technology, communication,information, class 10 IT

Information and Communication Technology : Class 10 IT 402

Multiple Choice Question

1. What does ICT stand for?

a) Internet Communication Technology
b) Information and Communication Technology
c) Information Computer Technology
d) Internet and Communication Technology
Answer: b) Information and Communication Technology

2. Which of the following is not a form of communication technology?
a) Email
b) Fax
c) LAN
d) Typewriter
Answer: d) Typewriter

3. What is the primary purpose of a network?
a) To restrict data
b) To share resources and information
c) To enhance memory
d) To improve graphic quality
Answer: b) To share resources and information

4. Which device is used to convert digital data into analog signals in a computer network?
a) Modem
b) Router
c) Switch
d) Hub
Answer: a) Modem

5. Which of the following is a social media platform used for communication?
a) Excel
b) WhatsApp
c) Windows
d) Photoshop
Answer: b) WhatsApp

6. What is a computer virus?
a) A type of hardware issue
b) A malicious program that replicates and spreads to other computers
c) A data storage device
d) A type of antivirus software
Answer: b) A malicious program that replicates and spreads to other computers

7. What is a Trojan Horse?
a) A legitimate software program
b) A malware disguised as useful software but harmful in nature
c) A hardware device used for protection
d) A type of virus that self-replicates
Answer: b) A malware disguised as useful software but harmful in nature

8. Which malware replicates itself to spread to other computers without the need for human action?
a) Virus
b) Trojan Horse
c) Worm
d) Spyware
Answer: c) Worm

9. Which type of software collects user information without their knowledge?
a) Worm
b) Spyware
c) Virus
d) Adware
Answer: b) Spyware

10. Which of the following refers to unsolicited emails sent in bulk?
a) Spam
b) Worm
c) Spyware
d) Phishing
Answer: a) Spam

11. Which of the following is an open-source operating system?
a) Windows
b) macOS
c) Linux
d) Android
Answer: c) Linux

12.Which operating system is known for its use in Apple computers?
a) Windows
b) macOS
c) Ubuntu
d) Fedora
Answer: b) macOS

13. Which of the following is NOT an example of computer hardware?
a) Keyboard
b) CPU
c) Operating System
d) Monitor
Answer: c) Operating System

14. Which type of maintenance involves regularly updating software and applying security patches?
a) Preventive maintenance
b) Corrective maintenance
c) Hardware maintenance
d) Performance maintenance
Answer: a) Preventive maintenance

15. What is the primary purpose of an operating system?
a) To protect hardware from damage
b) To perform calculations
c) To manage computer hardware and software resources
d) To provide internet access
Answer: c) To manage computer hardware and software resources

16. How do you create a new folder on the desktop in Windows?
a) Right-click on the desktop, select “New,” then click “Folder”
b) Double-click on the desktop
c) Press the “Delete” key
d) Drag an icon to the desktop
Answer: a) Right-click on the desktop, select “New,” then click “Folder”

17. Which of the following mouse actions is used to select an item?
a) Right-click
b) Left-click
c) Double-click
d) Scroll
Answer: b) Left-click

18. What does right-clicking on a folder do?
a) Opens the folder
b) Deletes the folder
c) Displays a context menu with additional options
d) Renames the folder automatically
Answer: c) Displays a context menu with additional options

19. Which of the following is NOT a common use of a mouse?
a) Selecting text
b) Clicking icons
c) Scrolling through pages
d) Formatting a hard drive
Answer: d) Formatting a hard drive

20. Which mouse action is used to open a file or folder?
a) Right-click
b) Drag
c) Double-click
d) Scroll
Answer: c) Double-click

21.To open temp folder type_____ in run dialog box.

a) temp% b) %temp% c) #temp# d) None of these

Answer: b) %temp%

22. Which of the following is a valid file extension for image file?

a) .jpg       

b) .doc         

c) .text           

d) .txt

Answer : a) .jpg

23. Which of the following functions is not performed using mouse

a) To turn on 

b) Hover     

c) Right Click   

d) Drag and Drop

Answer: a) To turn on

24. Which of these following refers to an unwanted and unsolicited message?

a) Spam

b) MBR

c) Boot Sector Virus

d) None of these

Answer: a) Spam

 

True or False

1. A modem converts digital signals to analog and vice versa.
Answer: True

2.Social media platforms are not part of ICT.
Answer: False

3. LAN stands for Local Area Network.
Answer: True

4. Cloud computing allows users to store and access data from remote servers over the internet.
Answer: True

5. E-commerce platforms are unrelated to information and communication technology.
Answer: False

6. A Trojan Horse can replicate itself and spread to other computers.
Answer: False (It does not replicate; it hides as a legitimate file.)

7. Worms require human intervention to spread from one system to another.
Answer: False (Worms spread automatically.)

8. Spyware can collect information like browsing habits, passwords, and credit card details.
Answer: True

9. Viruses can attach themselves to programs and files and damage them.
Answer: True

10. Spam refers to unwanted software that infects computers.
Answer: False (Spam refers to unwanted emails, not software.)

10. Windows is the most popular operating system for personal computers.
Answer: True

11. Preventive maintenance includes backing up data, updating software, and cleaning the system regularly.
Answer: True

12. Corrective maintenance involves troubleshooting and fixing issues after a failure has occurred.
Answer: True

13. The CPU is a type of software used in operating systems.
Answer: False (The CPU is a hardware component.)

14. macOS is an open-source operating system.
Answer: False (macOS is a proprietary operating system.)

15. Left-clicking on a folder will open it.
Answer: False (Double-clicking opens the folder, while left-clicking selects it.)

16. Right-clicking an item usually opens a context menu with additional options.
Answer: True

17. You can create a folder by dragging one file over another file.
Answer: False (You create a folder using the “New” option in the right-click menu or by using the “New Folder” option.)

18. Scrolling the mouse wheel allows you to move up and down a web page or document.
Answer: True

19. Double-clicking is used to rename a folder.
Answer: False (Right-click and select “Rename” to rename a folder.)

Fill in the Blanks

1. A __________ is a hardware device that routes data from one computer network to another.
Answer: Router

2. In ICT, __________ refers to the exchange of information between people or machines using technology.
Answer: Communication

3. __________ is a collection of computers and other devices connected to share resources and data.
Answer: Network

4. __________ is used to protect data from unauthorized access during transmission.
Answer: Encryption

5. __________ is the most common protocol used to transfer data over the internet.
Answer: HTTP (Hypertext Transfer Protocol)

6. A __________ is a self-replicating program that spreads from one computer to another by attaching itself to other files.
Answer: Virus

7. __________ is a type of malware that is designed to steal personal data from a computer without the user’s knowledge.
Answer: Spyware

8. A __________ disguises itself as a legitimate program but performs malicious activities when executed.
Answer: Trojan Horse

9. __________ is a type of malware that spreads without any user action by exploiting system vulnerabilities.
Answer: Worm

10. __________ refers to irrelevant or unsolicited messages sent over the internet, typically as emails.
Answer: Spam

11. The __________ operating system is widely used in servers and supercomputers for its security and stability.
Answer: Linux

12.__________ is the software that acts as an intermediary between the hardware and the user, managing system resources.
Answer: Operating System

13. A __________ is a type of software that allows users to interact with a computer and run applications.
Answer: Graphical User Interface (GUI)

14. Defragmenting a hard drive is an example of __________ maintenance.
Answer: Performance

15. The __________ operating system is primarily used on mobile devices and developed by Google.
Answer: Android

16. To create a new folder on your desktop, you can right-click, choose “New,” and then select __________.
Answer: Folder

17. A __________ is a location where you can store and organize files on your computer.
Answer: Folder

18. The mouse action used to select an item or icon is called a __________.
Answer: Left-click

19. __________ allows you to move the page up or down in a document or web browser using the mouse.
Answer: Scrolling

20. A __________ is used to control the pointer on the screen and interact with various elements.
Answer: Mouse

Short Questions and Answers

1. What is Information and Communication Technology (ICT)?
Answer: ICT refers to technologies that provide access to information through telecommunications. It includes the internet, wireless networks, cell phones, computers, and other communication mediums.

2. What is the significance of a network in ICT?
Answer: A network allows multiple devices, such as computers, to connect and share resources and information efficiently. This enhances communication and collaboration in organizations and homes.

3. Explain the role of a modem in communication technology.
Answer: A modem is a device that converts digital data from a computer into analog signals that can be transmitted over a telephone line and vice versa, enabling internet connectivity.

4. What is the difference between LAN and WAN?
Answer: LAN (Local Area Network) connects devices within a small geographical area like a home or office, while WAN (Wide Area Network) covers a large geographical area, potentially spanning cities or countries.

5. What is the importance of encryption in ICT?
Answer: Encryption ensures that data being transmitted over networks is secure and protected from unauthorized access by converting the information into a coded format that can only be decrypted by authorized users.

6. What is a computer virus?
Answer: A computer virus is a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code. It spreads by attaching itself to files or software and can cause damage or steal data.

7. What is a Trojan Horse in the context of cybersecurity?
Answer: A Trojan Horse is a type of malware that disguises itself as legitimate software. Once installed, it can cause harm by allowing unauthorized access to the user’s system, stealing sensitive data, or creating backdoors for further attacks.

8. How does a worm differ from a virus?
Answer: A worm is a type of malware that spreads from one computer to another without needing to attach itself to a program or file. Unlike a virus, which needs human action to spread (such as opening an infected file), a worm can spread automatically by exploiting system vulnerabilities.

9. What is spyware and what are its dangers?
Answer: Spyware is malware designed to secretly monitor a user’s activities, collecting personal information such as passwords, credit card details, and browsing history without their knowledge. This information can be misused for identity theft or financial fraud.

10. Explain the concept of spam in the context of digital communication.
Answer: Spam refers to unwanted, irrelevant, or unsolicited messages, often sent in bulk, typically over email. These messages can clutter inboxes, waste time, and sometimes contain malicious links or attachments that spread malware or phishing attempts.

11. How can users protect their systems from malware like viruses and trojans?
Answer: Users can protect their systems by installing and regularly updating antivirus software, avoiding opening attachments or clicking on links in unsolicited emails, downloading software only from trusted sources, and keeping their operating systems and applications updated with the latest security patches.

12. What is an operating system?
Answer: An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. It acts as an intermediary between users and the computer hardware.

13. What are the differences between Windows, macOS, and Linux?
Answer:

Windows is a commercial operating system developed by Microsoft and is widely used in personal computers.
macOS is developed by Apple and is designed for Mac computers, known for its stability and design.
Linux is an open-source operating system, known for its flexibility, security, and use in servers and other high-performance computing systems.
14. What is the importance of preventive maintenance for computer systems?
Answer: Preventive maintenance involves regularly servicing and updating computer hardware and software to prevent failures. This includes cleaning hardware, applying security patches, updating software, and ensuring data backups. It helps extend the lifespan of the system and improves its performance.

15. Explain the term ‘defragmentation’ and its importance in computer maintenance.
Answer: Defragmentation is the process of reorganizing the data on a hard drive so that files are stored in contiguous blocks, which reduces the time the system takes to access files. This improves the overall performance of the computer, especially in older systems using mechanical hard drives.

16. What are some common tasks involved in software maintenance?
Answer: Software maintenance includes tasks such as installing updates, applying patches to fix security vulnerabilities, upgrading software to newer versions, and troubleshooting software issues. It ensures the software remains functional, secure, and compatible with other applications.

17. What is corrective maintenance in the context of computer hardware and software?
Answer: Corrective maintenance involves identifying, troubleshooting, and repairing hardware or software issues after they occur. This type of maintenance is reactive and is performed when a system fails, such as replacing faulty hardware components or reinstalling corrupted software.

18. How do you create a new folder in Windows?
Answer: To create a new folder in Windows, right-click on the desktop or inside a directory, select “New” from the context menu, and then click “Folder.” A new folder will appear, allowing you to name it.

19. What are the basic functions of a mouse in computing?
Answer: A mouse is used to control the on-screen pointer, select items, open files or folders, drag and drop objects, scroll through documents or web pages, and access context menus using the right-click button.

20. What is the purpose of right-clicking on an item in Windows?
Answer: Right-clicking on an item opens a context menu with additional options, such as “Open,” “Rename,” “Delete,” “Properties,” or “Copy,” depending on the item selected.

21. How do you use the mouse to open a folder or file?
Answer: To open a folder or file, move the pointer to the item using the mouse, then double-click the left mouse button.

22. Explain how to rename a folder using the mouse.
Answer: To rename a folder, right-click on the folder and select “Rename” from the context menu. The folder name will become editable, allowing you to type a new name. Press “Enter” to save the changes.

23. What is the function of the scroll wheel on a mouse?
Answer: The scroll wheel on a mouse is used to scroll through content vertically, such as moving up and down a web page or document, making navigation easier without needing to drag the scrollbar manually.

24. Why does a computer need maintenance?
Answer: A computer needs maintenance to ensure it runs smoothly, prevent hardware and software issues, enhance performance, secure data from malware, and prolong its lifespan. Regular maintenance includes cleaning, updating software, and troubleshooting any issues.

25. What is Boot Sector Virus?
Answer: A boot sector virus is a type of malware that infects the master boot record (MBR) of a hard drive or a bootable disk. It is executed when the computer starts up, making it difficult to remove since it can affect the system before the operating system loads.

26. Write the steps to create a new folder.
Answer:

Step 1: Right-click on the desktop or inside any directory.
Step 2: Select “New” from the context menu.
Step 3: Click “Folder” from the options.
Step 4: Type a name for the folder and press “Enter.”
27. What is GUI?
Answer: GUI (Graphical User Interface) is a user interface that allows users to interact with electronic devices through graphical icons and visual indicators, rather than text-based commands. Examples include operating systems like Windows and macOS.

28. What is a Taskbar?
Answer: A taskbar is a feature in operating systems like Windows that displays open programs, shortcuts, and system icons. It typically appears at the bottom of the screen and allows users to switch between active applications easily.

29. How to Clean your Disk?
Answer:

Step 1: Open “File Explorer” and right-click on the drive you want to clean.
Step 2: Select “Properties.”
Step 3: Under the “General” tab, click “Disk Cleanup.”
Step 4: Select the files you want to delete and click “OK.”
Step 5: Confirm by clicking “Delete Files.”
30. What is DOS Operating System?
Answer: DOS (Disk Operating System) is a command-line-based operating system used in early personal computers. It allows users to interact with the system by typing commands and is known for its simplicity and low resource usage.

31. One example of Worms virus?
Answer: An example of a worm virus is the ILOVEYOU worm. It spread through email in 2000, causing significant damage by overwriting system files and sending itself to the victim’s contacts.

32. Why do we need to scan the computer?
Answer: We need to scan the computer to detect and remove malware, viruses, spyware, and other harmful programs that can compromise the system’s security, degrade performance, or steal personal information. Regular scans help maintain the overall health and security of the computer.

33. What is Malware?
Answer: Malware is malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. It includes viruses, worms, Trojan horses, spyware, and ransomware, which can steal data or harm the computer’s functionality.

34. Write the steps to rename a folder.
Answer:

Step 1: Right-click on the folder you want to rename.
Step 2: Select “Rename” from the context menu.
Step 3: Type the new name for the folder.
Step 4: Press “Enter” to save the new name.
35. What is CUI?
Answer: CUI (Character User Interface) is a user interface that allows users to interact with a computer through text-based commands rather than graphical elements. An example is the MS-DOS operating system, where users type commands to perform tasks.

36. What is a System Tray?
Answer: The system tray, also known as the notification area, is a section of the taskbar in Windows operating systems. It displays icons for background applications and system alerts, like the clock, volume control, network status, and antivirus notifications.

37. How to Clean your Disk?
Answer:

Step 1: Open “File Explorer” and right-click on the drive you want to clean.
Step 2: Select “Properties.”
Step 3: Click “Disk Cleanup” under the “General” tab.
Step 4: Select the files to delete and click “OK.”
Step 5: Confirm by clicking “Delete Files.”
38. What is the Windows Operating System?
Answer: Windows is a graphical operating system developed by Microsoft that allows users to run applications, manage files, and interact with hardware. It features a GUI, supports multitasking, and is widely used for personal computers and business applications.

39. One Example of a Trojan Horse Virus?
Answer: An example of a Trojan horse virus is Zeus (Zbot). It is a type of malware that appears legitimate but steals banking information by logging keystrokes and compromising sensitive financial data.

One mark Question and Answer

 Full Forms

1. What is the full form of ICT?
Answer: Information and Communication Technology

2. What does CPU stand for?
Answer: Central Processing Unit

3. What is the full form of RAM?
Answer: Random Access Memory

4. What does URL stand for?
Answer: Uniform Resource Locator

5. What is the full form of LAN?
Answer: Local Area Network

6. What does HTTP stand for?
Answer: Hypertext Transfer Protocol

7. What is the full form of USB?
Answer: Universal Serial Bus

8. What does GUI stand for?
Answer: Graphical User Interface

9. What is the full form of BIOS?
Answer: Basic Input/Output System

10. What does PDF stand for?
Answer: Portable Document Format

Examples

1. Give an example of an operating system.

Answer: Windows

2. Name one example of a web browser.
Answer: Google Chrome

3. Give an example of an input device.
Answer: Keyboard

4. Name an example of a social media platform.
Answer: Facebook

5. Give an example of antivirus software.
Answer: McAfee

6. Give an example of a file format for images.
Answer: JPEG

7. Name an example of cloud storage service.
Answer: Google Drive

8. Give an example of a word processing software.
Answer: Microsoft Word

9. Give an example of a programming language.
Answer: Python

10. Name an example of a spreadsheet application.
Answer: Microsoft Excel

Names


1. Name the primary hardware component that executes instructions.
Answer: CPU (Central Processing Unit)

2. What is the name of the protocol used to transfer files on the web?
Answer: HTTP (Hypertext Transfer Protocol)

3. Name a popular operating system developed by Apple.
Answer: macOS

4. What is the name of the memory that loses its data when power is turned off?
Answer: RAM (Random Access Memory)

5. Name the device used to point and click on a computer screen.
Answer: Mouse

6. What is the name of the hardware used to store long-term data on a computer?
Answer: Hard Disk Drive (HDD)

7. Name the type of network that connects devices over a small geographical area, such as an office or home.
Answer: LAN (Local Area Network)

8. What is the name of the open-source operating system widely used in servers?
Answer: Linux

9. What is the name of the keyboard shortcut for copying selected text or files?
Answer: Ctrl + C

10. Name the hardware device used to connect a computer to the internet.
Answer: Modem

9 thoughts on “Information and Communication Technology : Class 10 IT 402”

Leave a Comment

Your email address will not be published. Required fields are marked *