In this article, we are going to important questions ICT skills class 10. ICT Skills is the third unit of Employability skills Class 10. It is applicable for all kinds of skill courses of Class 10. Let us begin!
Important questions ICT skills class 10 asked in the Board exam
As per CBSE question papers pattern, there are two major type of questions framed for employability skills.
- One Marks Questions such as MCQs, Fill in the blanks etc.
- Two Marks questions or short answer questions.
So let us begin the article with 1 mark questions. Here we go!
Important ICT Skills questions class 10 – 1 Mark Questions
Let us see one-mark questions from ICT skills first in the first section of basic ict skills class 10 questions and answers. Here we go!
 ICT Stands for ____________________
Ans.: Information and Communication Technology
 ________ refers to all the methods, tools, and concepts related to storing, recording, and sending digital information.
 Which of the following is not a correct method of recording or storing information?
b) written text using a typewriter
c) written text using a keyboard
d) data collected orally on the phone
Ans.: d) data collected orally on the phone
 When data is written on registers, stored, and recorded on electronic devices it takes ________ form.
Ans.: a) digital
 Which of the following is not an ICT device?
Ans.: c) calculator
 State True or False – Everyone should acquire ICT skills and build them to stay updated with the latest software and applications.
 ICT helps to _______________
b) run a business
c) Stay connected with family and friends
d) All of these
Ans.:d) All of these
 A computer system has two major parts:
a) Footwear and Cookware
b) Peripherals and Users
c) Hardware and Software
d) Keyboard and Mouse
Ans.: c) Hardware and Software
 Which of the following is incorrect about hardware
a) We can see them
b) They provide an interface to us for work
c) We can touch them
d) They are physical parts of a computer
Ans. b) They provide an intreface to us for work
 Which of the following is a hardware
c) MS Word
Ans.: a) CPU
 Which of the following are responsible to make the hardware run?
Ans.: d) Software
 When we start a computer, we get the application interface on the screen. This is done by
d) None of these
Ans.: b) Software
 State True or False: Software would not be able to function without hardware.
 Which of the following starts working as soon as the computer is started?
a) MS Word
c) MS Excel
d) Operating System
Ans.: d) Operting System
 Which of the following is not a common OS for computers?
Ans.: b) Symbian
 Which of the following is one of the popular mobile operating systems?
 Rearrange the steps which start the computer before its ready for work
i) Operating system will start and display the desktop
ii) Power on the switch
iii) Press the power button on the CPU
a) i) – ii) – iii)
b) iii) – ii) – i)
c) ii) – iii) – i)
d) i) – iii) – ii)
Ans.: c) ii) – iii) – i)
 Naveen appeared for an interview for the post of Office Assistant. He has been asked about the program which runs automatically as soon as the computer is gets switched on. Suggest him the program name.
c) Control Panel
 BIOS stands for
a) Basic Input/Output Structure
b) Basic Input/Output Software
c) Basic Input/Output Socket
d) Basic Input/Output System
Ans.: d) Basic Input/Output System
 The BIOS first does a self-test for the computer. This self-test is known as
a) Start Up Selt Test (SUST)
b) Power On Self Test (POST)
c) First Run Self Test (FRST)
d) Power On Start Up (POSU)
Ans.: b) Power On Self Test (POST)
 Minesh wants to protect his computer from unauthorized access without his permission. Select the appropriate mechanism to help him out of the following:
a) He requires to lock the room
b) He requires to shut down the computer when he leaves the place
c) He requires a login id and password
d) He requires a pen drive and stores the password-protected file
Ans. c) He requires login id and password
 State True or False – When you shut down, the operating system will not close all the opened applications nor prompt any message to close them and closes them automatically then shut down the computer.
 Identify the control keys from the given set of keys:
enter, shift, space, capslock, semicolon, F1, F7, Delete, backspace, windows, tab
Ans.: The control kyes are – shift, space, caplock, tab
 Which of the following key is the command key?
Ans.: a) ins
 which of the following task cannot be performed by a mouse?
a) Turn on the computer
b) Hover on the object
c) Shut Down
d) Drag and Drop
Ans.: a) Turn on the computer
 Shreya is a beginner she just pressed and hold the left mouse key and move the mouse around. Her teacher saw her and asked her about the term and what she is doing. Help her so she can answer.
Ans. b) Dragging
 As you have your racks to keep your belongings. The computer also provides a container to store your files. This container is known as
b) Control Panel
Ans.: d) Folder
 The filename and extension are separated by
a) , (Comma)
b) . (Dot)
c) – (Dash)
d) _ (Underscore)
Ans.:: b) dot
 The folder is also known as ___________
b) File Container
d) File holder
Ans.:: a) directory
 State True or False – It is okay if we do not take care of dust and cleanliness of computers as it does not affect the functions of the computer.
 Gayatri kept the charges plugged in even though the laptop is charged 100%. This cause
a) Blast the battery
b) Damage laptop screen
c) Burn the keyboard
d) Overheat laptop
Ans.: d) overheat laptop
 Select a step that helps to protect the laptop from overheating
a) Fan should be not covered
b) avoid leaving a device in the direct sunlight
c) do not leave a device in a closed car
d) All of these
Ans.: d) All of these
 State True or False – While connecting the USB device to the laptop and if it is difficult to plug in forcefully.
 Dharmesh is working on the computer but his computer becomes very slow after some time. What can be the possible reason?
a) too many programs are running
b) listening to songs while working
c) taking up phone calls while working on computers
d) Using internet through wifi hotspot
Ans.: a) too many programs are running
 Which of the following task can be a part of daily maintenance?
a) Full virus scan
b) Deleting unwanted contacts
c) download email attachments
d) Disk defragmentation
Ans.: c) download email attachments
 Sometimes we get emails from companies who are advertising a product or trying to
attract you to their website. Such emails are called _______________________.
Ans.: a) Spam
 Archana is getting spam emails in his email. He is confused about what to do with this type of email. Select an appropriate option for him out of these.
i) She should never respond
ii) Delete those emails regularly
iii) Set filters in email settings
iv) Move them to inbox
a) i) and ii)
b) i), ii) and iii)
c) i) and iii) only
d) All of them
Ans.: c) i) , ii) and iii)
 Read the following traits of software and identify the software:
i) It can prevent vulnerable attacks on computer
ii) It can clean any malware that affects the data
a) disk defragmenter
b) disk cleaner
c) operating system
Ans.: d) antivirus
 Suman is working on the internet to download some information for her project. She visited some websites but was not sure if they are secured or not. Now she is aware that we can surf data on a secured website. Suggest appropriate options for her out of the following:
i) It should start with HTTPS
ii) A small lock icon should appear on the address bar
iii) Always requires username and password
iv) Ask for OTP every time
a) i) and ii)
b) ii) and iii)
c) iii) and iv)
d) ii) and iv)
Ans.: a) i) and ii)
 Distributing unlicensed copies of computer programs or software is known as _________
b) Software Piracy
c) Open Source
Ans.: b) Software Piracy
Important ICT Skills questions class 10 – 2 Marks Questions
In this section of questions ICT skills class 10, we are going to discuss some 2 marks questions. Here we go!
 Expand and Define: ICT.
Ans.: ICT Stands for Information and Communciation Technology.
ICT refers to all the methods, tools, concepts related to storing, recording and sending digital information.
 Gunja is class 10 stuent. Her teacher asked her to make a list of ways to store and record information. Assist her to accomplish her task.
Ans.: The different ways to store and record information are as follows:
1) Handwritten records on paper
2) Typerwriter written records
3) Computerised Records
 What is a digital record? Enlist some popular ICT devices.
Ans.: When information is stored and recorded on electronic devices, it takes on a ‘digital’ form. This digital form is knownas digital record.
Few popluar ICT devices are as follows: Tablets, smartphones, computer and laptops
 How ICT is helpful to us?
Ans.: ICT skills help us to communicate, run our business and stay connected with our family and friends. Hence, every person needs to acquire ICT skills and build them to stay updated with the latest software and applications (apps).
 Define: hardware and software
Ans.: The physical parts that can be seen and touch are called hardware. It is machinery of a computer such as keyboard, monitor, CPU etc.
The programs thact cannot seen and make the hardware work the way as user want. For example MS Excel, MS Word etc.
 What is Operating System? Write a few examples.
Ans.: Operating System is a software that povides an interface between hardware, software and user. It proivides platform to run computer peripherels and other programs. Examples are Windows, Linux, Unix, Android, Mac etc.
 Explain the use of the following keys on a keyboard:
- Control Keys
- Enter Key
- Punctuation Keys
- Navigation Keys
- Command Keys
- Windows Key
1. Control Kyes: Control keys that perform special functions depending on when and where they are used. Such keys are Ctrl, Shift, Spacebar, Alt, Caps Lock, and Tab.
2. Enter Key: Enter is also known as return key. It allows to move the cursor to the beginning of a new line. In some applications it allows to send commands and to confirm a task on a computer.
3. Punctuation Keys: It allows to type punctuation marsk such as colon(:), semicolon(;), questions mark(?), single quoatation marks(‘), and double quotation marks (“).
4. Navigation Keys:: Keys like arrow keys, home, end, page up, page down are navigation keys. They allows to navigation in the document, paragraph and lines.
5. Command Keys: Command keys are used to perform specific commands such as remove the typed chatacters, overwrite characters etc. Such keys are INS, DEL, BACKSPACE erc.
6. Windows Key: It is used to open start menu.
 Prathmesh asked about the difference between mouse rollover and drag and drop. Help him by writing at least two points of each.
|Rollover||Drag and drop|
|It can be done by simply rolling the mouse on an object.||It can be done by a single click on the object then holding the mouse button down and moving the item to the new location.|
|When the mouse brought over a file explorer it will show details of that file.||Drag and drop are mostly used to move objects into various locations.|
 Rushi has purchased a new computer. Help him to keep his keyboard and monitor screen clean.
1. He should not eat anything over a keyboard. Crumbs can damage the internal parts of keyboard.
2. Clean a keyboard with soft brush to remove crumbs and dust particles.
Monitor Screen: He can wipe the screen with a soft cloth to remove any fingure marks.
 Dhwani is a Social Science teacher. She purchased a new laptop but after some time her laptop generates heat and becomes very hot. Assist her in how she can keep the laptop cool.
Ans.: Every laptop or computer CPU has an internal CPU fan that keeps it cool. She should ensure that this fan is working properly. In addition to this she can use external fan to keep laptop cool. She should avoid leaving the device in the direct sun light or in a closed car. She should always ensure that the fan is not covered.
 Write any four tips for weekly maintenance.
1. Clean Kyeboard
2. Clean Monitor
3. Dust CPU and Printer
4. Backup data to an external drive
 Nitin wants to increase his computer’s performance. Write two tips that help him.
1. He can use a disk cleaner software.
2. Disables some unwanted applications running in background.
 Mention any two ways in which personal information can be lost or leaked.
1. Do not share account details and password on unsecure sites.
2. Do not leave computer without logging out.
 What are the different types of theft?
Ans.:There are three typs of theft:
1. Physical Theft: Any hardware device can be stolen
2. Identity: Hacker steals some information and assumed false identity
3. Software Piracy: Stealing of software and distributing unlicensed unauthorized copies of software.
 What is a virus? Write few examples.
Ans.: Virus is a computer software or program that can damage the data and software. Major types of viruses are Worms and Trojan horse,
 What do you mean by Worms? What are its effects?
Ans.: WORM stands for Write Once Read Many. They remplicate themselves and spread to all files once they attack on computer. It is very difficult to remove mannually.
 What is Trojan Horse? Write its causes. or How it damages data?
Ans.: Trojan horse appears like useful program but once it reaches to computer then it behaves like virus and destroy data.
 Who are online predators?
Ans.: Online predators are people who trap children into inappropriate relationships. They may be older people posing to be children age, bullying children into doing illegal activities online and sometimes face to face.
 Miska is a new internet user. She wants to create a user account but is not aware of the password. Help her to choose a wise password for her new account.
Ans.: She can follow these tips:
1. Use passwords that are difficult to guess.
2. Passwords should be combination of numeric, upper and lower case letters as well as special characters.
3. Password should be contain any personal identifiable parts such as mobile number, favourites or names.
4. Change password on regular intervals.
 What is data encryption? Which feature of windows allows to do the same?
Ans.: Data entcryption refers to store the sensitive information in different ways not in oginial form. Windows provides Bitlocker to protect data through encryption. User requires decryotion software to get back into original form.