ICT MCQ Quiz - Objective Question with Answer for ICT - Download Free PDF

Last updated on Mar 21, 2025

Latest ICT MCQ Objective Questions

ICT Question 1:

Which of the following peripheral devices are considered as only input devices?

(A) Speaker

(B) Barcode Reader

(C) MODEM

(D) Graphic Tablet

(E) Microphone

Choose the correct answer from the options given below :

  1. (B), (D) and (E) only
  2. (B), (C) and (D) only
  3. (A), (B) and (E) only
  4. (C), (D) and (E) only
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : (B), (D) and (E) only

ICT Question 1 Detailed Solution

Key Points
  •  Input device: It lets the user send data, information, or control signals to a computer. A computer's Central Processing Unit (CPU) receives the input and processes it to produce the output.
  • Some of the popular input devices are:
    • Keyboard
    • Mouse
    • Scanner
    • Barcode Reader:
      • A Barcode reader or scanner is an electronic input device that can scan and decode barcodes.
      • These devices use optical technology such as infrared light.
    • Graphic Tablet
      • A graphics tablet (also known as a digitizer, digital graphic tablet, pen tablet, drawing tablet, external drawing pad or digital art board) is a computer input device that enables a user to hand-draw images, animations and graphics with a special pen-like stylus, similar to the way a person draws images with a pencil.
    • Microphone:
      • The microphone is an input device to input sound that is stored digitally.
      • The microphone is used for various applications, such as adding sound to a multimedia presentation or mixing music.

 

Additional Information

  • MODEM:
    • A modem is considered an input/output device because a modem sends and receives data simultaneously.
  • Speaker:
    • A computer speaker is an output hardware device that connects to a computer to generate sound.

Therefore we can say that the correct answer is (B), (D) and (E) only

ICT Question 2:

What is the full form of SMS?

  1. Short Message Service
  2. Short Message Solution
  3. Short Message Server
  4. Short Message Sender
  5. None of the above

Answer (Detailed Solution Below)

Option 1 : Short Message Service

ICT Question 2 Detailed Solution

The correct answer is Short Message Service.

Key Points 

  • Short Message Service
    • It is a text messaging service component of most telephone, internet, and mobile device systems.
    • It uses standardized communication protocols that let mobile devices exchange short text messages.
    • SMS, as used on modern devices, originated from radio telegraphy in radio memo pagers that used standardized phone protocols. 
    • The service allows users to send and receive messages of up to 160 characters.
    • SMS was the most widely used data application, with an estimated 3.5 billion active users, or about 80% of all mobile phone subscribers.​​
    • The SMS concept was first developed by Friedhelm Hillebrand in 1984 in Franco-German GSM cooperation

ICT Question 3:

Which e-Governance service provides a centralized platform for citizens to access and apply for various government services?

  1. eHospital (ORS)
  2. Passport Seva
  3. Railway Reservation
  4. Common Services Centre (CSC)
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Common Services Centre (CSC)

ICT Question 3 Detailed Solution

The correct answer is option 4.

Key Points

  • Common Services Centre (CSC) is an e-Governance initiative established by the Government of India to provide citizens with access to various government services through a network of service centers.
  • CSCs act as a one-stop shop for citizens, providing a wide range of services such as applying for government schemes, utility bill payments, birth and death certificate issuance, and information dissemination.
  • They serve as a centralized platform where citizens can access and apply for various government services conveniently.

Additional Information

  • eHospital (ORS)
    • The eHospital or Online Registration System (ORS) is an e-Governance service in India that allows individuals to book online appointments for various medical services at government hospitals.
    • It facilitates online registration, appointment scheduling, and access to medical reports. However, it is specific to healthcare services and does not provide a centralized platform for accessing and applying for various government services. 
  • Passport Seva:
    • It is an e-Governance service provided by the Ministry of External Affairs in India. It facilitates the online application, submission, and processing of passport-related services.
    • Users can apply for new passports, renew existing passports, and schedule appointments at Passport Seva Kendras (PSKs) through the Passport Seva website or mobile app.
    • However, it is focused on passport-related services and does not offer a centralized platform for accessing and applying for various government services.
  • Railway Reservation: 
    • It is an e-Governance service that allows individuals to book train tickets online.
    • It is specific to booking train tickets through platforms provided by the Indian Railways, such as the official website or mobile applications.
    • While it is an important service, it does not provide a centralized platform for accessing and applying for various government services.

ICT Question 4:

Which of the following is a way to quickly access a favourite website by saving it in your browser?

  1. Cookie
  2. Bookmark
  3. Blog
  4. Wiki
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : Bookmark

ICT Question 4 Detailed Solution

Bookmark is a way to quickly access a  website by saving it in your browser.
Key Points

Bookmark

  • A bookmark in the context of the World Wide Web is a Uniform Resource Identifier that is saved for later retrieval in any of several storage formats.
  • Bookmark functionality is available in all current web browsers.
  • Bookmarks help users and browsers save time, which is particularly important when browsing Web pages with lengthy URLs or a specific section of the site that isn't always the homepage.

Additional Information

Cookie 

  • Cookies are text files made by the websites you visit. For a more convenient internet experience, they save browsing information.
  • Cookies enable websites to keep you logged in, remember your choices, and deliver content that is appropriate for your location.
  • A cookie is a bit of information that a website sends to a web browser and then stores there for later retrieval by the same website.
  • Cookies are used to inform a server when visitors return to a specific website.

Blog

  • A blog, also known as a Web log or Weblog, is an online journal where a person, group, or organisation keeps a record of their actions, ideas, or views.
  • Some blogs serve primarily as news aggregators, gathering information from numerous online sources and including brief comments and links to the Internet.
  • Other blogs place more emphasis on offering original content. Many blogs also offer forums where readers can post comments and engage with the author. The act of creating content for a blog is called "blogging."
  • The majority of content is written, but many blogs also include key visual, aural, and visual components. The internet realm of blogs is referred to as the "blogosphere."

Wiki

  • A wiki is a collaborative tool that enables students to add to and edit one or more pages of course-related resources.
  • Wikis encourage community formation within a course because they are collaborative in nature.
  • A wiki is essentially a web page with a public editing process. Wikis were developed primarily to provide a platform for collaborative text writing on a particular topic and text-to-text connections.
  • Sharing knowledge for the greater good is another major goal of many wikis.

ICT Question 5:

Which Indian Act makes it illegal to knowingly spread a computer virus?

  1. Data protection and Security Act, 1997
  2. Information Security Act, 1998
  3. Information Technology Act, 2000
  4. Computer Misuse and Cyber Act, 2009
  5. None of the above

Answer (Detailed Solution Below)

Option 3 : Information Technology Act, 2000

ICT Question 5 Detailed Solution

 Key Points

The Indian Act that makes it illegal to knowingly spread a computer virus is the Information Technology Act, of 2000.

This act was enacted to provide legal recognition for electronic transactions and to protect electronic data from unauthorized access, modification, and destruction.

Section 43 of the Information Technology Act, of 2000 specifically deals with penalties for damage to computer systems, and it includes provisions for punishing those who spread computer viruses.

  • Section 43 deals with penalties for damage to computer systems and data.

  • It includes provisions for punishing those who gain unauthorized access to a computer system, computer network, or computer resource.

  • The section specifies punishment of imprisonment for up to three years and/or a fine of up to INR 500,000 (approximately USD 6,800) for offenses related to damage to computer systems, data, and networks.

  • The section also allows for the payment of compensation for any loss or damage caused due to the offense.

  • The punishment under Section 43 can be enhanced in case of repeat offenses or damage to critical infrastructure such as power grids or government computer systems

Therefore, the correct option is option 3) Information Technology Act, 2000.

Important Points   Information Technology Act, 2000.

  • The act defines various cyber crimes, which include hacking, phishing, identity theft, virus attacks, denial of service attacks, and distribution of obscene content, among others.
  • The act provides legal provisions for the investigation and prosecution of these cyber crimes.
  • Hacking is defined as gaining unauthorized access to a computer system, computer network, or computer resource.
  • Phishing is defined as the act of fraudulently obtaining sensitive information such as passwords and credit card details by impersonating a trustworthy entity.
  • Identity theft is defined as the act of fraudulently assuming another person's identity for financial gain.
  • Virus attacks are defined as the act of intentionally spreading computer viruses to damage computer systems, data, and networks.
  • Denial of service attacks is defined as the act of disrupting the normal functioning of a computer system or network by overwhelming it with traffic.
  • The IT Act, of 2000 was enacted to provide legal recognition to electronic transactions, facilitate e-governance, and prevent cyber crimes in India.

  • he acts specifies punishments for various offenses, which range from imprisonment for up to three years and/or a fine of up to INR 500,000 (approximately USD 6,800) for the first offense to imprisonment for up to ten years and/or a fine of up to INR 1 crore (approximately USD 138,000) for repeat offenses.

  • The act also provides for the establishment of a Cyber Appellate Tribunal to hear appeals against orders passed by adjudicating officers appointed under the act.

In summary, the IT Act, of 2000 covers various types of cyber crimes such as hacking, phishing, identity theft, virus attacks, denial of service attacks, and distribution of obscene content, among others, and provides legal provisions for their investigation and prosecution.

Additional Information 

The Information Technology (Amendment2008 Act has been debated since it was passed by the Indian Parliament in December 2008, about a month after the terrorist attacks in Mumbai. The new IT Act empowers the Indian government to intercept, monitor, and decrypt computer systems, resources, and communication devices.

The objective of this Indian Penal Code is to provide a general Penal Code for India. Though this Code consolidates the whole of the law on the subject and is exhaustive on the matters in respect of which it declares the law, many more penal statutes governing various offenses have been created in addition to this code.

Top ICT MCQ Objective Questions

The speed of processor of a computer is measured in ____.

  1. Gigahertz 
  2. Baud
  3. BPS
  4. MIPS

Answer (Detailed Solution Below)

Option 1 : Gigahertz 

ICT Question 6 Detailed Solution

Download Solution PDF

the correct answer is ​GigaHertz.

Key Points

  • Clock speed:
    • Clock speed is the significant way to measure the performance of Processor.
    • CPU processes many instructions (low-level calculations like arithmetic) from different programs every second. The clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
    • A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes, they’re a basic unit that helps understand a CPU’s speed.
    • During each cycle, billions of transistors within the processor open and close.
    • A CPU with a clock speed of 3.2 GHz executes 3.2 billion cycles per second.

The main two components of CPU are ____________.

  1. control unit and ALU
  2. ALU and BUS
  3. Control unit and register
  4. Registers and main memory

Answer (Detailed Solution Below)

Option 1 : control unit and ALU

ICT Question 7 Detailed Solution

Download Solution PDF

The correct answer is Control Unit and ALU.

  • Computers have become pervasive in every walk of life.
  • It has changed the way we work, play, communicate and learn.
  • A computer essentially comprises of a set of hardware and software.

Key Points

The Central Processing Unit (CPU):

  • The CPU is the brain of the computer.
  • Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
  • The CPU executes the programs and controls the operation of all the hardware.
  • The three main components of the CPU are:

The Control Unit (CU):

  • It is one of the most important parts of the microprocessor as it is in charge of the entire process.
  • The control unit extracts instructions from memory and decodes them.
  • Based on these instructions, it creates control signals that tell the Arithmetic Logic Unit (ALU) and the Registers how to operate, what to operate on and what to do with the result.
  • The role of the control unit in the CPU is that of a “manager”.
  • In other words, it controls and coordinates all hardware operations.

The Arithmetic and Logic Unit (ALU):

  • It is the section where the actual data processing takes place.
  • All calculations and comparisons take place in this section.
  • In addition to arithmetic functions, the ALU also handles logic operations.
  • All mathematical operations are performed in binary numbers and all logic operations are performed using binary operations.

The Primary Memory (Main memory):

  • This unit stores programs during their execution, stores data that are being used by the current program and stores the operating system which controls the operation of the computer system.
  • It consists of Random Access Memory (RAM) where the user's programs and data must be stored in order to be run and Read-Only Memory (ROM) where permanent programs and data are built-in by the manufacturer.

Hence, it is clear that the Control Unit and ALU are the two main components of the CPU.

quesImage185

  • BUS: It is a Data Communication System in a computer network. The ALU and CU that are linked internally and externally by busses which carry binary signals between.
  • Register: They can be thought of as the CPU’s tiny scratchpad, temporarily storing instructions or data.

First cyberlaw which provides the legal infrastructure for e-commerce in India is

  1. The Information Technology Act, 1996
  2. The Information Technology Act, 2000
  3. The Information Technology Act, 1998
  4. The Information Technology Act, 1990

Answer (Detailed Solution Below)

Option 2 : The Information Technology Act, 2000

ICT Question 8 Detailed Solution

Download Solution PDF

The correct answer is The Information Technology act, 2000.

  • The Information Technology act 2000 is the first cyber law in India.
    • It was the first cyber law that provides the legal infrastructure for e-commerce in India.
    • The Information Technology act 2000 was enacted on 9th June 2000.
    • The Information Technology act 2000 came into effect on 17th October 2000.
    • The Information Technology act 2000  has 94 sections divided into 13 chapters and 4 schedules.

Additional Information

  • The act mainly focuses on the following issues:
    • Offences and contraventions.
    • Legal recognition of digital signatures.
    • Legal recognition of electronic documents.

The ability to read and write each piece of information in a storage device in approximately the same length of time of its location is _____.

  1. Sequential Access
  2. Raster scan
  3. Search
  4. Random Access

Answer (Detailed Solution Below)

Option 4 : Random Access

ICT Question 9 Detailed Solution

Download Solution PDF

The correct answer is Random Access.

Key Points

  • Random Access:
    • In computer science, random access is the capability to have access to any item from a given population of elements at random.
    • Random access is the opposite of sequential access, as sequential access locates elements by beginning at a particular predefined location and then traversing through all of the information in order to find the given item.
    • Random access has gained interest due to the fact that one can retrieve a record irrespective of the position in which it is located.
    • Random access is also known as direct access.

Which Operating System is used by the Apple computer systems (an American technology company)? 

  1. Linux
  2. Windows
  3. Solaris
  4. Mac

Answer (Detailed Solution Below)

Option 4 : Mac

ICT Question 10 Detailed Solution

Download Solution PDF

An operating system is a software program that manages and operates computing devices.

Key Points

  •  Mac OS is a powerful operating system that offers similar features and services to Windows and Linux. 
  • The Macintosh Operating System (Mac OS) is an operating system developed by Apple Inc.
  • It is a graphical user interface-based operating system that was first published in 1984.
  • Apple is an American-based company located in California. 
  • Mac OS is meant to run on Apple computers and does not support the x86 architecture by default.
  • Mac OS has multiple versions available such as Macintosh 128k, Mac OS 7, Mac OS X, and Mac Mountain Lion.

Therefore, Mac is used by the Apple computer systems (an American technology company).

Additional Information

  • Microsoft Windows, usually known as Windows or Windows OS, is a personal computer operating system developed by Microsoft Corporation.
  • Linux is a collection of open-source Unix-like operating systems based on Linus Torvalds' Linux kernel which was launched on September 17, 1991.
  • Oracle Solaris is also an operating system. 

Given below are two statements

Statement I: Compilers are software

Statement II: Touch screen monitors are input/output devices

In light of the above statements, choose the most appropriate answer from the options given below

  1. Both Statement I and Statement II are true
  2. Both Statement I and Statement II are false
  3. Statement I i true but Statement II is false
  4. Statement I is false but Statement II is true

Answer (Detailed Solution Below)

Option 1 : Both Statement I and Statement II are true

ICT Question 11 Detailed Solution

Download Solution PDF

Compilers:

  • A compiler is a program that translates a source program written in some high-level programming language into machine code for some computer architecture.
  • The generated machine code can be later executed many times against different data each time.
  • It writes the text into a format that the CPU can understand
  • This is a kind of system software

F1 Shraddha Pratiksha 21.01.2021 D2

Touch screen monitors:

  • This is a device that helps the user to interact with the computer using their finger
  • It is an alternative to mouse and keyboard for navigating a Graphical User Interface (GUI)
  • It allows tough sensitive inputs as well as outputs.

Therefore it is clear that Compilers are software and Touch screen monitors are input/output devices. So both the statements are true.

Which of the following is the binary equivalent of 25?

  1. 11010
  2. 11001
  3. 10111
  4. 10101

Answer (Detailed Solution Below)

Option 2 : 11001

ICT Question 12 Detailed Solution

Download Solution PDF

A number system includes the number of independent digits used in the number system (the base), the place values of the different digits constituting the number, and the maximum numbers that can be written with the given number of digits.

The Binary Number System: 

  • The binary number system with only two independent digits, 0 and 1, is a base-2 number system.
  • All larger binary numbers are represented in terms of ‘0’ and ‘1’.

new 16316276574081

Decimal to Binary Conversion:

Step 1: Divide 22 by 2 to get the Quotient. Keep the Whole part for the next step and set the Remainder aside.

25 / 2 = 12 with 1 remainder

Step 2: Divide the Whole part of the Quotient from Step 1 by 2. Again, keep the Whole part and set the Remainder aside.

12 / 2 = 6 with 0 remainder

Step 3: Repeat Step 2 above until the Whole part is 0.

6 / 2 = 3 with 0 remainder

3 / 2 = 1 with 1 remainder

1 / 2 = 0 with 1 remainder

Step 4: Write down the Remainders in reverse order to get the answer to 25 as a binary.

When we put the remainder together in reverse order, we get the answer 11001

Hence, the binary equivalent of decimal number 25 is 11001

Identify the incorrect pair from the following:

  1. .jpg - graphic file
  2. .ttf - word text file
  3. .wav - audio file
  4. .exe - executable file 

Answer (Detailed Solution Below)

Option 2 : .ttf - word text file

ICT Question 13 Detailed Solution

Download Solution PDF
File Format File Extension
Word Text Document File .txt
Microsoft Word document (the original official) .doc
The Portable Document Format  .pdf
Microsoft Word document (the newer version of DOC) .docx
PNG (Portable Network Graphics) Format .png
PowerPoint Picture Presentation .pptx
Microsoft Excel Spreadsheets .xls
PowerPoint 97-2003 Presentation .ppt
The third audio format of the MPEG-1 standard .mp3
JPEG (Joint Photographic Experts Group) FileFormat .jpg
Waveform Audio File Format  .wav
Executable file .exe
MPEG-4 Video .mp4
GIF (Graphics Interchange Format) .gif
Tagged Image File Format .tiff

Hence,  the incorrect pair is .ttf - word text file.

What is the email attachment size limit in Gmail?

  1. 10 MB
  2. 15 MB
  3. 25 MB
  4. 40 MB

Answer (Detailed Solution Below)

Option 3 : 25 MB

ICT Question 14 Detailed Solution

Download Solution PDF

Electronic mail, or email, is the transmission of text-based messages among networked computers. Email is one of the earliest and most basic messaging resources on the Internet and in many ways it still acts as the lowest common denominator for computer communications. Types of email services:

  • Free Web-based Email Services: These are the commonly used email accounts accessible through a web browser (such as Internet Explorer, Firefox etc.). They generally use HTTP Protocol for accessing mail. Example: Yahoo Mail, Hotmail, Gmail (whose attachment size limit is 25 MB) offer free web-based email services. These services are run on financial profit from advertisements. Advertisers pay service providers to expose email account holders to advertisement.
  • Priced Web-based Email Services: There are also priced web-based email service providers. Many of the free web-based email service providers such as Yahoo! And Hotmail do offer premium account on payment basis. Advantage of utilising such services include more secured transaction of communication; personalised email address; better spam filtration as well as increased storage space. Priced email services are most useful in business-related message exchanges. 
  • Private Email Services: Most of the institutions/organisations have their own dedicated mail server and offer mail account for free to their staff and other members of the institution. These accounts exist only till one is member of that institution. For example: [email protected]; [email protected] etc.

Hence, we conclude that email attachment size limit in Gmail is 25 MB.

Which of the following hardware was used by the first generation computers?

  1. Transistors
  2. Vacuum tubes
  3. VLSI
  4. Integrated circuits

Answer (Detailed Solution Below)

Option 2 : Vacuum tubes

ICT Question 15 Detailed Solution

Download Solution PDF

The computer has evolved from a large-sized simple calculating machine to a much smaller machine capable of multiple functionalities. Each generation of computer is designed based on the hardware technology used leading to better, cheaper and powerful computers that are faster and efficient than their predecessors.

Generation of Computers based on Hardware

Generation

Description

1st Generation (1940 – 1956)

  • used vacuum tubes for circuitry and magnetic drums for memory
  • very expensive, large in size, slow in processing and had less storage capacity
  • used machine level language for programming

2nd Generation (1956 – 1963)

  • transistors were used instead of vacuum tube
  • smaller, faster, cheaper, more energy-efficient, and more reliable than the previous generation
  • High-level programming languages were also being developed such as COBOL, FORTRAN

3rd Generation (1964 – 1971)

  • used Integrated Circuit(IC) consisting of the capacity of 300 transistors
  • small in size, low cost, large memory and high processing speed
  • known as minicomputers

4th Generation (1972 – 2010)

  • used VLSI (Very Large Scale Integration)
  • became possible to place CPU on a single chip
  • known as microcomputers

5th Generation (2010 – to date)

  • based on artificial intelligence
  • portable, superior processing speed, and network connectivity
  • the aim is to develop devices that will respond to natural language inputs and be capable of learning

Hence, it can be concluded from the table that vacuum tubes were used by the first generation computers.

Get Free Access Now
Hot Links: teen patti tiger teen patti star teen patti master update teen patti master apk best teen patti yes