0% found this document useful (0 votes)
17 views21 pages

ICT Question Bank

Uploaded by

bangezhanolinia2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views21 pages

ICT Question Bank

Uploaded by

bangezhanolinia2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

1.

A computer is made up of hardware and


………………..
2. What is the advantage of using backup
tools?
3. What is a white hat hacker?
4. When data is being sent from the computer
to the Internet this is called …………..
5. Draw a star topology.
6. State one advantage of star topology.
7. State one disadvantage of ring topology.
8. Explain in full the acronym LAN.
9. What is cyberbullying?
10. A picture or word that appears when you do
not use a computer for a certain period of
time is called …………
11. Name the application used to transfer files
from one smartphone to another

12. A …….. is an input device which can take


videos and pictures.
A. keyboard
B. scanner
C. camera
D. bar-code reader
13. A ……… is a storage device that can be
used in smart phone.
A. memory card
B. external hard drive
C. DVD
D. flash drive
14. You get a …….. after printing out information
15. New slide, layout, font and font size are
found on ………..
A. view
B. home
C. slide show
D. insert
16. A new presentation can be created from
……….
A. blank presentation
B. existing presentation
C. design template
D. title and content
17. Your work must be …….. at regular intervals.
A. formatted
B. updated
C. saved
D. deleted
18. ……… is used to create a database.
A. Microsoft Power Point
B. Microsoft WordPad
C. Microsoft Word
D. Microsoft Access
19. Give one advantage of saving data on an
external device.
A. It is portable
B. It stores data forever
C. If the computer is affected or stolen, you
can still access your files
D. It has a large memory

20. Name a device that can be used externally


by the computer.
21. Name any two data types used in database
creation.
22. State any one program used to create an
invitation card.
23. What is the importance of saving your work
at regular intervals?
24. What determines whether a certain type of
data can be saved in flash disk or not?
25. A …… is a storage device.
A. Printer
B. Memory card
C. WIFI
D. ESD tool
26. A …… is a peripheral device of a computer.
A. Printer
B. Mouse
C. Keyboard
D. Monitor
27. One of the following is an input part of a
computer
A. Mouse
B. Motherboard
C. Speaker
D. Camera
28. A ……… is a program used for creating
databases.
A. Microsoft Access
B. Microsoft Word
C. Microsoft Excel
D. Power Point
29. A database table is made up of fields and
…….
A. names
B. records
C. data types
D. queries
30. The process of reducing an unwanted part
from an image is known as …..,
A. cropping
B. editing
C. mopping
D. reducing
31. We edit images for ……. Purposes.
A. beauty
B. adding information
C. reducing space
D. changing its font
32. Which software is used to protect a
computer from virus attack?
A. Antivirus
B. Malware
C. Firewall
D. Program
33. Which one of the following is an example of
a virus?
A. Trojan
B. Malware
C. Spyware
D. Firewall
34. <!DOCTYPE html> informs the …….. that
this is a hypertext document.
A. search engine
B. html
C. browser
D. computer
35. Name any one computer cleaning tools
36. Give one example of an input device of a
computer.
37. Give two examples of output devices of a
computer.
38. Which part of a computer can be both an
input and an output device.
39. Which name is given to programmers who
gains access to other people’s accounts
without their consent?
40. Which important thing should not be shared
when you have opened an account online?
41. Give two examples of social media
platforms.
42. …….. is an ESD tool.
A. Antistatic mat
B. Pliers
C. Wire cutter
D. Flashlight
43. Name one tool that can be used as a printer
cleaner.
A. Air blower
B. Pliers
C. Side cutter
D. Torch
44. A multi – meter is used to …….
A. scan
B. take measurements
C. print
D. make phone calls
45. The process of systematically keeping
records is known as …….
A. data storing
B. database
C. data usage
D. spread sheet usage
46. The program used to create databases is
known as ……
A. Microsoft Office Word
B. Microsoft Office Power Point
C. Microsoft Office Access
D. Microsoft Office Excel
47. ……… is whereby someone uses Internet to
harm other users.
A. Hacking
B. Cyber bullying
C. Cyber protection
D. Internet breaking
48. Which software is used to protect a
computer from a virus attack?
A. Antivirus
B. Malware
C. Viruses
D. Worms
49. Which software is used to monitor incoming
and outgoing data on the Internet?
A. Malware
B. Antivirus
C. Firewall
D. Hardware
50. There are ……. main types of a firewall.
A. one
B. two
C. three
D. four
51. A collection of web pages under a domain
name is known as ……..
A. Web page
B. Website
C. html
D. Header
52. What does html stand for?
A. hyper text multi languages
B. hyper text multi language
C. hyper text mark up language
D. hyper text made language
53. Which software is used to create a web
page?
A. Browser
B. Html code
C. Notepad
D. Word
54. Which statement informs the browser that
this is a hypertext document?
A. <header>
B. <body>
C. <!DOCTYPE html>
D. <html>
55. Why is the cropping of images important?
A. It removes the unnecessary part of an
image
B. It beautifies a bad image
C. It saves space
D. It changes image quality
56. Which best gadget can be used to take a
video for editing?
A. A video camera
B. A tablet
C. A cell phone
D. Laptop
57. Name two external storage devices of a
computer.
58. Give two examples of computer peripherals.
59. State one gadget that is an output device.
60. What name is given to items like name, age,
contacts and ID in a database table?
61.

ID Firstna Surna DOB Contac


me me ts
00 Christia Murwir 10/10/20 00744
1 n a 03 98
00 Musa Adams 09/08/20 00877
2 03 69

What is the information in rows two and


three representing?

62. A crimping tool is part of ……….. tools


A. diagnostic
B. cleaning
C. esd
D. hand
63. A book of instructions on how to operate and
maintain a tool is called a ………
A. manual
B. chassis
C. multi – meter
D. cartridge
64. Software faults ……..
A. affect hardware performance only.
B. affect software performance only
C. may indicate hardware problems and
affect hardware performance.
D. have no fault origin.
65. ………… is a software that can damage files
or disable computer systems.
A. OS
B. DLL
C. Malware
D. RAM
66. To ………… is to put together an ICT tool.
A. disassemble
B. connect
C. screw
D. assemble
67. The purpose of the power supply unit is to
………….
A. control power in the unit.
B. supply power every component in the
unit.
C. supply power to the motherboard.
D. supply power to the cd/dvd.
68. A ………. is an organised way of keeping
records.
A. Spreadsheet
B. Database
C. Query
D. Table
69. A datatype that allows you to enter the first
name of a record is a ………
A. Look up wizard
B. Date/Time
C. Text
D. Number
70. The best datatype to use for gender is
………..
A. Long text
B. Short text
C. Number
D. Look up wizard
71. A query gets its information from …….
A. a database table
B. design view
C. an external source
D. a user
72. Cutting part of an image in image editing is
called ………..
A. cobbling
B. cropping
C. cutting
D. dropping
73. In photo editing the word contrast means
……….
A. crop
B. black and white
C. how bright the tones are
D. differences in pictures
74. A ………. stops unauthorised traffic access
to your computer through the Internet.
A. virus
B. firewall
C. stop sign
D. bookmark
75. Configuring a firewall is ………… a firewall.
A. setting up
B. updating
C. downloading
D. upgrading
76. You should avoid ………. when you are on
Internet.
A. downloading anything that you come
across.
B. watching videos
C. signing up new accounts for social media
platforms.
D. being on email.
77. Virus scanning can be successfully done
when you have ……..
A. a fast antivirus
B. a working antivirus
C. an expensive antivirus
D. two antiviruses on your machine
78. dpa stands for ………
A. Data Password Act
B. Data Processing Act
C. Data Protection Act
D. Data Processed Act
79. ……… is an example of a search engine.
A. Microsoft Excel
B. Phoenix
C. Opera
D. Ask.com
80. A database for search engines is called ……
A. a key word
B. an index
C. a stop word
D. an algorithm
81. …… is when you get educational material
from the Internet and save them for use.
A. Researching
B. Uploading
C. Downloading
D. Scanning
82. A website is a ……… of web pages under a
single domain name.
A. writing
B. drawing
C. single page
D. collection
83. ……… is a social setting on WordPress.
A. Bank details
B. Gamming
C. Twitter
D. Scratch
84. The …….. page gives information on what
the Website is about.
A. Menu
B. Header
C. About us
D. Comments
85. …… can intentionally damage information on
a Website.
A. Researchers
B. Hackers
C. Authors
D. Web Developers
86. ……… is an example of a domain that
contains relevant and reliable information.
A. .com
B. .ba
C. .edu
D. .co
87. Name the tool you would use to remove dust
in a printer.
88. What is the importance of ESD tools?
89. What can possibly be a fault origin of a
frozen screen?
90. Why should one wear an ESD wrist band
when disassembling ICT tools?
91. Give one reason for editing images.
92. State any two areas that can be edited on an
image.
93. Why is cropping done on an image?
94. Explain why would you trim a video.
95. Which tool can best be used to take a video?
96. What name is given to people who gain
access into other people’s accounts without
their permission?
97. What does html stand for?
98. Which software can be used to create a
website?
99. Which term is used to describe a situation
whereby one bullies other people on
Internet?
100. Which search engine is mainly used
for educational purposes?

You might also like