ICSTE 6 STD
ICSTE 6 STD
ICSTE 6 STD
STD – 6
1. What is the primary function of the ALU (Arithmetic Logic Unit) in the CPU?
o a) Windows
o b) Linux
o c) Microsoft Word
o d) mac OS
o a) RAM
o b) CPU
o c) Hard Disk
o d) Monitor
1
Answer: c) Hard Disk
o c) To design graphics
6. Which of the following protocols is used to send email over the internet?
o a) HTTP
o b) FTP
o c) SMTP
o d) POP3
Answer: c) SMTP
o b) Alt + F4
o d) Shift + Esc
2
9. Which type of file extension is typically used for image files?
o a) .docx
o b) .xls
o c) .jpg
o d) .ppt
Answer: c) .jpg
o a) Ctrl + N
o b) Ctrl + F
o c) Ctrl + Shift + N
o d) Ctrl + Alt + F
o a) Word Processor
o b) Spreadsheet
o d) Presentation Software
3
13. What is “Defragmentation” in computing?
o a) Assembly
o b) C++
o c) Machine Code
o d) Binary Code
Answer: b) C++
o a) Modem
o b) Printer
o c) Monitor
o d) Keyboard
4
Answer: a) Modem
18. Which command in Windows is used to display the list of files and folders in a
directory?
o a) dir
o b) ls
o c) show
o d) list
Answer: a) dir
5
o d) Binary Integrated Operating System
o a) .txt
o b) .pdf
o c) .jpg
o d) .xlsx
Answer: a) .txt
o a) Monitor
o b) Hard Drive
o c) CPU
o d) RAM
Answer: c) CPU
6
o c) To store data permanently
o a) 1010
o b) 1234
o c) 1A2B
o d) 2567
Answer: a) 1010
27. Which software is specifically designed for creating and editing videos?
o a) Microsoft PowerPoint
o b) Adobe Photoshop
o d) Microsoft Excel
7
o d) Uniform Reference Locator
o a) Linear
o b) Circular
o c) Star
o d) Static
Answer: c) Star
o a) A programming language
o b) A type of database
8
33. Which of the following is NOT a programming language?
a) Python
b) JavaScript
c) SQL
d) JPEG
Answer: d) JPEG
a) del
b) rm
c) erase
d) delete
Answer: b) rm
37. Which type of memory is non-volatile and used for storing firmware?
a) RAM
b) ROM
9
c) Cache
d) SSD
Answer: b) ROM
b) To fix bugs and add new features to the operating system or software
Answer: b) To fix bugs and add new features to the operating system or software
a) An IP address only
Answer: c) The domain name and path to a specific resource on the web
10
42. Which of the following is a form of malware designed to exploit vulnerabilities in
software?
a) Firewall
b) Antivirus
c) Trojan Horse
d) Backup
a) HTTP
b) FAT32
c) SMTP
d) FTP
Answer: b) FAT32
b) To filter and monitor internet traffic between a user and the web
Answer: b) To filter and monitor internet traffic between a user and the web
a) .mp4
b) .docx
c) .xlsx
d) .html
Answer: a) .mp4
11
b) Provides interactive features on web pages
b) Hard Drive
c) Monitor
d) Speaker
c) A file extension
12
Answer: a) A URL that links to a different page or resource
13