0% found this document useful (0 votes)
48 views13 pages

ICSTE 6 STD

Computer science mcq questions with answers for class 6

Uploaded by

jothi lakshmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views13 pages

ICSTE 6 STD

Computer science mcq questions with answers for class 6

Uploaded by

jothi lakshmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

ICSTE – Intellectual Computer Science Talent Exam

STD – 6

1. What is the primary function of the ALU (Arithmetic Logic Unit) in the CPU?

o a) To manage input and output devices

o b) To perform arithmetic and logical operations

o c) To store data permanently

o d) To execute software applications

Answer: b) to perform arithmetic and logical operations

2. Which of the following is NOT an example of system software?

o a) Windows

o b) Linux

o c) Microsoft Word

o d) mac OS

Answer: c) Microsoft Word

3. What does the "Booting" process do in a computer?

o a) Installs new software

o b) Starts the computer and loads the operating system

o c) Updates system drivers

o d) Cleans temporary files

Answer: b) Starts the computer and loads the operating system

4. In which component is the operating system primarily stored?

o a) RAM

o b) CPU

o c) Hard Disk

o d) Monitor

1
Answer: c) Hard Disk

5. What is the main purpose of an “Operating System”?

o a) To create and edit documents

o b) To manage hardware resources and provide a user interface

o c) To design graphics

o d) To browse the internet

Answer: b) To manage hardware resources and provide a user interface

6. Which of the following protocols is used to send email over the internet?

o a) HTTP

o b) FTP

o c) SMTP

o d) POP3

Answer: c) SMTP

7. Which key combination is used to open the Task Manager in Windows?

o a) Ctrl + Shift + Esc

o b) Alt + F4

o c) Ctrl + Alt + Del

o d) Shift + Esc

Answer: a) Ctrl + Shift + Esc

8. What does the "Clipboard" in a computer system do?

o a) Stores files permanently

o b) Temporarily holds data that has been copied or cut

o c) Manages network connections

o d) Displays graphics on the screen

Answer: b) Temporarily holds data that has been copied or cut

2
9. Which type of file extension is typically used for image files?

o a) .docx

o b) .xls

o c) .jpg

o d) .ppt

Answer: c) .jpg

10. What is a “virus” in computer terms?

o a) A program designed to protect your computer

o b) A harmful software that can damage or disrupt your system

o c) A tool for editing photos

o d) A type of hardware component

Answer: b) A harmful software that can damage or disrupt your system

11. Which command is used to create a new folder in Windows Explorer?

o a) Ctrl + N

o b) Ctrl + F

o c) Ctrl + Shift + N

o d) Ctrl + Alt + F

Answer: c) Ctrl + Shift + N

12. Which type of software is used to manage databases?

o a) Word Processor

o b) Spreadsheet

o c) Database Management System (DBMS)

o d) Presentation Software

Answer: c) Database Management System (DBMS)

3
13. What is “Defragmentation” in computing?

o a) A process to reorganize fragmented data on a disk to improve performance

o b) A process to delete unwanted files

o c) A type of virus removal

o d) A method to upgrade the operating system

Answer: a) A process to reorganize fragmented data on a disk to improve performance

14. Which programming language is known as a "high-level" language?

o a) Assembly

o b) C++

o c) Machine Code

o d) Binary Code

Answer: b) C++

15. What is “Encryption” used for in computing?

o a) To speed up a computer’s performance

o b) To secure data by converting it into a code to prevent unauthorized access

o c) To improve the quality of graphics

o d) To organize files into folders

Answer: b) To secure data by converting it into a code to prevent unauthorized access

16. Which device converts digital data to analog signals?

o a) Modem

o b) Printer

o c) Monitor

o d) Keyboard

4
Answer: a) Modem

17. What is a “Firewall” used for?

o a) To control the flow of electricity in a computer

o b) To block unauthorized access to a network

o c) To manage the display settings of the monitor

o d) To store data temporarily

Answer: b) To block unauthorized access to a network

18. Which command in Windows is used to display the list of files and folders in a
directory?

o a) dir

o b) ls

o c) show

o d) list

Answer: a) dir

19. What does “HTTP” stand for in web addresses?

o a) HyperText Transfer Protocol

o b) HyperText Transfer Program

o c) Hyperlink Transfer Protocol

o d) HyperText Transmission Protocol

Answer: a) HyperText Transfer Protocol

20. What is “BIOS” in computer terminology?

o a) Basic Input/Output System

o b) Binary Input/Output System

o c) Basic Internet Operating System

5
o d) Binary Integrated Operating System

Answer: a) Basic Input/Output System

21. Which file extension is commonly associated with a text file?

o a) .txt

o b) .pdf

o c) .jpg

o d) .xlsx

Answer: a) .txt

22. What does “LAN” stand for in network terminology?

o a) Local Area Network

o b) Large Area Network

o c) Link Area Network

o d) Local Application Network

Answer: a) Local Area Network

23. Which component is considered the "brain" of the computer?

o a) Monitor

o b) Hard Drive

o c) CPU

o d) RAM

Answer: c) CPU

24. What is the main function of the “Motherboard” in a computer?

o a) To provide power to the computer

o b) To connect and manage all the components of the computer

6
o c) To store data permanently

o d) To display information on the screen

Answer: b) To connect and manage all the components of the computer

25. What is “Phishing” in the context of internet security?

o a) A method to improve network speed

o b) A fraudulent attempt to obtain sensitive information by disguising as a


trustworthy entity

o c) A technique to protect against malware

o d) A type of software for creating animations

Answer: b) A fraudulent attempt to obtain sensitive information by disguising as a trustworthy


entity

26. Which of these is a valid binary number?

o a) 1010

o b) 1234

o c) 1A2B

o d) 2567

Answer: a) 1010

27. Which software is specifically designed for creating and editing videos?

o a) Microsoft PowerPoint

o b) Adobe Photoshop

o c) Adobe Premiere Pro

o d) Microsoft Excel

Answer: c) Adobe Premiere Pro

28. What does “URL” stand for in web terminology?

o a) Uniform Resource Locator

o b) Uniform Retrieval Locator

o c) Universal Resource Locator

7
o d) Uniform Reference Locator

Answer: a) Uniform Resource Locator

29. What does “BIOS” perform during the booting process?

o a) Manages network connections

o b) Initializes hardware and loads the operating system

o c) Opens application software

o d) Deletes temporary files

Answer: b) Initializes hardware and loads the operating system

30. Which of these is an example of a network topology?

o a) Linear

o b) Circular

o c) Star

o d) Static

Answer: c) Star

31. What does “VPN” stand for in network security?

o a) Virtual Private Network

o b) Variable Public Network

o c) Virtual Protected Network

o d) Verified Personal Network

Answer: a) Virtual Private Network

32. What is “HTML”?

o a) A programming language

o b) A type of database

o c) A markup language used to create web pages

o d) A type of network protocol

Answer: c) A markup language used to create web page

8
33. Which of the following is NOT a programming language?

 a) Python

 b) JavaScript

 c) SQL

 d) JPEG

Answer: d) JPEG

34. What is the function of a “Router” in a network?

 a) To connect and route data between different networks

 b) To manage printer functions

 c) To display information on a screen

 d) To store files temporarily

Answer: a) To connect and route data between different networks

35. What does “FTP” stand for in file transfer?

 a) File Transfer Protocol

 b) Fast Transfer Protocol

 c) File Transmission Program

 d) Functional Transfer Protocol

Answer: a) File Transfer Protocol

36. Which command is used to delete files or directories in Unix-based systems?

 a) del

 b) rm

 c) erase

 d) delete

Answer: b) rm

37. Which type of memory is non-volatile and used for storing firmware?

 a) RAM

 b) ROM

9
 c) Cache

 d) SSD

Answer: b) ROM

38. What is the primary purpose of “System Updates”?

 a) To change the appearance of the operating system

 b) To fix bugs and add new features to the operating system or software

 c) To create new files

 d) To delete old files

Answer: b) To fix bugs and add new features to the operating system or software

39. Which of the following is a type of cloud computing service?

 a) SaaS (Software as a Service)

 b) RAM (Random Access Memory)

 c) HDD (Hard Disk Drive)

 d) CPU (Central Processing Unit)

Answer: a) SaaS (Software as a Service)

40. What is the purpose of a “Search Engine”?

 a) To manage files on your computer

 b) To provide a means to search for information on the internet

 c) To create and edit documents

 d) To play multimedia files

Answer: b) To provide a means to search for information on the internet

41.What does “URL” typically include?

 a) An IP address only

 b) A description of the website's content

 c) The domain name and path to a specific resource on the web

 d) A list of email addresses

Answer: c) The domain name and path to a specific resource on the web

10
42. Which of the following is a form of malware designed to exploit vulnerabilities in
software?

 a) Firewall

 b) Antivirus

 c) Trojan Horse

 d) Backup

Answer: c) Trojan Horse

43. Which of the following is an example of a file system?

 a) HTTP

 b) FAT32

 c) SMTP

 d) FTP

Answer: b) FAT32

44. What is the function of a “Proxy Server”?

 a) To store backup copies of files

 b) To filter and monitor internet traffic between a user and the web

 c) To run computer games

 d) To connect directly to a website without security

Answer: b) To filter and monitor internet traffic between a user and the web

45. Which of the following is a common format for a video file?

 a) .mp4

 b) .docx

 c) .xlsx

 d) .html

Answer: a) .mp4

46. What does “JavaScript” primarily do in web development?

 a) Stores website data

11
 b) Provides interactive features on web pages

 c) Manages server operations

 d) Creates static web content

Answer: b) Provides interactive features on web pages

47. Which device is used to connect a computer to a network?

 a) Network Interface Card (NIC)

 b) Hard Drive

 c) Monitor

 d) Speaker

Answer: a) Network Interface Card (NIC)

48. What is the function of “Cache Memory”?

 a) To store frequently accessed data for faster access

 b) To store long-term data

 c) To run software applications

 d) To connect to external devices

Answer: a) To store frequently accessed data for faster access

49. What does “DNS” stand for in internet terminology?

 a) Domain Name System

 b) Direct Network Service

 c) Data Network Security

 d) Distributed Name Service

Answer: a) Domain Name System

50. What is a “Hyperlink” in a web page?

 a) A URL that links to a different page or resource

 b) A type of computer virus

 c) A file extension

 d) A type of data encryption

12
Answer: a) A URL that links to a different page or resource

13

You might also like