ICT MCQ Quiz - Objective Question with Answer for ICT - Download Free PDF
Last updated on Jul 15, 2025
Latest ICT MCQ Objective Questions
ICT Question 1:
Which of the following is a computer-based application for exchanging messages between users?
Answer (Detailed Solution Below)
ICT Question 1 Detailed Solution
The correct answer is Email.
Key Points
- Email stands for electronic mail, which is a method of exchanging digital messages over the Internet.
- Emails are typically sent through SMTP (Simple Mail Transfer Protocol) and received through IMAP (Internet Message Access Protocol) or POP3 (Post Office Protocol).
- Email services often include features such as attachments, enabling users to send files, documents, images, and other types of media.
- Emails are widely used for personal, business, and official communication due to their speed, reliability, and ability to be archived for future reference.
Additional Information
- Chrome
- Google Chrome is a cross-platform web browser developed by Google.
- It is known for its speed, simplicity, and security features.
- Chrome supports a wide range of web standards and technologies, including HTML5, CSS3, and JavaScript.
- It also has a large library of extensions and add-ons available through the Chrome Web Store.
- Bing
- Bing is a web search engine owned and operated by Microsoft.
- It provides various search services, including web, image, video, and map search results.
- Bing also powers search features in other Microsoft services, such as Cortana and Microsoft Edge.
- It competes directly with other search engines like Google and Yahoo.
- Mozilla
- Mozilla is a free software community known for its open-source products, primarily the Firefox web browser.
- Firefox is known for its focus on privacy and user control.
- Mozilla also develops other products, such as the Thunderbird email client and the Firefox OS mobile operating system.
- The organization promotes open standards and supports the advancement of the open web.
ICT Question 2:
Which of the following folders has an unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list?
Answer (Detailed Solution Below)
ICT Question 2 Detailed Solution
The correct answer is Spam folder.
Key Points
- Spam folder is designed to store unsolicited and unwanted junk emails.
- Emails in the spam folder are typically sent out in bulk to indiscriminate recipient lists.
- Spam folders help in keeping the main inbox clean by filtering out unwanted messages.
- Emails in the spam folder are often flagged by email service providers based on certain criteria such as content, sender reputation, and bulk sending patterns.
Additional Information
- Outbox:
- Outbox is a folder where emails are temporarily stored before they are sent out.
- Emails remain in the outbox when they are waiting to be sent or if they couldn't be sent due to some error.
- Once the email is successfully sent, it moves from the outbox to the sent folder.
- Inbox:
- The inbox is the main folder where incoming emails are received and stored.
- It is the default folder where new emails are delivered unless they are filtered to other folders like spam or specific category folders.
- Draft:
- The draft folder is where emails that are being composed are saved temporarily.
- It allows users to save their work and come back to it later before sending the email.
ICT Question 3:
What is the purpose of spellcheck in email composition?
Answer (Detailed Solution Below)
ICT Question 3 Detailed Solution
The correct answer is To check for and correct spelling errors.
Key Points
- Spellcheck helps in identifying and correcting spelling mistakes in the text.
- It enhances the professionalism and readability of the email content.
- Spellcheck tools often provide suggestions for misspelled words, ensuring accuracy.
- Automated spellcheck features can save time and reduce manual proofreading efforts.
Additional Information
- Spellcheck in Email Composition:
- Purpose: The main purpose of spellcheck is to identify and correct spelling mistakes in the text. This is crucial in professional communication to ensure that the email content is error-free and polished.
- Functionality: Spellcheck tools work by scanning the text for words that are not found in the dictionary. When a misspelled word is detected, the tool highlights it and often provides suggestions for the correct spelling.
- Importance: Using spellcheck helps maintain the credibility and professionalism of the sender. Emails with spelling errors can create a negative impression and may be perceived as unprofessional or careless.
- Automatic vs Manual: Many email platforms offer automatic spellcheck features that underline misspelled words as you type. Additionally, users can manually run a spellcheck before sending the email to ensure all errors are corrected.
- Formatting Email Text:
- Formatting involves adjusting the font size, style, color, and alignment of the text to enhance the presentation of the email.
- It is crucial for emphasizing important points and making the email visually appealing.
- However, formatting is a separate function from spellcheck and does not involve correcting spelling errors.
- Adding Attachments:
- This function allows users to attach files such as documents, images, or other media to the email.
- Attachments provide additional information or resources that support the email's content.
- Adding attachments is a different task and is not related to correcting spelling errors.
- Translating Emails:
- Email translation tools convert the email text from one language to another.
- This is helpful in communicating with recipients who speak different languages.
- Translation is a separate feature and does not involve spellchecking the original text for spelling errors.
ICT Question 4:
What is the meaning of an "Out of Office" auto-reply in email?
Answer (Detailed Solution Below)
ICT Question 4 Detailed Solution
The correct answer is To inform senders that the recipient is currently unavailable.
Key Points
- An "Out of Office" auto-reply is used to automatically notify email senders that the recipient is not currently available to respond.
- This message typically includes information about the duration of the recipient's absence and alternative contact details if necessary.
- It helps manage expectations and provides immediate feedback to the sender.
- It is commonly used during vacations, business trips, or other extended periods of unavailability.
Additional Information
- An "Out of Office" message can often be customized to include specific details such as the reason for absence, the date of return, and alternative contacts.
- Setting an "Out of Office" auto-reply ensures that important communications are not left unattended and that senders are aware of the recipient's availability status.
- It is a common practice in professional and corporate environments to maintain effective communication.
ICT Question 5:
What is the purpose of the CC field in an email?
Answer (Detailed Solution Below)
ICT Question 5 Detailed Solution
The correct answer is To include additional recipients who should be kept informed.
Key Points
- The CC field stands for "Carbon Copy" and is used to include additional recipients in an email.
- Recipients listed in the CC field receive a copy of the email, but are not the primary audience.
- It allows the sender to keep multiple parties informed about the contents of the email.
- Recipients in the CC field can see the email addresses of other recipients included in the CC field.
Additional Information
- To:
- This field is used to specify the primary recipients of the email.
- All recipients listed in the "To" field are considered the main audience of the email.
- CC:
- Stands for "Carbon Copy".
- Used to include additional recipients who should be informed of the email's content.
- Recipients in the CC field can see who else is copied on the email.
- BCC:
- Stands for "Blind Carbon Copy".
- Used to include recipients who should receive the email but remain hidden from other recipients.
- Recipients in the BCC field are not visible to other recipients, including those in the BCC field.
- Read Receipt:
- A request sent with an email asking the recipient to confirm they have read the message.
- Not all email clients support this feature, and recipients can choose not to send a read receipt.
- Email Encryption:
- Used to protect the content of an email from being read by anyone other than the intended recipient.
- Ensures confidentiality and security of the email's content.
- High Importance:
- An option to mark an email as high priority.
- Indicates to the recipient that the email is urgent and requires immediate attention.
Top ICT MCQ Objective Questions
The speed of processor of a computer is measured in ____.
Answer (Detailed Solution Below)
ICT Question 6 Detailed Solution
Download Solution PDFthe correct answer is GigaHertz.
Key Points
- Clock speed:
- Clock speed is the significant way to measure the performance of Processor.
- CPU processes many instructions (low-level calculations like arithmetic) from different programs every second. The clock speed measures the number of cycles your CPU executes per second, measured in GHz (gigahertz).
- A “cycle” is technically a pulse synchronized by an internal oscillator, but for our purposes, they’re a basic unit that helps understand a CPU’s speed.
- During each cycle, billions of transistors within the processor open and close.
- A CPU with a clock speed of 3.2 GHz executes 3.2 billion cycles per second.
The main two components of CPU are ____________.
Answer (Detailed Solution Below)
ICT Question 7 Detailed Solution
Download Solution PDFThe correct answer is Control Unit and ALU.
- Computers have become pervasive in every walk of life.
- It has changed the way we work, play, communicate and learn.
- A computer essentially comprises of a set of hardware and software.
Key Points
The Central Processing Unit (CPU):
- The CPU is the brain of the computer.
- Sometimes referred to simply as the processor or central processor, the CPU is where most calculations take place.
- The CPU executes the programs and controls the operation of all the hardware.
- The three main components of the CPU are:
The Control Unit (CU):
- It is one of the most important parts of the microprocessor as it is in charge of the entire process.
- The control unit extracts instructions from memory and decodes them.
- Based on these instructions, it creates control signals that tell the Arithmetic Logic Unit (ALU) and the Registers how to operate, what to operate on and what to do with the result.
- The role of the control unit in the CPU is that of a “manager”.
- In other words, it controls and coordinates all hardware operations.
The Arithmetic and Logic Unit (ALU):
- It is the section where the actual data processing takes place.
- All calculations and comparisons take place in this section.
- In addition to arithmetic functions, the ALU also handles logic operations.
- All mathematical operations are performed in binary numbers and all logic operations are performed using binary operations.
The Primary Memory (Main memory):
- This unit stores programs during their execution, stores data that are being used by the current program and stores the operating system which controls the operation of the computer system.
- It consists of Random Access Memory (RAM) where the user's programs and data must be stored in order to be run and Read-Only Memory (ROM) where permanent programs and data are built-in by the manufacturer.
Hence, it is clear that the Control Unit and ALU are the two main components of the CPU.
- BUS: It is a Data Communication System in a computer network. The ALU and CU that are linked internally and externally by busses which carry binary signals between.
- Register: They can be thought of as the CPU’s tiny scratchpad, temporarily storing instructions or data.
First cyberlaw which provides the legal infrastructure for e-commerce in India is
Answer (Detailed Solution Below)
ICT Question 8 Detailed Solution
Download Solution PDFThe correct answer is The Information Technology act, 2000.
- The Information Technology act 2000 is the first cyber law in India.
- It was the first cyber law that provides the legal infrastructure for e-commerce in India.
- The Information Technology act 2000 was enacted on 9th June 2000.
- The Information Technology act 2000 came into effect on 17th October 2000.
- The Information Technology act 2000 has 94 sections divided into 13 chapters and 4 schedules.
Additional Information
- The act mainly focuses on the following issues:
- Offences and contraventions.
- Legal recognition of digital signatures.
- Legal recognition of electronic documents.
The ability to read and write each piece of information in a storage device in approximately the same length of time of its location is _____.
Answer (Detailed Solution Below)
ICT Question 9 Detailed Solution
Download Solution PDFThe correct answer is Random Access.
Key Points
- Random Access:
- In computer science, random access is the capability to have access to any item from a given population of elements at random.
- Random access is the opposite of sequential access, as sequential access locates elements by beginning at a particular predefined location and then traversing through all of the information in order to find the given item.
- Random access has gained interest due to the fact that one can retrieve a record irrespective of the position in which it is located.
- Random access is also known as direct access.
Given below are two statements
Statement I: Compilers are software
Statement II: Touch screen monitors are input/output devices
In light of the above statements, choose the most appropriate answer from the options given below
Answer (Detailed Solution Below)
ICT Question 10 Detailed Solution
Download Solution PDFCompilers:
- A compiler is a program that translates a source program written in some high-level programming language into machine code for some computer architecture.
- The generated machine code can be later executed many times against different data each time.
- It writes the text into a format that the CPU can understand
- This is a kind of system software
Touch screen monitors:
- This is a device that helps the user to interact with the computer using their finger
- It is an alternative to mouse and keyboard for navigating a Graphical User Interface (GUI)
- It allows tough sensitive inputs as well as outputs.
Therefore it is clear that Compilers are software and Touch screen monitors are input/output devices. So both the statements are true.
Which Operating System is used by the Apple computer systems (an American technology company)?
Answer (Detailed Solution Below)
ICT Question 11 Detailed Solution
Download Solution PDFAn operating system is a software program that manages and operates computing devices.
Key Points
- Mac OS is a powerful operating system that offers similar features and services to Windows and Linux.
- The Macintosh Operating System (Mac OS) is an operating system developed by Apple Inc.
- It is a graphical user interface-based operating system that was first published in 1984.
- Apple is an American-based company located in California.
- Mac OS is meant to run on Apple computers and does not support the x86 architecture by default.
- Mac OS has multiple versions available such as Macintosh 128k, Mac OS 7, Mac OS X, and Mac Mountain Lion.
Therefore, Mac is used by the Apple computer systems (an American technology company).
Additional Information
- Microsoft Windows, usually known as Windows or Windows OS, is a personal computer operating system developed by Microsoft Corporation.
- Linux is a collection of open-source Unix-like operating systems based on Linus Torvalds' Linux kernel which was launched on September 17, 1991.
- Oracle Solaris is also an operating system.
Which of the following hardware holds together the various important components of a computer such as the CPU, memory, and input/output devices?
Answer (Detailed Solution Below)
ICT Question 12 Detailed Solution
Download Solution PDFMotherboard:
- The Motherboard is the main circuit board for the computer, containing both soldered, nonremovable components along with sockets or slots for components that can be removed.
- The motherboard holds the CPU, RAM and ROM chips, etc.
Additional Information
- The Arithmetic Logic Unit (ALU) performs arithmetic operations (such as addition and subtraction) and logical operations (such as comparing two values).
- The Control Unit deciphers and carries out instructions.
- A hard disk is similar to a floppy disk but uses metal platters to store information. Hard disks are not only much faster than floppy disks but can hold huge amounts of data (hundreds of gigabytes).
Hence, only motherboard holds together the various important components of a computer such as the CPU, memory, and input/output devices
Identify the incorrect pair from the following:
Answer (Detailed Solution Below)
ICT Question 13 Detailed Solution
Download Solution PDFFile Format | File Extension |
Word Text Document File | .txt |
Microsoft Word document (the original official) | .doc |
The Portable Document Format | |
Microsoft Word document (the newer version of DOC) | .docx |
PNG (Portable Network Graphics) Format | .png |
PowerPoint Picture Presentation | .pptx |
Microsoft Excel Spreadsheets | .xls |
PowerPoint 97-2003 Presentation | .ppt |
The third audio format of the MPEG-1 standard | .mp3 |
JPEG (Joint Photographic Experts Group) FileFormat | .jpg |
Waveform Audio File Format | .wav |
Executable file | .exe |
MPEG-4 Video | .mp4 |
GIF (Graphics Interchange Format) | .gif |
Tagged Image File Format | .tiff |
Which of the following is the binary equivalent of 25?
Answer (Detailed Solution Below)
ICT Question 14 Detailed Solution
Download Solution PDFA number system includes the number of independent digits used in the number system (the base), the place values of the different digits constituting the number, and the maximum numbers that can be written with the given number of digits.
The Binary Number System:
- The binary number system with only two independent digits, 0 and 1, is a base-2 number system.
- All larger binary numbers are represented in terms of ‘0’ and ‘1’.
Decimal to Binary Conversion:
Step 1: Divide 22 by 2 to get the Quotient. Keep the Whole part for the next step and set the Remainder aside.
25 / 2 = 12 with 1 remainder
Step 2: Divide the Whole part of the Quotient from Step 1 by 2. Again, keep the Whole part and set the Remainder aside.
12 / 2 = 6 with 0 remainder
Step 3: Repeat Step 2 above until the Whole part is 0.
6 / 2 = 3 with 0 remainder
3 / 2 = 1 with 1 remainder
1 / 2 = 0 with 1 remainder
Step 4: Write down the Remainders in reverse order to get the answer to 25 as a binary.
When we put the remainder together in reverse order, we get the answer 11001
Hence, the binary equivalent of decimal number 25 is 11001
A type of memory that holds the computer startup routine is
Answer (Detailed Solution Below)
ICT Question 15 Detailed Solution
Download Solution PDFThe correct answer is Read-Only Memory (ROM)
Key Points
- ROM stands for Read-Only Memory.
- ROM is a storage device that is used with computers and other electronic devices.
- Data stored in ROM may only be read.
- ROM is used for firmware updates, which means It contains the basic instructions for what needs to happen when a computer is powered on.
- Firmware is also known as BIOS, or basic input/output system.
- ROM is non-volatile storage, which means the information is maintained even if the component loses power.
- ROM is located on a BIOS chip which is plugged into the motherboard.
- ROM plays a critical part in booting up or starting up, your computer.
Important Points
Terminologies | Characteristics |
Random Access Memory (RAM) |
|
Dynamic random access memory (DRAM) |
|
Cache |
|