I Cste 10
I Cste 10
STD – 10
a) A programming language
b) A step-by-step procedure to solve a problem
c) A software application
d) A hardware component
Answer: b) A step-by-step procedure to solve a problem
a) Compiler
b) Interpreter
c) Windows
d) Assembler
Answer: c) Windows
a) Machine-dependent
b) Machine-independent
c) Hard to understand
d) Slow to write code
Answer: b) Machine-independent
1
6. Which of the following is not a type of network topology?
a) Ring
b) Star
c) Cloud
d) Bus
Answer: c) Cloud
a) Firewall
b) Antivirus
c) Phishing
d) Encryption
Answer: c) Phishing
a) Table
b) Query
c) Report
d) Spreadsheet
Answer: d) Spreadsheet
a) Linux
b) MySQL
c) Microsoft Office
d) Apache
Answer: c) Microsoft Office
a) Scalability
b) Cost
c) Security risks
d) Accessibility
Answer: c) Security risks
2
12. What does the "Ctrl + X" keyboard shortcut do?
13. Which of the following programming languages is primarily used for web
development?
a) Python
b) JavaScript
c) C++
d) Assembly
Answer: b) JavaScript
a) To store data
b) To direct data packets between networks
c) To convert digital signals to analog
d) To control access to network resources
Answer: b) To direct data packets between networks
a) HTML
b) BIOS
c) Ubuntu
d) TCP/IP
Answer: c) Ubuntu
3
18. Which of the following is an example of a volatile memory?
a) Hard Drive
b) SSD
c) RAM
d) DVD
Answer: c) RAM
a) White Box
b) Black Box
c) Grey Box
d) All of the above
Answer: d) All of the above
a) To compress data
b) To convert data into a secure format
c) To store data efficiently
d) To transfer data faster
Answer: b) To convert data into a secure format
a) Faster execution
b) Easier to write and understand
c) Requires less memory
d) Direct access to hardware
Answer: b) Easier to write and understand
4
24. What is the purpose of a database management system (DBMS)?
a) RAM
b) Cache
c) SSD
d) CPU
Answer: c) SSD
26. Which of the following is used to uniquely identify a record in a database table?
a) Primary Key
b) Foreign Key
c) Index
d) View
Answer: a) Primary Key
a) Web browser
b) Word processor
c) Antivirus
d) Operating system
Answer: d) Operating system
5
30. Which of the following is a markup language used to create web pages?
a) Python
b) SQL
c) HTML
d) Java
Answer: c) HTML
34. What is the primary function of the Arithmetic Logic Unit (ALU) in a computer?
a) FTP
b) HTTP
c) SMTP
d) DNS
Answer: c) SMTP
6
36. Which of the following is an example of a network security threat?
a) Phishing
b) Firewall
c) Router
d) Ethernet
Answer: a) Phishing
a) Centralized control
b) Distributed control among devices
c) High security
d) Expensive to implement
Answer: b) Distributed control among devices
39. Which of the following is not a valid data type in most programming languages?
a) Integer
b) String
c) Boolean
d) Command
Answer: d) Command
a) To compile code
b) To execute code line by line
c) To manage memory
d) To encrypt data
Answer: b) To execute code line by line
a) High redundancy
b) Complex data retrieval
c) Easy data management and relationships
d) No need for a primary key
Answer: c) Easy data management and relationships
7
42. What is the function of the "Ctrl + V" keyboard shortcut?
a) Printer
b) Monitor
c) Keyboard
d) Speaker
Answer: c) Keyboard
44. Which of the following protocols is used for secure communication over the internet?
a) FTP
b) HTTP
c) HTTPS
d) SMTP
Answer: c) HTTPS
45. Which of these storage devices has the fastest data access speed?
a) Scalability
b) Centralized control
c) Security risks
d) High cost
Answer: c) Security risks
8
48. What is the purpose of a cache memory in a computer?
a) Assembly
b) Machine Language
c) C++
d) Binary
Answer: c) C++