Q.1 Which of the following is generally associated with the domain name of an education institution?
(1) .org
(2) .edu
(3) .com
(4) .inst
Q.1 Which of the following is generally associated with the domain name of an education institution?
(1) .org
(2) .edu
(3) .com
(4) .inst
Q.2 Which of the following devices enables a computer to transmit data over telephone lines?
(1) CPU
(2) Hub
(3) Switch
(4) Modem
Q.2 Which of the following devices enables a computer to transmit data over telephone lines?
(1) CPU
(2) Hub
(3) Switch
(4) Modem
Q.3 Which of the following is not considered as a form of secondary storage?
(1) RAM
(2) Floppy Disk
(3) Optical Disk
(4) Flash Drive
Q.3 Which of the following is not considered as a form of secondary storage?
(1) RAM
(2) Floppy Disk
(3) Optical Disk
(4) Flash Drive
Q.4 Identify the encompassing term that involves the use of platforms to conduct a company’s business.
(1) E-Business
(2) E-Commerce
(3) E-Marketing
(4) E-Governance
Q.4 Identify the encompassing term that involves the use of platforms to conduct a company’s business.
(1) E-Business
(2) E-Commerce
(3) E-Marketing
(4) E-Governance
Q.5 Which of the following file format is not a video file format?
(1) .AVI
(2) .MOV
(3) .MP4
(4) .JPEG
Q.5 Which of the following file format is not a video file format?
(1) .AVI
(2) .MOV
(3) .MP4
(4) .JPEG
Q.6 A computer has main memory of 960 KBytes. What is the exact number of bytes contained in this memory?
(1) 960 x 8
(2) 960 x 1000
(3) 960 x 1024
(4) 960 x 1024 x 1024
Q.6 A computer has main memory of 960 KBytes. What is the exact number of bytes contained in this memory?
(1) 960 x 8
(2) 960 x 1000
(3) 960 x 1024
(4) 960 x 1024 x 1024
Q.7 SMTP is acronym for
(1) Simple Mail Transport Protocol
(2) Simple Mail Terminal Protocol
(3) Simple Mail Transfer Protocol
(4) Simple Mail Transition Protocol
Q.7 SMTP is acronym for
(1) Simple Mail Transport Protocol
(2) Simple Mail Terminal Protocol
(3) Simple Mail Transfer Protocol
(4) Simple Mail Transition Protocol
Q.8 The convenient place to store contact information for quick retrieval in e-mail is
(1) Address box
(2) Message box
(3) Address book
(4) Message book
Q.8 The convenient place to store contact information for quick retrieval in e-mail is
(1) Address box
(2) Message box
(3) Address book
(4) Message book
Q.9 Which of the following is an address that specifies location of a webpage?
(1) URL
(2) DNS
(3) HTML
(4) HTTP
Q.9 Which of the following is an address that specifies location of a webpage?
(1) URL
(2) DNS
(3) HTML
(4) HTTP
Q.10 What is meant by the term RAM?
(1) Memory which can only be read
(2) Memory can only be written to
(3) Memory which is used for permanent storage
(4) Memory which can be both read and written to
Q.10 What is meant by the term RAM?
(1) Memory which can only be read
(2) Memory can only be written to
(3) Memory which is used for permanent storage
(4) Memory which can be both read and written to
Q.11 Which of the following hardware was used by the first generation computers?
(1) Transistors
(2) Vacuum tubes
(3) VLSI
(4) Integrated circuits
Q.11 Which of the following hardware was used by the first generation computers?
(1) Transistors
(2) Vacuum tubes
(3) VLSI
(4) Integrated circuits
Q.12 Computer uses which number system to store data and perform calculations:
(1) Binary
(2) Octal
(3) Decimal
(4) Hexadecimal
Q.12 Computer uses which number system to store data and perform calculations:
(1) Binary
(2) Octal
(3) Decimal
(4) Hexadecimal
Q.13 The main two components of CPU are
(1) Control unit and ALU
(2) ALU and BUS
(3) Control unit and registers
(4) Registers and main memory
Q.13 The main two components of CPU are
(1) Control unit and ALU
(2) ALU and BUS
(3) Control unit and registers
(4) Registers and main memory
Q.14 Which of the following is a search Engine?
(1) Flash
(2) Fire fox
(3) Internet explorer
(4) Google
Q.14 Which of the following is a search Engine?
(1) Flash
(2) Fire fox
(3) Internet explorer
(4) Google
Q.15 Joint Photographic Experts Group (JPEG) is used to compress
(1) Music
(2) Video
(3) Image
(4) Frame
Q.15 Joint Photographic Experts Group (JPEG) is used to compress
(1) Music
(2) Video
(3) Image
(4) Frame
Q.16 Which of the following is used to create web pages?
(1) HTTP
(2) URL
(3) FTP
(4) HTML
Q.16 Which of the following is used to create web pages?
(1) HTTP
(2) URL
(3) FTP
(4) HTML
Q.17 The use of information Technology (IT) to improve the ability of Government to address the needs of society is known as
(1) E – Business
(2) E – Administration
(3) E – Governance
(4) E – Marketing
Q.17 The use of information Technology (IT) to improve the ability of Government to address the needs of society is known as
(1) E – Business
(2) E – Administration
(3) E – Governance
(4) E – Marketing
Q.18 In audio and video compression, the term RGB means
(1) Red, Grey, Blue
(2) Red, Green, Blue
(3) Red, Green, Black
(4) Red, Grey, Black
Q.18 In audio and video compression, the term RGB means
(1) Red, Grey, Blue
(2) Red, Green, Blue
(3) Red, Green, Black
(4) Red, Grey, Black
Q.19
Match the following:
(a) First Generation (i) transistor
(b) Second Generation (ii) VLSI microprocessor
(c) Third Generation (iii) Vacuum Tube
(d) Fourth Generation (iv) Integrated Circuit
Q.19
Match the following:
(a) First Generation (i) transistor
(b) Second Generation (ii) VLSI microprocessor
(c) Third Generation (iii) Vacuum Tube
(d) Fourth Generation (iv) Integrated Circuit
(a) (b) (c) (d)
(iii) (i) (iv) (ii)
Q.20 A/An is a computer program that spreads by inserting copies of it-self into other executable codes or documents.
(1) Operating System
(2) Computer Virus
(3) Firewall
(4) Anti-virus
Q.20 A/An is a computer program that spreads by inserting copies of it-self into other executable codes or documents.
(1) Operating System
(2) Computer Virus
(3) Firewall
(4) Anti-virus
Q.21 Which of the following is not a/an web browser?
(1) Internet Explorer
(2) Mozilla Firefox
(3) Google Chrome
(4) Yahoo
Q.21 Which of the following is not a/an web browser?
(1) Internet Explorer
(2) Mozilla Firefox
(3) Google Chrome
(4) Yahoo
Q.22 One Terabyte of memory is equal to
(1) 1024 KB
(2) 1024 X 1024 KB
(3) 1024 X 1024 X 1024 KB
(4) 1024 X 1024 X 1024 Bytes
Q.22 One Terabyte of memory is equal to
(1) 1024 KB
(2) 1024 X 1024 KB
(3) 1024 X 1024 X 1024 KB
(4) 1024 X 1024 X 1024 Bytes
Q.23 Which of the following statement(s) is/are true in respect of wireless Technology
P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile
Q: Bluetooth is a long range wireless technology and is a low cost means of data
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q
Q.23 Which of the following statement(s) is/are true in respect of wireless Technology
P: Bluetooth is a wireless technology which can be used to connect a headset to a mobile
Q: Bluetooth is a long range wireless technology and is a low cost means of data
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q
Q.24 Select the option that shows the storage devices in order of capacity from lowest to highest.
(1) CD-ROM, DVD-ROM, Blu-Ray
(2) Blu-Ray, CD-ROM, DVD-ROM
(3) DVD-ROM, Blu-Ray,CD-ROM
(4) DVD-ROM, CD-ROM,Blu-Ray
Q.24 Select the option that shows the storage devices in order of capacity from lowest to highest.
(1) CD-ROM, DVD-ROM, Blu-Ray
(2) Blu-Ray, CD-ROM, DVD-ROM
(3) DVD-ROM, Blu-Ray,CD-ROM
(4) DVD-ROM, CD-ROM,Blu-Ray
Q.25 Select the statement about an Operating System (OS)?
(1) An OS controls peripherals, allocate memory and organizes data into fields and records
(2) An OS provides protection against viruses and controls peripherals
(3) An OS controls peripherals, and allocates memory and processor time
(4) An OS controls processor and peripherals and allows the user to connect to the internet
Q.25 Select the statement about an Operating System (OS)?
(1) An OS controls peripherals, allocate memory and organizes data into fields and records
(2) An OS provides protection against viruses and controls peripherals
(3) An OS controls peripherals, and allocates memory and processor time
(4) An OS controls processor and peripherals and allows the user to connect to the internet
Q.26 Which one of the following pairs LEAST matches in respect of computers?
(1) 1 Giga Byte : (1024)X(1024)X(1024)
(2) CRT :Cathode Ray Tube
(3) ROM :Rapid online memory
(4) CPU :Central Processing Unit
Q.26 Which one of the following pairs LEAST matches in respect of computers?
(1) 1 Giga Byte : (1024)X(1024)X(1024)
(2) CRT :Cathode Ray Tube
(3) ROM :Rapid online memory
(4) CPU :Central Processing Unit
Q.27 Which of the following is a type of malware intentionally inserted into software systems that will set off a malicious function when specified conditions are met?
(1) Worm
(2) Trojan
(3) Spyware
(4) Logic Bomb
Q.27 Which of the following is a type of malware intentionally inserted into software systems that will set off a malicious function when specified conditions are met?
(1) Worm
(2) Trojan
(3) Spyware
(4) Logic Bomb
hoQ.28 A virus type that is capable of transferring from one computer to Another without any ‘user interaction’ is known as
(1) Worm
(2) Trojan
(3) Key Logging
(4) Boot Sector Virus
Q.28 A virus type that is capable of transferring from one computer to Another without any ‘user interaction’ is known as
(1) Worm
(2) Trojan
(3) Key Logging
(4) Boot Sector Virus
Q.29 In the correct of IT/ICT, which one of the following about spamming true?
(1) Spamming is posting or e-mailing unsolicited advertising messages to a wide audience
(2) Spamming is sending lines of nonsensical garbage in a chat Conversation
(3) Spamming is posting a message that contains graphic description of something offensive
(4) Spamming is An attempt to acquire sensitive information for Malicious reasons, by masquerading as trustworthy entity
Q.29 In the correct of IT/ICT, which one of the following about spamming true?
(1) Spamming is posting or e-mailing unsolicited advertising messages to a wide audience
(2) Spamming is sending lines of nonsensical garbage in a chat Conversation
(3) Spamming is posting a message that contains graphic description of something offensive
(4) Spamming is An attempt to acquire sensitive information for Malicious reasons, by masquerading as trustworthy entity
Q.30 You need to use automatic calculations in preparing a budget. Which software application should be used?
(1) Spreadsheet
(2) Presentation
(3) Word processing
(4) Desktop publishing
Q.30 You need to use automatic calculations in preparing a budget. Which software application should be used?
(1) Spreadsheet
(2) Presentation
(3) Word processing
(4) Desktop publishing
Q.31 What is the binary equivalent of decimal number 75?
(1) 1101001
(2) 101001
(3) 100101
(4) 1001011
Q.31 What is the binary equivalent of decimal number 75?
(1) 1101001
(2) 101001
(3) 100101
(4) 1001011
Q.32 Which statement is true about Random Access Memory (RAM) in a computer system?
(1) RAM is non-volatile and the amount of RAM in a computer system cannot affect its performance
(2) RAM is non-volatile and the amount of Ram in a computer system can affect its performance
(3) RAM is volatile and the amount of RAM in a computer cannot affect its performance
(4) RAM is volatile and the amount of RAM in a computer system can affect its performance
Q.32 Which statement is true about Random Access Memory (RAM) in a computer system?
(1) RAM is non-volatile and the amount of RAM in a computer system cannot affect its performance
(2) RAM is non-volatile and the amount of Ram in a computer system can affect its performance
(3) RAM is volatile and the amount of RAM in a computer cannot affect its performance
(4) RAM is volatile and the amount of RAM in a computer system can affect its performance
Q.33 What is spyware in respect of computer software?
(1) Software that aims to gather information about a person without his/her knowledge, and that may send such information to another entity
(2) Legitimate software that allows companies to monitor and supervise the computers of their employees from a central location
(3) Software used to disrupt computer operation or gain access to private computer systems
(4) A computer program hidden within another seemingly harmless program that produces copies of itself and inserts them into another programs or files
Q.33 What is spyware in respect of computer software?
(1) Software that aims to gather information about a person without his/her knowledge, and that may send such information to another entity
(2) Legitimate software that allows companies to monitor and supervise the computers of their employees from a central location
(3) Software used to disrupt computer operation or gain access to private computer systems
(4) A computer program hidden within another seemingly harmless program that produces copies of itself and inserts them into another programs or files
Q.34 Which of the following best describes a wiki?
(1) A system that allows users to add information onto a website but does not change any pre-existing information
(2) A system that allows collaborative modification of its content and structure directly from the web browser
(3) A system that serves as a publically accessible personal journal for an individual
(4) A system that monitors the modification of content within a blog
Q.34 Which of the following best describes a wiki?
(1) A system that allows users to add information onto a website but does not change any pre-existing information
(2) A system that allows collaborative modification of its content and structure directly from the web browser
(3) A system that serves as a publicly accessible personal journal for an individual
(4) A system that monitors the modification of content within a blog
Q.35 Anjali’s teacher uses VLE, a software tool designed to deliver courses online. The acronym VLE for
(1) Video Learning Environment
(2) Visual Learning Environment
(3) Virtual Learning Environment
(4) Visual Local Environment
Q.35 Anjali’s teacher uses VLE, a software tool designed to deliver courses online. The acronym VLE for
(1) Video Learning Environment
(2) Visual Learning Environment
(3) Virtual Learning Environment
(4) Visual Local Environment
Q.36 Which of the following statement(s) is/are true in respect to ICT?
P: ICT is acronym that stands for information and competitive
Q: The effective use of ICT to support learning in the inclusive education exemplifies good teaching for all
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q
Q.36 Which of the following statement(s) is/are true in respect to ICT?
P: ICT is acronym that stands for information and competitive
Q: The effective use of ICT to support learning in the inclusive education exemplifies good teaching for all
(1) P only
(2) Q only
(3) Both P and Q
(4) Neither P nor Q
Q37. What is the decimal equivalent of binary number 1100110?
(1) 102
(2) 204
(3) 153
(4) 51
Q37. What is the decimal equivalent of binary number 1100110?
(1) 102
(2) 204
(3) 153
(4) 51
Q.38 With respect to computers, which one of the following best describes phishing?
(1) A malicious installed on a system that stays concealed to avoid detection
(2) A method of bypassing normal authentication procedures over a connection to a network
(3) A type of unsolicited bulk email of identical message sent to numerous recipients
(4) An attempt to acquire sensitive information for the malicious reasons by masquerading as a trustworthy entity.
Q.38 With respect to computers, which one of the following best describes phishing?
(1) A malicious installed on a system that stays concealed to avoid detection
(2) A method of bypassing normal authentication procedures over a connection to a network
(3) A type of unsolicited bulk email of identical message sent to numerous recipients
(4) An attempt to acquire sensitive information for the malicious reasons by masquerading as a trustworthy entity.
Q.39 A computer network which is used within a building is called a
(1) WAN
(2) MAN
(3) LAN
(4) SAN
Q.39 A computer network which is used within a building is called a
(1) WAN
(2) MAN
(3) LAN
(4) SAN
Q.40 Why would BCC: be used in an e-mail?
(1) It allows the recipient to identify all the other recipients in the list when a group email address is
(2) It allows the sender to indicate who the email is for if there is more than one recipient
(3) It allows the sender of a message to conceal the recipient entered in the BCC: field from the other recipients
(4) It allows recipients to be visible to all the other recipients of the message
Q.40 Why would BCC: be used in an e-mail?
(1) It allows the recipient to identify all the other recipients in the list when a group email address is
(2) It allows the sender to indicate who the email is for if there is more than one recipient
(3) It allows the sender of a message to conceal the recipient entered in the BCC: field from the other recipients
(4) It allows recipients to be visible to all the other recipients of the message
Q.42 The acronym LCD stands for
(1) Light crystal display
(2) Liquid compact display
(3) Light compact display
(4) Liquid crystal display
Q.42 The acronym LCD stands for
(1) Light crystal display
(2) Liquid compact display
(3) Light compact display
(4) Liquid crystal display
Q.43 Which of the following is an example of proprietary system software?
(1) Linux
(2) Microsoft Internet Explorer
(3) Microsoft Office
(4) Microsoft windows
Q.43 Which of the following is an example of proprietary system software?
(1) Linux
(2) Microsoft Internet Explorer
(3) Microsoft Office
(4) Microsoft windows
Q.44 Which one of the following components is faster in terms of speed of access?
(1) USB Drive
(2) Solid State Drive
(3) RAM
(4) Hard Disk Drive
Q.44 Which one of the following components is faster in terms of speed of access?
(1) USB Drive
(2) Solid State Drive
(3) RAM
(4) Hard Disk Drive
Q.45 In internet technology, what does the acronym WYSIWYG stand for?
(1) Why You Saw Is What You Got
(2) What is See Is What You Get
(3) Where You See Is Where You Got
(4) What You See Is What you Got
Q.45 In internet technology, what does the acronym WYSIWYG stand for?
(1) Why You Saw Is What You Got
(2) What is See Is What You Get
(3) Where You See Is Where You Got
(4) What You See Is What you Got
Q.46 While sending an email, to differentiate among To:, Cc: and Bcc fields which one of the following statement is true
(1) Recipients in the To: field can see the email addresses that are in the Bcc: and Cc: fields
(2) Recipients in the Cc: field can see the email addresses that are in the To: and Bcc: fields
(3) Recipients in the Bcc: field can see the email addresses that are in the To: and Cc: fields
(4) Only the recipients in the Cc: field can see the other email addresses in the Bcc: fields
Q.46 While sending an email, to differentiate among To:, Cc: and Bcc fields which one of the following statement is true
(1) Recipients in the To: field can see the email addresses that are in the Bcc: and Cc: fields
(2) Recipients in the Cc: field can see the email addresses that are in the To: and Bcc: fields
(3) Recipients in the Bcc: field can see the email addresses that are in the To: and Cc: fields
(4) Only the recipients in the Cc: field can see the other email addresses in the Bcc: fields
Q.47 Software that you can download free, but have to pay to continue its use after a trial period is called
(1) Public domain software
(2) Freeware
(3) Open-source software
(4) Shareware
Q.47 Software that you can download free, but have to pay to continue its use after a trial period is called
(1) Public domain software
(2) Freeware
(3) Open-source software
(4) Shareware
Q.48 A group’s access to digital technology and another groups lack of access to it, will cause a disparity known as
(1) Internet inequality
(2) Web inequality
(3) Technological imbalance
(4) Digital divide
Q.48 A group’s access to digital technology and another groups lack of access to it, will cause a disparity known as
(1) Internet inequality
(2) Web inequality
(3) Technological imbalance
(4) Digital divide