ICT

Question 1

A researcher intends to make use of ICT in his/her research. What considerations should weight most in such a decision?

    (a) Appropriateness of the tool used
    (b) Cost involved in procuring it
    (c) Availability of tools in the department where research is to be undertaken
    (d) Willingness of his/her supervisor to offer help
    (e) The company from which the ICT equipment has been procured

    Choose your answer from the following options:

A
(a), (b) and (c)
B
(c), (d) and (e)
C
(a), (c) and (d)
D
(b), (c) and (e)
Question 2

Which one of the following tasks is associated with changing appearance of a document in word processing?

A
Editing
B
Formatting
C
Writing
D
Printing
Question 3

PCI stands for

A
Partial Component Interconnect
B
Partial Component Interaction
C
Peripheral Component Interconnect
D
Peripheral Component Interaction
Question 4

____________ is a wireless technology built in electronic gadgets for transferring data over short distance

A
WiFi
B
Bluetooth
C
Modem
D
USB
Question 5

The term one gigabyte refers to:

A
1024 petabytes
B
1024 megabytes
C
1024 kilobytes
D
1024 bytes
Question 6

Database WOS stands for

A
Web of Science
B
Web of Sources
C
World of Science
D
Web of Service
Question 7

The most dominant source of Benzene emissions in ambient air is

A
Cement industry
B
Cigarettes
C
Car exhaust
D
Paints and varnish
Question 8
Which tool is used to create online bulletin board where you can display information in the form of pictures, texts, videos etc.?
A
Quizzizz
B
Padlet
C
Screen Castify
D
Windows
Question 9
Which of the following are example of Asynchronous communication?
A. Blog
B. Podcast
C. Electronic Mail
D. Discussion Forum
E. Phone calls
Choose the most appropriate answer from the options given below:
A
B and E only
B
C, D and E only
C
A, C and D only
D
A, B, C and D only
Question 10
The hardware address of a computer network device consists of 48 bits. Which of the following is a valid address in hexadecimal numbers?
A
00E0071944A0
B
0A23B5
C
1E07FG124372
D
398A7E9412110408
Question 11
The computer uses a bootstrap. Which of the following shows the part of a computer of which the bootstrap is an example?
A
Application software
B
Firmware
C
Hard disk drive
D
IP address
Question 12
Given below are tow statements:
Statement I: One always uses CD-ROMs to save data
Statement II: A computer has 2048 MB of RAM. That means computer has 1.2 GB of RAM.
In the light of the above statements, choose the correct answer from the options given below:
A
Both Statement I and Statement II are true.
B
Both Statement I and Statement II are false.
C
Statement I is true and Statement II is false.
D
Statement I is false and Statement II is true.
Question 13
Which file formats are used to store music files?
A.bmp
B.wav
C.mp3
D.htm
E.wma
Choose the correct answer from the options given below:
A
A, B and D only
B
A, D and E only
C
B, C and D only
D
B, C and E only
Question 14

Choose the correct answer from the options given below:
A
A-I, B-II, C-III, D-IV
B
A-IV, B-II, C-III, D-I
C
A-II, B-IV, C-I, D-III
D
A-IV, B-III, C-II, D-I
Question 15
A type of memory that holds the computer startup routine is
A
Cache
B
RAM
C
DRAM
D
ROM
Question 15 Explanation: 
The invention of read-only memory (ROM) of various types solved this paradox by allowing computers to be shipped with a startup program that could not be erased. Growth in the capacity of ROM has allowed ever more elaborate start up procedures to be implemented
Question 16
Match List I with List II:
List I List II
A) Input (I) Mouse
B) Output (II) Monitor
C) Memory (III) Cache
D) Software (IV) Python
Choose the correct answer from the options given below:
A
(A)-(I), (B)-(II), (C)-(IV), (D)-(III)
B
(A)-(I), (B)-(III), (C)-(II), (D)-(IV)
C
(A)-(III), (B)-(II), (C)-(I), (D)-(IV)
D
(A)-(I), (B)-(II), (C)-(III), (D)-(IV)
Question 16 Explanation: 
Input device → Mouse
Output device → Monitor
Memory → Cache
Software → Python
Question 17
The word blog is derived from the word
A
My log
B
We blog
C
E blog
D
Blogger
Question 17 Explanation: 
A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page.
Question 18
Cloud computing has the following distinct characteristics:
A) The service is hosted on the internet.
B) It is made available by a service provider.
C) It computes and predicts rain when the weather is cloudy.
D) The service is fully managed by the provider.
Choose the correct answer from the options given below:
A
(A), (B) only
B
(A), (B), (C) only
C
(A), (D) only
D
(A), (B), (D) only
Question 19
A firewall is a software tool that protects
A) Server
B) Network
C) Fire
D) Individual Computer
Choose the correct answer from the options given below:
A
(A), (C) only
B
(B), (C) only
C
(A), (B), (C) only
D
(A), (B), (D) only
Question 19 Explanation: 
A firewall is a software tool that protects Server, Network and Individual Computer.
Question 20
Media that exist in an interconnected series of communication – points are referred to as
A
Networked media
B
Connective media
C
Nodal media
D
Multimedia
Question 21
An example of asynchronous medium is
A
Radio
B
Television
C
Film
D
Newspaper
Question 22
Which one of the following is not an Internet Service Provider (ISP)?
A
MTNL
B
BSNL
C
ERNET India
D
Infotech India Ltd.
Question 23
The hexadecimal number system consists of the symbols
A
0 – 7
B
0 – 9 , A – F
C
0 – 7, A – F
D
None of these
Question 24
The binary equivalent of (–15)10 is (2’s complement system is used)
A
11110001
B
11110000
C
10001111
D
None of these
Question 25
1 GB is equal to
A
230 bits
B
230 bytes
C
220 bits
D
220 bytes
Question 26
The set of computer programs that manage the hardware/software of a computer is called
A
Compiler system
B
Operation system
C
Operating system
D
None of these
Question 27
S/MIME in Internet technology stands for
A
Secure Multipurpose Internet Mail Extension
B
Secure Multimedia Internet Mail Extension
C
Simple Multipurpose Internet Mail Extension
D
Simple Multimedia Internet Mail Extension
Question 28
Which of the following statement(s) regarding the term ICT is/are true?
P: A digital divide is an economic and social equality with regard to access to, use of, or impact of ICT.
Q: ICT helps in international development by bridging the digital divide and providing equitable access to technologies.
Choose the correct answer from the following:
A
P only
B
Q only
C
P and Q
D
Neither P nor Q
Question 29
A confidential file needs to be deleted from a workstation. Which is the most effective way to ensure this?
A
Rename the file
B
Compress the file and back-up to tape
C
Copy and paste the file into the recycle bin and empty the recycle bin
D
Drag the file into the recycle bin and empty the recycle bin
Question 30
Which of the following statement(s) is/are true with regard to websites?
P: A blog is a website that consists of posts in reverse chronological order.
Q: A wiki is a website that is designed to allow people to collaborate easily.
Choose the correct answer from the following:
A
P only
B
Q only
C
P and Q
D
Neither P nor Q
Question 31
In the context of e-mail, what is ‘spam’?
A
The act of overloading an e-mail server by using denial-of-service attacks
B
E-mail messages that are infected with viruses
C
A large quantity of messages that do not reach the recipient
D
Unsolicited advertising sent to a large number of recipients
Question 32
A virus type that is capable of shifting from one computer to another without user interaction is known as a
A
Worm
B
Trojan
C
Logic bomb
D
Boot sector
Question 33
Read the following two statements:
I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).
II: The 'right to use' a piece of software is termed as copyright.
Which of the above statement(s) is/are CORRECT?
A
Both I and II
B
Neither I nor II
C
II only
D
I only
Question 34
Which of the following correctly lists computer memory types from highest to lowest speed?
A
Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers
B
CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)
C
CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage
D
Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage
Question 35
Which of the following statement(s) is/are TRUE?
S1: The decimal number 11 is larger than the hexadecimal number 11.
S2: In the binary number 1110.101, the fractional part has the decimal value as 0.625.
A
SI only
B
S2 only
C
Both S1 and S2
D
Neither S1 nor S2
Question 36
With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called
A
Electronic mail
B
Data sourcing
C
Mail merge
D
Spam mail
Question 37
DVD technology uses an optical media to store the digital data. DVD is an acronym for
A
Digital Vector Disc
B
Digital Volume Disc
C
Digital Versatile Disc
D
Digital Visualization Disc
Question 38
Which of the following is a characteristic of Web2.0 applications?
A
Multiple users schedule their time to use Web2.0 applications one by one.
B
Web2.0 applications are focused on the ability for people to collaborate and share information online.
C
Web2.0 applications provide users with content rather than facilitating users to create it.
D
Web2.0 applications use only static pages.
Question 39
NMEICT stands for:
A
National Mission on Education through ICT
B
National Mission on E-governance through ICT
C
National Mission on E-commerce through ICT
D
National Mission on E-learning through ICT
Question 40
Which of the following is an instant messaging application?
(a) WhatsApp
(b) Google Talk
(c) Viber
A
(a) and (b) only
B
(b) and (c) only
C
(a) only
D
(a), (b) and (c)
Question 41
In a Computer a byte generally consists of:
A
4 bits
B
8 bits
C
16 bits
D
10 bits
Question 42
Which of the following is not an input device?
A
Microphone
B
Keyboard
C
Joystick
D
Monitor
Question 43
Which of the following is an open source software?
A
MS Word
B
Windows
C
Mozilla Firefox
D
Acrobat Reader
Question 44
Which of the following enables us to send the same letter to different persons in MS Word?
A
Mail join
B
Mail copy
C
Mail insert
D
Mail merge
Question 45
– is a type of memory circuitry that holds the computer’s start-up routine.
A
RIM (Read Initial Memory)
B
RAM (Random Access Memory)
C
ROM (Read Only Memory)
D
Cache Memory
Question 46
An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, number and control keys that the computer user selects on the keyboard. ASCII is an acronym for
A
American Standard Code for Information Interchange
B
American Standard Code for Intelligent Information
C
American Standard Code for Information Integrity
D
American Standard Code for Isolated Information
Question 47
An unsolicited e-mail message sent to many recipients at once is a________
A
Worm
B
Virus
C
Threat
D
Spam
Question 48
The statement “the study, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware” refers to
A
Information Technology (IT)
B
Information and collaborative Technology (ICT)
C
Information and data Technology (IDT)
D
Artificial Intelligence (AI)
Question 49
If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by
A
110011
B
110010
C
110001
D
110100
Question 50
The process of copying files to a CD-ROM is known as________
A
Burning
B
Zipping
C
Digitizing
D
Ripping
There are 50 questions to complete.

Access subject wise (1000+) question and answers by becoming as a solutions adda PRO SUBSCRIBER with Ad-Free content

Register Now