File Name: ict quiz questions and answers .zip
- Information Technology Quiz
- ICT & Computer Science 500 QUIZ Questions with Answer
- ICT & Computer Science 500 QUIZ Questions with Answer
For the class 10 students who will take the ICT exam, we are providing here the previous year question paper. Its very important for every student to review the question papers of previous years. Tags: Question 2. Which of the following is not an output device?
Information Technology Quiz
Please feel free to reach us in case you need more info or comment to highlight any issues with the above question set.
For sake of relevance, they are given in reverse order starting from the latest exam until the year Exam. There are instance were question were repeated and by changing sentence formation so keep attention to details. Select the true statement about an operating system OS? Which of the following is a type of malware intentionally inserted into a software system that will set off a malicious function when specified conditions are met?
For example, a programmer may hide a piece of code that starts deleting files such as a salary database trigger , should he or she ever be terminated from the company. P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile phone. Q: Bluetooth is a long-range wireless technology and is a low cost means of data transfer. Answer : P only; As Bluetooth is a protocol for wireless communication over short distances. It was developed in the s, to reduce the number of cables.
Devices such as mobile phones, laptops, PCs, printers, digital cameras and video game consoles can connect to each other, and exchange information. This is done using radio waves. It can be done securely. Bluetooth is only used for relatively short distances, like a few metres. Which of the following file format is not a video file format? AVI 2. MOV 3. MP4 4. Rest all others are Video file formate. SMTP is a set of communication guidelines that allow the software to transmit an electronic mail over the internet is called Simple Mail Transfer Protocol.
It is a program used for sending messages to other computer users based on e-mail addresses. A computer has a main memory of Kbytes. What is the exact number of bytes contained in this memory? The convenient place to store contact information for quick retrieval in e-mail is: 1 Address box 2 Message box 3 Address book 4 Message book.
Why would BCC: be used in an e-mail? Answer: Bcc stands for blind carbon copy which is similar to that of Cc except that the Email address of the recipients specified in this field do not appear in the received message header and the recipients in the To or Cc fields will not know that a copy sent to these address. Answer: A liquid-crystal display LCD is a flat-panel display or other electronically modulated optical devices that uses the light-modulating properties of liquid crystals.
Liquid crystals do not emit light directly, instead of using a backlight or reflector to produce images in color or monochrome. Which of the following is an example of proprietary system software?
Answer: Proprietary software is any software that is copyrighted and bears limits against use, distribution and modification that are imposed by its publisher, vendor or developer. With respect to computers, which one of the following best describes phishing? Answer : Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
Answer: A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables. Answer: Viruses. A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action such as destroying data.
Answer : The basic unit used in computer data storage is called a bit. Bit : A Bit is a value of either a 0 or 1. Which one of the following processes is the main task for the computer in mapping the geographical data? Which one of the following would not be considered as a form of secondary storage? Q : Converging technologies that exemplify ICT include the merging of audio-visual, telephone and computer networks through a common cabling system.
A new Laptop has been produced that weighs less, is smaller and uses less power than previous Laptop models. Which of the following technologies has been used to accomplish this?
To… ram test. Put the following units of storage into the correct order, starting with the smallest unit first and going down to the largest unit : a Kilobyte b Byte c Megabyte d Terabyte e Gigabyte f Bit Give your answer from the following code : 1 f , b , a , c , d , e 2 f , b , a , d , e , c 3 f , b , a , c , e , d 4 f , b , a , d , c , e Correct answer is 3 i.
Which of the following domains is used for — profit businesses? The data storage hierarchy consists of: 1 Bits, bytes, fields, records, files and databases 2 Bits, bytes, records, fields, files and databases 3 Bits, bytes, fields, files, records and databases 4 Bytes, bits, fields, records, files and databases Answer: 1. What is the full form of USB as used in computer-related activities? What is the name of a web page address? Which of the following represents billion characters?
Which of the following correctly lists computer memory types from highest to lowest speed? S1 : The decimal number 11 is larger than the hexadecimal number S2 : In the binary number With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called. Answer: 3 DVD technology uses an optical media to store the digital data.
DVD is an acronym for. If the binary equivalent of the decimal number 48 is , then the binary equivalent of the decimal number 51 is given by 1 2 3 4 Answer: 1. An unsolicited e-mail message sent to many recipients at once is a 1 Worm 2 Virus 3 Threat 4 Spam Answer: 4 5. An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys mat the computer user selects on the keyboard.
Which of the following is an instant messaging application? In a Computer a byte generally consists of : 1 4 bits 2 8 bits 3 16 bits 4 10 bits Answer: 2 Which of the following is not an input device? Which of the following is an open source software?
Which of the following enables us to send the same letter to different persons in MS Word 1 Mail join 2 Mail copy 3 Mail insert 4 Mail merge Answer: 4. Encoding or scrambling data for transmission across a network is known as : 1 Protection 2 Detection 3 Encryption 4 Decryption Answer: 3 Which of the following is not an output device? Which of the following represents one billion characters? Which of the following is not open source software? Which one of the following represents the binary equivalent of the decimal number 25?
Which is an instant messenger that is used for chatting? Symbols A-F are used in which one of the following? Which one of the following is not a search engine? Which one of the following is not. Which of the following is a social network? A amazon. A Compiler is software which converts A. Characters to bits.
B High level language to machine language. Virtual memory A an extremely large main memory. B an extremely large secondary memory. C an illusion of extremely large main memory D a type of memory used in super computers.
Answer: C. Which one of the following is correct? Which of the following is not a programming language? Which of the following operating system is used on mobile phones? If y x represents a number y in base x, then which of the following numbers is smallest of all? High level programming language can be converted to machine language using which of the following?
IPv4 and IPv6 are addresses used to identify computers on the internet. Find the correct statement out of the following : A Number of bits required for IPv4 address is more than number of bits required for IPv6 address. D Number of bits required for IPv4 address is The binary equivalent of —19 10 in signed magnitude system is A B C D None of these Which of the following is type of LAN?
Which of the following statements is true? A Smart cards do not require an operating system. B Smart cards and PCs use some operating system. C COS is smart card operating system. D The communication between reader and card is in full duplex mode. Answer: D
ICT & Computer Science 500 QUIZ Questions with Answer
Practice "Storage Devices and Technology" MCQs, information and communication technology quiz questions and answers for online courses. Learn information and communication technology, storage devices and technology, transmission of electric signal through wires test prep for online classes. Free physics study guide for online learning storage devices and technology quiz questions for free online courses. MCQ : In , a simple telephone model to send voice in the form of the electrical signal from one place to another was made by. MCQ : The memory which is used in the computer as temporary memory is. Grade 10 Physics.
Solved examples with detailed answer description, explanation are given and it would be easy to understand. Multiple choice and true or false type questions are also provided. Toggle navigation. ICT stands for :. Report Errors. Kindly mention the details of the error here
ICT & Computer Science 500 QUIZ Questions with Answer
Teachers Pay Teachers is an online marketplace where teachers buy and sell original educational materials. Are you getting the free resources, updates, and special offers we send out every week in our teacher newsletter? Grade Level. Resource Type.
Please feel free to reach us in case you need more info or comment to highlight any issues with the above question set. For sake of relevance, they are given in reverse order starting from the latest exam until the year Exam. There are instance were question were repeated and by changing sentence formation so keep attention to details.
Speak now. This concept covers any product that will retrieve, transmit, manipulate, receive or store digital electronic information, such as personal computers, tablets and smartphones. The term is also used in reference to the convergence of telephone and audio-visual networks with computer networks.
Post navigation. Please wait while the activity loads.
ict multiple choice questions and answers
In this post, you can reference some of the most common interview questions for a ict officer interview along with appropriate answer samples. If you need more job interview materials, you can reference them at the end of this post. Tell me about your ability to work under […]. ICT stands for Information Communication Technology, which covers all of the digital technology that exists to help individuals, organizations, businesses, etc. Top 10 ict officer interview questions and answers 1.
Если будет еще интереснее, чем этой ночью, я не смогу встать. Дэвид привлек ее к себе, не ощущая тяжести. Вчера он чуть не умер, а сегодня жив, здоров и полон сил. Сьюзан положила голову ему на грудь и слушала, как стучит его сердце. А ведь еще вчера она думала, что потеряла его навсегда.
Она попыталась собраться с мыслями, но они упрямо возвращали ее к. Дэвид Беккер. Единственный мужчина, которого она любила.
ТРАНСТЕКСТ вскрыл ключ, состоявший из шестидесяти четырех знаков, за десять с небольшим минут, в два миллиона раз быстрее, чем если бы для этого использовался второй по мощности компьютер АНБ. Тогда бы время, необходимое для дешифровки, составило двадцать лет. Производственное управление АНБ под руководством заместителя оперативного директора коммандера Тревора Дж. Стратмора торжествовало победу.
Сьюзан быстро проскочила мимо него и вышла из комнаты. Проходя вдоль стеклянной стены, она ощутила на себе сверлящий взгляд Хейла. Сьюзан пришлось сделать крюк, притворившись, что она направляется в туалет. Нельзя, чтобы Хейл что-то заподозрил. ГЛАВА 43 В свои сорок пять Чед Бринкерхофф отличался тем, что носил тщательно отутюженные костюмы, был всегда аккуратно причесан и прекрасно информирован.
Сьюзан просунула в щель ногу в туфле Феррагамо и усилила нажим. Дверь подалась. Стратмор сменил положение. Вцепившись в левую створку, он тянул ее на себя, Сьюзан толкала правую створку в противоположном направлении. Через некоторое время им с огромным трудом удалось расширить щель до одного фута.