ICT MCQ Quiz - Objective Question with Answer for ICT - Download Free PDF
Last updated on Jun 23, 2025
Latest ICT MCQ Objective Questions
ICT Question 1:
How can the country's many universities be linked together?
Answer (Detailed Solution Below)
ICT Question 1 Detailed Solution
The correct option to link the country's many universities together is a WAN (Wide Area Network).
- A WAN is a network that covers a large geographic area, such as a country, and connects multiple smaller local area networks (LANs) or metropolitan area networks (MANs).
- A WAN allows for communication and data exchange between geographically dispersed locations.
- In the case of universities, a WAN can connect the individual LANs within each university to allow for communication and collaboration between faculty, staff, and students at different universities.
- This can facilitate research collaboration, the sharing of resources and expertise, and the coordination of academic programs and initiatives.
- PAN (Personal Area Network) and MAN (Metropolitan Area Network) are not appropriate options for linking universities together as they are designed for much smaller areas of coverage.
- A PAN is designed for personal devices such as smartphones and laptops, while a MAN covers a larger area, such as a city or town, but still typically connects devices within a single organization or campus.
ICT Question 2:
Which of the following hardware components will lose data when the power to a computer is switched off?
A. Processor Registers
B. Cache Memory
C. SSD
D. RAM
E. ROM
Choose the correct answer from the options given below:
Answer (Detailed Solution Below)
ICT Question 2 Detailed Solution
The correct answer is option 4) A, B, and D only.
Important Points
Primary storage:
- Primary storage is the volatile storing mechanism of a computer system.
- It can refer to random access memory (RAM), and processor. cache memory, or data buses, but it is most often connected with RAM.
- Primary storage is Fast and expensive as compared to secondary storage.
- The primary memory (hard drive, RAM) is where the operating system is stored.
Processor Registers:
- Processor registers are small, high-speed memory locations within the processor that hold data for quick access.
- They are used by the processor to store data that is frequently accessed, such as the current instruction being executed or the results of calculations.
- Registers are volatile, meaning they require power to retain their data.
- When power is lost, the data held in the registers is lost as well.
- Registers are an essential part of the processor, and the number performance of the processor and the size of the registers can impact the processor.
Cache Memory:
- Cache memory is a small amount of high-speed memory that is used to temporarily store frequently accessed data.
- The purpose of cache memory is to speed up data access and reduce the number of times data needs to be retrieved from slower memory such as RAM or storage devices.
- Like processor registers, cache memory is volatile and requires power to retain its data. When power is lost, the data held in the cache memory is lost as well.
- There are different levels of cache memory, with each level providing a larger but slower cache that is accessed if the smaller, faster cache does not have the requested data.
RAM:
- RAM stands for Random Access Memory, which is the main memory of a computer.
- RAM is volatile, meaning it requires power to retain its data. When power is lost, the data held in RAM is lost as well.
- RAM is used by the processor to store data that is currently being used by the computer, such as applications and open files.
- The amount of RAM in a computer can impact its performance, as more RAM allows the computer to handle more data at once
Therefore, the correct answer is option 4) A, B, and D only, as these are the hardware components that will lose data when the power to a computer is switched off.
Additional Information
Secondary storage:
- Secondary storage is non-volatile, permanent memory that is not immediately accessible by a computer or processor.
- It enables users to store data and information that can be quickly and conveniently retrieved, communicated, and used by apps and services.
- Secondary memory can be external devices such as CDs, floppy magnetic discs, and so on.
- Secondary storage is also known as external memory storage since it cannot be accessed directly by the CPU.
SSD:
- SSD stands for Solid State Drive, which is a type of non-volatile storage device that uses flash memory to store data.
- Unlike traditional hard disk drives (HDDs), SSDs do not have any moving parts, which makes them faster and more reliable.
- SSDs are non-volatile, meaning they do not require power to retain their data. When power is lost, the data stored on an SSD will not be lost.
- SSDs are commonly used in laptops and desktops as well as other electronic devices such as cameras and smartphones
ROM:
- ROM stands for Read-Only Memory, which is a type of non-volatile memory used to store firmware and other essential system software.
- Unlike RAM, ROM is not typically used for storing data that changes frequently.
- ROM does not require power to retain its data, so the data stored on it will not be lost when the power is switched off.
- ROM is used to store the BIOS (Basic Input/Output System) firmware, which is essential to boot the computer and start up the operating system.
ICT Question 3:
Which one of the following is a type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met?
Answer (Detailed Solution Below)
ICT Question 3 Detailed Solution
Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.
Key Points
- A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
- Software that is inherently malicious, such as viruses and worms, often contains logic bombs that execute a certain payload at a pre-defined time or when some other condition is met.
- To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software.
Additional Information
- Worm- A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
- Trojan- A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
- Spyware- Spyware is a type of malware that collects personal information and gathers data about a person without consent. Viruses are a type of malicious software designed to spread from one device to another devices.
Hence, a Logic Bomb is the type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met.
ICT Question 4:
The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed as:
Answer (Detailed Solution Below)
ICT Question 4 Detailed Solution
The correct answer is Spoofing.
Key PointsSpoofing:
- The practice of forging a return address on an email to deceive the recipient into revealing private information is commonly known as "email spoofing."
- In email spoofing, the sender alters the email header information, including the "From" field, to make it appear as if the email is originating from a different source than the actual sender.
- This technique is often used in phishing attacks, where the attacker aims to trick recipients into disclosing sensitive information such as passwords, financial details, or personal information by posing as a trustworthy entity.
- It is important to be cautious and verify the authenticity of emails, especially when they request sensitive information or seem suspicious in nature.
Additional InformationHacking: Hacking refers to the act of gaining unauthorized access to computer systems, networks, or digital devices. Hackers, also known as ethical hackers or malicious hackers (depending on their intentions), use their technical knowledge and skills to exploit vulnerabilities in computer systems for various purposes. Hacking can involve activities such as circumventing security measures, stealing data, modifying or damaging systems or gaining control over a network or device.
Cracking: Cracking is a term often used interchangeably with hacking, but it specifically refers to breaking the security mechanisms of software, primarily for illegal purposes. Cracking involves removing or bypassing copy protection or licensing restrictions on software, allowing it to be used without proper authorization or payment. It is commonly associated with software piracy and copyright infringement.
Dumpster Diving: Dumpster diving involves searching through trash or discarded materials to extract valuable information. In the context of information security, dumpster diving specifically refers to individuals or attackers going through dumpsters or trash bins to find discarded documents, files, or electronic devices that may contain sensitive or confidential information. This information can be used for identity theft, fraud, or other malicious purposes.
ICT Question 5:
Pihu is regularly connecting her mobile phone and her computer for taking backup. Which of the following types of networks do you thinks she is using for the same?
Answer (Detailed Solution Below)
ICT Question 5 Detailed Solution
A computer network is a collection of two or more networked computers.
Key Points
- A computer network connection can be created using either cable or wireless media used for sharing files and resources.
- There are various types of networks: Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN).
- A Personal Area Network is built around one individual.
- It includes a computer, a phone, or a personal digital assistant.
- PAN can be used to connect these personal gadgets to a digital network and the internet by establishing communication between them.
Thus, PAN types of networks she is using for taking backups.Additional Information
- WAN is a computer network that is spread over a big geographic area.
- MAN is a computer network spanning an entire city, a college campus, or a small area.
- LAN is a group of computers and related peripherals that are interconnected in a constrained space.
Top ICT MCQ Objective Questions
The speed of processor of a computer is measured in ____.
Answer (Detailed Solution Below)
ICT Question 6 Detailed Solution
Download Solution PDFthe correct answer is GigaHertz.
Key Points
- Clock speed:
- Clock speed is the significant way to measure the performance of Processor.
- CPU processes many instructions (low-level calculations like arithmetic) from different programs every second. The clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
- A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes, they’re a basic unit that helps understand a CPU’s speed.
- During each cycle, billions of transistors within the processor open and close.
- A CPU with a clock speed of 3.2 GHz executes 3.2 billion cycles per second.
The main two components of CPU are ____________.
Answer (Detailed Solution Below)
ICT Question 7 Detailed Solution
Download Solution PDFThe correct answer is Control Unit and ALU.
- Computers have become pervasive in every walk of life.
- It has changed the way we work, play, communicate and learn.
- A computer essentially comprises of a set of hardware and software.
Key Points
The Central Processing Unit (CPU):
- The CPU is the brain of the computer.
- Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
- The CPU executes the programs and controls the operation of all the hardware.
- The three main components of the CPU are:
The Control Unit (CU):
- It is one of the most important parts of the microprocessor as it is in charge of the entire process.
- The control unit extracts instructions from memory and decodes them.
- Based on these instructions, it creates control signals that tell the Arithmetic Logic Unit (ALU) and the Registers how to operate, what to operate on and what to do with the result.
- The role of the control unit in the CPU is that of a “manager”.
- In other words, it controls and coordinates all hardware operations.
The Arithmetic and Logic Unit (ALU):
- It is the section where the actual data processing takes place.
- All calculations and comparisons take place in this section.
- In addition to arithmetic functions, the ALU also handles logic operations.
- All mathematical operations are performed in binary numbers and all logic operations are performed using binary operations.
The Primary Memory (Main memory):
- This unit stores programs during their execution, stores data that are being used by the current program and stores the operating system which controls the operation of the computer system.
- It consists of Random Access Memory (RAM) where the user's programs and data must be stored in order to be run and Read-Only Memory (ROM) where permanent programs and data are built-in by the manufacturer.
Hence, it is clear that the Control Unit and ALU are the two main components of the CPU.
- BUS: It is a Data Communication System in a computer network. The ALU and CU that are linked internally and externally by busses which carry binary signals between.
- Register: They can be thought of as the CPU’s tiny scratchpad, temporarily storing instructions or data.
First cyberlaw which provides the legal infrastructure for e-commerce in India is
Answer (Detailed Solution Below)
ICT Question 8 Detailed Solution
Download Solution PDFThe correct answer is The Information Technology act, 2000.
- The Information Technology act 2000 is the first cyber law in India.
- It was the first cyber law that provides the legal infrastructure for e-commerce in India.
- The Information Technology act 2000 was enacted on 9th June 2000.
- The Information Technology act 2000 came into effect on 17th October 2000.
- The Information Technology act 2000 has 94 sections divided into 13 chapters and 4 schedules.
Additional Information
- The act mainly focuses on the following issues:
- Offences and contraventions.
- Legal recognition of digital signatures.
- Legal recognition of electronic documents.
The ability to read and write each piece of information in a storage device in approximately the same length of time of its location is _____.
Answer (Detailed Solution Below)
ICT Question 9 Detailed Solution
Download Solution PDFThe correct answer is Random Access.
Key Points
- Random Access:
- In computer science, random access is the capability to have access to any item from a given population of elements at random.
- Random access is the opposite of sequential access, as sequential access locates elements by beginning at a particular predefined location and then traversing through all of the information in order to find the given item.
- Random access has gained interest due to the fact that one can retrieve a record irrespective of the position in which it is located.
- Random access is also known as direct access.
Given below are two statements
Statement I: Compilers are software
Statement II: Touch screen monitors are input/output devices
In light of the above statements, choose the most appropriate answer from the options given below
Answer (Detailed Solution Below)
ICT Question 10 Detailed Solution
Download Solution PDFCompilers:
- A compiler is a program that translates a source program written in some high-level programming language into machine code for some computer architecture.
- The generated machine code can be later executed many times against different data each time.
- It writes the text into a format that the CPU can understand
- This is a kind of system software
Touch screen monitors:
- This is a device that helps the user to interact with the computer using their finger
- It is an alternative to mouse and keyboard for navigating a Graphical User Interface (GUI)
- It allows tough sensitive inputs as well as outputs.
Therefore it is clear that Compilers are software and Touch screen monitors are input/output devices. So both the statements are true.
Which Operating System is used by the Apple computer systems (an American technology company)?
Answer (Detailed Solution Below)
ICT Question 11 Detailed Solution
Download Solution PDFAn operating system is a software program that manages and operates computing devices.
Key Points
- Mac OS is a powerful operating system that offers similar features and services to Windows and Linux.
- The Macintosh Operating System (Mac OS) is an operating system developed by Apple Inc.
- It is a graphical user interface-based operating system that was first published in 1984.
- Apple is an American-based company located in California.
- Mac OS is meant to run on Apple computers and does not support the x86 architecture by default.
- Mac OS has multiple versions available such as Macintosh 128k, Mac OS 7, Mac OS X, and Mac Mountain Lion.
Therefore, Mac is used by the Apple computer systems (an American technology company).
Additional Information
- Microsoft Windows, usually known as Windows or Windows OS, is a personal computer operating system developed by Microsoft Corporation.
- Linux is a collection of open-source Unix-like operating systems based on Linus Torvalds' Linux kernel which was launched on September 17, 1991.
- Oracle Solaris is also an operating system.
Which of the following hardware holds together the various important components of a computer such as the CPU, memory, and input/output devices?
Answer (Detailed Solution Below)
ICT Question 12 Detailed Solution
Download Solution PDFMotherboard:
- The Motherboard is the main circuit board for the computer, containing both soldered, nonremovable components along with sockets or slots for components that can be removed.
- The motherboard holds the CPU, RAM and ROM chips, etc.
Additional Information
- The Arithmetic Logic Unit (ALU) performs arithmetic operations (such as addition and subtraction) and logical operations (such as comparing two values).
- The Control Unit deciphers and carries out instructions.
- A hard disk is similar to a floppy disk but uses metal platters to store information. Hard disks are not only much faster than floppy disks but can hold huge amounts of data (hundreds of gigabytes).
Hence, only motherboard holds together the various important components of a computer such as the CPU, memory, and input/output devices
Identify the incorrect pair from the following:
Answer (Detailed Solution Below)
ICT Question 13 Detailed Solution
Download Solution PDFFile Format | File Extension |
Word Text Document File | .txt |
Microsoft Word document (the original official) | .doc |
The Portable Document Format | |
Microsoft Word document (the newer version of DOC) | .docx |
PNG (Portable Network Graphics) Format | .png |
PowerPoint Picture Presentation | .pptx |
Microsoft Excel Spreadsheets | .xls |
PowerPoint 97-2003 Presentation | .ppt |
The third audio format of the MPEG-1 standard | .mp3 |
JPEG (Joint Photographic Experts Group) FileFormat | .jpg |
Waveform Audio File Format | .wav |
Executable file | .exe |
MPEG-4 Video | .mp4 |
GIF (Graphics Interchange Format) | .gif |
Tagged Image File Format | .tiff |
Which of the following is the binary equivalent of 25?
Answer (Detailed Solution Below)
ICT Question 14 Detailed Solution
Download Solution PDFA number system includes the number of independent digits used in the number system (the base), the place values of the different digits constituting the number, and the maximum numbers that can be written with the given number of digits.
The Binary Number System:
- The binary number system with only two independent digits, 0 and 1, is a base-2 number system.
- All larger binary numbers are represented in terms of ‘0’ and ‘1’.
Decimal to Binary Conversion:
Step 1: Divide 22 by 2 to get the Quotient. Keep the Whole part for the next step and set the Remainder aside.
25 / 2 = 12 with 1 remainder
Step 2: Divide the Whole part of the Quotient from Step 1 by 2. Again, keep the Whole part and set the Remainder aside.
12 / 2 = 6 with 0 remainder
Step 3: Repeat Step 2 above until the Whole part is 0.
6 / 2 = 3 with 0 remainder
3 / 2 = 1 with 1 remainder
1 / 2 = 0 with 1 remainder
Step 4: Write down the Remainders in reverse order to get the answer to 25 as a binary.
When we put the remainder together in reverse order, we get the answer 11001
Hence, the binary equivalent of decimal number 25 is 11001
A type of memory that holds the computer startup routine is
Answer (Detailed Solution Below)
ICT Question 15 Detailed Solution
Download Solution PDFThe correct answer is Read-Only Memory (ROM)
Key Points
- ROM stands for Read-Only Memory.
- ROM is a storage device that is used with computers and other electronic devices.
- Data stored in ROM may only be read.
- ROM is used for firmware updates, which means It contains the basic instructions for what needs to happen when a computer is powered on.
- Firmware is also known as BIOS, or basic input/output system.
- ROM is non-volatile storage, which means the information is maintained even if the component loses power.
- ROM is located on a BIOS chip which is plugged into the motherboard.
- ROM plays a critical part in booting up or starting up, your computer.
Important Points
Terminologies | Characteristics |
Random Access Memory (RAM) |
|
Dynamic random access memory (DRAM) |
|
Cache |
|