0% found this document useful (0 votes)
41 views12 pages

ICT Skills Questions

The document contains questions about computer and internet related terms. It asks about topics like what www stands for, uses of Bcc in email, types of computer networks, web browsers, file sizes and storage units, computer languages, multimedia, blogs, operating systems, internet protocols, and other computer hardware and software concepts. The questions test knowledge across a wide range of foundational IT topics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views12 pages

ICT Skills Questions

The document contains questions about computer and internet related terms. It asks about topics like what www stands for, uses of Bcc in email, types of computer networks, web browsers, file sizes and storage units, computer languages, multimedia, blogs, operating systems, internet protocols, and other computer hardware and software concepts. The questions test knowledge across a wide range of foundational IT topics.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Sn

Question Question Type


What does "www" stand for?
1

2 Why would Bcc. Used in an email?

3 A computer network which is used within a


building is termed as…....
4 Which of the following is not an Web browser?
5 1 Gigabyte is equal to...
6 HTML is used to create….
7 Which of the following represent the binary
equivalent of the decimal number 23?
8 Where does a computer add and compare its
data?
9 Computers on the internet are identified by…..
10 Which is the largest unit of storage among the
following?
11 Errors in computer programmes are called…
12 Speech about objects or people, speech about
processes, speech about events, and speech
about concepts.
13 Computer follows a simple principle GIGO which
stands for…
14 Which is the commonly used unit for measuring
the speed of data transmission?
15 1 byte consists of ..
16
Which of the following statement is correct?

17 Line access and avoidance of collision are the


main functions of…
18 Communications bandwidth that has the highest
capacity and is used by microwave, cable and
fibre optics lines is known as:
19 Using websites to pour out one's grievances is
called:
20 Video transmission over the Internet that looks
like delayed livecasting is called:
21
Which of the following statement is correct?

22
On the keyboard of computer each character has
an "ASCII" value which stands for:
23 Which part of the Central Processing Unit (CPU)
performs calculation and makes decisions:
24 "Dpi" stands for:
25 Which of the following is not a Computer
language?
26 Information, a combination of graphics, text,
sound, video and animation is called:
27
What is blog?

28 Which of the following is not related to


information security on the Internet?
29 Which one of the following is an example of
Operating System?
30
 S/MIME in Internet technology stands for

31 DNS in internet technology stands for


32 Which of the following is type of LAN ?
33 TCP/IP is necessary if one is to connect to the
34
POP3 and IMAP are e-mail accounts in which

35 A Personal Computer uses a number of chips


mounted on a circuit board called
36 A hard disk is divided into tracks which is further
subdivided into
37 A computer program that translates a program
statement by statement into machine languages
is called a/an
38
A Compiler is a software which converts

39
Virtual memory is

40 Commercial messages on the net are identified


as
41 GIF stands for
42 The acronym FTP stands for
43 When a computer is booting, BIOS is loaded to
the memory by
44 Which one of the following is not the same as the
other three?
45 Symbols A-F are used in which one of the
following?
46 Encoding or scrambling data for transmission
across a network is known as
47 Which of the following device is used to connect
two systems, especially if the systems use
different protocols?
48 A distributed network configuration in which all
data/information pass through a central
computer is
49
Demodulation is a process of

50
Which of the following is a class of computer
threat?
Option 1 Option 2

Wicked Wizard Web Wiked Will West


BCC allows the recipient to
BCC allows the sender to idicate who the email is
identify all other recipients when
a group email address is used for if there is more than one recipent

MAN(Metropolitian Area
Network) LAN(Local Area Network)

Google chrome Mozilla Firefox


1024 kilobytes 1024 bytes
Web page High level program
1011 10111

CPU Hard disk

E-mail Street address

Terabyte Gigabyte

Mistakes Follies

Persuasive Entertainment

Garbage in Garbage Out Garbage in Good output

Nano seconds Bits per second

four bits ten bits

Virus is a part of software Virus is an operating system

Wide area networks the monitor

bus width hyper-link

web plea web hate

video shift virtual video

Modem is a software Modem is the operating system

American Standard Code for Adaptable Standard Code for Information Change
Information Interchange
Alternate Local Unit American Logic Unit

Dots per inch Digits per unit

UNIX COBOL

Multifacet Multimedia

Intranet Online music

Data hiding Water marking

Microsoft Word Microsoft Windows

Simple Multimedia Internet Mail


Secure Multimedia Internet Mail Extension
Extension
Domain Name System Dynamic Name System
FDDI Ethernet
LAN Internet
One does not need any
One automatically gets one’s mail everyday
telephone lines

Mother Board System Board

Heads Sectors

Interpreter Simulator

words to bits characters to bits

an extremely large main


an extremely large secondary memory.
memory.

Net ads Webmercials

Graphics Interchange File Global Information Format


File Transfer Protocol File Tracking Protocol
TCP RAM

IP address MAC address

Octal number system Decimal number system

Detection Protection

hub bridge
bus network star network

performing data description converting analog to digital signals

Phishing Soliciting
Correct
Option 3 Option 4 Difficulty
Answer
World Wide Web Were World Was 3 50

BCC allows the sender of a message


Bcc allows recipents to be visible to
to hide the recipent entered in the 4 50
all other recipents of the message BCC field from other recipents

WAN(Wide Area Network) SAN(Storage Area Network) 2 50

Facebook Google chrome 3 50


1024 Terabytes 1024 Megabytes 4 50
Machine language program Web server 1 50
50
10011 None of above 2
50
Floppy disk Memory 1

Ip address None of above 3 50


50
Kilobyte Megabyte 1

Spam bugs 4 50
50
Informative Manuscript 3

50
Good input Good output Greater instructions Greater output 1
50
Characters per second Mega hertz 2

one bits eight bits 4 50


Virus improves the speed of 50
Internet does not allows the virus to
processing information through 1
spread
computer
50
network protocals the CPU 3
50
broadband carrier wave 3

50
cyber ranting cyber venting 4
50
real-time video direct broadcast 3

Modem helps in stabilizing the Modem converts the analog signal 50


voltage into digital signal and vice-versa 4

American Stock Code for Information African Standard Code for 50


1
Interchange Information Interchange
50
Alternating Logic Unit Arithematic Logic Unit 4

Dots pixel inch Diagrams per inch 4 50


50
PASCAL FORTRAN 1
50
Multiprocess Multiprogramme 2

A personal or corporate Google A personal or corporate website in 50


4
search the form of an online journal
50
Data Encryption Information Retrieval 4
50
Microsoft Excel Microsoft Access 2

Secure Multipurpose Internet Mail Simple Multipurpose Internet Mail 50


3
Extension Extension
Distributed Name System None of these 1 50
Token Ring All of the above 2 50
A Server Phone lines  2 50

One has to be connected to the One only has to be connected to the 50


4
server to read or write one’s mail server to send and receive email
50
Daughter Board Microprocessor 1
50
Vectors Clusters 2
50
Translator Compiler 1

machine language to high level high level language to machine 50


4
language language
a type of memory used in super an illusion of extremely large main 50
4
computers. memory
50
Viral advertisements Internet commercials 2

Graphics Information Format Graphics Interchange Format 4 50


Fast Transfer Protocol File Transfer Procedure 1 50
50
ROM CD-ROM 3
50
Physical address Hardware address 1
50
Binary number system Hexadecimal number system 4
50
Decryption Encryption 4
50
gateway repeater 3
50
ring network Point-to-point network 2

multiplexing various signals into one 50


converting digital to analog signals 2
high speed line signals

DOS-attacks Stalking 3
Time Second

60

60

60
60
60
60
60

60

60
60

60
60

60

60

60
60

60

60

60

60

60

60
60

60
60

60

60

60

60

60

60
60
60
60

60

60

60

60

60

60

60
60
60

60

60

60

60
60

60

60

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy