Q.1 Which of the following is generally associated with the domain name of an education institution?
(1) .org
(2) .edu
(3) .com
(4) .inst

Show Answer

Q.1 Which of the following is generally associated with the domain name of an education institution?
(1) .org
(
2) .edu
(3) .com
(4) .inst

Q.2 Which of the following devices enables a computer to transmit data over telephone lines?
(1) CPU
(2) Hub
(3) Switch

(4) Modem

Show Answer

Q.2 Which of the following devices enables a computer to transmit data over telephone lines?
(1) CPU
(2) Hub
(3) Switch
(4) Modem

Q.3 Which of the following is not considered as a form of secondary storage?
(1) RAM
(2) Floppy Disk
(3) Optical Disk
(4) Flash Drive

Show Answer

Q.3 Which of the following is not considered as a form of secondary storage?
(1) RAM
(2) Floppy Disk
(3) Optical Disk
(4) Flash Drive

Q.4 Identify the encompassing term that involves the use of platforms to conduct a company’s business.
(1) E-Business
(2) E-Commerce
(3) E-Marketing
(4) E-Governance

Show Answer

Q.4 Identify the encompassing term that involves the use of platforms to conduct a company’s business.
(1) E-Business
(2) E-Commerce
(3) E-Marketing
(4) E-Governance

Q.5 Which of the following file format is not a video file format?
(1) .AVI
(2) .MOV
(3) .MP4
(4) .JPEG

Show Answer

Q.5 Which of the following file format is not a video file format?
(1) .AVI
(2) .MOV
(3) .MP4
(4) .JPEG

Q.6 A computer has main memory of 960 KBytes. What is the exact number of bytes contained in this memory?
(1) 960 x 8
(2) 960 x 1000
(3) 960 x 1024
(4) 960 x 1024 x 1024

Show Answer

Q.6 A computer has main memory of 960 KBytes. What is the exact number of bytes contained in this memory?
(1) 960 x 8
(2) 960 x 1000
(3) 960 x 1024
(4) 960 x 1024 x 1024

Q.7 SMTP is acronym for
(1) Simple Mail Transport Protocol
(2) Simple Mail Terminal Protocol
(3) Simple Mail Transfer Protocol
(4) Simple Mail Transition Protocol

Show Answer

Q.7 SMTP is acronym for
(1) Simple Mail Transport Protocol
(2) Simple Mail Terminal Protocol
(3
) Simple Mail Transfer Protocol
(4) Simple Mail Transition Protocol

Q.8 The convenient place to store contact information for quick retrieval in e-mail is
(1) Address box
(2) Message box
(3) Address book
(4) Message book

Show Answer

Q.8 The convenient place to store contact information for quick retrieval in e-mail is
(1) Address box
(2) Message box
(3) Address book
(4) Message book

Q.9 Which of the following is an address that specifies location of a webpage?
(1) URL
(2) DNS
(3) HTML
(4) HTTP

Show Answer

Q.9 Which of the following is an address that specifies location of a webpage?
(1) URL
(2) DNS
(3) HTML
(4) HTTP

Q.10 What is meant by the term RAM?
(1) Memory which can only be read
(2) Memory can only be written to
(3) Memory which is used for permanent storage
(4) Memory which can be both read and written to

Show Answer

Q.10 What is meant by the term RAM?
(1) Memory which can only be read
(2) Memory can only be written to
(3) Memory which is used for permanent storage
(4) Memory which can be both read and written to

Q.11 Which of the following hardware was used by the first generation computers?
(1) Transistors
(2) Vacuum tubes
(3) VLSI
(4) Integrated circuits

Show Answer

Q.11 Which of the following hardware was used by the first generation computers?
(1) Transistors
(2) Vacuum tubes
(3) VLSI
(4) Integrated circuits

Q.12 Computer uses which number system to store data and perform calculations:
(1) Binary
(2) Octal
(3) Decimal
(4) Hexadecimal

Show Answer

Q.12 Computer uses which number system to store data and perform calculations:
(1) Binary
(2) Octal
(3) Decimal
(4) Hexadecimal

Q.13 The main two components of CPU are
(1) Control unit and ALU
(2) ALU and BUS
(3) Control unit and registers
(4) Registers and main memory

Show Answer

Q.13 The main two components of CPU are
(1) Control unit and ALU
(2) ALU and BUS
(3) Control unit and registers
(4) Registers and main memory

Q.14 Which of the following is a search Engine?
(1) Flash
(2) Fire fox
(3) Internet explorer
(4) Google

Show Answer

Q.14 Which of the following is a search Engine?
(1) Flash
(2) Fire fox
(3) Internet explorer
(4) Google

Q.15 Joint Photographic Experts Group (JPEG) is used to compress
(1) Music
(2) Video

(3) Image
(4) Frame

Show Answer

Q.15 Joint Photographic Experts Group (JPEG) is used to compress
(1) Music
(2) Video
(3) Image
(4) Frame

Q.16 Which of the following is used to create web pages?
(1) HTTP
(2) URL
(3) FTP
(4) HTML

Show Answer

Q.16 Which of the following is used to create web pages?
(1) HTTP
(2) URL
(3) FTP
(4) HTML

Q.17 The use of information Technology (IT) to improve the ability of Government to address the needs of society is known as
(1) E – Business
(2) E – Administration
(3) E – Governance
(4) E – Marketing

Show Answer

Q.17 The use of information Technology (IT) to improve the ability of Government to address the needs of society is known as
(1) E – Business
(2) E – Administration
(3) E – Governance
(4) E – Marketing

Q.18 In audio and video compression, the term RGB means
(1) Red, Grey, Blue
(2) Red, Green, Blue
(3) Red, Green, Black
(4) Red, Grey, Black

Show Answer

Q.18 In audio and video compression, the term RGB means
(1) Red, Grey, Blue
(2) Red, Green, Blue
(3) Red, Green, Black
(4) Red, Grey, Black

Q.19
Match the following:
(a) First Generation                    (i) transistor
(b) Second Generation              (ii) VLSI microprocessor
(c) Third Generation                  (iii) Vacuum Tube
(d) Fourth Generation               (iv) Integrated Circuit

Show Answer

Q.19
Match the following:
(a) First Generation                    (i) transistor
(b) Second Generation              (ii) VLSI microprocessor
(c) Third Generation                  (iii) Vacuum Tube
(d) Fourth Generation               (iv) Integrated Circuit

(a) (b)     (c)     (d)
(iii) (i) (iv) (ii)

Q.20 A/An is a computer program that spreads by inserting copies of it-self into other executable codes or documents.
(1) Operating System
(2) Computer Virus
(3) Firewall
(4) Anti-virus

Show Answer

Q.20 A/An is a computer program that spreads by inserting copies of it-self into other executable codes or documents.
(1) Operating System
(2) Computer Virus
(3) Firewall
(4) Anti-virus

Q.21 Which of the following is not a/an web browser?
(1) Internet Explorer
(2) Mozilla Firefox
(3) Google Chrome
(4) Yahoo

Show Answer

Q.21 Which of the following is not a/an web browser?
(1) Internet Explorer
(2) Mozilla Firefox
(3) Google Chrome
(4) Yahoo

Q.22 One Terabyte of memory is equal to
(1) 1024 KB
(2) 1024 X 1024 KB
(3) 1024 X 1024 X 1024 KB
(4) 1024 X 1024 X 1024 Bytes

Show Answer

Q.22 One Terabyte of memory is equal to
(1) 1024 KB
(2) 1024 X 1024 KB
(3) 1024 X 1024 X 1024 KB
(4) 1024 X 1024 X 1024 Bytes

Q.23 Which of the following statement(s) is/are true in respect of wireless Technology
P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile
Q: Bluetooth is a long range wireless technology and is a low cost means of data


(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q

Show Answer

Q.23 Which of the following statement(s) is/are true in respect of wireless Technology
P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile
Q: Bluetooth is a long range wireless technology and is a low cost means of data


(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q

Q.24 Select the option that shows the storage devices in order of capacity from lowest to highest.
(1) CD-ROM, DVD-ROM, Blu-Ray
(2) Blu-Ray, CD-ROM, DVD-ROM
(3) DVD-ROM, Blu-Ray,CD-ROM
(4) DVD-ROM, CD-ROM,Blu-Ray

Show Answer

Q.24 Select the option that shows the storage devices in order of capacity from lowest to highest.
(1) CD-ROM, DVD-ROM, Blu-Ray
(2) Blu-Ray, CD-ROM, DVD-ROM
(3) DVD-ROM, Blu-Ray,CD-ROM
(4) DVD-ROM, CD-ROM,Blu-Ray

Q.25 Select the statement about an Operating System (OS)?
(1) An OS controls peripherals, allocate memory and organizes data into fields and records
(2) An OS provides protection against viruses and controls peripherals

(3) An OS controls peripherals, and allocates memory and processor time
(4) An OS controls processor and peripherals and allows the user to connect to the internet

Show Answer

Q.25 Select the statement about an Operating System (OS)?
(1) An OS controls peripherals, allocate memory and organizes data into fields and records
(2) An OS provides protection against viruses and controls peripherals
(3) An OS controls peripherals, and allocates memory and processor time
(4) An OS controls processor and peripherals and allows the user to connect to the internet

Q.26 Which one of the following pairs LEAST matches in respect of computers?
(1) 1 Giga Byte    : (1024)X(1024)X(1024)
(2) CRT                 :Cathode Ray Tube
(3) ROM               :Rapid online memory
(4) CPU                 :Central Processing Unit

Show Answer

Q.26 Which one of the following pairs LEAST matches in respect of computers?
(1) 1 Giga Byte    : (1024)X(1024)X(1024)
(2) CRT                 :Cathode Ray Tube
(3) ROM               :Rapid online memory
(4) CPU                 :Central Processing Unit

Q.27 Which of the following is a type of malware intentionally inserted into software systems that will set off a malicious function when specified conditions are met?
(1) Worm
(2) Trojan
(3) Spyware
(4) Logic Bomb

Show Answer

Q.27 Which of the following is a type of malware intentionally inserted into software systems that will set off a malicious function when specified conditions are met?
(1) Worm
(2) Trojan
(3) Spyware
(4) Logic Bomb

hoQ.28 A virus type that is capable of transferring from one computer to  Another without any ‘user interaction’ is known as
(1) Worm
(2) Trojan
(3) Key Logging
(4) Boot Sector Virus

Show Answer

Q.28 A virus type that is capable of transferring from one computer to  Another without any ‘user interaction’ is known as
(1) Worm
(2) Trojan
(3) Key Logging
(4) Boot Sector Virus

Q.29 In the correct of IT/ICT, which one of the following about spamming true?
(1) Spamming is posting or e-mailing unsolicited advertising messages to a wide audience
(2) Spamming is sending lines of nonsensical garbage in a chat Conversation
(3) Spamming is posting a message that contains graphic description of something offensive
(4) Spamming is An attempt to acquire sensitive information for Malicious reasons, by masquerading as trustworthy entity

Show Answer

Q.29 In the correct of IT/ICT, which one of the following about spamming true?
(1) Spamming is posting or e-mailing unsolicited advertising messages to a wide audience
(2) Spamming is sending lines of nonsensical garbage in a chat Conversation
(3) Spamming is posting a message that contains graphic description of something offensive
(4) Spamming is An attempt to acquire sensitive information for Malicious reasons, by masquerading as trustworthy entity

Q.30 You need to use automatic calculations in preparing a budget. Which software application should be used?
(1) Spreadsheet
(2) Presentation
(3) Word processing
(4) Desktop publishing

Show Answer

Q.30 You need to use automatic calculations in preparing a budget. Which software application should be used?
(1) Spreadsheet
(2) Presentation
(3) Word processing
(4) Desktop publishing

Q.31 What is the binary equivalent of decimal number 75?
(1) 1101001
(2) 101001
(3) 100101
(4) 1001011

Show Answer

Q.31 What is the binary equivalent of decimal number 75?
(1) 1101001
(2) 101001
(3) 100101
(4) 1001011

Q.32 Which statement is true about Random Access Memory (RAM) in a computer system?
(1) RAM is non-volatile and the amount of RAM in a computer system cannot affect its performance
(2) RAM is non-volatile and the amount of Ram in a computer system can affect its performance
(3) RAM is volatile and the amount of RAM in a computer cannot affect its performance
(4) RAM is volatile and the amount of RAM in a computer system can affect its performance

Show Answer

Q.32 Which statement is true about Random Access Memory (RAM) in a computer system?
(1) RAM is non-volatile and the amount of RAM in a computer system cannot affect its performance
(2) RAM is non-volatile and the amount of Ram in a computer system can affect its performance
(3) RAM is volatile and the amount of RAM in a computer cannot affect its performance
(4) RAM is volatile and the amount of RAM in a computer system can affect its performance

Q.33 What is spyware in respect of computer software?
(1) Software that aims to gather information about a person without his/her knowledge, and that may send such information to another entity
(2) Legitimate software that allows companies to monitor and supervise the computers of their employees from a central location
(3) Software used to disrupt computer operation or gain access to private computer systems
(4) A computer program hidden within another seemingly harmless program that produces copies of itself and inserts them into another programs or files

Show Answer

Q.33 What is spyware in respect of computer software?
(1) Software that aims to gather information about a person without his/her knowledge, and that may send such information to another entity
(2) Legitimate software that allows companies to monitor and supervise the computers of their employees from a central location
(3) Software used to disrupt computer operation or gain access to private computer systems
(4) A computer program hidden within another seemingly harmless program that produces copies of itself and inserts them into another programs or files

Q.34 Which of the following best describes a wiki?
(1) A system that allows users to add information onto a website but does not change any pre-existing information
(2) A system that allows collaborative modification of its content and structure directly from the web browser
(3) A system that serves as a publically accessible personal journal for an individual
(4) A system that monitors the modification of content within a blog

Show Answer

Q.34 Which of the following best describes a wiki?
(1) A system that allows users to add information onto a website but does not change any pre-existing information
(2) A system that allows collaborative modification of its content and structure directly from the web browser
(3) A system that serves as a
publicly accessible personal journal for an individual
(4) A system that monitors the modification of content within a blog

Q.35 Anjali’s teacher uses VLE, a software tool designed to deliver courses online. The acronym VLE for
(1) Video Learning Environment
(2) Visual Learning Environment
(3) Virtual Learning Environment
(4) Visual Local Environment

Show Answer

Q.35 Anjali’s teacher uses VLE, a software tool designed to deliver courses online. The acronym VLE for
(1) Video Learning Environment
(2) Visual Learning Environment
(3) Virtual Learning Environment
(4) Visual Local Environment

Q.36 Which of the following statement(s) is/are true in respect to ICT?
P: ICT is acronym that stands for information and competitive
Q: The effective use of ICT to support learning in the inclusive education exemplifies good teaching for all
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q

Show Answer

Q.36 Which of the following statement(s) is/are true in respect to ICT?
P: ICT is acronym that stands for information and competitive
Q: The effective use of ICT to support learning in the inclusive education exemplifies good teaching for all
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q

Q37. What is the decimal equivalent of binary number 1100110?
(1) 102
(2) 204
(3) 153
(4) 51

Show Answer

Q37. What is the decimal equivalent of binary number 1100110?
(1) 102
(2) 204
(3) 153
(4) 51

Q.38 With respect to computers, which one of the following best describes phishing?
(1) A malicious installed on a system that stays concealed to avoid detection
(2) A method of bypassing normal authentication procedures over a connection to a network
(3) A type of unsolicited bulk email of identical message sent to numerous recipients
(4) An attempt to acquire sensitive information for the malicious reasons by masquerading as a trustworthy entity.

Show Answer

Q.38 With respect to computers, which one of the following best describes phishing?
(1) A malicious installed on a system that stays concealed to avoid detection
(2) A method of bypassing normal authentication procedures over a connection to a network
(3) A type of unsolicited bulk email of identical message sent to numerous recipients
(4) An attempt to acquire sensitive information for the malicious reasons by masquerading as a trustworthy entity.

Q.39 A computer network which is used within a building is called a
(1) WAN
(2) MAN
(3) LAN
(4) SAN

Show Answer

Q.39 A computer network which is used within a building is called a
(1) WAN
(2) MAN
(3) LAN
(4) SAN

Q.40 Why would BCC: be used in an e-mail?
(1) It allows the recipient to identify all the other recipients in the list when a group email address is
(2) It allows the sender to indicate who the email is for if there is more than one recipient
(3) It allows the sender of a message to conceal the recipient entered in the BCC: field from the other recipients
(4) It allows recipients to be visible to all the other recipients of the message

Show Answer

Q.40 Why would BCC: be used in an e-mail?
(1) It allows the recipient to identify all the other recipients in the list when a group email address is
(2) It allows the sender to indicate who the email is for if there is more than one recipient
(3) It allows the sender of a message to conceal the recipient entered in the BCC: field from the other recipients
(4) It allows recipients to be visible to all the other recipients of the message

Q.42 The acronym LCD stands for
(1) Light crystal display
(2) Liquid compact display
(3) Light compact display
(4) Liquid crystal display

Show Answer

Q.42 The acronym LCD stands for
(1) Light crystal display
(2) Liquid compact display
(3) Light compact display
(4) Liquid crystal display

Q.43 Which of the following is an example of proprietary system software?
(1) Linux
(2) Microsoft Internet Explorer
(3) Microsoft Office
(4) Microsoft windows

Show Answer

Q.43 Which of the following is an example of proprietary system software?
(1) Linux
(2) Microsoft Internet Explorer
(3) Microsoft Office
(4) Microsoft windows

Q.44 Which one of the following components is faster in terms of speed of access?
(1) USB Drive
(2) Solid State Drive
(3) RAM
(4) Hard Disk Drive

Show Answer

Q.44 Which one of the following components is faster in terms of speed of access?
(1) USB Drive
(2) Solid State Drive
(3) RAM
(4) Hard Disk Drive

Q.45 In internet technology, what does the acronym WYSIWYG stand for?
(1) Why You Saw Is What You Got
(2) What is See Is What You Get
(3) Where You See Is Where You Got
(4) What You See Is What you Got

Show Answer

Q.45 In internet technology, what does the acronym WYSIWYG stand for?
(1) Why You Saw Is What You Got
(2) What is See Is What You Get
(3) Where You See Is Where You Got
(4) What You See Is What you Got

Q.46 While sending an email, to differentiate among To:, Cc: and Bcc fields which one of the following statement is true
(1) Recipients in the To: field can see the email addresses that are in the Bcc: and Cc: fields
(2) Recipients in the Cc: field can see the email addresses that are in the To: and Bcc: fields
(3) Recipients in the Bcc: field can see the email addresses that are in the To: and Cc: fields
(4) Only the recipients in the Cc: field can see the other email addresses in the Bcc: fields

Show Answer

Q.46 While sending an email, to differentiate among To:, Cc: and Bcc fields which one of the following statement is true
(1) Recipients in the To: field can see the email addresses that are in the Bcc: and Cc: fields
(2) Recipients in the Cc: field can see the email addresses that are in the To: and Bcc: fields
(3) Recipients in the Bcc: field can see the email addresses that are in the To: and Cc: fields
(4) Only the recipients in the Cc: field can see the other email addresses in the Bcc: fields

Q.47 Software that you can download free, but have to pay to continue its use after a trial period is called
(1) Public domain software
(2) Freeware
(3) Open-source software
(4) Shareware

Show Answer

Q.47 Software that you can download free, but have to pay to continue its use after a trial period is called
(1) Public domain software
(2) Freeware
(3) Open-source software
(4) Shareware

Q.48 A group’s access to digital technology and another groups lack of access to it, will cause a disparity known as
(1) Internet inequality
(2) Web inequality
(3) Technological imbalance
(4) Digital divide

Show Answer

Q.48 A group’s access to digital technology and another groups lack of access to it, will cause a disparity known as
(1) Internet inequality
(2) Web inequality
(3) Technological imbalance
(4) Digital divide