ICT MCQ Quiz - Objective Question with Answer for ICT - Download Free PDF

Last updated on Jun 23, 2025

Latest ICT MCQ Objective Questions

ICT Question 1:

How can the country's many universities be linked together?

  1. PAN
  2. MAN
  3. LAN
  4. WAN
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : WAN

ICT Question 1 Detailed Solution

The correct option to link the country's many universities together is a WAN (Wide Area Network).

  • A WAN is a network that covers a large geographic area, such as a country, and connects multiple smaller local area networks (LANs) or metropolitan area networks (MANs).
  • A WAN allows for communication and data exchange between geographically dispersed locations.
  • In the case of universities, a WAN can connect the individual LANs within each university to allow for communication and collaboration between faculty, staff, and students at different universities.
  • This can facilitate research collaboration, the sharing of resources and expertise, and the coordination of academic programs and initiatives.
  • PAN (Personal Area Network) and MAN (Metropolitan Area Network) are not appropriate options for linking universities together as they are designed for much smaller areas of coverage.
  • A PAN is designed for personal devices such as smartphones and laptops, while a MAN covers a larger area, such as a city or town, but still typically connects devices within a single organization or campus.

ICT Question 2:

Which of the following hardware components will lose data when the power to a computer is switched off?

A. Processor Registers

B. Cache Memory

C. SSD

D. RAM

E. ROM

Choose the correct answer from the options given below: 

  1. B and D only  
  2. A, C and D only  
  3. A, B and C only
  4. A, B and D only
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : A, B and D only

ICT Question 2 Detailed Solution

The correct answer is option 4) A, B, and D only. 

Important Points

Primary storage:

  • Primary storage is the volatile storing mechanism of a computer system.
  • It can refer to random access memory (RAM), and processor. cache memory, or data buses, but it is most often connected with RAM.
  • Primary storage is Fast and expensive as compared to secondary storage.
  • The primary memory (hard drive, RAM) is where the operating system is stored.

 Processor Registers:

  • Processor registers are small, high-speed memory locations within the processor that hold data for quick access.
  • They are used by the processor to store data that is frequently accessed, such as the current instruction being executed or the results of calculations.
  • Registers are volatile, meaning they require power to retain their data.
  • When power is lost, the data held in the registers is lost as well.
  • Registers are an essential part of the processor, and the number performance of the processor and the size of the registers can impact the processor.

Cache Memory:

  • Cache memory is a small amount of high-speed memory that is used to temporarily store frequently accessed data.
  • The purpose of cache memory is to speed up data access and reduce the number of times data needs to be retrieved from slower memory such as RAM or storage devices.
  • Like processor registers, cache memory is volatile and requires power to retain its data. When power is lost, the data held in the cache memory is lost as well.
  • There are different levels of cache memory, with each level providing a larger but slower cache that is accessed if the smaller, faster cache does not have the requested data.

RAM:

  • RAM stands for Random Access Memory, which is the main memory of a computer.
  • RAM is volatile, meaning it requires power to retain its data. When power is lost, the data held in RAM is lost as well.
  • RAM is used by the processor to store data that is currently being used by the computer, such as applications and open files.
  • The amount of RAM in a computer can impact its performance, as more RAM allows the computer to handle more data at once

Therefore, the correct answer is option 4) A, B, and D only, as these are the hardware components that will lose data when the power to a computer is switched off.

Additional Information

Secondary storage:

  • Secondary storage is non-volatile, permanent memory that is not immediately accessible by a computer or processor.
  • It enables users to store data and information that can be quickly and conveniently retrieved, communicated, and used by apps and services. 
  • Secondary memory can be external devices such as CDs, floppy magnetic discs, and so on.
  • Secondary storage is also known as external memory storage since it cannot be accessed directly by the CPU.

SSD:

  • SSD stands for Solid State Drive, which is a type of non-volatile storage device that uses flash memory to store data.
  • Unlike traditional hard disk drives (HDDs), SSDs do not have any moving parts, which makes them faster and more reliable.
  • SSDs are non-volatile, meaning they do not require power to retain their data. When power is lost, the data stored on an SSD will not be lost.
  • SSDs are commonly used in laptops and desktops as well as other electronic devices such as cameras and smartphones

ROM:

  • ROM stands for Read-Only Memory, which is a type of non-volatile memory used to store firmware and other essential system software.
  • Unlike RAM, ROM is not typically used for storing data that changes frequently.
  • ROM does not require power to retain its data, so the data stored on it will not be lost when the power is switched off.
  • ROM is used to store the BIOS (Basic Input/Output System) firmware, which is essential to boot the computer and start up the operating system.

ICT Question 3:

Which one of the following is a type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met?

  1. Worm
  2. Trojan
  3. Spyware
  4. Logic Bomb
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Logic Bomb

ICT Question 3 Detailed Solution

Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.

 Key Points

  • A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
  • Software that is inherently malicious, such as viruses and worms, often contains logic bombs that execute a certain payload at a pre-defined time or when some other condition is met.
  • To be considered a logic bomb, the payload should be unwanted and unknown to the user of the software.

 Additional Information

  • Worm- A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.
  • Trojan- A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software.
  • Spyware- Spyware is a type of malware that collects personal information and gathers data about a person without consent. Viruses are a type of malicious software designed to spread from one device to another devices.

Hence, a Logic Bomb is the type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met.

ICT Question 4:

The practice of forging a return address on an e-mail so that the recipient is fooled into revealing private information is termed as:

  1. Hacking
  2. Cracking
  3. Dumpster diving
  4. Spoofing
  5. None of the above

Answer (Detailed Solution Below)

Option 4 : Spoofing

ICT Question 4 Detailed Solution

The correct answer is Spoofing.

Key PointsSpoofing: 

  • The practice of forging a return address on an email to deceive the recipient into revealing private information is commonly known as "email spoofing."
  • In email spoofing, the sender alters the email header information, including the "From" field, to make it appear as if the email is originating from a different source than the actual sender.
  • This technique is often used in phishing attacks, where the attacker aims to trick recipients into disclosing sensitive information such as passwords, financial details, or personal information by posing as a trustworthy entity.
  • It is important to be cautious and verify the authenticity of emails, especially when they request sensitive information or seem suspicious in nature.

Additional InformationHacking: Hacking refers to the act of gaining unauthorized access to computer systems, networks, or digital devices. Hackers, also known as ethical hackers or malicious hackers (depending on their intentions), use their technical knowledge and skills to exploit vulnerabilities in computer systems for various purposes. Hacking can involve activities such as circumventing security measures, stealing data, modifying or damaging systems or gaining control over a network or device.

Cracking: Cracking is a term often used interchangeably with hacking, but it specifically refers to breaking the security mechanisms of software, primarily for illegal purposes. Cracking involves removing or bypassing copy protection or licensing restrictions on software, allowing it to be used without proper authorization or payment. It is commonly associated with software piracy and copyright infringement.

Dumpster Diving: Dumpster diving involves searching through trash or discarded materials to extract valuable information. In the context of information security, dumpster diving specifically refers to individuals or attackers going through dumpsters or trash bins to find discarded documents, files, or electronic devices that may contain sensitive or confidential information. This information can be used for identity theft, fraud, or other malicious purposes.

ICT Question 5:

Pihu is regularly connecting her mobile phone and her computer for taking backup. Which of the following types of networks do you thinks she is using for the same? 

  1. LAN
  2. PAN
  3. MAN
  4. WAN
  5. None of the above

Answer (Detailed Solution Below)

Option 2 : PAN

ICT Question 5 Detailed Solution

​A computer network is a collection of two or more networked computers. 

Key Points

  • A computer network connection can be created using either cable or wireless media used for sharing files and resources. 
  • There are various types of networks: Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN). 
  • A Personal Area Network is built around one individual.
  • It includes a computer, a phone, or a personal digital assistant.
  • PAN can be used to connect these personal gadgets to a digital network and the internet by establishing communication between them.

Thus, PAN types of networks she is using for taking backups.Additional Information

  •  WAN is a computer network that is spread over a big geographic area. 
  • MAN is a computer network spanning an entire city, a college campus, or a small area. 
  • LAN is a group of computers and related peripherals that are interconnected in a constrained space. 

Top ICT MCQ Objective Questions

The speed of processor of a computer is measured in ____.

  1. Gigahertz 
  2. Baud
  3. BPS
  4. MIPS

Answer (Detailed Solution Below)

Option 1 : Gigahertz 

ICT Question 6 Detailed Solution

Download Solution PDF

the correct answer is ​GigaHertz.

Key Points

  • Clock speed:
    • Clock speed is the significant way to measure the performance of Processor.
    • CPU processes many instructions (low-level calculations like arithmetic) from different programs every second. The clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
    • A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes, they’re a basic unit that helps understand a CPU’s speed.
    • During each cycle, billions of transistors within the processor open and close.
    • A CPU with a clock speed of 3.2 GHz executes 3.2 billion cycles per second.

The main two components of CPU are ____________.

  1. control unit and ALU
  2. ALU and BUS
  3. Control unit and register
  4. Registers and main memory

Answer (Detailed Solution Below)

Option 1 : control unit and ALU

ICT Question 7 Detailed Solution

Download Solution PDF

The correct answer is Control Unit and ALU.

  • Computers have become pervasive in every walk of life.
  • It has changed the way we work, play, communicate and learn.
  • A computer essentially comprises of a set of hardware and software.

Key Points

The Central Processing Unit (CPU):

  • The CPU is the brain of the computer.
  • Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
  • The CPU executes the programs and controls the operation of all the hardware.
  • The three main components of the CPU are:

The Control Unit (CU):

  • It is one of the most important parts of the microprocessor as it is in charge of the entire process.
  • The control unit extracts instructions from memory and decodes them.
  • Based on these instructions, it creates control signals that tell the Arithmetic Logic Unit (ALU) and the Registers how to operate, what to operate on and what to do with the result.
  • The role of the control unit in the CPU is that of a “manager”.
  • In other words, it controls and coordinates all hardware operations.

The Arithmetic and Logic Unit (ALU):

  • It is the section where the actual data processing takes place.
  • All calculations and comparisons take place in this section.
  • In addition to arithmetic functions, the ALU also handles logic operations.
  • All mathematical operations are performed in binary numbers and all logic operations are performed using binary operations.

The Primary Memory (Main memory):

  • This unit stores programs during their execution, stores data that are being used by the current program and stores the operating system which controls the operation of the computer system.
  • It consists of Random Access Memory (RAM) where the user's programs and data must be stored in order to be run and Read-Only Memory (ROM) where permanent programs and data are built-in by the manufacturer.

Hence, it is clear that the Control Unit and ALU are the two main components of the CPU.

  • BUS: It is a Data Communication System in a computer network. The ALU and CU that are linked internally and externally by busses which carry binary signals between.
  • Register: They can be thought of as the CPU’s tiny scratchpad, temporarily storing instructions or data.

First cyberlaw which provides the legal infrastructure for e-commerce in India is

  1. The Information Technology Act, 1996
  2. The Information Technology Act, 2000
  3. The Information Technology Act, 1998
  4. The Information Technology Act, 1990

Answer (Detailed Solution Below)

Option 2 : The Information Technology Act, 2000

ICT Question 8 Detailed Solution

Download Solution PDF

The correct answer is The Information Technology act, 2000.

  • The Information Technology act 2000 is the first cyber law in India.
    • It was the first cyber law that provides the legal infrastructure for e-commerce in India.
    • The Information Technology act 2000 was enacted on 9th June 2000.
    • The Information Technology act 2000 came into effect on 17th October 2000.
    • The Information Technology act 2000  has 94 sections divided into 13 chapters and 4 schedules.

Additional Information

  • The act mainly focuses on the following issues:
    • Offences and contraventions.
    • Legal recognition of digital signatures.
    • Legal recognition of electronic documents.

The ability to read and write each piece of information in a storage device in approximately the same length of time of its location is _____.

  1. Sequential Access
  2. Raster scan
  3. Search
  4. Random Access

Answer (Detailed Solution Below)

Option 4 : Random Access

ICT Question 9 Detailed Solution

Download Solution PDF

The correct answer is Random Access.

Key Points

  • Random Access:
    • In computer science, random access is the capability to have access to any item from a given population of elements at random.
    • Random access is the opposite of sequential access, as sequential access locates elements by beginning at a particular predefined location and then traversing through all of the information in order to find the given item.
    • Random access has gained interest due to the fact that one can retrieve a record irrespective of the position in which it is located.
    • Random access is also known as direct access.

Given below are two statements

Statement I: Compilers are software

Statement II: Touch screen monitors are input/output devices

In light of the above statements, choose the most appropriate answer from the options given below

  1. Both Statement I and Statement II are true
  2. Both Statement I and Statement II are false
  3. Statement I i true but Statement II is false
  4. Statement I is false but Statement II is true

Answer (Detailed Solution Below)

Option 1 : Both Statement I and Statement II are true

ICT Question 10 Detailed Solution

Download Solution PDF

Compilers:

  • A compiler is a program that translates a source program written in some high-level programming language into machine code for some computer architecture.
  • The generated machine code can be later executed many times against different data each time.
  • It writes the text into a format that the CPU can understand
  • This is a kind of system software

Touch screen monitors:

  • This is a device that helps the user to interact with the computer using their finger
  • It is an alternative to mouse and keyboard for navigating a Graphical User Interface (GUI)
  • It allows tough sensitive inputs as well as outputs.

Therefore it is clear that Compilers are software and Touch screen monitors are input/output devices. So both the statements are true.

Which Operating System is used by the Apple computer systems (an American technology company)? 

  1. Linux
  2. Windows
  3. Solaris
  4. Mac

Answer (Detailed Solution Below)

Option 4 : Mac

ICT Question 11 Detailed Solution

Download Solution PDF

An operating system is a software program that manages and operates computing devices.

Key Points

  •  Mac OS is a powerful operating system that offers similar features and services to Windows and Linux. 
  • The Macintosh Operating System (Mac OS) is an operating system developed by Apple Inc.
  • It is a graphical user interface-based operating system that was first published in 1984.
  • Apple is an American-based company located in California. 
  • Mac OS is meant to run on Apple computers and does not support the x86 architecture by default.
  • Mac OS has multiple versions available such as Macintosh 128k, Mac OS 7, Mac OS X, and Mac Mountain Lion.

Therefore, Mac is used by the Apple computer systems (an American technology company).

Additional Information

  • Microsoft Windows, usually known as Windows or Windows OS, is a personal computer operating system developed by Microsoft Corporation.
  • Linux is a collection of open-source Unix-like operating systems based on Linus Torvalds' Linux kernel which was launched on September 17, 1991.
  • Oracle Solaris is also an operating system. 

Which of the following hardware holds together the various important components of a computer such as the CPU, memory, and input/output devices?

  1. Hard Disk Drive
  2. Motherboard
  3. Control Unit
  4. ALU

Answer (Detailed Solution Below)

Option 2 : Motherboard

ICT Question 12 Detailed Solution

Download Solution PDF
Key Points

Motherboard:

  • The Motherboard is the main circuit board for the computer, containing both soldered, nonremovable components along with sockets or slots for components that can be removed.
  • The motherboard holds the CPU, RAM and ROM chips, etc.

Additional Information

  • The Arithmetic Logic Unit (ALU) performs arithmetic operations (such as addition and subtraction) and logical operations (such as comparing two values).
  • The Control Unit deciphers and carries out instructions.
  • A hard disk is similar to a floppy disk but uses metal platters to store information. Hard disks are not only much faster than floppy disks but can hold huge amounts of data (hundreds of gigabytes).

Hence, only motherboard holds together the various important components of a computer such as the CPU, memory, and input/output devices

Identify the incorrect pair from the following:

  1. .jpg - graphic file
  2. .ttf - word text file
  3. .wav - audio file
  4. .exe - executable file 

Answer (Detailed Solution Below)

Option 2 : .ttf - word text file

ICT Question 13 Detailed Solution

Download Solution PDF

Hence,  the incorrect pair is .ttf - word text file.

File Format File Extension
Word Text Document File .txt
Microsoft Word document (the original official) .doc
The Portable Document Format  .pdf
Microsoft Word document (the newer version of DOC) .docx
PNG (Portable Network Graphics) Format .png
PowerPoint Picture Presentation .pptx
Microsoft Excel Spreadsheets .xls
PowerPoint 97-2003 Presentation .ppt
The third audio format of the MPEG-1 standard .mp3
JPEG (Joint Photographic Experts Group) FileFormat .jpg
Waveform Audio File Format  .wav
Executable file .exe
MPEG-4 Video .mp4
GIF (Graphics Interchange Format) .gif
Tagged Image File Format .tiff

Which of the following is the binary equivalent of 25?

  1. 11010
  2. 11001
  3. 10111
  4. 10101

Answer (Detailed Solution Below)

Option 2 : 11001

ICT Question 14 Detailed Solution

Download Solution PDF

A number system includes the number of independent digits used in the number system (the base), the place values of the different digits constituting the number, and the maximum numbers that can be written with the given number of digits.

The Binary Number System: 

  • The binary number system with only two independent digits, 0 and 1, is a base-2 number system.
  • All larger binary numbers are represented in terms of ‘0’ and ‘1’.

Decimal to Binary Conversion:

Step 1: Divide 22 by 2 to get the Quotient. Keep the Whole part for the next step and set the Remainder aside.

25 / 2 = 12 with 1 remainder

Step 2: Divide the Whole part of the Quotient from Step 1 by 2. Again, keep the Whole part and set the Remainder aside.

12 / 2 = 6 with 0 remainder

Step 3: Repeat Step 2 above until the Whole part is 0.

6 / 2 = 3 with 0 remainder

3 / 2 = 1 with 1 remainder

1 / 2 = 0 with 1 remainder

Step 4: Write down the Remainders in reverse order to get the answer to 25 as a binary.

When we put the remainder together in reverse order, we get the answer 11001

Hence, the binary equivalent of decimal number 25 is 11001

A type of memory that holds the computer startup routine is

  1. cache
  2. RAM
  3. DRAM
  4. ROM

Answer (Detailed Solution Below)

Option 4 : ROM

ICT Question 15 Detailed Solution

Download Solution PDF

The correct answer is Read-Only Memory (ROM)

 

Key Points

  • ROM stands for Read-Only Memory.
  • ROM is a storage device that is used with computers and other electronic devices.
  • Data stored in ROM may only be read.
  • ROM is used for firmware updates, which means It contains the basic instructions for what needs to happen when a computer is powered on.
  • Firmware is also known as BIOS, or basic input/output system. 
  • ROM is non-volatile storage, which means the information is maintained even if the component loses power.
  • ROM is located on a BIOS chip which is plugged into the motherboard.
  • ROM plays a critical part in booting up or starting up, your computer.

Important Points

Terminologies Characteristics

Random Access Memory (RAM)

 
  • This memory allows writing as well as reading of data, unlike ROM which does not allow writing of data on to it.
  • It is volatile storage because the contents of RAM are lost when the power (computer) is turned off.
  • If you want to store the data for later use, you have to transfer all the contents to a secondary storage device.
Dynamic random access memory (DRAM)
  • It is a type of semiconductor memory that is typically used for the data or program code needed by a computer processor to function.
  •  DRAM is a common type of random access memory (RAM) that is used in personal computers (PCs), workstations and servers.
Cache
  • Cache primarily refers to a thing that is hidden or stored somewhere, or to the place where it is hidden.
  • It has recently taken on another common meaning, “short-term computer memory where information is stored for easy retrieval.”

Hot Links: teen patti apk teen patti yas yono teen patti teen patti rules