ICSTE – Intellectual Computer Science Talent Exam
STD – 6
1. What is the primary function of the ALU (Arithmetic Logic Unit) in the CPU?
o a) To manage input and output devices
o b) To perform arithmetic and logical operations
o c) To store data permanently
o d) To execute software applications
Answer: b) to perform arithmetic and logical operations
2. Which of the following is NOT an example of system software?
o a) Windows
o b) Linux
o c) Microsoft Word
o d) mac OS
Answer: c) Microsoft Word
3. What does the "Booting" process do in a computer?
o a) Installs new software
o b) Starts the computer and loads the operating system
o c) Updates system drivers
o d) Cleans temporary files
Answer: b) Starts the computer and loads the operating system
4. In which component is the operating system primarily stored?
o a) RAM
o b) CPU
o c) Hard Disk
o d) Monitor
1
Answer: c) Hard Disk
5. What is the main purpose of an “Operating System”?
o a) To create and edit documents
o b) To manage hardware resources and provide a user interface
o c) To design graphics
o d) To browse the internet
Answer: b) To manage hardware resources and provide a user interface
6. Which of the following protocols is used to send email over the internet?
o a) HTTP
o b) FTP
o c) SMTP
o d) POP3
Answer: c) SMTP
7. Which key combination is used to open the Task Manager in Windows?
o a) Ctrl + Shift + Esc
o b) Alt + F4
o c) Ctrl + Alt + Del
o d) Shift + Esc
Answer: a) Ctrl + Shift + Esc
8. What does the "Clipboard" in a computer system do?
o a) Stores files permanently
o b) Temporarily holds data that has been copied or cut
o c) Manages network connections
o d) Displays graphics on the screen
Answer: b) Temporarily holds data that has been copied or cut
2
9. Which type of file extension is typically used for image files?
o a) .docx
o b) .xls
o c) .jpg
o d) .ppt
Answer: c) .jpg
10. What is a “virus” in computer terms?
o a) A program designed to protect your computer
o b) A harmful software that can damage or disrupt your system
o c) A tool for editing photos
o d) A type of hardware component
Answer: b) A harmful software that can damage or disrupt your system
11. Which command is used to create a new folder in Windows Explorer?
o a) Ctrl + N
o b) Ctrl + F
o c) Ctrl + Shift + N
o d) Ctrl + Alt + F
Answer: c) Ctrl + Shift + N
12. Which type of software is used to manage databases?
o a) Word Processor
o b) Spreadsheet
o c) Database Management System (DBMS)
o d) Presentation Software
Answer: c) Database Management System (DBMS)
3
13. What is “Defragmentation” in computing?
o a) A process to reorganize fragmented data on a disk to improve performance
o b) A process to delete unwanted files
o c) A type of virus removal
o d) A method to upgrade the operating system
Answer: a) A process to reorganize fragmented data on a disk to improve performance
14. Which programming language is known as a "high-level" language?
o a) Assembly
o b) C++
o c) Machine Code
o d) Binary Code
Answer: b) C++
15. What is “Encryption” used for in computing?
o a) To speed up a computer’s performance
o b) To secure data by converting it into a code to prevent unauthorized access
o c) To improve the quality of graphics
o d) To organize files into folders
Answer: b) To secure data by converting it into a code to prevent unauthorized access
16. Which device converts digital data to analog signals?
o a) Modem
o b) Printer
o c) Monitor
o d) Keyboard
4
Answer: a) Modem
17. What is a “Firewall” used for?
o a) To control the flow of electricity in a computer
o b) To block unauthorized access to a network
o c) To manage the display settings of the monitor
o d) To store data temporarily
Answer: b) To block unauthorized access to a network
18. Which command in Windows is used to display the list of files and folders in a
directory?
o a) dir
o b) ls
o c) show
o d) list
Answer: a) dir
19. What does “HTTP” stand for in web addresses?
o a) HyperText Transfer Protocol
o b) HyperText Transfer Program
o c) Hyperlink Transfer Protocol
o d) HyperText Transmission Protocol
Answer: a) HyperText Transfer Protocol
20. What is “BIOS” in computer terminology?
o a) Basic Input/Output System
o b) Binary Input/Output System
o c) Basic Internet Operating System
5
o d) Binary Integrated Operating System
Answer: a) Basic Input/Output System
21. Which file extension is commonly associated with a text file?
o a) .txt
o b) .pdf
o c) .jpg
o d) .xlsx
Answer: a) .txt
22. What does “LAN” stand for in network terminology?
o a) Local Area Network
o b) Large Area Network
o c) Link Area Network
o d) Local Application Network
Answer: a) Local Area Network
23. Which component is considered the "brain" of the computer?
o a) Monitor
o b) Hard Drive
o c) CPU
o d) RAM
Answer: c) CPU
24. What is the main function of the “Motherboard” in a computer?
o a) To provide power to the computer
o b) To connect and manage all the components of the computer
6
o c) To store data permanently
o d) To display information on the screen
Answer: b) To connect and manage all the components of the computer
25. What is “Phishing” in the context of internet security?
o a) A method to improve network speed
o b) A fraudulent attempt to obtain sensitive information by disguising as a
trustworthy entity
o c) A technique to protect against malware
o d) A type of software for creating animations
Answer: b) A fraudulent attempt to obtain sensitive information by disguising as a trustworthy
entity
26. Which of these is a valid binary number?
o a) 1010
o b) 1234
o c) 1A2B
o d) 2567
Answer: a) 1010
27. Which software is specifically designed for creating and editing videos?
o a) Microsoft PowerPoint
o b) Adobe Photoshop
o c) Adobe Premiere Pro
o d) Microsoft Excel
Answer: c) Adobe Premiere Pro
28. What does “URL” stand for in web terminology?
o a) Uniform Resource Locator
o b) Uniform Retrieval Locator
o c) Universal Resource Locator
7
o d) Uniform Reference Locator
Answer: a) Uniform Resource Locator
29. What does “BIOS” perform during the booting process?
o a) Manages network connections
o b) Initializes hardware and loads the operating system
o c) Opens application software
o d) Deletes temporary files
Answer: b) Initializes hardware and loads the operating system
30. Which of these is an example of a network topology?
o a) Linear
o b) Circular
o c) Star
o d) Static
Answer: c) Star
31. What does “VPN” stand for in network security?
o a) Virtual Private Network
o b) Variable Public Network
o c) Virtual Protected Network
o d) Verified Personal Network
Answer: a) Virtual Private Network
32. What is “HTML”?
o a) A programming language
o b) A type of database
o c) A markup language used to create web pages
o d) A type of network protocol
Answer: c) A markup language used to create web page
8
33. Which of the following is NOT a programming language?
a) Python
b) JavaScript
c) SQL
d) JPEG
Answer: d) JPEG
34. What is the function of a “Router” in a network?
a) To connect and route data between different networks
b) To manage printer functions
c) To display information on a screen
d) To store files temporarily
Answer: a) To connect and route data between different networks
35. What does “FTP” stand for in file transfer?
a) File Transfer Protocol
b) Fast Transfer Protocol
c) File Transmission Program
d) Functional Transfer Protocol
Answer: a) File Transfer Protocol
36. Which command is used to delete files or directories in Unix-based systems?
a) del
b) rm
c) erase
d) delete
Answer: b) rm
37. Which type of memory is non-volatile and used for storing firmware?
a) RAM
b) ROM
9
c) Cache
d) SSD
Answer: b) ROM
38. What is the primary purpose of “System Updates”?
a) To change the appearance of the operating system
b) To fix bugs and add new features to the operating system or software
c) To create new files
d) To delete old files
Answer: b) To fix bugs and add new features to the operating system or software
39. Which of the following is a type of cloud computing service?
a) SaaS (Software as a Service)
b) RAM (Random Access Memory)
c) HDD (Hard Disk Drive)
d) CPU (Central Processing Unit)
Answer: a) SaaS (Software as a Service)
40. What is the purpose of a “Search Engine”?
a) To manage files on your computer
b) To provide a means to search for information on the internet
c) To create and edit documents
d) To play multimedia files
Answer: b) To provide a means to search for information on the internet
41.What does “URL” typically include?
a) An IP address only
b) A description of the website's content
c) The domain name and path to a specific resource on the web
d) A list of email addresses
Answer: c) The domain name and path to a specific resource on the web
10
42. Which of the following is a form of malware designed to exploit vulnerabilities in
software?
a) Firewall
b) Antivirus
c) Trojan Horse
d) Backup
Answer: c) Trojan Horse
43. Which of the following is an example of a file system?
a) HTTP
b) FAT32
c) SMTP
d) FTP
Answer: b) FAT32
44. What is the function of a “Proxy Server”?
a) To store backup copies of files
b) To filter and monitor internet traffic between a user and the web
c) To run computer games
d) To connect directly to a website without security
Answer: b) To filter and monitor internet traffic between a user and the web
45. Which of the following is a common format for a video file?
a) .mp4
b) .docx
c) .xlsx
d) .html
Answer: a) .mp4
46. What does “JavaScript” primarily do in web development?
a) Stores website data
11
b) Provides interactive features on web pages
c) Manages server operations
d) Creates static web content
Answer: b) Provides interactive features on web pages
47. Which device is used to connect a computer to a network?
a) Network Interface Card (NIC)
b) Hard Drive
c) Monitor
d) Speaker
Answer: a) Network Interface Card (NIC)
48. What is the function of “Cache Memory”?
a) To store frequently accessed data for faster access
b) To store long-term data
c) To run software applications
d) To connect to external devices
Answer: a) To store frequently accessed data for faster access
49. What does “DNS” stand for in internet terminology?
a) Domain Name System
b) Direct Network Service
c) Data Network Security
d) Distributed Name Service
Answer: a) Domain Name System
50. What is a “Hyperlink” in a web page?
a) A URL that links to a different page or resource
b) A type of computer virus
c) A file extension
d) A type of data encryption
12
Answer: a) A URL that links to a different page or resource
13