ICT MCQ Quiz - Objective Question with Answer for ICT - Download Free PDF
Last updated on Mar 21, 2025
Latest ICT MCQ Objective Questions
ICT Question 1:
Which of the following peripheral devices are considered as only input devices?
(A) Speaker
(B) Barcode Reader
(C) MODEM
(D) Graphic Tablet
(E) Microphone
Choose the correct answer from the options given below :
Answer (Detailed Solution Below)
ICT Question 1 Detailed Solution
- Input device: It lets the user send data, information, or control signals to a computer. A computer's Central Processing Unit (CPU) receives the input and processes it to produce the output.
- Some of the popular input devices are:
- Keyboard
- Mouse
- Scanner
- Barcode Reader:
- A Barcode reader or scanner is an electronic input device that can scan and decode barcodes.
- These devices use optical technology such as infrared light.
- Graphic Tablet:
- A graphics tablet (also known as a digitizer, digital graphic tablet, pen tablet, drawing tablet, external drawing pad or digital art board) is a computer input device that enables a user to hand-draw images, animations and graphics with a special pen-like stylus, similar to the way a person draws images with a pencil.
- Microphone:
- The microphone is an input device to input sound that is stored digitally.
- The microphone is used for various applications, such as adding sound to a multimedia presentation or mixing music.
Additional Information
- MODEM:
- A modem is considered an input/output device because a modem sends and receives data simultaneously.
- Speaker:
- A computer speaker is an output hardware device that connects to a computer to generate sound.
Therefore we can say that the correct answer is (B), (D) and (E) only
ICT Question 2:
What is the full form of SMS?
Answer (Detailed Solution Below)
ICT Question 2 Detailed Solution
The correct answer is Short Message Service.
Key Points
- Short Message Service
- It is a text messaging service component of most telephone, internet, and mobile device systems.
- It uses standardized communication protocols that let mobile devices exchange short text messages.
- SMS, as used on modern devices, originated from radio telegraphy in radio memo pagers that used standardized phone protocols.
- The service allows users to send and receive messages of up to 160 characters.
- SMS was the most widely used data application, with an estimated 3.5 billion active users, or about 80% of all mobile phone subscribers.
- The SMS concept was first developed by Friedhelm Hillebrand in 1984 in Franco-German GSM cooperation
ICT Question 3:
Which e-Governance service provides a centralized platform for citizens to access and apply for various government services?
Answer (Detailed Solution Below)
ICT Question 3 Detailed Solution
The correct answer is option 4.
Key Points
- Common Services Centre (CSC) is an e-Governance initiative established by the Government of India to provide citizens with access to various government services through a network of service centers.
- CSCs act as a one-stop shop for citizens, providing a wide range of services such as applying for government schemes, utility bill payments, birth and death certificate issuance, and information dissemination.
- They serve as a centralized platform where citizens can access and apply for various government services conveniently.
Additional Information
- eHospital (ORS)
- The eHospital or Online Registration System (ORS) is an e-Governance service in India that allows individuals to book online appointments for various medical services at government hospitals.
- It facilitates online registration, appointment scheduling, and access to medical reports. However, it is specific to healthcare services and does not provide a centralized platform for accessing and applying for various government services.
- Passport Seva:
- It is an e-Governance service provided by the Ministry of External Affairs in India. It facilitates the online application, submission, and processing of passport-related services.
- Users can apply for new passports, renew existing passports, and schedule appointments at Passport Seva Kendras (PSKs) through the Passport Seva website or mobile app.
- However, it is focused on passport-related services and does not offer a centralized platform for accessing and applying for various government services.
- Railway Reservation:
- It is an e-Governance service that allows individuals to book train tickets online.
- It is specific to booking train tickets through platforms provided by the Indian Railways, such as the official website or mobile applications.
- While it is an important service, it does not provide a centralized platform for accessing and applying for various government services.
ICT Question 4:
Which of the following is a way to quickly access a favourite website by saving it in your browser?
Answer (Detailed Solution Below)
ICT Question 4 Detailed Solution
Bookmark is a way to quickly access a website by saving it in your browser.
Key Points
Bookmark
- A bookmark in the context of the World Wide Web is a Uniform Resource Identifier that is saved for later retrieval in any of several storage formats.
- Bookmark functionality is available in all current web browsers.
- Bookmarks help users and browsers save time, which is particularly important when browsing Web pages with lengthy URLs or a specific section of the site that isn't always the homepage.
Additional Information
Cookie
- Cookies are text files made by the websites you visit. For a more convenient internet experience, they save browsing information.
- Cookies enable websites to keep you logged in, remember your choices, and deliver content that is appropriate for your location.
- A cookie is a bit of information that a website sends to a web browser and then stores there for later retrieval by the same website.
- Cookies are used to inform a server when visitors return to a specific website.
Blog
- A blog, also known as a Web log or Weblog, is an online journal where a person, group, or organisation keeps a record of their actions, ideas, or views.
- Some blogs serve primarily as news aggregators, gathering information from numerous online sources and including brief comments and links to the Internet.
- Other blogs place more emphasis on offering original content. Many blogs also offer forums where readers can post comments and engage with the author. The act of creating content for a blog is called "blogging."
- The majority of content is written, but many blogs also include key visual, aural, and visual components. The internet realm of blogs is referred to as the "blogosphere."
Wiki
- A wiki is a collaborative tool that enables students to add to and edit one or more pages of course-related resources.
- Wikis encourage community formation within a course because they are collaborative in nature.
- A wiki is essentially a web page with a public editing process. Wikis were developed primarily to provide a platform for collaborative text writing on a particular topic and text-to-text connections.
- Sharing knowledge for the greater good is another major goal of many wikis.
ICT Question 5:
Which Indian Act makes it illegal to knowingly spread a computer virus?
Answer (Detailed Solution Below)
ICT Question 5 Detailed Solution
Key Points
The Indian Act that makes it illegal to knowingly spread a computer virus is the Information Technology Act, of 2000.
This act was enacted to provide legal recognition for electronic transactions and to protect electronic data from unauthorized access, modification, and destruction.
Section 43 of the Information Technology Act, of 2000 specifically deals with penalties for damage to computer systems, and it includes provisions for punishing those who spread computer viruses.
-
Section 43 deals with penalties for damage to computer systems and data.
-
It includes provisions for punishing those who gain unauthorized access to a computer system, computer network, or computer resource.
-
The section specifies punishment of imprisonment for up to three years and/or a fine of up to INR 500,000 (approximately USD 6,800) for offenses related to damage to computer systems, data, and networks.
-
The section also allows for the payment of compensation for any loss or damage caused due to the offense.
-
The punishment under Section 43 can be enhanced in case of repeat offenses or damage to critical infrastructure such as power grids or government computer systems
Therefore, the correct option is option 3) Information Technology Act, 2000.
Important Points Information Technology Act, 2000.
- The act defines various cyber crimes, which include hacking, phishing, identity theft, virus attacks, denial of service attacks, and distribution of obscene content, among others.
- The act provides legal provisions for the investigation and prosecution of these cyber crimes.
- Hacking is defined as gaining unauthorized access to a computer system, computer network, or computer resource.
- Phishing is defined as the act of fraudulently obtaining sensitive information such as passwords and credit card details by impersonating a trustworthy entity.
- Identity theft is defined as the act of fraudulently assuming another person's identity for financial gain.
- Virus attacks are defined as the act of intentionally spreading computer viruses to damage computer systems, data, and networks.
- Denial of service attacks is defined as the act of disrupting the normal functioning of a computer system or network by overwhelming it with traffic.
-
The IT Act, of 2000 was enacted to provide legal recognition to electronic transactions, facilitate e-governance, and prevent cyber crimes in India.
-
he acts specifies punishments for various offenses, which range from imprisonment for up to three years and/or a fine of up to INR 500,000 (approximately USD 6,800) for the first offense to imprisonment for up to ten years and/or a fine of up to INR 1 crore (approximately USD 138,000) for repeat offenses.
-
The act also provides for the establishment of a Cyber Appellate Tribunal to hear appeals against orders passed by adjudicating officers appointed under the act.
In summary, the IT Act, of 2000 covers various types of cyber crimes such as hacking, phishing, identity theft, virus attacks, denial of service attacks, and distribution of obscene content, among others, and provides legal provisions for their investigation and prosecution.
Additional Information
The Information Technology (Amendment) 2008 Act has been debated since it was passed by the Indian Parliament in December 2008, about a month after the terrorist attacks in Mumbai. The new IT Act empowers the Indian government to intercept, monitor, and decrypt computer systems, resources, and communication devices.
The objective of this Indian Penal Code is to provide a general Penal Code for India. Though this Code consolidates the whole of the law on the subject and is exhaustive on the matters in respect of which it declares the law, many more penal statutes governing various offenses have been created in addition to this code.
Top ICT MCQ Objective Questions
The speed of processor of a computer is measured in ____.
Answer (Detailed Solution Below)
ICT Question 6 Detailed Solution
Download Solution PDFthe correct answer is GigaHertz.
Key Points
- Clock speed:
- Clock speed is the significant way to measure the performance of Processor.
- CPU processes many instructions (low-level calculations like arithmetic) from different programs every second. The clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
- A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes, they’re a basic unit that helps understand a CPU’s speed.
- During each cycle, billions of transistors within the processor open and close.
- A CPU with a clock speed of 3.2 GHz executes 3.2 billion cycles per second.
The main two components of CPU are ____________.
Answer (Detailed Solution Below)
ICT Question 7 Detailed Solution
Download Solution PDFThe correct answer is Control Unit and ALU.
- Computers have become pervasive in every walk of life.
- It has changed the way we work, play, communicate and learn.
- A computer essentially comprises of a set of hardware and software.
Key Points
The Central Processing Unit (CPU):
- The CPU is the brain of the computer.
- Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
- The CPU executes the programs and controls the operation of all the hardware.
- The three main components of the CPU are:
The Control Unit (CU):
- It is one of the most important parts of the microprocessor as it is in charge of the entire process.
- The control unit extracts instructions from memory and decodes them.
- Based on these instructions, it creates control signals that tell the Arithmetic Logic Unit (ALU) and the Registers how to operate, what to operate on and what to do with the result.
- The role of the control unit in the CPU is that of a “manager”.
- In other words, it controls and coordinates all hardware operations.
The Arithmetic and Logic Unit (ALU):
- It is the section where the actual data processing takes place.
- All calculations and comparisons take place in this section.
- In addition to arithmetic functions, the ALU also handles logic operations.
- All mathematical operations are performed in binary numbers and all logic operations are performed using binary operations.
The Primary Memory (Main memory):
- This unit stores programs during their execution, stores data that are being used by the current program and stores the operating system which controls the operation of the computer system.
- It consists of Random Access Memory (RAM) where the user's programs and data must be stored in order to be run and Read-Only Memory (ROM) where permanent programs and data are built-in by the manufacturer.
Hence, it is clear that the Control Unit and ALU are the two main components of the CPU.
- BUS: It is a Data Communication System in a computer network. The ALU and CU that are linked internally and externally by busses which carry binary signals between.
- Register: They can be thought of as the CPU’s tiny scratchpad, temporarily storing instructions or data.
First cyberlaw which provides the legal infrastructure for e-commerce in India is
Answer (Detailed Solution Below)
ICT Question 8 Detailed Solution
Download Solution PDFThe correct answer is The Information Technology act, 2000.
- The Information Technology act 2000 is the first cyber law in India.
- It was the first cyber law that provides the legal infrastructure for e-commerce in India.
- The Information Technology act 2000 was enacted on 9th June 2000.
- The Information Technology act 2000 came into effect on 17th October 2000.
- The Information Technology act 2000 has 94 sections divided into 13 chapters and 4 schedules.
Additional Information
- The act mainly focuses on the following issues:
- Offences and contraventions.
- Legal recognition of digital signatures.
- Legal recognition of electronic documents.
The ability to read and write each piece of information in a storage device in approximately the same length of time of its location is _____.
Answer (Detailed Solution Below)
ICT Question 9 Detailed Solution
Download Solution PDFThe correct answer is Random Access.
Key Points
- Random Access:
- In computer science, random access is the capability to have access to any item from a given population of elements at random.
- Random access is the opposite of sequential access, as sequential access locates elements by beginning at a particular predefined location and then traversing through all of the information in order to find the given item.
- Random access has gained interest due to the fact that one can retrieve a record irrespective of the position in which it is located.
- Random access is also known as direct access.
Which Operating System is used by the Apple computer systems (an American technology company)?
Answer (Detailed Solution Below)
ICT Question 10 Detailed Solution
Download Solution PDFAn operating system is a software program that manages and operates computing devices.
Key Points
- Mac OS is a powerful operating system that offers similar features and services to Windows and Linux.
- The Macintosh Operating System (Mac OS) is an operating system developed by Apple Inc.
- It is a graphical user interface-based operating system that was first published in 1984.
- Apple is an American-based company located in California.
- Mac OS is meant to run on Apple computers and does not support the x86 architecture by default.
- Mac OS has multiple versions available such as Macintosh 128k, Mac OS 7, Mac OS X, and Mac Mountain Lion.
Therefore, Mac is used by the Apple computer systems (an American technology company).
Additional Information
- Microsoft Windows, usually known as Windows or Windows OS, is a personal computer operating system developed by Microsoft Corporation.
- Linux is a collection of open-source Unix-like operating systems based on Linus Torvalds' Linux kernel which was launched on September 17, 1991.
- Oracle Solaris is also an operating system.
Given below are two statements
Statement I: Compilers are software
Statement II: Touch screen monitors are input/output devices
In light of the above statements, choose the most appropriate answer from the options given below
Answer (Detailed Solution Below)
ICT Question 11 Detailed Solution
Download Solution PDFCompilers:
- A compiler is a program that translates a source program written in some high-level programming language into machine code for some computer architecture.
- The generated machine code can be later executed many times against different data each time.
- It writes the text into a format that the CPU can understand
- This is a kind of system software
Touch screen monitors:
- This is a device that helps the user to interact with the computer using their finger
- It is an alternative to mouse and keyboard for navigating a Graphical User Interface (GUI)
- It allows tough sensitive inputs as well as outputs.
Therefore it is clear that Compilers are software and Touch screen monitors are input/output devices. So both the statements are true.
Which of the following is the binary equivalent of 25?
Answer (Detailed Solution Below)
ICT Question 12 Detailed Solution
Download Solution PDFA number system includes the number of independent digits used in the number system (the base), the place values of the different digits constituting the number, and the maximum numbers that can be written with the given number of digits.
The Binary Number System:
- The binary number system with only two independent digits, 0 and 1, is a base-2 number system.
- All larger binary numbers are represented in terms of ‘0’ and ‘1’.
Decimal to Binary Conversion:
Step 1: Divide 22 by 2 to get the Quotient. Keep the Whole part for the next step and set the Remainder aside.
25 / 2 = 12 with 1 remainder
Step 2: Divide the Whole part of the Quotient from Step 1 by 2. Again, keep the Whole part and set the Remainder aside.
12 / 2 = 6 with 0 remainder
Step 3: Repeat Step 2 above until the Whole part is 0.
6 / 2 = 3 with 0 remainder
3 / 2 = 1 with 1 remainder
1 / 2 = 0 with 1 remainder
Step 4: Write down the Remainders in reverse order to get the answer to 25 as a binary.
When we put the remainder together in reverse order, we get the answer 11001
Hence, the binary equivalent of decimal number 25 is 11001
Identify the incorrect pair from the following:
Answer (Detailed Solution Below)
ICT Question 13 Detailed Solution
Download Solution PDFFile Format | File Extension |
Word Text Document File | .txt |
Microsoft Word document (the original official) | .doc |
The Portable Document Format | |
Microsoft Word document (the newer version of DOC) | .docx |
PNG (Portable Network Graphics) Format | .png |
PowerPoint Picture Presentation | .pptx |
Microsoft Excel Spreadsheets | .xls |
PowerPoint 97-2003 Presentation | .ppt |
The third audio format of the MPEG-1 standard | .mp3 |
JPEG (Joint Photographic Experts Group) FileFormat | .jpg |
Waveform Audio File Format | .wav |
Executable file | .exe |
MPEG-4 Video | .mp4 |
GIF (Graphics Interchange Format) | .gif |
Tagged Image File Format | .tiff |
Hence, the incorrect pair is .ttf - word text file.
What is the email attachment size limit in Gmail?
Answer (Detailed Solution Below)
ICT Question 14 Detailed Solution
Download Solution PDFElectronic mail, or email, is the transmission of text-based messages among networked computers. Email is one of the earliest and most basic messaging resources on the Internet and in many ways it still acts as the lowest common denominator for computer communications. Types of email services:
- Free Web-based Email Services: These are the commonly used email accounts accessible through a web browser (such as Internet Explorer, Firefox etc.). They generally use HTTP Protocol for accessing mail. Example: Yahoo Mail, Hotmail, Gmail (whose attachment size limit is 25 MB) offer free web-based email services. These services are run on financial profit from advertisements. Advertisers pay service providers to expose email account holders to advertisement.
- Priced Web-based Email Services: There are also priced web-based email service providers. Many of the free web-based email service providers such as Yahoo! And Hotmail do offer premium account on payment basis. Advantage of utilising such services include more secured transaction of communication; personalised email address; better spam filtration as well as increased storage space. Priced email services are most useful in business-related message exchanges.
- Private Email Services: Most of the institutions/organisations have their own dedicated mail server and offer mail account for free to their staff and other members of the institution. These accounts exist only till one is member of that institution. For example: [email protected]; [email protected] etc.
Hence, we conclude that email attachment size limit in Gmail is 25 MB.
Which of the following hardware was used by the first generation computers?
Answer (Detailed Solution Below)
ICT Question 15 Detailed Solution
Download Solution PDFThe computer has evolved from a large-sized simple calculating machine to a much smaller machine capable of multiple functionalities. Each generation of computer is designed based on the hardware technology used leading to better, cheaper and powerful computers that are faster and efficient than their predecessors.
Generation of Computers based on Hardware |
|
Generation |
Description |
1st Generation (1940 – 1956) |
|
2nd Generation (1956 – 1963) |
|
3rd Generation (1964 – 1971) |
|
4th Generation (1972 – 2010) |
|
5th Generation (2010 – to date) |
|
Hence, it can be concluded from the table that vacuum tubes were used by the first generation computers.