ICT
Question 1 |
A researcher intends to make use of ICT in his/her research. What considerations should weight most in such a decision?
-
(a) Appropriateness of the tool used
(b) Cost involved in procuring it
(c) Availability of tools in the department where research is to be undertaken
(d) Willingness of his/her supervisor to offer help
(e) The company from which the ICT equipment has been procured
Choose your answer from the following options:
A | (a), (b) and (c) |
B | (c), (d) and (e) |
C | (a), (c) and (d) |
D | (b), (c) and (e)
|
Question 2 |
Which one of the following tasks is associated with changing appearance of a document in word processing?
A | Editing |
B | Formatting
|
C | Writing |
D | Printing
|
Question 3 |
PCI stands for
A | Partial Component Interconnect |
B | Partial Component Interaction |
C | Peripheral Component Interconnect |
D | Peripheral Component Interaction |
Question 4 |
____________ is a wireless technology built in electronic gadgets for transferring data over short distance
A | WiFi |
B | Bluetooth |
C | Modem |
D | USB |
Question 5 |
The term one gigabyte refers to:
A | 1024 petabytes |
B | 1024 megabytes |
C | 1024 kilobytes |
D | 1024 bytes |
Question 6 |
Database WOS stands for
A | Web of Science |
B | Web of Sources
|
C | World of Science |
D | Web of Service |
Question 7 |
The most dominant source of Benzene emissions in ambient air is
A | Cement industry |
B | Cigarettes |
C | Car exhaust |
D | Paints and varnish |
Question 8 |
A type of memory that holds the computer startup routine is
A | Cache |
B | RAM
|
C | DRAM |
D | ROM |
Question 8 Explanation:
The invention of read-only memory (ROM) of various types solved this paradox by allowing computers to be shipped with a startup program that could not be erased. Growth in the capacity of ROM has allowed ever more elaborate start up procedures to be implemented
Question 9 |
Match List I with List II:
List I List II
A) Input (I) Mouse
B) Output (II) Monitor
C) Memory (III) Cache
D) Software (IV) Python
Choose the correct answer from the options given below:
List I List II
A) Input (I) Mouse
B) Output (II) Monitor
C) Memory (III) Cache
D) Software (IV) Python
Choose the correct answer from the options given below:
A | (A)-(I), (B)-(II), (C)-(IV), (D)-(III)
|
B | (A)-(I), (B)-(III), (C)-(II), (D)-(IV)
|
C | (A)-(III), (B)-(II), (C)-(I), (D)-(IV)
|
D | (A)-(I), (B)-(II), (C)-(III), (D)-(IV)
|
Question 9 Explanation:
Input device → Mouse
Output device → Monitor
Memory → Cache
Software → Python
Output device → Monitor
Memory → Cache
Software → Python
Question 10 |
The word blog is derived from the word
A | My log
|
B | We blog |
C | E blog |
D | Blogger |
Question 10 Explanation:
A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order, so that the most recent post appears first, at the top of the web page.
Question 11 |
Cloud computing has the following distinct characteristics:
A) The service is hosted on the internet.
B) It is made available by a service provider.
C) It computes and predicts rain when the weather is cloudy.
D) The service is fully managed by the provider.
Choose the correct answer from the options given below:
A) The service is hosted on the internet.
B) It is made available by a service provider.
C) It computes and predicts rain when the weather is cloudy.
D) The service is fully managed by the provider.
Choose the correct answer from the options given below:
A | (A), (B) only
|
B | (A), (B), (C) only
|
C | (A), (D) only |
D | (A), (B), (D) only
|
Question 12 |
A firewall is a software tool that protects
A) Server
B) Network
C) Fire
D) Individual Computer
Choose the correct answer from the options given below:
A) Server
B) Network
C) Fire
D) Individual Computer
Choose the correct answer from the options given below:
A | (A), (C) only |
B | (B), (C) only |
C | (A), (B), (C) only |
D | (A), (B), (D) only |
Question 12 Explanation:
A firewall is a software tool that protects Server, Network and Individual Computer.
Question 13 |
Which tool is used to create online bulletin board where you can display information in the form of pictures, texts, videos etc.?
A | Quizzizz |
B | Padlet |
C | Screen Castify |
D | Windows |
Question 14 |
Which of the following are example of Asynchronous communication?
A. Blog
B. Podcast
C. Electronic Mail
D. Discussion Forum
E. Phone calls
Choose the most appropriate answer from the options given below:
A. Blog
B. Podcast
C. Electronic Mail
D. Discussion Forum
E. Phone calls
Choose the most appropriate answer from the options given below:
A | B and E only |
B | C, D and E only |
C | A, C and D only |
D | A, B, C and D only |
Question 15 |
The hardware address of a computer network device consists of 48 bits. Which of the following is a valid address in hexadecimal numbers?
A | 00E0071944A0 |
B | 0A23B5 |
C | 1E07FG124372 |
D | 398A7E9412110408 |
Question 16 |
The computer uses a bootstrap. Which of the following shows the part of a computer of which the bootstrap is an example?
A | Application software |
B | Firmware |
C | Hard disk drive |
D | IP address |
Question 17 |
Given below are tow statements:
Statement I: One always uses CD-ROMs to save data
Statement II: A computer has 2048 MB of RAM. That means computer has 1.2 GB of RAM.
In the light of the above statements, choose the correct answer from the options given below:
Statement I: One always uses CD-ROMs to save data
Statement II: A computer has 2048 MB of RAM. That means computer has 1.2 GB of RAM.
In the light of the above statements, choose the correct answer from the options given below:
A | Both Statement I and Statement II are true. |
B | Both Statement I and Statement II are false. |
C | Statement I is true and Statement II is false. |
D | Statement I is false and Statement II is true. |
Question 18 |
Which file formats are used to store music files?
A.bmp
B.wav
C.mp3
D.htm
E.wma
Choose the correct answer from the options given below:
A.bmp
B.wav
C.mp3
D.htm
E.wma
Choose the correct answer from the options given below:
A | A, B and D only |
B | A, D and E only |
C | B, C and D only |
D | B, C and E only |
Question 19 |
Choose the correct answer from the options given below:
A | A-I, B-II, C-III, D-IV |
B | A-IV, B-II, C-III, D-I |
C | A-II, B-IV, C-I, D-III |
D | A-IV, B-III, C-II, D-I |
Question 20 |
Media that exist in an interconnected series of communication – points are referred to as
A | Networked media |
B | Connective media |
C | Nodal media |
D | Multimedia |
Question 21 |
An example of asynchronous medium is
A | Radio |
B | Television |
C | Film |
D | Newspaper |
Question 22 |
Which one of the following is not an Internet Service Provider (ISP)?
A | MTNL |
B | BSNL |
C | ERNET India |
D | Infotech India Ltd. |
Question 23 |
The hexadecimal number system consists of the symbols
A | 0 – 7 |
B | 0 – 9 , A – F |
C | 0 – 7, A – F |
D | None of these |
Question 24 |
The binary equivalent of (–15)10 is (2’s complement system is used)
A | 11110001 |
B | 11110000 |
C | 10001111 |
D | None of these |
Question 25 |
1 GB is equal to
A | 230 bits |
B | 230 bytes |
C | 220 bits |
D | 220 bytes |
Question 26 |
The set of computer programs that manage the hardware/software of a computer is called
A | Compiler system |
B | Operation system |
C | Operating system |
D | None of these |
Question 27 |
S/MIME in Internet technology stands for
A | Secure Multipurpose Internet Mail Extension |
B | Secure Multimedia Internet Mail Extension |
C | Simple Multipurpose Internet Mail Extension |
D | Simple Multimedia Internet Mail Extension |
Question 28 |
Which of the following statement(s) regarding the term ICT is/are true?
P: A digital divide is an economic and social equality with regard to access to, use of, or impact of ICT.
Q: ICT helps in international development by bridging the digital divide and providing equitable access to technologies.
Choose the correct answer from the following:
P: A digital divide is an economic and social equality with regard to access to, use of, or impact of ICT.
Q: ICT helps in international development by bridging the digital divide and providing equitable access to technologies.
Choose the correct answer from the following:
A | P only |
B | Q only |
C | P and Q |
D | Neither P nor Q |
Question 29 |
A confidential file needs to be deleted from a workstation. Which is the most effective way to ensure this?
A | Rename the file |
B | Compress the file and back-up to tape |
C | Copy and paste the file into the recycle bin and empty the recycle bin |
D | Drag the file into the recycle bin and empty the recycle bin |
Question 30 |
Which of the following statement(s) is/are true with regard to websites?
P: A blog is a website that consists of posts in reverse chronological order.
Q: A wiki is a website that is designed to allow people to collaborate easily.
Choose the correct answer from the following:
P: A blog is a website that consists of posts in reverse chronological order.
Q: A wiki is a website that is designed to allow people to collaborate easily.
Choose the correct answer from the following:
A | P only |
B | Q only |
C | P and Q |
D | Neither P nor Q |
Question 31 |
In the context of e-mail, what is ‘spam’?
A | The act of overloading an e-mail server by using denial-of-service attacks |
B | E-mail messages that are infected with viruses |
C | A large quantity of messages that do not reach the recipient |
D | Unsolicited advertising sent to a large number of recipients |
Question 32 |
A virus type that is capable of shifting from one computer to another without user interaction is known as a
A | Worm |
B | Trojan |
C | Logic bomb |
D | Boot sector |
Question 33 |
Read the following two statements:
I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).
II: The 'right to use' a piece of software is termed as copyright.
Which of the above statement(s) is/are CORRECT?
I: Information and Communication Technology (ICT) is considered a subset of Information Technology (IT).
II: The 'right to use' a piece of software is termed as copyright.
Which of the above statement(s) is/are CORRECT?
A | Both I and II |
B | Neither I nor II |
C | II only |
D | I only |
Question 34 |
Which of the following correctly lists computer memory types from highest to lowest speed?
A | Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers |
B | CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM) |
C | CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage |
D | Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage |
Question 35 |
Which of the following statement(s) is/are TRUE?
S1: The decimal number 11 is larger than the hexadecimal number 11.
S2: In the binary number 1110.101, the fractional part has the decimal value as 0.625.
S1: The decimal number 11 is larger than the hexadecimal number 11.
S2: In the binary number 1110.101, the fractional part has the decimal value as 0.625.
A | SI only |
B | S2 only |
C | Both S1 and S2 |
D | Neither S1 nor S2 |
Question 36 |
With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called
A | Electronic mail |
B | Data sourcing |
C | Mail merge |
D | Spam mail |
Question 37 |
DVD technology uses an optical media to store the digital data. DVD is an acronym for
A | Digital Vector Disc |
B | Digital Volume Disc |
C | Digital Versatile Disc |
D | Digital Visualization Disc |
Question 38 |
Which of the following is a characteristic of Web2.0 applications?
A | Multiple users schedule their time to use Web2.0 applications one by one. |
B | Web2.0 applications are focused on the ability for people to collaborate and share information online. |
C | Web2.0 applications provide users with content rather than facilitating users to create it. |
D | Web2.0 applications use only static pages. |
Question 39 |
NMEICT stands for:
A | National Mission on Education through ICT |
B | National Mission on E-governance through ICT |
C | National Mission on E-commerce through ICT |
D | National Mission on E-learning through ICT |
Question 40 |
Which of the following is an instant messaging application?
(a) WhatsApp
(b) Google Talk
(c) Viber
(a) WhatsApp
(b) Google Talk
(c) Viber
A | (a) and (b) only |
B | (b) and (c) only |
C | (a) only |
D | (a), (b) and (c) |
Question 41 |
In a Computer a byte generally consists of:
A | 4 bits |
B | 8 bits |
C | 16 bits |
D | 10 bits |
Question 42 |
Which of the following is not an input device?
A | Microphone |
B | Keyboard |
C | Joystick |
D | Monitor |
Question 43 |
Which of the following is an open source software?
A | MS Word |
B | Windows |
C | Mozilla Firefox |
D | Acrobat Reader |
Question 44 |
Which of the following enables us to send the same letter to different persons in MS Word?
A | Mail join |
B | Mail copy |
C | Mail insert |
D | Mail merge |
Question 45 |
– is a type of memory circuitry that holds the computer’s start-up routine.
A | RIM (Read Initial Memory) |
B | RAM (Random Access Memory) |
C | ROM (Read Only Memory) |
D | Cache Memory |
Question 46 |
An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, number and control keys that the computer user selects on the keyboard. ASCII is an acronym for
A | American Standard Code for Information Interchange |
B | American Standard Code for Intelligent Information |
C | American Standard Code for Information Integrity |
D | American Standard Code for Isolated Information |
Question 47 |
An unsolicited e-mail message sent to many recipients at once is a________
A | Worm |
B | Virus |
C | Threat |
D | Spam |
Question 48 |
The statement “the study, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware” refers to
A | Information Technology (IT) |
B | Information and collaborative Technology (ICT) |
C | Information and data Technology (IDT) |
D | Artificial Intelligence (AI) |
Question 49 |
If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent of the decimal number 51 is given by
A | 110011 |
B | 110010 |
C | 110001 |
D | 110100 |
Question 50 |
The process of copying files to a CD-ROM is known as________
A | Burning |
B | Zipping |
C | Digitizing |
D | Ripping |
Access subject wise (1000+) question and answers by becoming as a solutions adda PRO SUBSCRIBER with Ad-Free content
Register Now
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!