ICT MCQ set 365

By | December 21, 2018

Information and Communicating Technology (ICT) MCQ QUESTION ANSWERS

Question 1
Which is not he function of Operating System..........
A
Virus Protection
B
Disk Management
C
None of These
D
All the above
Question 2
Data communications involving telegraph lines uses
A
simplex lines
B
wideband channels
C
narrowband channels
D
dialed service
Question 3
To verify that the note text is positioned correctly on the page, switch to.......... view or display the document in print preview.
A
normal
B
print layout
C
page layout
D
page edit
Question 4
Which method is used to connect a remote computer?
A
Device
B
Dialup
C
Diagnostic
D
Logic circuit
Question 5
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A
Hacker-proof program
B
Firewall
C
Hacker-resistant server
D
Encryption safe wall
Question 6
Elaborate SMS
A
Short message services
B
Short medium service
C
Small message service
D
Small media service
Question 7
Which of the following is used to open the Run Dialog Box?
A
Windows Logo Key + F
B
Windows Logo Key + L
C
Windows Logo Key + R
D
Windows Logo Key + T
Question 8
The ALU of a central processing unit does the essential maths work for the computer. What does the control unit do?
A
Communicates its results
B
Activates the output device
C
Monitors the flow of information
D
Control the printer
Question 9
When you delete file, where it resides?
A
Briefcase
B
Recycle bin
C
CD
D
Desktop
Question 10
For selecting a company use.......... key
A
F1
B
F2
C
F6
D
F7
Question 11
A.......... hacker is a computer security specialist who breaks into protected systems and networks to test and assess their security.
A
Script Kiddie
B
Blue Hat
C
White Hat
D
None of these
Question 12
Which of the following files and folders does Recycle Bin store?
A
Hidden files and folders
B
Deleted files and folders
C
Files and folders in the floppy drive
D
None of these
Question 13
Transfer of materials from one godown to another godown, use
A
Manufacturing Journal
B
Stock Journal
C
Purchase Journal
D
Both A& B
Question 14
The Josephson tunneling device illustrates principles associated with the advanced storage technique:
A
cryogenics
B
CCD
C
EBAM
D
holographing
Question 15
A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify the location of a data object. What is correct full form?
A
Graphical User Identifier
B
Globally Unique Identifier
C
Globally Unique Internet
D
None of these
Question 16
To save your computer from viruses you will do
A
Install antivirus software and run it
B
Make physical safe for the removal disk
C
Scan the removable disk before using it
D
All of the above
There are 16 questions to complete.

Leave a Reply

Your email address will not be published. Required fields are marked *