0% found this document useful (0 votes)
63 views9 pages

I Cste 10

Computer science important questions with answers

Uploaded by

jothi lakshmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views9 pages

I Cste 10

Computer science important questions with answers

Uploaded by

jothi lakshmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

I CSTE – Intellectual Computer Science Talent Exam

STD – 10

1. Which of the following best describes an algorithm?

a) A programming language
b) A step-by-step procedure to solve a problem
c) A software application
d) A hardware component
Answer: b) A step-by-step procedure to solve a problem

2. Which of the following is a type of operating system?

a) Compiler
b) Interpreter
c) Windows
d) Assembler
Answer: c) Windows

3. What is the purpose of a compiler in programming?

a) To execute code line by line


b) To interpret high-level language into machine code
c) To convert high-level language into machine code
d) To debug code
Answer: c) To convert high-level language into machine code

4. Which of the following is a characteristic of a high-level programming language?

a) Machine-dependent
b) Machine-independent
c) Hard to understand
d) Slow to write code
Answer: b) Machine-independent

5. What is the primary function of an IP address?

a) To identify a device on a network


b) To encrypt data
c) To manage network traffic
d) To store data
Answer: a) To identify a device on a network

1
6. Which of the following is not a type of network topology?

a) Ring
b) Star
c) Cloud
d) Bus
Answer: c) Cloud

7. Which of the following is a type of cyber attack?

a) Firewall
b) Antivirus
c) Phishing
d) Encryption
Answer: c) Phishing

8. Which of these is not a component of a database?

a) Table
b) Query
c) Report
d) Spreadsheet
Answer: d) Spreadsheet

9. What does SQL stand for?

a) Structured Query Language


b) Simple Query Language
c) Sequential Query Language
d) Secure Query Language
Answer: a) Structured Query Language

10. Which of the following is not an example of open-source software?

a) Linux
b) MySQL
c) Microsoft Office
d) Apache
Answer: c) Microsoft Office

11. Which of the following is a disadvantage of cloud computing?

a) Scalability
b) Cost
c) Security risks
d) Accessibility
Answer: c) Security risks

2
12. What does the "Ctrl + X" keyboard shortcut do?

a) Copies the selected text


b) Cuts the selected text
c) Pastes the selected text
d) Deletes the selected text
Answer: b) Cuts the selected text

13. Which of the following programming languages is primarily used for web
development?

a) Python
b) JavaScript
c) C++
d) Assembly
Answer: b) JavaScript

14. What is the function of a router in a computer network?

a) To store data
b) To direct data packets between networks
c) To convert digital signals to analog
d) To control access to network resources
Answer: b) To direct data packets between networks

15. Which of these is an example of an operating system?

a) HTML
b) BIOS
c) Ubuntu
d) TCP/IP
Answer: c) Ubuntu

16. What does "HTTP" stand for in web communication?

a) HyperText Transfer Protocol


b) HyperText Transfer Program
c) HyperText Transmission Protocol
d) HyperText Transport Protocol
Answer: a) HyperText Transfer Protocol

17. Which of the following is not a primary function of an operating system?

a) Managing hardware resources


b) Providing a user interface
c) Compiling code
d) Managing files and directories
Answer: c) Compiling code

3
18. Which of the following is an example of a volatile memory?

a) Hard Drive
b) SSD
c) RAM
d) DVD
Answer: c) RAM

19. Which of the following is a type of software testing?

a) White Box
b) Black Box
c) Grey Box
d) All of the above
Answer: d) All of the above

20. What is the purpose of encryption in data communication?

a) To compress data
b) To convert data into a secure format
c) To store data efficiently
d) To transfer data faster
Answer: b) To convert data into a secure format

21. Which of the following is a characteristic of a relational database?

a) Data is stored in a flat file


b) Data is organized into tables
c) Data is unstructured
d) Data cannot be queried
Answer: b) Data is organized into tables

22. What is the full form of "DNS"?

a) Domain Network Service


b) Domain Name System
c) Digital Network System
d) Data Name Service
Answer: b) Domain Name System

23. Which of the following is an advantage of using a high-level programming language?

a) Faster execution
b) Easier to write and understand
c) Requires less memory
d) Direct access to hardware
Answer: b) Easier to write and understand

4
24. What is the purpose of a database management system (DBMS)?

a) To create and manage databases


b) To design software applications
c) To manage network traffic
d) To encrypt data
Answer: a) To create and manage databases

25. Which of the following is a non-volatile storage device?

a) RAM
b) Cache
c) SSD
d) CPU
Answer: c) SSD

26. Which of the following is used to uniquely identify a record in a database table?

a) Primary Key
b) Foreign Key
c) Index
d) View
Answer: a) Primary Key

27. Which of the following is not an application software?

a) Web browser
b) Word processor
c) Antivirus
d) Operating system
Answer: d) Operating system

28. Which of the following is a function of an antivirus software?

a) To speed up the computer


b) To protect the computer from malware
c) To manage files
d) To enhance graphics
Answer: b) To protect the computer from malware

29. What is the purpose of a firewall in a network?

a) To speed up internet access


b) To filter incoming and outgoing traffic
c) To store data
d) To manage hardware resources
Answer: b) To filter incoming and outgoing traffic

5
30. Which of the following is a markup language used to create web pages?

a) Python
b) SQL
c) HTML
d) Java
Answer: c) HTML

31. What does "BIOS" stand for?

a) Basic Input/Output System


b) Binary Input/Output System
c) Basic Internal Operating System
d) Binary Internal Operating System
Answer: a) Basic Input/Output System

32. Which of the following is a characteristic of cloud storage?

a) Data is stored locally on a user's device


b) Data is stored on remote servers and accessed via the internet
c) Data is stored in external hard drives
d) Data cannot be accessed remotely
Answer: b) Data is stored on remote servers and accessed via the internet

33. Which of the following is a function of the Control Unit in a CPU?

a) To perform arithmetic operations


b) To decode and execute instructions
c) To store data temporarily
d) To manage network connections
Answer: b) To decode and execute instructions

34. What is the primary function of the Arithmetic Logic Unit (ALU) in a computer?

a) To perform arithmetic and logical operations


b) To store data permanently
c) To manage input and output devices
d) To connect to the internet
Answer: a) To perform arithmetic and logical operations

35. Which of these is a protocol used for sending email?

a) FTP
b) HTTP
c) SMTP
d) DNS
Answer: c) SMTP

6
36. Which of the following is an example of a network security threat?

a) Phishing
b) Firewall
c) Router
d) Ethernet
Answer: a) Phishing

37. What does "FTP" stand for in networking?

a) File Transfer Protocol


b) Fast Transfer Protocol
c) File Transmission Program
d) Fast Transmission Protocol
Answer: a) File Transfer Protocol

38. Which of the following is a characteristic of a peer-to-peer network?

a) Centralized control
b) Distributed control among devices
c) High security
d) Expensive to implement
Answer: b) Distributed control among devices

39. Which of the following is not a valid data type in most programming languages?

a) Integer
b) String
c) Boolean
d) Command
Answer: d) Command

40. What is the purpose of an interpreter in programming?

a) To compile code
b) To execute code line by line
c) To manage memory
d) To encrypt data
Answer: b) To execute code line by line

41. Which of the following is an advantage of using a relational database?

a) High redundancy
b) Complex data retrieval
c) Easy data management and relationships
d) No need for a primary key
Answer: c) Easy data management and relationships

7
42. What is the function of the "Ctrl + V" keyboard shortcut?

a) To copy the selected text


b) To cut the selected text
c) To paste the copied text
d) To delete the selected text
Answer: c) To paste the copied text

43. Which of the following is an example of an input device?

a) Printer
b) Monitor
c) Keyboard
d) Speaker
Answer: c) Keyboard

44. Which of the following protocols is used for secure communication over the internet?

a) FTP
b) HTTP
c) HTTPS
d) SMTP
Answer: c) HTTPS

45. Which of these storage devices has the fastest data access speed?

a) Hard Disk Drive (HDD)


b) Solid State Drive (SSD)
c) CD-ROM
d) USB Flash Drive
Answer: b) Solid State Drive (SSD)

46. What is the function of an operating system's file system?

a) To manage memory allocation


b) To manage files and directories
c) To perform arithmetic operations
d) To connect to the internet
Answer: b) To manage files and directories

47. Which of the following is a disadvantage of using a peer-to-peer network?

a) Scalability
b) Centralized control
c) Security risks
d) High cost
Answer: c) Security risks

8
48. What is the purpose of a cache memory in a computer?

a) To store data permanently


b) To store frequently accessed data temporarily
c) To manage network connections
d) To control hardware devices
Answer: b) To store frequently accessed data temporarily

49. Which of the following is a characteristic of a star network topology?

a) All devices are connected to a central hub


b) All devices are connected in a ring
c) All devices are connected to a single bus
d) All devices are connected directly to each other
Answer: a) All devices are connected to a central hub

50. Which of these is an example of a high-level programming language?

a) Assembly
b) Machine Language
c) C++
d) Binary
Answer: c) C++

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy