Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

ICT Skills II - Holiday Homework Worksheet

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

ICT Skills II

Worksheet I

Multiple Choice Questions:

1) The virus which replicates themselves and spread all files once they attach on computer and very
difficult to remove them. This Virus is known as

a) Trojan Horse ( ) b) File Virus ( ) c) Worm ( ) d) Ransomware ( )

2) Bitlocker is an example of –

a) Firewall ( ) b) Backup and restore ( ) c) Encryption ( ) d) Ransomware ( )

3) Choose the strong password from the following : -

a) 12345 ( ) b) Aprfd@2021! ( ) c) hello 123 ( ) d) password ( )

4) Each file stored in the computer has :-

a) File name and Extension ( ) b) Data and Information ( )

c) Particular size and Location ( ) d) all of these ( )

5) The file name and extension are separated by

a) . (Period) ( ) b) , (Comma) ( ) c) __ (Underscore) ( ) d) ‘ (Single quote) ( )

6) The shortcut key to open run window :-

a)Ctrl + R ( ) b) Shift + R ( ) c)Alt + R ( ) d) Windows + R ( )

7) What is responsible for performing POST (Power On Self Test)?

a) the user ( ) b) Operating System ( ) c) Dekstop ( ) d) BIOS ( )


8) Identify the operating system of the following:

a) Google Chrome ( ) (b) Adobe Photoshop ( )

c) Microsoft Windows ( ) (d) Adobe Dreamweaver ( )

9 The function key is used to get help in most programs :-

a) F12 ( ) b) F2 ( ) c) F3 ( ) d) F1( )

10) ICT stands for

a) Information and Contact Technology ( ) b) Information and Connection Technology ( )

c) Information and Communication Technology ( )

d) Information Communication Terminology ( )

11) All the methods, tools, concepts related to storing, recording and sending digital information is
called _____

a) ICT ( ) b) IT ( ) c) ITC ( ) d) ITS ( )

12) ICT helps everyone to :-

a) Stay connected with each other ( ) b) run the business smoothly ( )

c) share the knowledge on public domain ( ) d) all of the above ( )

13) recognise me: When the computer is started, I perform some basic processes/ functions to check all
the devices are running properly or not.

a) power on self test ( ) b) welcome screen ( ) . c) dekstop ( ) d) login screen ( )

14) Extension of notepad file is :-

a).doc ( ) b) .txt ( ) c .mp3 ( ) d) .text ( )

15) Extension of sound file is :-

a) .mp3 ( ) b) .mp4 ( ) c) .xlsx ( ) d) None ( )

16) There is it talent contest in your town. For participating in the audition, you have to send a
recording of a song. What would you connect to your computer to record your song?

a) keyboard ( ) b) microphone ( ) c) scanner ( ) d) headphone ( )

17) Which one of the following shortcut key is used to paste a file ?

a) Ctrl + C ( ) b) ctrl + p ( ) c) ctrl + v ( ) d) ctrl + x ( )


18) Which ki do you use to copy something ?

a) ctrl + c ( ) b) ctrl + p ( ) c) ctrl + v ( ) d) ctrl + x ( )

19) Which of the following functions is not perform using a mouse ?

a) turn on ( ) b) hover ( ) c) right click ( ) d) drag and drop ( )

20) What is the term used when you press and hold the left mouse key and move the mouse around ?

a) highlighting ( ) b) dragging ( ) c) selecting ( ) d) moving ( )

21) How can an antivirus protect your device ?

a) it can protect it from overheating ( ) b) it can increase its performance ( )

c) it can prevent data from getting corrupt ( ) d) it can backup data ( )

22) which option is not required to keep a device cool ?

a) is the device unplugged when in use ( ) b) do not cover a laptop with a blanket ( )

c) make sure computers CPU fan is working ( ) d) avoid leaving the device in the sun ( )

23) What should you do to ensure secured online transactions ?

a) lock your computer ( ) b) give credit card or bank details only on safe websites ( )

c) use antivirus ( ) d) do not use pirated software ( )

24) Which of the following trap small children into appropriate relations ?

a) online predators ( ) b) worms ( ) c) trojan horse ( ) d) anti-virus ( )

25) What should a strong password consist of ?

a) only letters ( ) b) name of a person ( ) c) number and special characters ( )

d) Letters, numbers and special characters ( )

26) The cleaning of software installed in the computer cannot be achieved by _____ .

a) disk cleanup ( ) b) cleaning CPU cabinet ( ) c) backup ( ) d) installing anti-virus software ( )

27) ______ acts as an interface between user and computer hardware.

a) operating system ( ) b) MS Excel ( ) c) hardware ( ) d) software ( )

28) GPS stands for : -


a) general packet service ( ) b) global pointer system ( ) c) global positioning system ( )

d) general positioning system ( )

29) ______ action with mouse is used to show the details of the file.

a) roll over or hover ( ) b) point and check ( ) c) drag and drop ( ) d) double click ( )

30) ____ is a navigation system that helps you to navigate, find directions and maps to specific locations.

a) cellular network ( ) b) GPRS ( ) c) GPS ( ) d) Wi-Fi ( )

31) All information institute in a computer is kept in ______.

a) extension ( ) b) files ( ) c) both a and b ( ) d) none ( )

32) ______ is a location whore a group of files can be stored.

a) Extension ( ) c) Files ( ) c) Folder ( ) d) None

33) ________ software helps us to clean up the unnecessary files and increase the computer
performance

a) Back up ( ) b) Disk Cleaner ( ) c) System Software ( ) d) All of these ( )

34) In GUI Operating System, GUI stands for______ .

a) Graphical User Interface ( ) b) Graphics User Identity ( )

c) Graphical User Serviced ( ) d) Graphical Unity Service ( )

35) System performance can be increased by.

a) Increasing RAM ( ) (b) Disk Defragmentation ( ) c) Both a & b ( ) d) None ( )

36) The extension of temporary files is

a) .bmp ( ) b) .exe ( ) c) .tmp ( ) d) .del (. )

37) What command will you write in the Open Text Box to open the Temp folder?

a) _temp_ ( ) b) %temp% ( ) c) .tepm ( ) d) @temp@ ( )

38) Which of the following a temporary file?

a) Project.docx ( ) b) Mathsite.tmp ( ) c) setup.exe ( ) d) temp.bmp ( )

39) How the can you select all the files in a folders using keyboard ?
a) Ctrl + s ( ) b) Ctrl + A ( ) c) Ctrl+E ( ) d) Ctrl + Z ( )

40 ) Deleted files or folders gets stored in _______ .

a) Trash ( ) b) Start button ( ) c) recycle bin ( ) d) Network ( )

41) Name the icon that provides access to all the drives, files and folders on a computer.

a) This PC or My Computer ( ) b) start button ( ) c) recycle bin ( ) d) network ( )

42) What is the name given to the screen that appears after windows operating system is loaded ?

a) desktop ( ) b) wallpaper ( ) c) screensaver ( ) d) none ( )

43) A _____ operating system runs on a set of computers that are interconnected by a network.

a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )

44) AA _____ operating system is used to control machinery, scientific instruments like robot, in
complex animations and computer control animated machines.

a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )

45) A _____ operating system enables multiple uses to work on a same computer at different times or
simultaneously.

a) multi user ( ) b) real time ( ) c) distinguished ( ) d) single user ( )

46) The backspace key is used to erase the characters typed on the ____ side of the cursor.

a) left ( ) b) right ( ) c) both a and b ( ) d) None ( )

47) _____ is a software or hardware device that monitors and controls incoming and outgoing traffic
based on user defined security rules.

a) anti-virus ( ) b) malware ( ) c) firewall ( ) d) spyware ( )

48) The delete ki is used to erase the characters typed on the ____ side of the cursor.

a) left ( ) b) right ( ) c) both a and b ( ) d) None ( )

49) Which of the following is an input device ?

a) printer ( ) b) speaker ( ) c) mouse mouse ( ) d) monitor ( )

50) BIOS stands for :-

a) basic input output system ( ) b) built input output system ( )

c) basic input output service ( ) d) build in input output service ( )


51) To protect our data from theft and viruses, which measures can be taken ?

a) use passwords to login to your computer ( )

b) install antivirus and firewall ( )

c) encrypt data ( ) d) visit secure sites having https protocol ( )

e) all of these ( )

52) A ____ distinguishes itself i.e. it appears to be a useful to Be a useful program but once it reaches a
computer it starts behaving like a virus and destroying data .

a) worm ( ) b) trojan horse ( ) c) virus ( ) d) None ( )

You might also like