Welcome to the 10th Class Physics Chapter 17 MCQs Practice and Quiz Tests. We are presenting you with top MCQ questions from the 10th Class Physics Chapter 17 Information and Communication Technology.
You can find all the 10th Class Physics Chapter 17 MCQs online tests on our website. These online tests are great for learning and as well as for scoring maximum marks in your Matriculation Exams. We are making these Class 10 Physics MCQs online tests for those who want full marks in their exams.
What does the abbreviation “ICT” stand for?
a) Internet and Computer Technology
b) Information and Computing Technology
c) Information and Communication Technology
d) International Communication Technology
Which of the following is an example of an input device?
a) Printer
b) Monitor
c) Keyboard
d) Speakers
Which type of software allows users to perform specific tasks, such as word processing or spreadsheet calculations?
a) Operating system
b) Application software
c) System software
d) Firmware
What is the function of a router in a computer network?
a) Connects devices within the same local area network (LAN)
b) Translates domain names to IP addresses
c) Connects devices between different networks
d) Provides power to network devices
Which of the following is NOT a type of cloud computing service?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Database as a Service (DBaaS)
What does “URL” stand for in the context of the internet?
a) Universal Resource Locator
b) Unified Resource Locator
c) Uniform Resource Locator
d) Unique Resource Locator
Which of the following is an example of a volatile memory?
a) Hard disk drive (HDD)
b) Solid-state drive (SSD)
c) Flash drive
d) Random Access Memory (RAM)
What does the term “phishing” refer to in the context of cybersecurity?
a) The process of encrypting data to secure it from unauthorized access
b) Sending unsolicited emails to a large number of recipients
c) Stealing sensitive information by impersonating a trustworthy entity
d) Gaining unauthorized access to a computer system
Which network topology connects all devices in a linear sequence?
a) Star topology
b) Bus topology
c) Ring topology
d) Mesh topology
What is the purpose of an operating system in a computer?
a) To run application software
b) To manage hardware resources
c) To provide internet connectivity
d) To display graphics on the screen
What does “CPU” stand for in the context of computers?
a) Central Processing Unit
b) Control Processing Unit
c) Computer Processing Unit
d) Central Power Unit
Which of the following is an example of a presentation software?
a) Microsoft Word
b) Adobe Photoshop
c) Microsoft Excel
d) Microsoft PowerPoint
What is the purpose of an IP address in computer networking?
a) To identify a specific device on a network
b) To provide internet connectivity
c) To store data for future reference
d) To protect against cyberattacks
Which of the following is an example of a non-impact printer?
a) Inkjet printer
b) Dot matrix printer
c) Laser printer
d) Thermal printer
What is the purpose of a firewall in network security?
a) To scan for viruses and malware
b) To prevent unauthorized access to a network
c) To increase internet speed
d) To provide backup for network data
Which type of software allows users to interact with the computer system and other software applications?
a) System software
b) Application software
c) Firmware
d) Shareware
What is the purpose of a modem in a computer network?
a) To convert digital signals to analog signals for transmission over telephone lines
b) To convert analog signals to digital signals for transmission over network cables
c) To provide internet connectivity
d) To increase the processing speed of a computer
Which of the following is an example of an output device?
a) Mouse
b) Printer
c) Scanner
d) Keyboard
What does the abbreviation “HTML” stand for in web development?
a) Hyper Transfer Markup Language
b) Hyper Text Markup Language
c) High-Level Markup Language
d) Home Text Markup Language
Which of the following is a type of computer memory that retains its content even when the power is turned off?
a) RAM
b) ROM
c) Cache memory
d) Virtual memory
What is the function of an antivirus software?
a) To provide internet connectivity
b) To create backups of files
c) To scan for and remove malicious software
d) To manage hardware resources
Which of the following is a type of computer programming language?
a) JPEG
b) XML
c) Java
d) HTML
What is the purpose of a router in a computer network?
a) Connects devices within the same local area network (LAN)
b) Translates domain names to IP addresses
c) Connects devices between different networks
d) Provides power to network devices
What does “URL” stand for in the context of the internet?
a) Universal Resource Locator
b) Unified Resource Locator
c) Uniform Resource Locator
d) Unique Resource Locator
Which of the following is NOT a type of cloud computing service?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Database as a Service (DBaaS)
What does the term “phishing” refer to in the context of cybersecurity?
a) The process of encrypting data to secure it from unauthorized access
b) Sending unsolicited emails to a large number of recipients
c) Stealing sensitive information by impersonating a trustworthy entity
d) Gaining unauthorized access to a computer system
Which network topology connects all devices in a linear sequence?
a) Star topology
b) Bus topology
c) Ring topology
d) Mesh topology
What is the purpose of an operating system in a computer?
a) To run application software
b) To manage hardware resources
c) To provide internet connectivity
d) To display graphics on the screen
What does “CPU” stand for in the context of computers?
a) Central Processing Unit
b) Control Processing Unit
c) Computer Processing Unit
d) Central Power Unit
Which of the following is an example of a presentation software?
a) Microsoft Word
b) Adobe Photoshop
c) Microsoft Excel
d) Microsoft PowerPoint
What is the purpose of an IP address in computer networking?
a) To identify a specific device on a network
b) To provide internet connectivity
c) To store data for future reference
d) To protect against cyberattacks
Which of the following is an example of a non-impact printer?
a) Inkjet printer
b) Dot matrix printer
c) Laser printer
d) Thermal printer
What is the purpose of a firewall in network security?
a) To scan for viruses and malware
b) To prevent unauthorized access to a network
c) To increase internet speed
d) To provide backup for network data
Which of the following is an example of an output device?
a) Mouse
b) Printer
c) Scanner
d) Keyboard
What does the abbreviation “HTML” stand for in web development?
a) Hyper Transfer Markup Language
b) Hyper Text Markup Language
c) High-Level Markup Language
d) Home Text Markup Language
Which of the following is a type of computer memory that retains its content even when the power is turned off?
a) RAM
b) ROM
c) Cache memory
d) Virtual memory
What is the function of an antivirus software?
a) To provide internet connectivity
b) To create backups of files
c) To scan for and remove malicious software
d) To manage hardware resources
Which of the following is a type of computer programming language?
a) JPEG
b) XML
c) Java
d) HTML
What does the abbreviation “ICT” stand for?
a) Internet and Computer Technology
b) Information and Computing Technology
c) Information and Communication Technology
d) International Communication Technology
Which of the following is an example of an input device?
a) Printer
b) Monitor
c) Keyboard
d) Speakers
Which type of software allows users to perform specific tasks, such as word processing or spreadsheet calculations?
a) Operating system
b) Application software
c) System software
d) Firmware
What is the function of a router in a computer network?
a) Connects devices within the same local area network (LAN)
b) Translates domain names to IP addresses
c) Connects devices between different networks
d) Provides power to network devices
What does “URL” stand for in the context of the internet?
a) Universal Resource Locator
b) Unified Resource Locator
c) Uniform Resource Locator
d) Unique Resource Locator
Which of the following is NOT a type of cloud computing service?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Database as a Service (DBaaS)
What does the term “phishing” refer to in the context of cybersecurity?
a) The process of encrypting data to secure it from unauthorized access
b) Sending unsolicited emails to a large number of recipients
c) Stealing sensitive information by impersonating a trustworthy entity
d) Gaining unauthorized access to a computer system
Which network topology connects all devices in a linear sequence?
a) Star topology
b) Bus topology
c) Ring topology
d) Mesh topology
What is the purpose of an operating system in a computer?
a) To run application software
b) To manage hardware resources
c) To provide internet connectivity
d) To display graphics on the screen
What does “CPU” stand for in the context of computers?
a) Central Processing Unit
b) Control Processing Unit
c) Computer Processing Unit
d) Central Power Unit
Which of the following is an example of a presentation software?
a) Microsoft Word
b) Adobe Photoshop
c) Microsoft Excel
d) Microsoft PowerPoint
What is the purpose of an IP address in computer networking?
a) To identify a specific device on a network
b) To provide internet connectivity
c) To store data for future reference
d) To protect against cyberattacks
Which of the following is an example of a non-impact printer?
a) Inkjet printer
b) Dot matrix printer
c) Laser printer
d) Thermal printer
What is the purpose of a firewall in network security?
a) To scan for viruses and malware
b) To prevent unauthorized access to a network
c) To increase internet speed
d) To provide backup for network data
Which of the following is an example of an output device?
a) Mouse
b) Printer
c) Scanner
d) Keyboard
What does the abbreviation “HTML” stand for in web development?
a) Hyper Transfer Markup Language
b) Hyper Text Markup Language
c) High-Level Markup Language
d) Home Text Markup Language
Which of the following is a type of computer memory that retains its content even when the power is turned off?
a) RAM
b) ROM
c) Cache memory
d) Virtual memory
What is the function of an antivirus software?
a) To provide internet connectivity
b) To create backups of files
c) To scan for and remove malicious software
d) To manage hardware resources
Which of the following is a type of computer programming language?
a) JPEG
b) XML
c) Java
d) HTML
What does the abbreviation “ICT” stand for?
a) Internet and Computer Technology
b) Information and Computing Technology
c) Information and Communication Technology
d) International Communication Technology
Which of the following is an example of an input device?
a) Printer
b) Monitor
c) Keyboard
d) Speakers
Which type of software allows users to perform specific tasks, such as word processing or spreadsheet calculations?
a) Operating system
b) Application software
c) System software
d) Firmware
If you are interested to enhance your knowledge regarding Physics, Chemistry, Biology, and Computer please click on the link of each category, you will be redirected to dedicated website for each category.