ICT MCQ set 409

By | December 21, 2018

Information and Communicating Technology (ICT) MCQ QUESTION ANSWERS

Question 1
The largest unit of storage is
A
Gigabyte
B
Petabyte
C
eXabyte
D
Zettabyte
Question 2
Most of the inexpensive personal computer does not have any disk or diskette drive. What is the name of such computes?
A
Home computers
B
Dedicated computer
C
General computer
D
Driveless computer
Question 3
Which of the following is used to reset highlighted text to the default font in MS Word?
A
Ctrl + Alt
B
Ctrl + Spacebar
C
Ctrl + F2
D
Ctrl + F6
Question 4
In Excel you can insert labels for
A
All the data markers on a chart
B
A data series
C
A selected data marker
D
All of the above
Question 5
A program that performs a useful task while simultaneously allowing destructive acts is a..........
A
Trojan horse.
B
Virus.
C
Macro virus.
D
None of these
Question 6
Key to represent relationship between tables is called..........
A
Secondary Key
B
Foreign Key
C
None of the Above
D
All the above
Question 7
A program component that allows structuring of a program in an unusual way is known as
A
Correlation
B
Coroutine
C
Diagonalization
D
Quene
Question 8
RAM stands for..........
A
Random Access Memory
B
Rewritable Access Memory
C
None of These
D
All the above
Question 9
CGI is the application of computer to create images in art, printed media, games, films etc. Expand CGI.
A
Computer-Generated Imagery
B
Computer-Gateway Imagery
C
Computer-Generated Interface
D
All the above
Question 10
The key feature of formatting text in MS-Word is..........
A
Style
B
Font
C
Column
D
None of these
Question 11
Cache and main memory will not be able to hold their contents when the power is off. They are..........
A
Dynamic
B
Non Volatile
C
Volatile
D
All the above
Question 12
The register which keeps track of the execution of a program and which contains the memory address of the instruction currently being executed is called.
A
index register
B
Memory address register
C
Program counter
D
Instruction register
Question 13
A type of malicious software that is activated each time your system boots up. This malicious software difficult to detect because they are activated before your system's Operating System has completely booted up is called..........
A
Rootkits
B
Pharming
C
All of these
D
None of these
Question 14
The silicon chips used for data processing are called
A
RAM chips
B
ROM chips
C
Micro processors
D
PROM chips
Question 15
The flow and timing to data to and from the microprocessor is regulated by
A
control pins
B
address pins
C
data pins
D
power pins
Question 16
In MS-Excel to protect a worksheet, you can choose Protection and the Protect Sheet from the.......... menu
A
Edit
B
Format
C
Tools
D
All the above
There are 16 questions to complete.

Leave a Reply

Your email address will not be published. Required fields are marked *