Monthly Student Online Competition

10th Class Physics Chapter 17 MCQs with Answers

10th Class Physics Chapter 17 MCQs

Master the basics of ICT (Information and Communication Technology) with these focused MCQs. Topics include digital communication, the internet, and data transfer methods. With keywords like “ICT MCQs for physics tests” and “communication technology quiz questions,” this guide is perfect for revision.

What does the abbreviation “ICT” stand for?
a) Internet and Computer Technology
b) Information and Computing Technology
c) Information and Communication Technology
d) International Communication Technology

Answer
c) Information and Communication Technology

Which of the following is an example of an input device?
a) Printer
b) Monitor
c) Keyboard
d) Speakers

Answer
c) Keyboard

Which type of software allows users to perform specific tasks, such as word processing or spreadsheet calculations?
a) Operating system
b) Application software
c) System software
d) Firmware

Answer
b) Application software

What is the function of a router in a computer network?
a) Connects devices within the same local area network (LAN)
b) Translates domain names to IP addresses
c) Connects devices between different networks
d) Provides power to network devices

Answer
c) Connects devices between different networks

Which of the following is NOT a type of cloud computing service?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Database as a Service (DBaaS)

Answer
d) Database as a Service (DBaaS)

What does “URL” stand for in the context of the internet?
a) Universal Resource Locator
b) Unified Resource Locator
c) Uniform Resource Locator
d) Unique Resource Locator

Answer
c) Uniform Resource Locator

Which of the following is an example of a volatile memory?
a) Hard disk drive (HDD)
b) Solid-state drive (SSD)
c) Flash drive
d) Random Access Memory (RAM)

Answer
d) Random Access Memory (RAM)

What does the term “phishing” refer to in the context of cybersecurity?
a) The process of encrypting data to secure it from unauthorized access
b) Sending unsolicited emails to a large number of recipients
c) Stealing sensitive information by impersonating a trustworthy entity
d) Gaining unauthorized access to a computer system

Answer
c) Stealing sensitive information by impersonating a trustworthy entity

Which network topology connects all devices in a linear sequence?
a) Star topology
b) Bus topology
c) Ring topology
d) Mesh topology

Answer
b) Bus topology

What is the purpose of an operating system in a computer?
a) To run application software
b) To manage hardware resources
c) To provide internet connectivity
d) To display graphics on the screen

Answer
b) To manage hardware resources

What does “CPU” stand for in the context of computers?
a) Central Processing Unit
b) Control Processing Unit
c) Computer Processing Unit
d) Central Power Unit

Answer
a) Central Processing Unit

Which of the following is an example of a presentation software?
a) Microsoft Word
b) Adobe Photoshop
c) Microsoft Excel
d) Microsoft PowerPoint

Answer
d) Microsoft PowerPoint

What is the purpose of an IP address in computer networking?
a) To identify a specific device on a network
b) To provide internet connectivity
c) To store data for future reference
d) To protect against cyberattacks

Answer
a) To identify a specific device on a network

Which of the following is an example of a non-impact printer?
a) Inkjet printer
b) Dot matrix printer
c) Laser printer
d) Thermal printer

Answer
a) Inkjet printer

What is the purpose of a firewall in network security?
a) To scan for viruses and malware
b) To prevent unauthorized access to a network
c) To increase internet speed
d) To provide backup for network data

Answer
b) To prevent unauthorized access to a network

Which type of software allows users to interact with the computer system and other software applications?
a) System software
b) Application software
c) Firmware
d) Shareware

Answer
b) Application software

What is the purpose of a modem in a computer network?
a) To convert digital signals to analog signals for transmission over telephone lines
b) To convert analog signals to digital signals for transmission over network cables
c) To provide internet connectivity
d) To increase the processing speed of a computer

Answer
a) To convert digital signals to analog signals for transmission over telephone lines

Which of the following is an example of an output device?
a) Mouse
b) Printer
c) Scanner
d) Keyboard

Answer
b) Printer

What does the abbreviation “HTML” stand for in web development?
a) Hyper Transfer Markup Language
b) Hyper Text Markup Language
c) High-Level Markup Language
d) Home Text Markup Language

Answer
b) Hyper Text Markup Language

Which of the following is a type of computer memory that retains its content even when the power is turned off?
a) RAM
b) ROM
c) Cache memory
d) Virtual memory

Answer
b) ROM

What is the function of an antivirus software?
a) To provide internet connectivity
b) To create backups of files
c) To scan for and remove malicious software
d) To manage hardware resources

Answer
c) To scan for and remove malicious software

Which of the following is a type of computer programming language?
a) JPEG
b) XML
c) Java
d) HTML

Answer
c) Java

What is the purpose of a router in a computer network?
a) Connects devices within the same local area network (LAN)
b) Translates domain names to IP addresses
c) Connects devices between different networks
d) Provides power to network devices

Answer
c) Connects devices between different networks

What does “URL” stand for in the context of the internet?
a) Universal Resource Locator
b) Unified Resource Locator
c) Uniform Resource Locator
d) Unique Resource Locator

Answer
c) Uniform Resource Locator

Which of the following is NOT a type of cloud computing service?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Database as a Service (DBaaS)

Answer
d) Database as a Service (DBaaS)

What does the term “phishing” refer to in the context of cybersecurity?
a) The process of encrypting data to secure it from unauthorized access
b) Sending unsolicited emails to a large number of recipients
c) Stealing sensitive information by impersonating a trustworthy entity
d) Gaining unauthorized access to a computer system

Answer
c) Stealing sensitive information by impersonating a trustworthy entity

Which network topology connects all devices in a linear sequence?
a) Star topology
b) Bus topology
c) Ring topology
d) Mesh topology

Answer
b) Bus topology

What is the purpose of an operating system in a computer?
a) To run application software
b) To manage hardware resources
c) To provide internet connectivity
d) To display graphics on the screen

Answer
b) To manage hardware resources

What does “CPU” stand for in the context of computers?
a) Central Processing Unit
b) Control Processing Unit
c) Computer Processing Unit
d) Central Power Unit

Answer
a) Central Processing Unit

Which of the following is an example of a presentation software?
a) Microsoft Word
b) Adobe Photoshop
c) Microsoft Excel
d) Microsoft PowerPoint

Answer
d) Microsoft PowerPoint

What is the purpose of an IP address in computer networking?
a) To identify a specific device on a network
b) To provide internet connectivity
c) To store data for future reference
d) To protect against cyberattacks

Answer
a) To identify a specific device on a network

Which of the following is an example of a non-impact printer?
a) Inkjet printer
b) Dot matrix printer
c) Laser printer
d) Thermal printer

Answer
a) Inkjet printer

What is the purpose of a firewall in network security?
a) To scan for viruses and malware
b) To prevent unauthorized access to a network
c) To increase internet speed
d) To provide backup for network data

Answer
b) To prevent unauthorized access to a network

Which of the following is an example of an output device?
a) Mouse
b) Printer
c) Scanner
d) Keyboard

Answer
b) Printer

What does the abbreviation “HTML” stand for in web development?
a) Hyper Transfer Markup Language
b) Hyper Text Markup Language
c) High-Level Markup Language
d) Home Text Markup Language

Answer
b) Hyper Text Markup Language

Which of the following is a type of computer memory that retains its content even when the power is turned off?
a) RAM
b) ROM
c) Cache memory
d) Virtual memory

Answer
b) ROM

What is the function of an antivirus software?
a) To provide internet connectivity
b) To create backups of files
c) To scan for and remove malicious software
d) To manage hardware resources

Answer
c) To scan for and remove malicious software

Which of the following is a type of computer programming language?
a) JPEG
b) XML
c) Java
d) HTML

Answer
c) Java

What does the abbreviation “ICT” stand for?
a) Internet and Computer Technology
b) Information and Computing Technology
c) Information and Communication Technology
d) International Communication Technology

Answer
c) Information and Communication Technology

Which of the following is an example of an input device?
a) Printer
b) Monitor
c) Keyboard
d) Speakers

Answer
c) Keyboard

Which type of software allows users to perform specific tasks, such as word processing or spreadsheet calculations?
a) Operating system
b) Application software
c) System software
d) Firmware

Answer
b) Application software

What is the function of a router in a computer network?
a) Connects devices within the same local area network (LAN)
b) Translates domain names to IP addresses
c) Connects devices between different networks
d) Provides power to network devices

Answer
c) Connects devices between different networks

What does “URL” stand for in the context of the internet?
a) Universal Resource Locator
b) Unified Resource Locator
c) Uniform Resource Locator
d) Unique Resource Locator

Answer
c) Uniform Resource Locator

Which of the following is NOT a type of cloud computing service?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Database as a Service (DBaaS)

Answer
d) Database as a Service (DBaaS)

What does the term “phishing” refer to in the context of cybersecurity?
a) The process of encrypting data to secure it from unauthorized access
b) Sending unsolicited emails to a large number of recipients
c) Stealing sensitive information by impersonating a trustworthy entity
d) Gaining unauthorized access to a computer system

Answer
c) Stealing sensitive information by impersonating a trustworthy entity

Which network topology connects all devices in a linear sequence?
a) Star topology
b) Bus topology
c) Ring topology
d) Mesh topology

Answer
b) Bus topology

What is the purpose of an operating system in a computer?
a) To run application software
b) To manage hardware resources
c) To provide internet connectivity
d) To display graphics on the screen

Answer
b) To manage hardware resources

What does “CPU” stand for in the context of computers?
a) Central Processing Unit
b) Control Processing Unit
c) Computer Processing Unit
d) Central Power Unit

Answer
a) Central Processing Unit

Which of the following is an example of a presentation software?
a) Microsoft Word
b) Adobe Photoshop
c) Microsoft Excel
d) Microsoft PowerPoint

Answer
d) Microsoft PowerPoint

What is the purpose of an IP address in computer networking?
a) To identify a specific device on a network
b) To provide internet connectivity
c) To store data for future reference
d) To protect against cyberattacks

Answer
a) To identify a specific device on a network

Which of the following is an example of a non-impact printer?
a) Inkjet printer
b) Dot matrix printer
c) Laser printer
d) Thermal printer

Answer
a) Inkjet printer

What is the purpose of a firewall in network security?
a) To scan for viruses and malware
b) To prevent unauthorized access to a network
c) To increase internet speed
d) To provide backup for network data

Answer
b) To prevent unauthorized access to a network

Which of the following is an example of an output device?
a) Mouse
b) Printer
c) Scanner
d) Keyboard

Answer
b) Printer

What does the abbreviation “HTML” stand for in web development?
a) Hyper Transfer Markup Language
b) Hyper Text Markup Language
c) High-Level Markup Language
d) Home Text Markup Language

Answer
b) Hyper Text Markup Language

Which of the following is a type of computer memory that retains its content even when the power is turned off?
a) RAM
b) ROM
c) Cache memory
d) Virtual memory

Answer
b) ROM

What is the function of an antivirus software?
a) To provide internet connectivity
b) To create backups of files
c) To scan for and remove malicious software
d) To manage hardware resources

Answer
c) To scan for and remove malicious software

Which of the following is a type of computer programming language?
a) JPEG
b) XML
c) Java
d) HTML

Answer
c) Java

What does the abbreviation “ICT” stand for?
a) Internet and Computer Technology
b) Information and Computing Technology
c) Information and Communication Technology
d) International Communication Technology

Answer
c) Information and Communication Technology

Which of the following is an example of an input device?
a) Printer
b) Monitor
c) Keyboard
d) Speakers

Answer
c) Keyboard

Which type of software allows users to perform specific tasks, such as word processing or spreadsheet calculations?
a) Operating system
b) Application software
c) System software
d) Firmware

Answer
b) Application software

If you are interested to enhance your knowledge regarding  Physics, Chemistry, Biology, and Computer please click on the link of each category, you will be redirected to dedicated website for each category.

Was this article helpful?
YesNo
See Also  10th Class Physics Chapter 18 MCQs with Answers
Facebook
Twitter
LinkedIn
WhatsApp
Pinterest
Telegram
Picture of YFP

YFP

YFP empower the youth with the ability to nurture their communication and leadership skills at a common national platform resulting in greater self-confidence and personal growth.

Leave a Reply

Your email address will not be published. Required fields are marked *