Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

ICSTE 6 STD

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

ICSTE – Intellectual Computer Science Talent Exam

STD – 6

1. What is the primary function of the ALU (Arithmetic Logic Unit) in the CPU?

o a) To manage input and output devices

o b) To perform arithmetic and logical operations

o c) To store data permanently

o d) To execute software applications

Answer: b) to perform arithmetic and logical operations

2. Which of the following is NOT an example of system software?

o a) Windows

o b) Linux

o c) Microsoft Word

o d) mac OS

Answer: c) Microsoft Word

3. What does the "Booting" process do in a computer?

o a) Installs new software

o b) Starts the computer and loads the operating system

o c) Updates system drivers

o d) Cleans temporary files

Answer: b) Starts the computer and loads the operating system

4. In which component is the operating system primarily stored?

o a) RAM

o b) CPU

o c) Hard Disk

o d) Monitor

1
Answer: c) Hard Disk

5. What is the main purpose of an “Operating System”?

o a) To create and edit documents

o b) To manage hardware resources and provide a user interface

o c) To design graphics

o d) To browse the internet

Answer: b) To manage hardware resources and provide a user interface

6. Which of the following protocols is used to send email over the internet?

o a) HTTP

o b) FTP

o c) SMTP

o d) POP3

Answer: c) SMTP

7. Which key combination is used to open the Task Manager in Windows?

o a) Ctrl + Shift + Esc

o b) Alt + F4

o c) Ctrl + Alt + Del

o d) Shift + Esc

Answer: a) Ctrl + Shift + Esc

8. What does the "Clipboard" in a computer system do?

o a) Stores files permanently

o b) Temporarily holds data that has been copied or cut

o c) Manages network connections

o d) Displays graphics on the screen

Answer: b) Temporarily holds data that has been copied or cut

2
9. Which type of file extension is typically used for image files?

o a) .docx

o b) .xls

o c) .jpg

o d) .ppt

Answer: c) .jpg

10. What is a “virus” in computer terms?

o a) A program designed to protect your computer

o b) A harmful software that can damage or disrupt your system

o c) A tool for editing photos

o d) A type of hardware component

Answer: b) A harmful software that can damage or disrupt your system

11. Which command is used to create a new folder in Windows Explorer?

o a) Ctrl + N

o b) Ctrl + F

o c) Ctrl + Shift + N

o d) Ctrl + Alt + F

Answer: c) Ctrl + Shift + N

12. Which type of software is used to manage databases?

o a) Word Processor

o b) Spreadsheet

o c) Database Management System (DBMS)

o d) Presentation Software

Answer: c) Database Management System (DBMS)

3
13. What is “Defragmentation” in computing?

o a) A process to reorganize fragmented data on a disk to improve performance

o b) A process to delete unwanted files

o c) A type of virus removal

o d) A method to upgrade the operating system

Answer: a) A process to reorganize fragmented data on a disk to improve performance

14. Which programming language is known as a "high-level" language?

o a) Assembly

o b) C++

o c) Machine Code

o d) Binary Code

Answer: b) C++

15. What is “Encryption” used for in computing?

o a) To speed up a computer’s performance

o b) To secure data by converting it into a code to prevent unauthorized access

o c) To improve the quality of graphics

o d) To organize files into folders

Answer: b) To secure data by converting it into a code to prevent unauthorized access

16. Which device converts digital data to analog signals?

o a) Modem

o b) Printer

o c) Monitor

o d) Keyboard

4
Answer: a) Modem

17. What is a “Firewall” used for?

o a) To control the flow of electricity in a computer

o b) To block unauthorized access to a network

o c) To manage the display settings of the monitor

o d) To store data temporarily

Answer: b) To block unauthorized access to a network

18. Which command in Windows is used to display the list of files and folders in a
directory?

o a) dir

o b) ls

o c) show

o d) list

Answer: a) dir

19. What does “HTTP” stand for in web addresses?

o a) HyperText Transfer Protocol

o b) HyperText Transfer Program

o c) Hyperlink Transfer Protocol

o d) HyperText Transmission Protocol

Answer: a) HyperText Transfer Protocol

20. What is “BIOS” in computer terminology?

o a) Basic Input/Output System

o b) Binary Input/Output System

o c) Basic Internet Operating System

5
o d) Binary Integrated Operating System

Answer: a) Basic Input/Output System

21. Which file extension is commonly associated with a text file?

o a) .txt

o b) .pdf

o c) .jpg

o d) .xlsx

Answer: a) .txt

22. What does “LAN” stand for in network terminology?

o a) Local Area Network

o b) Large Area Network

o c) Link Area Network

o d) Local Application Network

Answer: a) Local Area Network

23. Which component is considered the "brain" of the computer?

o a) Monitor

o b) Hard Drive

o c) CPU

o d) RAM

Answer: c) CPU

24. What is the main function of the “Motherboard” in a computer?

o a) To provide power to the computer

o b) To connect and manage all the components of the computer

6
o c) To store data permanently

o d) To display information on the screen

Answer: b) To connect and manage all the components of the computer

25. What is “Phishing” in the context of internet security?

o a) A method to improve network speed

o b) A fraudulent attempt to obtain sensitive information by disguising as a


trustworthy entity

o c) A technique to protect against malware

o d) A type of software for creating animations

Answer: b) A fraudulent attempt to obtain sensitive information by disguising as a trustworthy


entity

26. Which of these is a valid binary number?

o a) 1010

o b) 1234

o c) 1A2B

o d) 2567

Answer: a) 1010

27. Which software is specifically designed for creating and editing videos?

o a) Microsoft PowerPoint

o b) Adobe Photoshop

o c) Adobe Premiere Pro

o d) Microsoft Excel

Answer: c) Adobe Premiere Pro

28. What does “URL” stand for in web terminology?

o a) Uniform Resource Locator

o b) Uniform Retrieval Locator

o c) Universal Resource Locator

7
o d) Uniform Reference Locator

Answer: a) Uniform Resource Locator

29. What does “BIOS” perform during the booting process?

o a) Manages network connections

o b) Initializes hardware and loads the operating system

o c) Opens application software

o d) Deletes temporary files

Answer: b) Initializes hardware and loads the operating system

30. Which of these is an example of a network topology?

o a) Linear

o b) Circular

o c) Star

o d) Static

Answer: c) Star

31. What does “VPN” stand for in network security?

o a) Virtual Private Network

o b) Variable Public Network

o c) Virtual Protected Network

o d) Verified Personal Network

Answer: a) Virtual Private Network

32. What is “HTML”?

o a) A programming language

o b) A type of database

o c) A markup language used to create web pages

o d) A type of network protocol

Answer: c) A markup language used to create web page

8
33. Which of the following is NOT a programming language?

 a) Python

 b) JavaScript

 c) SQL

 d) JPEG

Answer: d) JPEG

34. What is the function of a “Router” in a network?

 a) To connect and route data between different networks

 b) To manage printer functions

 c) To display information on a screen

 d) To store files temporarily

Answer: a) To connect and route data between different networks

35. What does “FTP” stand for in file transfer?

 a) File Transfer Protocol

 b) Fast Transfer Protocol

 c) File Transmission Program

 d) Functional Transfer Protocol

Answer: a) File Transfer Protocol

36. Which command is used to delete files or directories in Unix-based systems?

 a) del

 b) rm

 c) erase

 d) delete

Answer: b) rm

37. Which type of memory is non-volatile and used for storing firmware?

 a) RAM

 b) ROM

9
 c) Cache

 d) SSD

Answer: b) ROM

38. What is the primary purpose of “System Updates”?

 a) To change the appearance of the operating system

 b) To fix bugs and add new features to the operating system or software

 c) To create new files

 d) To delete old files

Answer: b) To fix bugs and add new features to the operating system or software

39. Which of the following is a type of cloud computing service?

 a) SaaS (Software as a Service)

 b) RAM (Random Access Memory)

 c) HDD (Hard Disk Drive)

 d) CPU (Central Processing Unit)

Answer: a) SaaS (Software as a Service)

40. What is the purpose of a “Search Engine”?

 a) To manage files on your computer

 b) To provide a means to search for information on the internet

 c) To create and edit documents

 d) To play multimedia files

Answer: b) To provide a means to search for information on the internet

41.What does “URL” typically include?

 a) An IP address only

 b) A description of the website's content

 c) The domain name and path to a specific resource on the web

 d) A list of email addresses

Answer: c) The domain name and path to a specific resource on the web

10
42. Which of the following is a form of malware designed to exploit vulnerabilities in
software?

 a) Firewall

 b) Antivirus

 c) Trojan Horse

 d) Backup

Answer: c) Trojan Horse

43. Which of the following is an example of a file system?

 a) HTTP

 b) FAT32

 c) SMTP

 d) FTP

Answer: b) FAT32

44. What is the function of a “Proxy Server”?

 a) To store backup copies of files

 b) To filter and monitor internet traffic between a user and the web

 c) To run computer games

 d) To connect directly to a website without security

Answer: b) To filter and monitor internet traffic between a user and the web

45. Which of the following is a common format for a video file?

 a) .mp4

 b) .docx

 c) .xlsx

 d) .html

Answer: a) .mp4

46. What does “JavaScript” primarily do in web development?

 a) Stores website data

11
 b) Provides interactive features on web pages

 c) Manages server operations

 d) Creates static web content

Answer: b) Provides interactive features on web pages

47. Which device is used to connect a computer to a network?

 a) Network Interface Card (NIC)

 b) Hard Drive

 c) Monitor

 d) Speaker

Answer: a) Network Interface Card (NIC)

48. What is the function of “Cache Memory”?

 a) To store frequently accessed data for faster access

 b) To store long-term data

 c) To run software applications

 d) To connect to external devices

Answer: a) To store frequently accessed data for faster access

49. What does “DNS” stand for in internet terminology?

 a) Domain Name System

 b) Direct Network Service

 c) Data Network Security

 d) Distributed Name Service

Answer: a) Domain Name System

50. What is a “Hyperlink” in a web page?

 a) A URL that links to a different page or resource

 b) A type of computer virus

 c) A file extension

 d) A type of data encryption

12
Answer: a) A URL that links to a different page or resource

13

You might also like