ICT

Question 1
A firewall is a software tool that protects
A) Server
B) Network
C) Fire
D) Individual Computer
Choose the correct answer from the options given below:
A
(A), (C) only
B
(B), (C) only
C
(A), (B), (C) only
D
(A), (B), (D) only
Question 1 Explanation: 
A firewall is a software tool that protects Server, Network and Individual Computer.
Question 2
Cloud computing has the following distinct characteristics:
A) The service is hosted on the internet.
B) It is made available by a service provider.
C) It computes and predicts rain when the weather is cloudy.
D) The service is fully managed by the provider.
Choose the correct answer from the options given below:
A
(A), (B) only
B
(A), (B), (C) only
C
(A), (D) only
D
(A), (B), (D) only
Question 3
The word blog is derived from the word
A
My log
B
We blog
C
E blog
D
Blogger
Question 3 Explanation: 
A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page.
Question 4
Match List I with List II:
List I List II
A) Input (I) Mouse
B) Output (II) Monitor
C) Memory (III) Cache
D) Software (IV) Python
Choose the correct answer from the options given below:
A
(A)-(I), (B)-(II), (C)-(IV), (D)-(III)
B
(A)-(I), (B)-(III), (C)-(II), (D)-(IV)
C
(A)-(III), (B)-(II), (C)-(I), (D)-(IV)
D
(A)-(I), (B)-(II), (C)-(III), (D)-(IV)
Question 4 Explanation: 
Input device → Mouse
Output device → Monitor
Memory → Cache
Software → Python
Question 5
A type of memory that holds the computer startup routine is
A
Cache
B
RAM
C
DRAM
D
ROM
Question 5 Explanation: 
The invention of read-only memory (ROM) of various types solved this paradox by allowing computers to be shipped with a startup program that could not be erased. Growth in the capacity of ROM has allowed ever more elaborate start up procedures to be implemented
Question 6
Android is a mobile operating system developed by
A
IBM
B
Apple
C
Microsoft
D
Google
Question 7
Which of the following statements A - D are true with reference to high-level computer programming languages?
A. These need to be translated into machine code in order to run on a computer.
B. These are written using mnemonic codes-
C. These are specific to the computer's hardware.
D. These are portable languages.
Choose the correct answer from the options given below:
A
B and C only
B
A and B Only
C
A and D Only
D
C and D Only
Question 8
Which of the following is an independent malicious program that propagates itself across a network by exploiting security flaws in widely-used services?
A
Computer Worm
B
Computer Virus
C
Trojan Horse
D
Logic Bomb
Question 9
Match the LIST-I with LIST-II
LIST-I(Question) LIST-II(Answer)
A The speed of a CPU is measured in ____ I Inches
B Storage capacity of data is measured in ___ II Hertz
C Network bandwidth is measured in ____ III bits per second
D Size of a computer monitor is measured in ___ diagonally from corner to the opposite corner. IV Bytes
 
Choose the correct answer from the options given below:
A
A-I, B-III, C-IV, D-II
B
A-III, B-II, C-I, D-lV
C
A-IV, B-I, C-II, D-III
D
A-II, B-lV, C-III, D-l
Question 10
Match List-I with List-II
List-I      List-II
(Internet Term)      (Description)
A)Blogs      (I) Allows users to create and edit web pages using a browser
B)Podcasts      (II) A type of bookmarking where a user “marks” a webpage or photo using text to describe its contents
C)Tagging      (III) A series of digital media files
D)Wikis      (IV) Personal internet journals,br> Choose the correct answer from the options given below:
A
(A)-(I), (B)-(II) , (C)-(III),(D)-(IV)
B
(A)-(III), (B)-(IV) , (C)-(II),(D)-(I)
C
(A)-(IV), (B)-(III) , (C)-(II),(D)-(I)
D
(A)-(II), (B)-(III) , (C)-(IV),(D)-(I)
Question 11
Identify the correct order of the following major technological changes A-D in the development of computers based on the first to fourth generation of the computers :
A)Transistors
B)Microprocessor
C)Vacuum tubes
D)Integrated circuits
choose the correct answer from the options given below :
A
(A),(C),(D),(B)
B
(B),(A),(C),(D)
C
(D),(A),(C),(B)
D
(C),(A),(D),(B)
Question 12
If (L)M​ represents a number L in base-M number system, then what will be the value of (107)8 + (257)16?
A
(762)10
B
​(862)10​
C
(962)10​
D
(662)10
Question 13
To record voice narration for your Microsoft PowerPoint presentation, your computer must have :
A)Sound card
B)An internet connection
C)Speakers
D)An external video port
E)Microphone
Choose the correct answer from the options give below :
A
(A),(C) and (E) only
B
(B) and (D) only
C
(A) and (E) only
D
(B),(C) and (D) only
Question 14
In computer networking , an Ip version-6 is ____________times larger than an IP version-4 address.
A
2
B
4
C
6
D
8
Question 14 Explanation: 
The IPv4 is a 32-bit address, whereas IPv6 is a 128-bit hexadecimal address.
Question 15
The hardware address of a computer network device consists of 48 bits. Which of the following is a valid address in hexadecimal numbers?
A
00E0071944A0
B
0A23B5
C
1E07FG124372
D
398A7E9412110408
Question 16
The computer uses a bootstrap. Which of the following shows the part of a computer of which the bootstrap is an example?
A
Application software
B
Firmware
C
Hard disk drive
D
IP address
Question 17
Given below are tow statements:
Statement I: One always uses CD-ROMs to save data
Statement II: A computer has 2048 MB of RAM. That means computer has 1.2 GB of RAM.
In the light of the above statements, choose the correct answer from the options given below:
A
Both Statement I and Statement II are true.
B
Both Statement I and Statement II are false.
C
Statement I is true and Statement II is false.
D
Statement I is false and Statement II is true.
Question 18
Which file formats are used to store music files?
A.bmp
B.wav
C.mp3
D.htm
E.wma
Choose the correct answer from the options given below:
A
A, B and D only
B
A, D and E only
C
B, C and D only
D
B, C and E only
Question 19

Choose the correct answer from the options given below:
A
A-I, B-II, C-III, D-IV
B
A-IV, B-II, C-III, D-I
C
A-II, B-IV, C-I, D-III
D
A-IV, B-III, C-II, D-I
Question 20
Which tool is used to create online bulletin board where you can display information in the form of pictures, texts, videos etc.?
A
Quizzizz
B
Padlet
C
Screen Castify
D
Windows
Question 21
Which of the following are example of Asynchronous communication?
A. Blog
B. Podcast
C. Electronic Mail
D. Discussion Forum
E. Phone calls
Choose the most appropriate answer from the options given below:
A
B and E only
B
C, D and E only
C
A, C and D only
D
A, B, C and D only
Question 22
Which Indian Act makes it illegal to knowingly spread a computer virus
A
Data Protection and Security Act,1997
B
Information Security Act,1998
C
Information Technology Act,2000
D
Computer Misuse and Cyber Act,2009
Question 23
Which of the following three numbers (A-C) in decimal, octal and hexadecimal notations respectively, is/are equivalent to (11011001)2 in binary notation?
(A (217)10
(B) (661)8
(C) (D9)16
Choose the correct answer from the options given below :
A
A only
B
B only
C
A and B only
D
A and C only
Question 24
Consider the following worksheet:

Which of the following formula should be entered into the cell D1 so that when it is copied into the cells D2 and D3, it gives the correct values as shown in the range D1:D3?
A
B1*$C$1
B
$B$1*C1
C
B1*C1
D
$B$1*$C$1
Question 25
Given below are two statements:
Statement I: Cache memory is volatile memory and is much slower than Random Access Memory(RAM)
Statement II: CDs,DVDs and Magnetic Tapes are all optical media devices
In the light of the above statements. choose the correct answer from the options given below
A
Both Statement I and Statement II are true
B
Both Statement I and Statement II are false
C
Statement I is true but Statement II is false
D
Statement I is false but Statement II is true
Question 26
Which of the following statements are correct regarding CERT-IN?
A) CERT-IN is the national nodal agency for responding to computer security incidents as and when they occur
B) CERT-IN is operational since January 2014
C) forecast and alert of cyber security incidents is one of the functions of CERT-IN
Choose the correct answer from the options given below:
A
A,B,C
B
A and B only
C
A and C only
D
B and C only
Question 27
Given below are two statements : One is labelled as Assertion A and the other is labelled as   Reason R.      
Assertion (A) :   Discussion forums are one of the Four Quadrants for MOOC.         

Reasons (R) : Discussion forums are in-built feature Of learning management systems   
(LMS).  
In the light of the above statements, choose the most appropriate answer from the options 
given below
A
Both (A) and (R) are correct and (R) is the correct explanation of (A)
B
Both (A) and (R) are correct but (R) is NOT the correct explanation of (A)
C
(A) is correct but (R) is not correct (A)
D
(A) is not correct but (R) is correct (A)
Question 28
Line access and avoidance of collision are the main functions of :
A
the CPU
B
the monitor
C
network protocols
D
wide area networks
Question 28 Explanation: 
Subaltern:- of lower status.
→ which implies inequality
Question 29
In the hypermedia database, information bits are stored in the form of :
A
signals
B
cubes
C
nodes
D
symbols
Question 29 Explanation: 
The premises of a valid deductive argument provide conclusive evidence for its conclusion.
Question 30
Communications bandwidth that has the highest capacity and is used by microwave, cable and fibre optics lines is known as :
A
hyper-link
B
broadband
C
bus width
D
carrier wave
Question 31
An electronic bill board that has a short text or graphical advertising message is referred to as :
A
bulletin
B
strap
C
bridge line
D
banner
Question 32
Which of the following is not the characteristic of a computer ?
A
computer is an electrical machine
B
computer cannot think at its own
C
computer processes information error free
D
computer can hold data for any length of time
Question 33
Recording a television programme on a VCR is an example of :
A
time-shifting
B
content reference
C
mechanical clarity
D
media synchronisation
Question 34
The largest number of newspapers in India is published from the state of :
A
Kerala
B
Maharashtra
C
West Bengal
D
Uttar Pradesh
Question 35
Which of the following domains is used for – profit businesses?
A
. net
B
. edu
C
. com
D
. org
Question 36
The data storage hierarchy consists of:
A
Bits, bytes, fields, records, files and databases
B
Bits, bytes, records, fields, files and databases
C
Bits, bytes, fields, files, records and databases
D
Bytes, bits, fields, records, files and databases
Question 37
What is the full form of USB as used in computer related activities?
A
Universal Security Block
B
Universal Serial Bus
C
United Serial Bus
D
Ultra Security Block
Question 38
Which of the following represents billion characters?
A
Megabytes
B
Kilobytes
C
Gigabytes
D
Terabytes
Question 39
What is the name of a webpage address?
A
Directory
B
Protocol
C
URL
D
Domain
Question 40
Which of the following statement(s) regarding the term ICT is/are true?
P: A digital divide is an economic and social equality with regard to access to, use of, or impact of ICT.
Q: ICT helps in international development by bridging the digital divide and providing equitable access to technologies.
Choose the correct answer from the following:
A
P only
B
Q only
C
P and Q
D
Neither P nor Q
Question 41
A confidential file needs to be deleted from a workstation. Which is the most effective way to ensure this?
A
Rename the file
B
Compress the file and back-up to tape
C
Copy and paste the file into the recycle bin and empty the recycle bin
D
Drag the file into the recycle bin and empty the recycle bin
Question 42
Which of the following statement(s) is/are true with regard to websites?
P: A blog is a website that consists of posts in reverse chronological order.
Q: A wiki is a website that is designed to allow people to collaborate easily.
Choose the correct answer from the following:
A
P only
B
Q only
C
P and Q
D
Neither P nor Q
Question 43
In the context of e-mail, what is ‘spam’?
A
The act of overloading an e-mail server by using denial-of-service attacks
B
E-mail messages that are infected with viruses
C
A large quantity of messages that do not reach the recipient
D
Unsolicited advertising sent to a large number of recipients
Question 44
A virus type that is capable of shifting from one computer to another without user interaction is known as a
A
Worm
B
Trojan
C
Logic bomb
D
Boot sector
Question 45
Which of the following is a characteristic of Web2.0 applications?
A
Multiple users schedule their time to use Web2.0 applications one by one.
B
Web2.0 applications are focused on the ability for people to collaborate and share information online.
C
Web2.0 applications provide users with content rather than facilitating users to create it.
D
Web2.0 applications use only static pages.
Question 46
DVD technology uses an optical media to store the digital data. DVD is an acronym for
A
Digital Vector Disc
B
Digital Volume Disc
C
Digital Versatile Disc
D
Digital Visualization Disc
Question 47
Which of the following correctly lists computer memory types from highest to lowest speed?
A
Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers
B
CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)
C
CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage
D
Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage
Question 48
Which of the following statement(s) is/are TRUE?
S1: The decimal number 11 is larger than the hexadecimal number 11.
S2: In the binary number 1110.101, the fractional part has the decimal value as 0.625.
A
SI only
B
S2 only
C
Both S1 and S2
D
Neither S1 nor S2
Question 49
With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called
A
Electronic mail
B
Data sourcing
C
Mail merge
D
Spam mail
Question 50
Read the following two statements:
I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).
II: The 'right to use' a piece of software is termed as copyright.
Which of the above statement(s) is/are CORRECT?
A
Both I and II
B
Neither I nor II
C
II only
D
I only
There are 50 questions to complete.

Access subject wise (1000+) question and answers by becoming as a solutions adda PRO SUBSCRIBER with Ad-Free content

Register Now