File Name: ict quiz questions and answers .zip
Pattern recognition is one of the key aspects of computing. Which figure comes next in the series above?
- ICT & Computer Science 500 QUIZ Questions with Answer
- Information Technology Quiz
- Search results
- ICT & Computer Science 500 QUIZ Questions with Answer
Solved examples with detailed answer description, explanation are given and it would be easy to understand. Multiple choice and true or false type questions are also provided. Toggle navigation. ICT stands for :. Report Errors.
ICT & Computer Science 500 QUIZ Questions with Answer
Please feel free to reach us in case you need more info or comment to highlight any issues with the above question set. For sake of relevance, they are given in reverse order starting from the latest exam until the year Exam. There are instance were question were repeated and by changing sentence formation so keep attention to details. Select the true statement about an operating system OS? Which of the following is a type of malware intentionally inserted into a software system that will set off a malicious function when specified conditions are met?
For example, a programmer may hide a piece of code that starts deleting files such as a salary database trigger , should he or she ever be terminated from the company. P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile phone. Q: Bluetooth is a long-range wireless technology and is a low cost means of data transfer. Answer : P only; As Bluetooth is a protocol for wireless communication over short distances.
It was developed in the s, to reduce the number of cables. Devices such as mobile phones, laptops, PCs, printers, digital cameras and video game consoles can connect to each other, and exchange information. This is done using radio waves. It can be done securely. Bluetooth is only used for relatively short distances, like a few metres. Which of the following file format is not a video file format?
AVI 2. MOV 3. MP4 4. Rest all others are Video file formate. SMTP is a set of communication guidelines that allow the software to transmit an electronic mail over the internet is called Simple Mail Transfer Protocol.
It is a program used for sending messages to other computer users based on e-mail addresses. A computer has a main memory of Kbytes. What is the exact number of bytes contained in this memory? The convenient place to store contact information for quick retrieval in e-mail is: 1 Address box 2 Message box 3 Address book 4 Message book.
Why would BCC: be used in an e-mail? Answer: Bcc stands for blind carbon copy which is similar to that of Cc except that the Email address of the recipients specified in this field do not appear in the received message header and the recipients in the To or Cc fields will not know that a copy sent to these address.
Answer: A liquid-crystal display LCD is a flat-panel display or other electronically modulated optical devices that uses the light-modulating properties of liquid crystals.
Liquid crystals do not emit light directly, instead of using a backlight or reflector to produce images in color or monochrome.
Which of the following is an example of proprietary system software? Answer: Proprietary software is any software that is copyrighted and bears limits against use, distribution and modification that are imposed by its publisher, vendor or developer.
With respect to computers, which one of the following best describes phishing? Answer : Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
Answer: A local area network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables. Answer: Viruses. A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action such as destroying data.
Answer : The basic unit used in computer data storage is called a bit. Bit : A Bit is a value of either a 0 or 1. Which one of the following processes is the main task for the computer in mapping the geographical data?
Which one of the following would not be considered as a form of secondary storage? Q : Converging technologies that exemplify ICT include the merging of audio-visual, telephone and computer networks through a common cabling system. A new Laptop has been produced that weighs less, is smaller and uses less power than previous Laptop models.
Which of the following technologies has been used to accomplish this? To… ram test. Put the following units of storage into the correct order, starting with the smallest unit first and going down to the largest unit : a Kilobyte b Byte c Megabyte d Terabyte e Gigabyte f Bit Give your answer from the following code : 1 f , b , a , c , d , e 2 f , b , a , d , e , c 3 f , b , a , c , e , d 4 f , b , a , d , c , e Correct answer is 3 i.
Which of the following domains is used for — profit businesses? The data storage hierarchy consists of: 1 Bits, bytes, fields, records, files and databases 2 Bits, bytes, records, fields, files and databases 3 Bits, bytes, fields, files, records and databases 4 Bytes, bits, fields, records, files and databases Answer: 1.
What is the full form of USB as used in computer-related activities? What is the name of a web page address? Which of the following represents billion characters? Which of the following correctly lists computer memory types from highest to lowest speed? S1 : The decimal number 11 is larger than the hexadecimal number S2 : In the binary number With regard to a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called.
Answer: 3 DVD technology uses an optical media to store the digital data. DVD is an acronym for. If the binary equivalent of the decimal number 48 is , then the binary equivalent of the decimal number 51 is given by 1 2 3 4 Answer: 1. An unsolicited e-mail message sent to many recipients at once is a 1 Worm 2 Virus 3 Threat 4 Spam Answer: 4 5.
An ASCII is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys mat the computer user selects on the keyboard. Which of the following is an instant messaging application? In a Computer a byte generally consists of : 1 4 bits 2 8 bits 3 16 bits 4 10 bits Answer: 2 Which of the following is not an input device? Which of the following is an open source software? Which of the following enables us to send the same letter to different persons in MS Word 1 Mail join 2 Mail copy 3 Mail insert 4 Mail merge Answer: 4.
Encoding or scrambling data for transmission across a network is known as : 1 Protection 2 Detection 3 Encryption 4 Decryption Answer: 3 Which of the following is not an output device? Which of the following represents one billion characters? Which of the following is not open source software? Which one of the following represents the binary equivalent of the decimal number 25?
Which is an instant messenger that is used for chatting? Symbols A-F are used in which one of the following? Which one of the following is not a search engine? Which one of the following is not. Which of the following is a social network? A amazon. A Compiler is software which converts A. Characters to bits. B High level language to machine language. Virtual memory A an extremely large main memory. B an extremely large secondary memory. C an illusion of extremely large main memory D a type of memory used in super computers.
Answer: C. Which one of the following is correct? Which of the following is not a programming language? Which of the following operating system is used on mobile phones?
If y x represents a number y in base x, then which of the following numbers is smallest of all? High level programming language can be converted to machine language using which of the following? IPv4 and IPv6 are addresses used to identify computers on the internet.
Find the correct statement out of the following : A Number of bits required for IPv4 address is more than number of bits required for IPv6 address. D Number of bits required for IPv4 address is The binary equivalent of —19 10 in signed magnitude system is A B C D None of these Which of the following is type of LAN?
Which of the following statements is true? A Smart cards do not require an operating system. B Smart cards and PCs use some operating system. C COS is smart card operating system. D The communication between reader and card is in full duplex mode.
Information Technology Quiz
Teachers Pay Teachers is an online marketplace where teachers buy and sell original educational materials. Are you getting the free resources, updates, and special offers we send out every week in our teacher newsletter? Grade Level. Resource Type. Log In Join Us.
Please feel free to reach us in case you need more info or comment to highlight any issues with the above question set. For sake of relevance, they are given in reverse order starting from the latest exam until the year Exam. There are instance were question were repeated and by changing sentence formation so keep attention to details. Select the true statement about an operating system OS? Which of the following is a type of malware intentionally inserted into a software system that will set off a malicious function when specified conditions are met? For example, a programmer may hide a piece of code that starts deleting files such as a salary database trigger , should he or she ever be terminated from the company.
For the class 10 students who will take the ICT exam, we are providing here the previous year question paper. Its very important for every student to review the question papers of previous years. Tags: Question 2. Which of the following is not an output device? Conforms with the lastest syllabus The more you read through possible examination papers, the easy you find your tests, quizzes, examinations or any kind of assessment. You cannot save and finish later.
A comprehensive database of more than 96 ICT quizzes online, test your knowledge with ICT quiz questions. Our online ICT trivia quizzes can be adapted to suit.
Practice "Storage Devices and Technology" MCQs, information and communication technology quiz questions and answers for online courses. Learn information and communication technology, storage devices and technology, transmission of electric signal through wires test prep for online classes. Free physics study guide for online learning storage devices and technology quiz questions for free online courses.
The operating system Basic Computer Knowledge Quiz. Internal hard disk Basic Computer Knowledge Quiz. All of these Basic Computer Knowledge Quiz.
ICT & Computer Science 500 QUIZ Questions with Answer
In this post, you can reference some of the most common interview questions for a ict officer interview along with appropriate answer samples. If you need more job interview materials, you can reference them at the end of this post. Tell me about your ability to work under […]. ICT stands for Information Communication Technology, which covers all of the digital technology that exists to help individuals, organizations, businesses, etc. Top 10 ict officer interview questions and answers 1.
Speak now. This concept covers any product that will retrieve, transmit, manipulate, receive or store digital electronic information, such as personal computers, tablets and smartphones. The term is also used in reference to the convergence of telephone and audio-visual networks with computer networks. What percent have ICT budgets in companies grown since ?
Information & Communication Technology (ICT) - Education Questions & Answers
Теперь можно возвращаться домой. Кольцо на пальце и есть тот Грааль, который он искал. Беккер поднял руку к свету и вгляделся в выгравированные на золоте знаки. Его взгляд не фокусировался, и он не мог прочитать надпись, но, похоже, она сделана по-английски. Первая буква вроде бы О, или Q, или ноль: глаза у него так болели. что он не мог разобрать, но все-таки кое-как прочитал первые буквы, В них не было никакого смысла. И это вопрос национальной безопасности.
Мне нужна твоя помощь. Сьюзан плохо его понимала. Ей показалось, что столь своевременная кончина Танкадо решила все проблемы. - Коммандер, - сказала она, - если власти говорят, что он умер от сердечного приступа, это значит, мы к его смерти не причастны. Его партнер поймет, что АНБ не несет за нее ответственности. - Не несет ответственности? - Глаза Стратмора расширились от изумления.
Коммандер! - позвала Сьюзан. Ответа не последовало. Сьюзан спустилась по лестнице на несколько ступенек. Горячий воздух снизу задувал под юбку. Ступеньки оказались очень скользкими, влажными из-за конденсации пара. Она присела на решетчатой площадке. - Коммандер.
Потом, озадаченная, снова взглянула на монитор.
Она была слишком возбуждена, чтобы ответить. Испания. Так вот почему Дэвид отложил поездку в Стоун-Мэнор. - Сегодня утром я послал за ним машину. Он сказал, что позвонит тебе перед вылетом.
Последние слова предсмертной записки Хейла крутились у нее в голове, не повинуясь никаким приказам. И в первую очередь я искренне сожалею о Дэвиде Беккере. Простите. Я был ослеплен своими амбициями.
Она попыталась высвободиться. Коммандер не отпускал. Она попробовала закричать, но голос ей не повиновался. Ей хотелось убежать, но сильные руки тянули ее .