Advertise here ✔️

Phone: +255 692 127 931 Email: njoholes@gmail.com

Monday, March 30, 2026

ASSISTANT ICT OFFICER GRADE III QUESTIONS AND ANSWERS

 


ASSISTANT ICT OFFICER GRADE III

📘 SECTION A: BASIC ICT (1–25)
1. ICT stands for:
A. Information Computer Technology
B. Information and Communication Technology ✅
C. Internal Communication Tool
D. Integrated Computer Technique


2. Which is NOT a component of ICT?
A. Hardware
B. Software
C. Data
D. Electricity ✅


3. Physical parts of a computer are called:
A. Software
B. Hardware ✅
C. Firmware
D. Data


4. Which of the following is software?
A. Keyboard
B. Monitor
C. Microsoft Word ✅
D. Mouse


5. The brain of the computer is:
A. RAM
B. CPU ✅
C. Monitor
D. Disk


6. Which device is used for input?
A. Printer
B. Monitor
C. Keyboard ✅
D. Speaker


7. Which device is output?
A. Scanner
B. Keyboard
C. Monitor ✅
D. Mouse


8. A set of instructions given to a computer is called:
A. Data
B. Software ✅
C. Hardware
D. Memory


9. Which memory is volatile?
A. ROM
B. Hard Disk
C. RAM ✅
D. CD


10. ROM stands for:
A. Read Only Memory ✅
B. Random Output Memory
C. Read Output Memory
D. Run Only Memory


11. Which is an example of an operating system?
A. Windows Operating System ✅
B. Excel
C. Chrome
D. Printer


12. Software used to perform specific tasks is called:
A. System software
B. Application software ✅
C. Hardware
D. Firmware


13. Which of the following is NOT an input device?
A. Mouse
B. Keyboard
C. Printer ✅
D. Scanner


14. Which of the following is NOT an output device?
A. Monitor
B. Speaker
C. Keyboard ✅
D. Printer


15. A computer processes data into:
A. Input
B. Output ✅
C. Storage
D. Files


16. Which is a storage device?
A. CPU
B. Monitor
C. Hard disk ✅
D. Keyboard


17. Data is:
A. Processed information
B. Raw facts ✅
C. Software
D. Hardware


18. Information is:
A. Raw data
B. Processed data ✅
C. Hardware
D. Virus


19. Which is an example of secondary storage?
A. RAM
B. Cache
C. Hard disk ✅
D. Register


20. Which unit processes instructions?
A. ALU
B. CU
C. CPU ✅
D. RAM


21. Which is NOT software?
A. Microsoft Excel
B. Microsoft PowerPoint
C. Printer ✅
D. Google Chrome


22. Which device displays output?
A. Printer
B. Monitor ✅
C. Scanner
D. Keyboard


23. Which is an input device?
A. Speaker
B. Mouse ✅
C. Monitor
D. Printer


24. CPU stands for:
A. Central Process Unit
B. Central Processing Unit ✅
C. Computer Personal Unit
D. Control Process Unit


25. Which performs arithmetic operations?
A. RAM
B. ALU ✅
C. CU
D. Disk


🌐 SECTION B: NETWORKING (26–50)
26. A network is:
A. Single computer
B. Connected computers ✅
C. Software
D. Printer


27. LAN stands for:
A. Large Area Network
B. Local Area Network ✅
C. Long Area Network
D. Link Area Network


28. WAN covers:
A. Small area
B. Large area ✅
C. One room
D. One building


29. Internet is:
A. Software
B. Hardware
C. Global network ✅
D. Device


30. IP address is:
A. Device
B. Unique identifier ✅
C. Software
D. Protocol


31. Router is used to:
A. Print
B. Connect networks ✅
C. Store data
D. Scan


32. Example of web browser:
A. Google Chrome ✅
B. Excel
C. Word
D. Paint


33. Email is used for:
A. Storage
B. Communication ✅
C. Gaming
D. Printing


34. WWW stands for:
A. World Wide Web ✅
B. Web World Wide
C. Wide Web World
D. World Web Wide


35. Which is a search engine?
A. Google Search ✅
B. Excel
C. PowerPoint
D. Word


36. HTTP is:
A. Protocol ✅
B. Software
C. Device
D. Virus


37. FTP is used for:
A. Browsing
B. File transfer ✅
C. Email
D. Security


38. Network device example:
A. Router ✅
B. Keyboard
C. Monitor
D. Printer


39. Which connects devices in LAN?
A. Switch ✅
B. Printer
C. CPU
D. RAM


40. MAN stands for:
A. Metropolitan Area Network ✅
B. Main Area Network
C. Medium Area Network
D. Major Area Network


41. Modem is used for:
A. Printing
B. Internet connection ✅
C. Storage
D. Processing


42. Network protocol example:
A. HTTP ✅
B. Excel
C. CPU
D. RAM


43. Internet service provider is:
A. Vodacom Tanzania ✅
B. Keyboard
C. CPU
D. Monitor


44. Which is wireless network?
A. LAN
B. WAN
C. Wi-Fi ✅
D. MAN


45. Which is wired medium?
A. Wi-Fi
B. Bluetooth
C. Ethernet cable ✅
D. Radio


46. Bandwidth refers to:
A. Speed of network ✅
B. Storage
C. Memory
D. CPU


47. URL is:
A. Address of website ✅
B. Software
C. Hardware
D. Virus


48. Browser is used to:
A. Print
B. Access web pages ✅
C. Store data
D. Scan


49. Example of ISP:
A. Airtel Tanzania ✅
B. Excel
C. Word
D. CPU


50. Which is NOT network type?
A. LAN
B. WAN
C. RAM ✅
D. MAN


🔐 SECTION C: CYBER SECURITY (51–75)
51. Virus is:
A. Hardware
B. Malicious program ✅
C. Input device
D. Output device


52. Antivirus is used to:
A. Delete files
B. Remove viruses ✅
C. Print
D. Browse


53. Example antivirus:
A. Kaspersky Antivirus ✅
B. Word
C. Excel
D. Chrome


54. Malware includes:
A. Virus
B. Worm
C. Trojan
D. All above ✅


55. Phishing is:
A. Fishing
B. Data theft trick ✅
C. Hardware
D. Software


56. Firewall is:
A. Security system ✅
B. Virus
C. Hardware only
D. Software only


57. Strong password includes:
A. Only letters
B. Only numbers
C. Letters, numbers, symbols ✅
D. Only symbols


58. Hacking is:
A. Authorized access
B. Unauthorized access ✅
C. Programming
D. Networking


59. Backup means:
A. Delete data
B. Copy data ✅
C. Scan
D. Format


60. Safe browsing means:
A. Click all links
B. Avoid suspicious links ✅
C. Share passwords
D. Ignore updates


61. Spyware is:
A. Security tool
B. Malicious software ✅
C. Hardware
D. OS


62. Worm spreads:
A. Automatically ✅
B. Manually
C. Through printer
D. CPU


63. Trojan disguises as:
A. Virus
B. Legit software ✅
C. Hardware
D. File


64. Encryption is:
A. Data protection ✅
B. Virus
C. Hardware
D. Software


65. Decryption is:
A. Lock data
B. Unlock data ✅
C. Delete data
D. Copy data


66. Password sharing is:
A. Safe
B. Unsafe ✅
C. Required
D. Recommended


67. Antivirus should be:
A. Updated regularly ✅
B. Ignored
C. Deleted
D. Disabled


68. Spam email is:
A. Important
B. Unwanted email ✅
C. Virus
D. Hardware


69. Data breach is:
A. Data safe
B. Data exposed ✅
C. Data deleted
D. Data copied


70. Cyber security protects:
A. Data & systems ✅
B. Hardware only
C. Software only
D. Printer


71. Two-factor authentication:
A. One security
B. Extra security ✅
C. No security
D. Virus


72. Social engineering attacks:
A. Technical
B. Psychological trick ✅
C. Hardware
D. Software


73. VPN is used for:
A. Gaming
B. Secure connection ✅
C. Printing
D. Storage


74. Updating software helps:
A. Slow system
B. Improve security ✅
C. Delete files
D. Virus spread


75. Best practice:
A. Weak password
B. Strong password ✅
C. No password
D. Shared password


📊 SECTION D: MS OFFICE & PRACTICAL (76–100)
76. MS Word is used for:
A. Spreadsheet
B. Document creation ✅
C. Presentation
D. Database


77. MS Excel is used for:
A. Typing
B. Calculation ✅
C. Drawing
D. Gaming


78. MS PowerPoint is used for:
A. Typing
B. Slides presentation ✅
C. Coding
D. Networking


79. Word file extension:
A. .docx ✅
B. .xls
C. .ppt
D. .txt


80. Excel file extension:
A. .ppt
B. .docx
C. .xlsx ✅
D. .pdf


81. PowerPoint extension:
A. .pptx ✅
B. .docx
C. .xlsx
D. .txt


82. Excel formula starts with:
A. = ✅
B. @
C. #
D. $


83. SUM function:
A. Multiply
B. Add ✅
C. Divide
D. Subtract


84. Cell is:
A. Row
B. Column
C. Intersection ✅
D. Table


85. Ctrl + S:
A. Save ✅
B. Copy
C. Paste
D. Print


86. Ctrl + C:
A. Cut
B. Copy ✅
C. Paste
D. Save


87. Ctrl + V:
A. Copy
B. Paste ✅
C. Save
D. Print


88. Ctrl + X:
A. Cut ✅
B. Copy
C. Paste
D. Save


89. Screenshot key:
A. Alt
B. Ctrl
C. PrtScn ✅
D. Shift


90. Folder is used to:
A. Delete
B. Organize files ✅
C. Print
D. Run


91. File extension identifies:
A. Size
B. Type ✅
C. Name
D. Location


92. Database is:
A. Random data
B. Organized data ✅
C. Hardware
D. Software


93. DBMS example:
A. MySQL ✅
B. Word
C. Excel
D. Chrome


94. Table contains:
A. Rows & columns ✅
B. Files
C. CPU
D. RAM


95. Primary key is:
A. Duplicate
B. Unique identifier ✅
C. Column
D. Row


96. SQL is used for:
A. Programming
B. Database queries ✅
C. Networking
D. Printing


97. SELECT is used to:
A. Insert
B. Delete
C. Retrieve data ✅
D. Update


98. DELETE is used to:
A. Add
B. Remove data ✅
C. Update
D. View


99. UPDATE is used to:
A. Add
B. Modify data ✅
C. Delete
D. Select


100. Backup is used to:
A. Delete
B. Protect data ✅
C. Print
D. Scan


-----------------------------------------------------------------------------------------------------------

For any enquiries WhatsApp: 0692 127 931

Share:

0 comments:

Post a Comment

Contact Us

SALEHE NJOHOLE P.O.BOX 2428, DAR ES SALAAM, TANZANIA EAST AFRIKA. Call: 0692 127 931