2024 - ICT Skills - X
2024 - ICT Skills - X
2024 - ICT Skills - X
Q2. Which of the following ways are used to record or store information?
A) handwritten on paper
B) written using a typewriter
C) typed in computer
D) All of the above
Answer (D)
Q4. Which icon allows the user to access all drives, files, and folders on the
computer.
A) Recycle Bin
B) Computer
C) Application
D) Start button
Answer (B)
Q8. The first screen that appears on monitor after loading OS is called
________________
A) Icons
B) Desktop
C) Wallpaper
D) None of the above
Answer (B)
Q10. Which of the following is one of the security measures that monitor incoming
and outgoing data?
A) Firewall
B) Firewall
C) Device Manager
D) Google Chrome
Answer (A)
Q13. Rakesh received a call and was informed about the lottery for winning a huge
amount. This type of activity is considered as............
A) Trojan Horse
B) Online Predator
C) Internet Scams
D) Encryption
Answer (C)
Q15. Which of the following trap small children into inappropriate relations?
A) Online predators
B) Worms
C) Trojan Horse
D) Anti-Virus
Answer (A)
Q21. Which part of the computer system should be cleaned so that it can work
properly?
A) Internal
B) External
C) Both internal and external
D) None of the above
Answer (C)
Q29. A _________ is a software program that attaches itself to other programs and
alters their behaviour.
A) Cookie
B) Computer virus
C) Firewall
D) None of the above
Answer (B)
Q32. . ___________ are small files which are stored on a user’s computer when a user
visit a website on the internet.
A) Image
B) Cookies
C) Firewall
D) None of the above
Answer (B)
Q34. ________ key helps to move the cursor to the beginning of a new line.
A) Ctrl + Home
B) Ctrl + End
C) Enter
D) None of the above
Answer (C)
Q35. Pressing ____________ key opens the Start menu.
A) Windows
B) Alt + Windows
C) Ctrl + Windows
D) None of the above
Answer (A)
Q37. The ________ function key is used to get help in most programs.
A) F12
B) F2
C) F3
D) F1
Answer (D)
Q38. Enter your username and password, I allow opening your computer to work
upon
A) Power On Self Test
B) Welcome Screen
C) Desktop
D) Login Screen
Answer (D)
Q39. Which of the following programs starts as soon as the computer gets turned
on?
A) MS Office
B) Text Editor
C) Text Editor
D) Windows Explorer
Answer (C)
Q46. A _____________ is a device that you can use to move, select and open items on
your computer screen.
A) Mouse
B) Joystick
C) Scanner
D) None of the above
Answer (A)
ICT helps in the proper sharing, receiving, and processing of information, and
an ICT device is a device that is used for processing, storing, and delivering
information to others.
Examples of ICT devices are – Laptop, Desktop, Tablets and Smartphones.
Advantages of ICT
a. Enhanced the modes of communication
b. Independent learning platforms Cost – efficient
c. Enhanced data and information security
d. Paperless – Eliminate the usage of paper
e. Better teaching and learning methods
f. Web – based LMS tools
Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology
4. What is BIOS?
Answer – BIOS stands for Basic Input/ Output System, It helps the computer
system to identify (Self-test) the paraperaphal devices which are connected to
the computer system and helps computers to load Operating System properly.
5. What are the different types of keys in Keyboard?
Answer –
a. Function keys – F1 to F12 are function keys in the keyboard, function keys
are used for specific purposes.
c. Enter key – ENTER or RETURN keys are known as Enter key, depending
on the brand of computer that you are using.
e. Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys
are known as navigation keys, these keys are used to move up, down, left or
right in the document.
The DELETE command key and BACKSPACE key are used to remove typed
text, character, or any other objects from the right and left side of the cursor.
a. Roll Over or Hover – Whenever we bring the mouse over the files, it
shows the details of the file.
b. Click or Double Click – Mouse allows you to select, open or delete files
and folders from the computer system.
c. Drag and Drop – Click on the file and drag and drop your file where you
want.
Answer –
a. File – File is a collection of information different types of files store different
types of information. Every file has a file name and extension that identifies
the type of file.
Daily Maintenance
Weekly Maintenance
Monthly Maintenance
We are not cautious when it comes to disclosing personal information via the
internet. We share our account information and passwords on unsafe
websites.
A person gets unauthorized access to our computer. This can happen at work
if we don’t log out before leaving the computer.
i. Virus – Viruses are computer programmes that can corrupt data and
software applications, as well as steal data from computers. Worms and
Trojan Horses are two major forms of viruses.
ii. Worms – Worms are viruses that replicate and spread to all files on a
computer once they attack a computer. This makes it very difficult to remove
them.
iii. Online Predator – Online predators are persons who use the internet
to trap you into unhealthy relationships. They could be older people appearing
as your age who harass you into doing unlawful things online.
Answer – To protect our data from theft and viruses we can take the following
measures –
d. Open only secure site – Before visiting a website, make sure the address
begins with https://. A website that begins with https:// is a secure website.
PART 1
1. ICT stands for
o Information and Contact Technology
o Information and Connection Technology
o Information and Communication Technology
o Information and Call Technology
2. All the methods, tools, concepts related to storing, recording and sending
digital information is called _____________
o ICT
o IT
o ITC
o ITS
3. The information can be recorded or stored through
o handwritten on paper
o written using type writer
o soft copy on computer
o all of the above
4. When the information is stored or recorded on electronic devices, refers to
____________
o raw form
o digital form
o paper form
o paper back form
5. Which of the following is considered as ICT device?
o Smart TV
o FM radio
o Tablet
o Multi meter
6. ICT helps everyone to
o stay connected with each other
o run the business smoothly
o share the knowledge on public domain
o all of the above
7. Aryan is confused about hardware and software. Which of the following you
suggest to clear his confusion:
o Any device which tangible and can be touched is hardware and a
program that makes hardware function is software
o Any device that is very hard is hardware and any device that is very
soft is software
o A device used on a hard surface is hardware and a device used on a
soft surface is software
o A program is very hard to understand is hardware and a program is
very easy to understand is software
8. Which of the following is hardware?
o Opera
o Notepad
o Monitor
o Cleaner
9. Which of the following is software?
o Printer
o Projector
o Hard Disk
o Ccleaner
10. Read the following statements:
o Statement A: The software and hardware both are required to work
upon ICT devices
o Statement B: All ICT devices are very small in size and can be carried
anywhere
▪ Statement A is True but statement B is False
▪ Statement B is True but statement A is False
▪ Both are False
▪ Both are True
11. Which of the following programs starts as soon as computer gets turned
on?
o MS Office
o Text Editor
o Operating System
o Windows Explorer
12. Which of the following in one of the mobile operating system?
o Linux
o Unix
o Mac OS
o iOS
13. Recognize me: When the computer is started, I perform some basic
processes/functions to check all the devices are running properly or not
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
14. Enter your username and password, I allow to open your computer to work
upon
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
15. I am capable to store and display all icons available in PC
o Power On Self Test
o Welcome Screen
o Desktop
o Login Screen
16. What is responsible for performing the POST (Power On Self Test)?
o The User
o Operating System
o Desktop
o BIOS
17. Identify the operating system out of the following:
o Google Chrome
o Adobe Photoshop
o Microsoft Windows
o Adobe Dreamweaver
18. Which of the following item is not present on desktop?
o Folder
o Disk drive
o Icon
o Taskbar
19. The login screen appears after
o POST
o Welcome Screen
o Windows Start Screen
o BIOS Screen
20. The ________ function key is used to get help in most programs.
o F12
o F2
o F3
o F1
21. Manisha pressed a key on keyboard that moved the cursor to the beginning
of a new line. But she did not know which key has been presses by her.
Identify the key pressed by her:
o Enter
o Shift
o Ctrl
o Windows
22. Rekha wants to move the cursor to the begining of the line to the left side.
Select a key which she should press:
o Left Arrow
o End
o Home
o Page Up
23. Which of the following statement is correct for delete and backspace key?
o Any key can be used to remove the text from center
o Delete erases characters from left side where as Backspace erases
characters from right side
o Delete erases characters from right side where as Backspace erases
characters from left side
o Anyone can overwrite the content selected by use
24. When the mouse is dragged on the file or icon it displays the information
about the file. This process is known as
o Left Click
o Right Click
o Mouse Hover
o Drag and Drop
25. Each file stored in the computer has
o Filename and Extension
o Data and Information
o Particular Size and Location
o All of these
26. The filename and extension are separated by
o . (Period)
o , (Comma)
o _ (Underscore)
o ‘ (Single Quote)
27. A _________ is location or container in which the files can be stored.
o Folder
o Recycle Bin
o Library
o Utility
28. The shortcut key to open run command is :
o ctrl + r
o shift + r
o ctrl + r
o windows + r
29. The shortcut key to copy the file or folder is
o ctrl + c
o window + c
o alt + c
o shift + c
30. The short cut key to open a new file in notepad is
o ctrl + e
o ctrl + n
o ctrl + w
o alt + n
31. Which command is used to reverse the previous work done by the user?
o Redo
o Undo
o Paste
o Cut
32. You should always protect your computer from
o dust and damage
o not to use more that 2 or 3 hours
o not install a software
o not to turn on in the morning or late night
33. To clean the keyboard, you can
o use ashing Powder and Water then wash it
o keep a soft brush to remove crumbs and dust particles
o use wet cloth and wipe on it
o use acid to clean it
34. How to remove the finger marks from the screen?
o wipe the screen with soft cloth
o use wet cloth and wipe it
o keep water and glass near to computer and wash it as and when
needed
o use colin or harpik and spray it on the screen
35. Which of the following can be followed to keep the laptop cool?
o Keep snow around the laptop
o Use external Cooling fan
o Keep the laptop inside freezer
o Keep the room cool then start the laptop
36. Running to many programs at a time can cause
o computer can become slow and crash
o damage the hard disk
o generate lots of heat
o computer can work efficiently
37. Which of the following is one of the process for daily maintenance?
o download email attachments in to the folders
o backup your data
o full system virus scan
o update operating system
38. How can an anti-virus protect your device?
o It can protect it from over-heating.
o It can increase its performance.
o It can protect against the virus
o It can backup data.
39. What happens if you leave a device plugged in even after it is charged 100%?
o It can break.
o It can stop functioning.
o It can over-heat.
o Data can get corrupt.
40. Which of the following trap small children into inappropriate relations?
o Online predators
o Worms
o Trojan Horse
o Anti-Virus
41. What type of care should be taken while transacting online?
o Always lock your computer when you are going away
o Give credit card and debit card or UPI information on secured sites
o Save the passwords on cloud
o Use pirated software
42. A hacker can try to misuse your data and information and perform illegeal
activity. This is considered as
o Physical Theft
o Identity theft
o Software Piracy
o Virus
43. Manoj received a call and informed about lottery for winning huge amount.
This type of activity is considered as
o Trojan Horse
o Online Predator
o Internet Scams
o Encryption
44. The virus which replicates themselves and spread all files once they attack
on computer and very difficult to remove them. This virus is known as
o Trojan Horse
o File Virus
o WORM
o Ransomware
45. A __________ is seems useful software but reacts like a virus and destroying
data.
o Trojan Horse
o File Virus
o WORM
o Ransomware
46. Choose the strong password out of the following:
o 12345
o Aprfd@2021!
o hello123
o password
47. Which of the following is one of the security measures that monitor
incoming and outgoing data?
o Firewall
o Windows Login
o Device Manager
o Google Chrome
48. Bit locker is an example of
o Backup and restore
o Firewall
o Encryption
o Ransomware
49. The identity of secure websites are
o Indicates a lock in front of the URL and begins https:
o Asks to login using OTP
o Asks to login using email id and password
o Website requires biometrics to login
50. Software piracy refers to
o Stealing software and distributing the unlicensed copies
o Opensource software
o Gain access of a website and perform illegal activity
o Selling software online with a proper license key
[2] Gunjan is class 10 student. Her teacher asked her to make a list of ways
to store and record information. Assist her to accomplish her task.
Ans.: The different ways to store and record information are as follows:
1) Handwritten records on paper
2) Typerwriter written records
3) Computerised Records
Ans.: ICT skills help us to communicate, run our business and stay connected with
our family and friends. Hence, every person needs to acquire ICT skills and build
them to stay updated with the latest software and applications (apps).
Ans.: The physical parts that can be seen and touch are called hardware. It is
machinery of a computer such as keyboard, monitor, CPU etc.
The programs that cannot be touched and make the hardware work the way as the
user wants are termed as software. For example MS Excel, MS Word etc.
An Operating System performs all the basic tasks like managing files,
processes, and memory. Thus operating system acts as the manager of all
the resources, i.e. resource manager. Thus, the operating system becomes
an interface between the user and the machine. It is one of the most required
software that is present in the device.
Operating System is a type of software that works as an interface between
the system program and the hardware. There are several types of Operating
Systems in which many of which are mentioned below. Let’s have a look at
them.