Basic ICT Skills Class 10 MCQ

Basic ICT Skills Class 10 MCQ are based on CBSE employability skills class 10 textbook. All the important Information are taken from the CBSE Textbook Employability Skills Class X Based on CBSE Board Pattern.

Basic ICT Skills Class 10 MCQ

Session 1: Basic Computer Operations

1. ICT Stands for _____________.
a. Inform and Communicate technology
b. Information and Communication technology
c. Inform and Communication technology
d. Information and Communicate technology

Show Answer ⟶
b. Information and Communication technology

2. In a business, the best approach to keep records is ____________.
a. Handwritten on paper
b. Written using a typewriter
c. Written using a Computer
d. None of the above

Show Answer ⟶
c. Written using a Computer

3. ICT Skills help us to ________________, run our business and stay connected with our family and friends.
a. Communicate
b. Entertainment
c. Both a) and b)
d. None of the above

Show Answer ⟶
. Communicate

4. A computer system consists of two main parts __________ and _________.
a. Hardware
b. Software
c. Antivirus
d. Both a) and b)

Show Answer ⟶
d. Both a) and b)

5. The physical parts that we can see and touch are called _________.
a. Hardware
b. Software
c. Antivirus
d. None of the above

Show Answer ⟶
a. Hardware

5. Mobile devices, such as __________ and ____________ are also computer systems with hardware and software.
a. Mouse and Keyboard
b. Smartphone and Tablets
c. Typewriter and Pen
d. None of the above

Show Answer ⟶
b. Smartphone and Tablets

6. The most important software in any computer is the _________________.
a. Operating System
b. Antivirus
c. Office Package
d. Photo Editing Software

Show Answer ⟶
a. Operating System

7. Mobile devices also have an operating system like ___________.
a. Apple iOS
b. Android
c. Both a) and b)
d. None of the above

Show Answer ⟶
c. Both a) and b)

8. BIOS stands for ____________.
a. Basic Input/Output System
b. Basic In/Out System
c. Based on In/Out System
d. None of the above

Show Answer ⟶
a. Basic Input/Output System

9. Keyboard is an ___________ device.
a. Output device
b. Input device
c. Outer device
d. Inner device

Show Answer ⟶
b. Input device

10. __________ helps the computer to close all the applications, Operating system and turn off the computer.
a. Sleep
b. Shut down
c. Hibernate
d. None of the above

Show Answer ⟶
b. Shut down

11. SHIFT, SPACEBAR, ALT, CAPS LOCK are ________ keys which perform special functions.
a. Enter Key
b. Function Key
c. Control Key
d. Navigation Key

Show Answer ⟶
c. Control Key

12. __________ keys help to move the cursor to the beginning of a new line.
a. Enter Key
b. Return Key
c. Both a) and b)
d. None of the above

Show Answer ⟶
c. Both a) and b)

13. ____________ keys known as punctuation keys.
a. Colon
b. Semicolon
c. Question mark
d. All of the above

Show Answer ⟶
d. All of the above

14. Example of navigation keys ___________.
a. Home
b. End
c. Page Up & Page Down
d. All of the above

Show Answer ⟶
d. All of the above

15. Example of command keys___________.
a. Insert
b. Delete
c. Backspace
d. All of the above

Show Answer ⟶
d. All of the above

16. Which of the following does not require the use of a mouse?
a. Turn on
b. Right click
c. Hover
d. Drag and Drop

Show Answer ⟶
a. Turn on

17. What is the term used when you press and hold the left mouse key and move the mouse around?
a. Highlighting
b. Selecting
c. Dragging
d. Moving

Show Answer ⟶
c. Dragging

18. The following are the stages involved in starting a computer. Rearrange the stages in the proper sequence.
i. Desktop appears after login
ii. Login screen appears
iii. Power on Self-Test (POST) starts
iv. Operating system starts
v. Welcome screen appears

a. i), ii), iii), iv), v)
b. ii), i), v), iii), iv)
c. iii), iv), v), ii), i)
d. iii), ii), i), iv), v)

Show Answer ⟶
c. iii), iv), v), ii), i)

Session 2: Performing Basic File Operations

19. Extension of notepad file _________.
a. .txt
b. .bmp
c. .jpg
d. .psd

Show Answer ⟶
a. .txt

20. Extension of image file _________.
a. .bmp
b. .jpg
c. Both a) and b)
d. None of the above

Show Answer ⟶
c. Both a) and b)

21. Which one of the following shortcut keys is used to paste a file?
a. Ctrl + c
b. Ctrl + p
c. Ctrl + v
d. Ctrl + x

Show Answer ⟶
c. Ctrl + v

22. Which of the following is a valid file extension for Notepad file?
a. .jpg
b. .doc
c. .text
d. .txt

Show Answer ⟶
d. .txt

23. What keys do you use to copy something?
a. Ctrl+x
b. Ctrl+c
c. Ctrl+z
d. Ctrl+y

Show Answer ⟶
b. Ctrl+c

Session 3: Computer Care and Maintenance

24. What are the best options for caring for computer devices?
a. Keeping a Device Clean
b. Prepare a Maintenance Schedule
c. Do not overcharge your battery
d. All of the above

Show Answer ⟶
d. All of the above

25. You can take backup in the following devices_________.
a. CD/DVD
b. Flash Drive
c. External Drive
d. All of the above

Show Answer ⟶
c. External Drive

26. To clean the computer from the virus we required __________.
a. Antivirus
b. Office Package
c. Photoshop
d. Operating System

Show Answer ⟶
a. Antivirus

27. If we are using a computer for a long time we have to __________ unnecessary files and data from the computer.
a. Delete
b. Save
c. Backup
d. None of the above

Show Answer ⟶
a. Delete

28. Sometimes we get mails from companies who are advertising a product or trying to attract you to their website. Such mails are called ________.
a. Trash
b. Inbox
c. Spam
d. None of the above

Show Answer ⟶
c. Spam

29. What happens if you keep a device plugged in after it has been fully charged?
a. It can break.
b. It can overheat.
c. It can stop functioning.
d. Data can get corrupt.

Show Answer ⟶
b. It can overheat.

30. What role does antivirus play in protecting your device?
a. It can increase its performance.
b. It can protect it from overheating.
c. It can prevent data from getting corrupt.
d. It can backup data.

Show Answer ⟶
c. It can prevent data from getting corrupt.

31. Which option does not need to be enabled in order to keep a device cool?
a. Make sure the computer’s CPU fan is working.
b. Keep the device unplugged when in use.
c. Do not cover a laptop with a blanket.
d. Avoid leaving the device in the sun.

Show Answer ⟶
b. Keep the device unplugged when in use.

32. Which of the following is required for keyboard maintenance?
a. Use a very dilute combination of soap and water applied with a non-abrasive cloth to remove stains from the keycaps.
b. Turn the keyboard upside down and shake it to remove foreign material.
c. Blow dust and other particles with the help of a blower.
d. All of the above.

Show Answer ⟶
d. All of the above

Session 4: Computer Security and Privacy

33. Computer security helps to protect computers from ___________.
a. Security Break
b. Protect from Threats
c. Protecting your data
d. All of the above

Show Answer ⟶
d. All of the above

34. What do you mean by Threats ___________.
a. Theft
b. Virus
c. Both a) and b)
d. None of the above

Show Answer ⟶
c. Both a) and b)

35. __________ are computer programmes that can corrupt data and software programmes, as well as steal information from a computer.
a. Virus
b. Theft
c. Both a) and b)
d. None of the above

Show Answer ⟶
a. Virus

36. If someone steals your desktop computer or laptop, it is referred to as _________ theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above

Show Answer ⟶
a. Physical

37. When a hacker takes your personal information and assumes your identity, this is referred to as____________ theft.
a. Physical
b. Identity
c. Software Piracy
d. None of the above

Show Answer ⟶
b. Identity

38. _________ hits the computer, it acts like a virus, deleting data.
a. Trojan Horse
b. Online Predator
c. Theft
d. None of the above

Show Answer ⟶
a. Trojan Horse

39. __________ are persons who try to attract you into inappropriate relationships.
a. Trojan House
b. Online Predator
c. Theft
d. None of the above

Show Answer ⟶
b. Online Predator

40. Sometimes you may receive very attractive offers saying you have won a huge amount of money in a lottery and that you can claim the prize by depositing a certain amount of money known as ___________.
a. Trojan House
b. Online Predator
c. Theft
d. Internet Scams

Show Answer ⟶
d. Internet Scams

41. To protect our data from theft and viruses we can take ___________ measures.
a. Use passwords to login
b. Install Anti – Virus and firewall
c. Encrypt Data
d. All of the above

Show Answer ⟶
d. All of the above

42. Banks and companies usually keep their data in ___________ format.
a. Encrypted
b. Firewall
c. Using Password
d. All of the above

Show Answer ⟶
a. Encrypted

43. If you want to create a secure password you have to use _________ in the password.
a. Small and Capital letter
b. Numbers
c. Special Characters
d. All of the above

Show Answer ⟶
d. All of the above

44. We can check secure websites using __________.
a. http://
b. https://
c. Www
d. None of the above

Show Answer ⟶
b. https://

45. What can you do to make sure your internet transactions are safe?
a. Lock your computer
b. Do not use pirated software
c. Give credit card or bank details only on safe websites
d. Use anti-virus

Show Answer ⟶
c. Give credit card or bank details only on safe websites

46. Which of the following is a trap for small children into unsuitable relationships?
a. Trojan Horse
b. Online predators
c. Worms
d. Anti-Virus

Show Answer ⟶
b. Online predators

47. What should a strong password consist of?
a. Name of a person
b. Only letters
c. Letters, numbers and special characters
d. Numbers and special characters

Show Answer ⟶
c. Letters, numbers and special characters

Competency Based Questions for Board Examination

1. GUI stands for :
a. Graphical User Interaction
b. Graphical User Interface
c. Graphical Upper Interface
d. None of these

Show Answer ⟶
b. Graphical User Interface

2. How can an anti-virus protect your device?
a. It can protect it from over-heating
b. It can increase its performance
c. It can prevent data from getting corrupt
d. It can backup data

Show Answer ⟶
c. It can prevent data from getting corrupt

3. Which of the following functions is not performed using a mouse?
a. Turn on
b. Hover
c. Right click
d. Drag and Drop

Show Answer ⟶
a. Turn on

4. Which of the following is a valid file extension for a Notepad file?
a. .jpg
b. .doc
c. .text
d. .txt

Show Answer ⟶
c. .txt

5. What keys do you use to copy something?
a. Ctrl+x
b. Ctrl+c
c. Ctrl+z
d. Ctrl+y

Show Answer ⟶
b. Ctrl+c

6. Where are the Files and folders deleted by the user stored in the computer?
a. Control Panel
b. Recycle Bin
c. Search Box
d. Menu Bar

Show Answer ⟶
b. Recycle Bin

7. Which of the following shortcut keys is used to paste a file?
a. Ctrl + C
b. Ctrl + P
c. Ctrl + V
d. Ctrl + X

Show Answer ⟶
c. Ctrl + V

8. __ is a shortcut key used to undo an action.
a. Answer Shift +End
b. Shift + Ctrl + Home
c. Ctrl + A
d. Ctrl+Z

Show Answer ⟶
d. Ctrl+Z

9. Which of the following function is not a way to protect data?
a. Password
b. Antivirus and firewell
c. Secure sites
d. Trojan horse

Show Answer ⟶
d. Trojan horse

10. When the information is stored or recorded on electronic devices, it refers to _.
a. Raw form
b. Paper form
c. Digital form
d. Paper back form

Show Answer ⟶
c. Digital form

11. Which one of the following is a control key?
a. RETURN
b. SPACE BAR
c. TAB
d. PAGE DOWN

Show Answer ⟶
d. PAGE DOWN

12. What are the small pictures on the desktop called?
a. Symbols
b. Images
c. Icons
d. Logo

Show Answer ⟶
c. Icons

13. Which of the following software can be used to create text files?
a. Viewer
b. WritePad
c. Notepad
d. Recorder

Show Answer ⟶
c. Notepad

14. A key or set of keys on the computer keyboard, when pressed once, evokes and performs a task quickly is called:
a. Shortcut key
b. Special key
c. Function key
d. System key

Show Answer ⟶
a. Shortcut key

15. What is the keyboard shortcut for copying selected text or files in most operating systems ?
a. Ctrl + X
b. Ctrl + Z
c. Ctrl + V
d. Ctrl + C

Show Answer ⟶
d. Ctrl + C

16. When we double-click on a file, it will open the __.
a. folder
b. C Drive
c. D Drive
d. file

Show Answer ⟶
d. file

17. Operating system is a:
a. hardware
b. software
c. humanware
d. hardware and humanware

Show Answer ⟶
b. software

18. The most important software in any computer is the __. This is the software that starts working as soon as we switch on a computer.
a. Web Browsers
b. Operating System
c. Office Software
d. Designing Software

Show Answer ⟶
b. Operating System

19. A soon as we switch on a computer, the _ starts working.
a. Monitor
b. Output devices
c. Operating System
d. CPU

Show Answer ⟶
c. Operating System

20. Name the shortcut key which is used for “Select all” option.
a. Ctrl + A
b. Ctrl + C
c. Ctrl + X
d. Ctrl + Z

Show Answer ⟶
a. Ctrl + A

21. Which of the following trap small children into inappropriate relations?
a. Online predators
b. Worms
c. Trojan Horse
d. Anti-Virus

Show Answer ⟶
a. Online predators

22. Name the operating system developed by Microsoft.
a. Windows
b. Disk Operating System
c. Linux
d. Firefox

Show Answer ⟶
a. Windows

23. An operating system is a software that serves as an interface between
a. user and computers
b. server and computer
c. computer and network
d. computer without CPU

Show Answer ⟶
a. user and computers

24. Using which of the following can change settings?
a. Search box
b. Recycle bin
c. Control panel
d. Taskbar

Show Answer ⟶
c. Control panel

25. Which is the most important software in any computer?
a. Application software.
b. System software.
c. Operating System (OS)
d. Programming software

Show Answer ⟶
c. Operating System (OS)

26. Which key opens the start menu?
a. Ctrl key
b. Alt key
c. Shift key
d. Windows key

Show Answer ⟶
d. Windows key

28. Right clicking on File or Folder opens
a. Main Menu
b. Shortcut Menu
c. Back Menu
d. Front Menu

Show Answer ⟶
b. Shortcut Menu

29. A software program that attaches itself to other programs and alter their behavior is called .
a. Infected file
b. Computer virus
c. Infected drive
d. Human virus

Show Answer ⟶
b. Computer virus

30. _ makes the hardware work the way we want.
a. Software
b. Files
c. Folder
d. Data

Show Answer ⟶
a. Software

31. A computer system consists of two main parts, the hardware and the _
a. CP
b. Monitor
c. Software
d. Mobile device

Show Answer ⟶
c. Software

32. Most companies their customers information to protect their data.
a. encrypt
b. save
c. block
d. copy

Show Answer ⟶
a. encrypt

33. Which of the following is a mobile operating system ?
a. Ubuntu
b. Microsoft Windows
c. Google Android
d. macOS

Show Answer ⟶
c. Google Android

34. Installing the __ helps in increasing the performance of the computer.
a. spam files
b. disk cleaner software
c. temporary files
d. extra files

Show Answer ⟶
b. disk cleaner software

35. A is a device used to type text, numbers and command into the computer.
a. Mouse
b. Keyboard
c. Joystick
d. Speakers

Show Answer ⟶
b. Keyboard

36. Which of the following is/are example’s of software ?
a. MS Paint
b. Mouse
c. CPU
d. Keyboard

Show Answer ⟶
a. MS Paint

37. _ is the long horizontal bar present at the bottom of the screen.
a. Taskbar
b. Menu Bar
c. Search Bar
d. Control panel

Show Answer ⟶
a. Taskbar

38. __ allows the user to search a file or a folder or run executable files.
a. Shut Down
b. Control Panel
c. Search Box
d. Menu Bar

Show Answer ⟶
c. Search Box

39. __ are computer programs that can damage the data and software programs or steal the information stored on a computer.
a. Spam
b. Viruses
c. Junk mail
d. BIOS

Show Answer ⟶
b. Viruses

40. _ is a horizontal bar present at bottom of the Windows 7 desktop.
a. Status Bar
b. Menu Bar
c. Task Bar
d. Recycle bin

Show Answer ⟶
c. Task Bar

41. Identify the virus that is harmful to computers.
a. COVID 19
b. Trojan Horse
c. Herpes Simplex
d. Chicken Pox

Show Answer ⟶
b. Trojan Horse

42. Which one of the following short-cut keys is used to copy ?
a. Ctrl+C
b. Ctrl+P
c. Ctrl+V
d. Ctrl+X

Show Answer ⟶
a. Ctrl+C

43. These files are created when you are running programs.
a. Virus
b. Backup files
c. System files
d. Temporary files

Show Answer ⟶
d. Temporary files

44. A is a location where a group of files can be stored.
a. Hard disk
b. Folder
c. Software
d. Hardware

Show Answer ⟶
b. Folder

45. Which of the following is a shortcut key to save a file ?
a. Ctrl+C
b. Ctrl+P
c. Ctrl+S
d. Ctrl+V

Show Answer ⟶
c. Ctrl+S

46. __ are the ways in which personal information can be leaked from a computer.
a. Printing
b. Scanning
c. Worms
d. Threats

Show Answer ⟶
d. Threats

47. What is a Trojan Horse ?
a. Race horse
b. Computer virus
c. Computer game
d. An animal

Show Answer ⟶
b. Computer virus

48. __ is a type of operating system that runs on a set of computers that are interconnected by a network.
a. Multi-user
b. DOS
c. Single
d. Distributed

Show Answer ⟶
d. Distributed

49. Which keys do you press to copy a file or a folder ?
a. Ctrl + X
b. Ctrl + C
c. Ctrl + Z
d. Ctrl + Y

Show Answer ⟶
b. Ctrl + C

Important links of employability skills class 10 MCQ

Disclaimer: We have taken an effort to provide you with the accurate handout of “Basic ICT Skills Class 10 MCQ“. If you feel that there is any error or mistake, please contact me at anuraganand2017@gmail.com. The above CBSE study material present on our websites is for education purpose, not our copyrights. All the above content and Screenshot are taken from Employability Skills Class 10 CBSE Textbook and Support Material which is present in CBSEACADEMIC website, This Textbook and Support Material are legally copyright by Central Board of Secondary Education. We are only providing a medium and helping the students to improve the performances in the examination. 

For more information, refer to the official CBSE textbooks available at cbseacademic.nic.in

6 thoughts on “Basic ICT Skills Class 10 MCQ”

  1. Competency Based Questions for Board Examination
    Q.8 ans is wrong
    8. __ is a shortcut key used to undo an action.
    a. Answer Shift +End
    b. Shift + Ctrl + Home
    c. Ctrl + A
    d. Ctrl+Z

    Hide Answer ⟵
    c. Ctrl + A
    It’s Ctrl + Z

    Reply
  2. 38 question
    It should be Trojan horse not house
    40 question maybe answer is wrong .
    Should be anti-virus
    Rest everything very usefull and impressive thanks

    Reply

Leave a Comment