ICT
Question 1 |
A researcher intends to make use of ICT in his/her research. What considerations should weight most in such a decision?
-
(a) Appropriateness of the tool used
(b) Cost involved in procuring it
(c) Availability of tools in the department where research is to be undertaken
(d) Willingness of his/her supervisor to offer help
(e) The company from which the ICT equipment has been procured
Choose your answer from the following options:
A | (a), (b) and (c) |
B | (c), (d) and (e) |
C | (a), (c) and (d) |
D | (b), (c) and (e)
|
Question 2 |
Which one of the following tasks is associated with changing appearance of a document in word processing?
A | Editing |
B | Formatting
|
C | Writing |
D | Printing
|
Question 3 |
PCI stands for
A | Partial Component Interconnect |
B | Partial Component Interaction |
C | Peripheral Component Interconnect |
D | Peripheral Component Interaction |
Question 4 |
____________ is a wireless technology built in electronic gadgets for transferring data over short distance
A | WiFi |
B | Bluetooth |
C | Modem |
D | USB |
Question 5 |
The term one gigabyte refers to:
A | 1024 petabytes |
B | 1024 megabytes |
C | 1024 kilobytes |
D | 1024 bytes |
Question 6 |
Database WOS stands for
A | Web of Science |
B | Web of Sources
|
C | World of Science |
D | Web of Service |
Question 7 |
The most dominant source of Benzene emissions in ambient air is
A | Cement industry |
B | Cigarettes |
C | Car exhaust |
D | Paints and varnish |
Question 8 |
Which tool is used to create online bulletin board where you can display information in the form of pictures, texts, videos etc.?
A | Quizzizz |
B | Padlet |
C | Screen Castify |
D | Windows |
Question 9 |
Which of the following are example of Asynchronous communication?
A. Blog
B. Podcast
C. Electronic Mail
D. Discussion Forum
E. Phone calls
Choose the most appropriate answer from the options given below:
A. Blog
B. Podcast
C. Electronic Mail
D. Discussion Forum
E. Phone calls
Choose the most appropriate answer from the options given below:
A | B and E only |
B | C, D and E only |
C | A, C and D only |
D | A, B, C and D only |
Question 10 |
The hardware address of a computer network device consists of 48 bits. Which of the following is a valid address in hexadecimal numbers?
A | 00E0071944A0 |
B | 0A23B5 |
C | 1E07FG124372 |
D | 398A7E9412110408 |
Question 11 |
The computer uses a bootstrap. Which of the following shows the part of a computer of which the bootstrap is an example?
A | Application software |
B | Firmware |
C | Hard disk drive |
D | IP address |
Question 12 |
Given below are tow statements:
Statement I: One always uses CD-ROMs to save data
Statement II: A computer has 2048 MB of RAM. That means computer has 1.2 GB of RAM.
In the light of the above statements, choose the correct answer from the options given below:
Statement I: One always uses CD-ROMs to save data
Statement II: A computer has 2048 MB of RAM. That means computer has 1.2 GB of RAM.
In the light of the above statements, choose the correct answer from the options given below:
A | Both Statement I and Statement II are true. |
B | Both Statement I and Statement II are false. |
C | Statement I is true and Statement II is false. |
D | Statement I is false and Statement II is true. |
Question 13 |
Which file formats are used to store music files?
A.bmp
B.wav
C.mp3
D.htm
E.wma
Choose the correct answer from the options given below:
A.bmp
B.wav
C.mp3
D.htm
E.wma
Choose the correct answer from the options given below:
A | A, B and D only |
B | A, D and E only |
C | B, C and D only |
D | B, C and E only |
Question 14 |

Choose the correct answer from the options given below:
A | A-I, B-II, C-III, D-IV |
B | A-IV, B-II, C-III, D-I |
C | A-II, B-IV, C-I, D-III |
D | A-IV, B-III, C-II, D-I |
Question 15 |
A type of memory that holds the computer startup routine is
A | Cache |
B | RAM
|
C | DRAM |
D | ROM |
Question 15 Explanation:
The invention of read-only memory (ROM) of various types solved this paradox by allowing computers to be shipped with a startup program that could not be erased. Growth in the capacity of ROM has allowed ever more elaborate start up procedures to be implemented
Question 16 |
Match List I with List II:
List I List II
A) Input (I) Mouse
B) Output (II) Monitor
C) Memory (III) Cache
D) Software (IV) Python
Choose the correct answer from the options given below:
List I List II
A) Input (I) Mouse
B) Output (II) Monitor
C) Memory (III) Cache
D) Software (IV) Python
Choose the correct answer from the options given below:
A | (A)-(I), (B)-(II), (C)-(IV), (D)-(III)
|
B | (A)-(I), (B)-(III), (C)-(II), (D)-(IV)
|
C | (A)-(III), (B)-(II), (C)-(I), (D)-(IV)
|
D | (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
|
Question 16 Explanation:
Input device → Mouse
Output device → Monitor
Memory → Cache
Software → Python
Output device → Monitor
Memory → Cache
Software → Python
Question 17 |
The word blog is derived from the word
A | My log
|
B | We blog |
C | E blog |
D | Blogger |
Question 17 Explanation:
A blog (a truncation of “weblog”) is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page.
Question 18 |
Cloud computing has the following distinct characteristics:
A) The service is hosted on the internet.
B) It is made available by a service provider.
C) It computes and predicts rain when the weather is cloudy.
D) The service is fully managed by the provider.
Choose the correct answer from the options given below:
A) The service is hosted on the internet.
B) It is made available by a service provider.
C) It computes and predicts rain when the weather is cloudy.
D) The service is fully managed by the provider.
Choose the correct answer from the options given below:
A | (A), (B) only
|
B | (A), (B), (C) only
|
C | (A), (D) only |
D | (A), (B), (D) only
|
Question 19 |
A firewall is a software tool that protects
A) Server
B) Network
C) Fire
D) Individual Computer
Choose the correct answer from the options given below:
A) Server
B) Network
C) Fire
D) Individual Computer
Choose the correct answer from the options given below:
A | (A), (C) only |
B | (B), (C) only |
C | (A), (B), (C) only |
D | (A), (B), (D) only |
Question 19 Explanation:
A firewall is a software tool that protects Server, Network and Individual Computer.
Question 20 |
Which one of the following Telephonic Conferencing with a radio link is very popular throughout the world?
A | TPS |
B | Telepresence |
C | Video conference |
D | Video teletext |
Question 21 |
Which is not 24 hours news channel?
A | NDTV24x7 |
B | ZEE News |
C | Aajtak |
D | Lok Sabha channel |
Question 22 |
The main objective of F.M. station in radio is:
A | Information, Entertainment and Tourism |
B | Entertainment, Information and Interaction |
C | Tourism, Interaction and Entertainment |
D | Entertainment only |
Question 23 |
What do you need to put your web pages on the www?
A | a connection to internet |
B | a web browser |
C | a web server |
D | all of the above |
Question 24 |
Which was the first company to launch mobile phone services in India?
A | Essar |
B | BPL |
C | Hutchison |
D | Airtel |
Question 25 |
Chandrayan I was launched on 22nd October, 2008 in India from:
A | Bangalore |
B | Sri Harikota |
C | Chennai |
D | Ahmedabad |
Question 26 |
What is blog?
A | Online music |
B | Intranet |
C | A personal or corporate website in the form of an online journal |
D | A personal or corporate Google search |
Question 27 |
Which is not online Indian Matrimonial website?
A | www.jeevansathi.com |
B | www.bharatmatrimony.com |
C | www.shaadi.com |
D | www.u.k.singlemuslim.com |
Question 28 |
Read the following two statements:
I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).
II: The ‘right to use’ a piece of software is termed as copyright.
Which of the above statement(s) is/are CORRECT?
I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).
II: The ‘right to use’ a piece of software is termed as copyright.
Which of the above statement(s) is/are CORRECT?
A | Both I and II |
B | Neither I nor II |
C | II only |
D | I only |
Question 29 |
Which of the following correctly lists computer memory types from highest to lowest speed?
A | Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers |
B | CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM) |
C | CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage |
D | Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage |
Question 30 |
Which of the following statement(s) is/are TRUE?
S1: The decimal number 11 is larger than the hexadecimal number 11.
S2: In the binary number 1110.101, the fractional part has the decimal value as 0.625.
S1: The decimal number 11 is larger than the hexadecimal number 11.
S2: In the binary number 1110.101, the fractional part has the decimal value as 0.625.
A | SI only |
B | S2 only |
C | Both S1 and S2 |
D | Neither S1 nor S2 |
Question 31 |
With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called
A | Electronic mail |
B | Data sourcing |
C | Mail merge |
D | Spam mail |
Question 32 |
DVD technology uses an optical media to store the digital data. DVD is an acronym for
A | Digital Vector Disc |
B | Digital Volume Disc |
C | Digital Versatile Disc |
D | Digital Visualization Disc |
Question 33 |
Which of the following is a characteristic of Web2.0 applications?
A | Multiple users schedule their time to use Web2.0 applications one by one. |
B | Web2.0 applications are focused on the ability for people to collaborate and share information online. |
C | Web2.0 applications provide users with content rather than facilitating users to create it. |
D | Web2.0 applications use only static pages. |
Question 34 |
NMEICT stands for:
A | National Mission on Education through ICT |
B | National Mission on E-governance through ICT |
C | National Mission on E-commerce through ICT |
D | National Mission on E-learning through ICT |
Question 35 |
Which of the following is an instant messaging application?
(a) WhatsApp
(b) Google Talk
(c) Viber
(a) WhatsApp
(b) Google Talk
(c) Viber
A | (a) and (b) only |
B | (b) and (c) only |
C | (a) only |
D | (a), (b) and (c) |
Question 36 |
In a Computer a byte generally consists of:
A | 4 bits |
B | 8 bits |
C | 16 bits |
D | 10 bits |
Question 37 |
Which of the following is not an input device?
A | Microphone |
B | Keyboard |
C | Joystick |
D | Monitor |
Question 38 |
Which of the following is an open source software?
A | MS Word |
B | Windows |
C | Mozilla Firefox |
D | Acrobat Reader |
Question 39 |
Which of the following enables us to send the same letter to different persons in MS Word?
A | Mail join |
B | Mail copy |
C | Mail insert |
D | Mail merge |
Question 40 |
– is a type of memory circuitry that holds the computer’s start-up routine.
A | RIM (Read Initial Memory) |
B | RAM (Random Access Memory) |
C | ROM (Read Only Memory) |
D | Cache Memory |
Question 41 |
An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, number and control keys that the computer user selects on the keyboard. ASCII is an acronym for
A | American Standard Code for Information Interchange |
B | American Standard Code for Intelligent Information |
C | American Standard Code for Information Integrity |
D | American Standard Code for Isolated Information |
Question 42 |
An unsolicited e-mail message sent to many recipients at once is a________
A | Worm |
B | Virus |
C | Threat |
D | Spam |
Question 43 |
The statement “the study, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware” refers to
A | Information Technology (IT) |
B | Information and collaborative Technology (ICT) |
C | Information and data Technology (IDT) |
D | Artificial Intelligence (AI) |
Question 44 |
If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by
A | 110011 |
B | 110010 |
C | 110001 |
D | 110100 |
Question 45 |
The process of copying files to a CD-ROM is known as________
A | Burning |
B | Zipping |
C | Digitizing |
D | Ripping |
Question 46 |
Which of the following represents one billion characters?
A | Terabyte |
B | Kilobyte |
C | Megabyte |
D | Gigabyte |
Question 47 |
Which one of the following represents the binary equivalent of the decimal number 25?
A | 11011 |
B | 10101 |
C | 01101 |
D | 11001 |
Question 48 |
Encoding or scrambling data for transmission across a network is known as:
A | Decryption |
B | Protection |
C | Detection |
D | Encryption |
Question 49 |
Which is an instant messenger that is used for chatting?
A | Google Talk |
B | AltaVista |
C | MAC |
D | Microsoft Office |
Question 50 |
Which of the following is not an output device?
A | Keyboard |
B | Printer |
C | Speaker |
D | Monitor |
There are 50 questions to complete.
Access subject wise (1000+) question and answers by becoming as a solutions adda PRO SUBSCRIBER with Ad-Free content
Register Now
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!