for: 1
a. Inter Connected Terminals
b. Intra Common Terminology
c. International Communication Technology
d. Information and Communication Technology
Ans: d
Q4. Physical part of computer is called . . . . . .. 1
a. Hardware
b. Software
c. Shareware
d. None of the above
Ans: a
Q5. Software that starts working as soon as we switch on a computer is 1
a. RAM
b. ROM
c. Operating System
d. None of the above
Ans: c
Q6. act as an interface between the user and the computer. 1
a. Operating System
b. MS Excel
c. Impress
d. Digital Documentation
Ans: a
Q7. Which of the following is a valid file extension for Notepad file? 1
a. .jpg b. .doc c. .text d. .txt
Ans: d
Q8. How can an antivirus protect your device? 1
a. It can protect it from overheating.
b. It can increase its performance.
c. It can prevent data from getting corrupt.
d. It can backup data.
Ans: d
Q9. Which of the following is essential for maintaining a keyboard? 1
a. Turn the keyboard upside down and shake it to remove foreign
material.
b. Blow dust and other particles with help of a blower.
c. Use a very dilute combination of soap and water applied with a
non-abrasive cloth to remove stains from the keycaps.
d. Cover the keyboard whenever not in use
Ans: c
Q10. When the information is stored or recorded on electronics device, refers to 1
a. Raw form
b. Digital form
c. Paper form
d. None of the above
Ans: b
Q11. Manisha pressed a key on keyboard that moved the cursor to the 1
beginning of a new line but she did not know which key has been presses
by her. Identify the key pressed by her:
a. Enter
b. Shift
c. Ctrl
d. Windows
Ans: a

Q12. Which of the following is not an advantage of cyber security? 1


a. Makes the system slower
b. Minimizes computer freezing and crashes
c. Gives privacy to users
d. Protects system against viruses
Ans: a
Q13. In which of the following, a person is constantly followed/chased by 1
another person or group of several peoples?
a. Phishing
b. Bulling
c. Stalking
d. Identity theft
Ans: c
Q14. is a type of software designed to help the user's computer detect 1
viruses and avoid them.
a. Malware
b. Adware
c. Antivirus
d. Both B and C
Ans: c
Q15. It is the set of programs that enables your computer's hardware devices 1
and application software to work together
a. Management
b. Processing
c. System Software
d. Utility software
Ans: c
Short Answer type Questions
Q16. What do you mean by ICT term?
Ans: ICT stands for Information and communication technology. It refers
to all the tools related to storing, recording and sending digital
information.
Q17. How can we increase the performance of a computer?
Ans: We can increase the performance of system by:
1. Using an updated Antivirus
2. Removing unnecessary files and data such as temporary files and
images.
Q18. Rama is eager to know about the use of ICT, especially the role of ICT in
education, so help her to know more about this term.
Ans: Information and Communication technology (ICT) play a significant
role in all aspects of modern Society.
● ICT enables use of innovative resources and renewal of learning
methods.
● It establishes a more active collaboration of students.
● Simultaneous acquisition of technical knowledge.
Q19. Ravi wants to know about the benefits and flaws of ICT, so help him by
writing the advantages and disadvantages of Information and
Communication technology.
Each digital device contains its advantages and disadvantages.
Advantages of ICT:
● Enhanced the modes of communication.
● Better teaching and learning methods
● Paperless technique
Disadvantage of ICT:
● Teacher requires experience to handle ICT
● Traditional books and handwritten methods at risk
● Risk of Cyber-attack and hacking
Q20. Aisha is searching some contents related to sports in search engine but
during searching help her about how to prevent her data while using the
internet?
Ans: To protect the data following measures should be take care:
● Use a strong password in your account.
● Install antivirus and firewall
● Keep the information in encrypted format
● Click only on secure websites during internet surfing.
Q21. How to maintain a computer system?
Ans: For maintenance of the system keep the following points in mind:
● Keep the devices clean such as keyboard, screen, CPU etc.
● Prepare a maintenance schedule such as daily or weekly.
Q22. List the various threats to a computer and its data.
Ans: The various threats to a computer and its data:
● Virus
● Phishing
● Online theft
● Cyber crime
● Hacking

Q23. Write the functions of the operating system


Ans: The following are the functions of operating system:
● It checks whether the device is functioning properly.
● It controls all the software resources.
● It manages computer memory.
● It allows you to create, copy and delete files.
Q24. Seema is using a laptop and trying to copy data from pen drive but she
does not know about how a system gets affected with virus so help her by
mentioning a few ways how the system gets infected with virus.
Ans: A computer can gets affected with virus in any following ways:
● Infected files
● Infected pen drives
● Infected CD ROM /DVD ROM
● Through infected files attached in emails
Q25. Define hardware and software in Computer systems.
Ans: Hardware refers to the physical and visible components of the system
such as a monitor, CPU, keyboard and mouse.
Software: Software refers to a set of instructions which enable the hardware
to perform a specific set of tasks. Software is a generic term used to refer
to applications, scripts and programs that run on a device.
Q26. Why is the CPU calling the “Brain of a computer”?
Ans: The CPU is called as Brain of the computer" because the Central
Processing Unit (CPU) is responsible for executing instructions and
performing calculations in a computer. It acts as the brain of the computer
by controlling and coordinating all the operations of the system, including
processing data, running programs, and managing hardware resources.
Without a CPU, a computer would not be able to function and perform
task.

Q27. Define antivirus and what is the use of antivirus.


Ans: Anti-virus software is a program that protects your email, files, and
downloads attached to software.
● It scans and detects potential threats such as viruses, malware, and
spyware, preventing them from infecting your system.
● It also provides real-time protection by constantly monitoring your
computer for any suspicious activity.
● By regularly updating its virus definitions, it can identify and
remove the latest threats

Q28. Rishi wants to categorize different types of devices so help him to list any
four input, output and storage devices which are used in day to day life.
Ans: Input Devices: Keyboard, Mouse, Scanner, Microphone
Output Devices: Monitor, printer, plotter, Speaker
Storage Devices: Hard Disk, CD/DVD, Pen Drive, Memory card
Q29. How to delete files and folders permanently from the recycle bin window?
Ans: 1. Double click on the Recycle bin
2. The Recycle bin window appears
3. Click empty the Recycle
Q30. Ravish wants to change his phone but he wants to transfer his old data
for later use so suggest him the term regarding this process.
Ans: The process through which Ravish can transfer his old data for later
use is known as data backup. Backing up data means to save the
information present on your computer on another device, such as
CD/DVD drives or hard disk.

You might also like