COSC101 Practice
COSC101 Practice
A. A host
B. A drone
C. A zombie
D. A bot
Correct Answer: C
2. What does a denial of service (DoS) attack do?
A. Enhances computer performance
B. Disrupts computer access to an Internet service
C. Provides additional security
D. Increases internet speed
Correct Answer: B
3. What is a distributed DoS (DDoS) attack?
A. An attack from a single computer
B. An attack that uses multiple compromised devices to overwhelm a service
C. An attack that enhances service availability
D. A physical security breach
Correct Answer: B
4. What is a back door in a software program?
A. A security feature
B. A method to improve performance
C. A program that allows users to bypass security controls
D. An encryption algorithm
Correct Answer: C
5. What does spoofing refer to in cybersecurity?
A. Creating fake software
B. A technique to make network transmissions appear legitimate
C. Disabling access controls
D. Installing malware
Correct Answer: B
6. What are access controls?
A. Restrictions on physical access only
B. Measures defining who can access a computer, when, and what actions they can take
C. Tools for monitoring network performance
D. Types of encryption
Correct Answer: B
7. The ________ device is used to point and click on objects on a computer screen.
A) Keyboard
B) Mouse
C) Monitor
D) Printer
Answer: B) Mouse
8. ________ is a permanent form of storage that is not erased when the computer is turned off.
A) RAM
B) ROM
1
C) Hard Disk
D) Cache
Answer: C) Hard Disk
9. ________ is the process of starting a computer and loading the operating system.
A) Shutting down
B) Booting
C) Installing
D) Formatting
Answer: B) Booting
10. The ________ is the graphical part of an operating system that allows users to interact with the computer.
A) GUI
B) CPU
C) Command Line
D) BIOS
Answer: A) GUI
11. ________ memory allows fast access to data that is frequently used by the CPU.
A) Hard Disk
B) Cache
C) ROM
D) USB
Answer: B) Cache
12. The ________ translates domain names into IP addresses on the internet.
A) Router
B) Firewall
C) DNS
D) Modem
Answer: C) DNS
13. A ________ is an application that enables users to browse the internet.
A) Word Processor
B) Web Browser
C) Spreadsheet
D) Database
Answer: B) Web Browser
14. ________ is used to protect a computer system from malicious attacks and unauthorized access.
A) Antivirus
B) Software Patch
C) BIOS
D) Cache
Answer: A) Antivirus
15. ________ is the unit used to measure the speed of a computer processor.
A) Hertz
B) Gigabyte
C) Byte
D) Bit
Answer: A) Hertz
16. The most common input device used to interact with a computer is the ________.
2
A) Monitor
B) Keyboard
C) Printer
D) Hard Drive
Answer: B) Keyboard
17. A ________ is a collection of computers and other devices connected together for the purpose of sharing
resources.
A) Database
B) Network
C) Server
D) Cluster
Answer: B) Network
18. What is the role of a digital camera?
A. To store data
B. To take photos and record videos
C. To browse the web
D. To print documents
Answer: B
19. Which of the following devices is typically used to read digital books?
A) Smartphone
B) Ebook reader
C) Tablet
D) Desktop computer
Answer: B
20. Which of the following is a key characteristic of a tablet?
A) It is larger than a laptop
B) It lacks a touchscreen interface
C) It is portable and uses touch input
D) It can only be used in an office setting
Answer: C
21. A ________ is used to copy data from one location to another, ensuring data integrity.
A) Virus
B) Backup
C) Firewall
D) Reboot
Answer: B) Backup
22. ________ is the most common format for images on the web.
A) PDF
B) MP4
C) JPEG
D) TXT
Answer: C) JPEG
23. The main function of a ________ is to display visual output from the computer.
A) Printer
B) Monitor
C) Keyboard
3
D) Scanner
Answer: B) Monitor
24. The ________ is considered the "brain" of the computer and performs calculations and logical operations.
A) RAM
B) CPU
C) Motherboard
D) Hard Drive
Answer: B) CPU
25. The smallest unit of data in a computer is called a ________.
A) Byte
B) Bit
C) Kilobyte
D) Word
Answer: B) Bit
26. The main circuit board of a computer is known as the ________.
A) Processor
B) Power Supply
C) Motherboard
D) Chipset
Answer: C) Motherboard
27. ________ is the collection of programs that manage hardware resources and provide services for application
software.
A) Operating System
B) Application Software
C) BIOS
D) Compiler
Answer: A) Operating System
28. ________ is the process of encoding information in such a way that only authorized users can read it.
A) Decryption
B) Encryption
C) Compression
D) Hashing
Answer: B) Encryption
29. ________ is the protocol used for secure communication over a computer network.
A) FTP
B) HTTP
C) HTTPS
D) SMTP
Answer: C) HTTPS
30. ________ is the amount of data that can be transferred over a communication channel in a given time period.
A) Latency
B) Bandwidth
C) Throughput
D) Packet Loss
Answer: B) Bandwidth
31. A ________ is a device that forwards data packets between computer networks, creating an internetwork.
4
A) Modem
B) Hub
C) Router
D) Switch
Answer: C) Router
32. What is a digital security risk?
A. Any event that enhances computer performance
B. Any event that improves data processing speed
C. Any event or action that could cause a loss or damage to hardware, software, data, or
processing capability
D. Any event that prevents the use of mobile devices
Correct Answer: C
33. What is generally referred to as a computer crime?
A. Any legal act involving computers
B. Any illegal act involving the use of a computer or related devices
C. Any physical damage to computer hardware
D. Any act that improves software security
Correct Answer: B
34. What is a cybercrime?
A. An illegal act performed offline using mobile devices
B. An illegal act involving only software-related activities
C. An online or Internet-based illegal act
D. Any crime involving physical damage to computers
Correct Answer: C
35. What is a botnet?
A. A group of secure computers
B. A group of compromised computers or mobile devices connected to a network
C. A network of healthy devices
D. A type of encryption method
Correct Answer: B
36. What is a compromised computer or device commonly referred to as?
A. A host
B. A drone
C. A zombie
D. A bot
Correct Answer: C
37. What does a denial of service (DoS) attack do?
A. Enhances computer performance
B. Disrupts computer access to an Internet service
C. Provides additional security
D. Increases internet speed
Correct Answer: B
38. What is a distributed DoS (DDoS) attack?
A. An attack from a single computer
B. An attack that uses multiple compromised devices to overwhelm a service
C. An attack that enhances service availability
5
D. A physical security breach
Correct Answer: B
39. What is a back door in a software program?
A. A security feature
B. A method to improve performance
C. A program that allows users to bypass security controls
D. An encryption algorithm
Correct Answer: C
40. What does spoofing refer to in cybersecurity?
A. Creating fake software
B. A technique to make network transmissions appear legitimate
C. Disabling access controls
D. Installing malware
Correct Answer: B
41. What are access controls?
A. Restrictions on physical access only
B. Measures defining who can access a computer, when, and what actions they can take
C. Tools for monitoring network performance
D. Types of encryption
Correct Answer: B
42. What is an audit trail in a computer system?
A. A record of only successful access attempts
B. A file that records both successful and unsuccessful access attempts
C. A document outlining user permissions
D. A method for encrypting data
Correct Answer: B
43. What is a passphrase?
A. A short numeric password
B. A combination of words, often with mixed capitalization and punctuation, associated with a username
C. A simple word used for authentication
D. A type of encryption key
Correct Answer: B
44. ________ refers to the part of the operating system that manages files and directories on a storage device.
A) File system
B) Task manager
C) Memory manager
D) Command line
Answer: A) File system
45. A ________ is used to prevent unauthorized access to a computer network.
A) Router
B) Firewall
C) Switch
D) Hub
Answer: B) Firewall
46. A ________ is a type of malicious software designed to damage or disrupt a computer system.
A) Virus
6
B) Compiler
C) Patch
D) Firewall
Answer: A) Virus
47. The ________ is the first program that runs when a computer starts, responsible for loading the operating
system.
A) BIOS
B) Kernel
C) Bootloader
D) Command Prompt
Answer: A) BIOS
48. A ________ is a unique number assigned to every device connected to a computer network.
A) MAC address
B) Domain name
C) IP address
D) DNS
Answer: C) IP address
49. The ________ is the physical device that allows data to be input into and output from a computer.
A) Software
B) Hardware
C) Network
D) File system
Answer: B) Hardware
50. What is a PIN (personal identification number)?
A. A combination of letters and numbers
B. A numeric password assigned by a company or selected by a user
C. An encrypted code
D. A biometric identifier
Correct Answer: B
51. What is an online social network?
A) A website used to browse news
B) A platform where members share interests and content
C) A tool used to analyze data
D) A device for playing online games
Answer: B
52. Which of these devices is classified as an input device?
A) Monitor
B) Printer
C) Mouse
D) Speaker
Answer: C
53. Which of the following is a digital security risk?
A) Instant messaging
B) Environmental concerns
C) Computer viruses
D) Bluetooth technology
7
Answer: C
54. Which device allows users to control a small symbol on a screen?
A) Keyboard
B) Pointing device
C) Monitor
D) Speaker
Answer: B
55. What is a display device used for?
A) Storing data
B) Printing documents
C) Conveying visual information
D) Scanning images
Answer: C
56. What is cloud storage?
A) A physical storage device
B) An online service for storing data remotely
C) A type of hard disk
D) A software used to compress files
Answer: B
57. What is the difference between data and information?
A) Data is unprocessed, and information is processed data
B) Data is used for output, and information is used for input
C) Data is stored, and information cannot be stored
D) There is no difference between them
Answer: A
58. Which of the following describes green computing?
A) Using the latest computers
B) Reducing environmental waste and conserving energy
C) Upgrading software regularly
D) Recycling unused hardware for profit
Answer: B
59. Which of the following is NOT a purpose of smartphones?
A) Making calls
B) Browsing the web
C) Printing documents
D) Capturing photos
Answer: C
60. What is a wearable device?
A) A device worn by users to access computing features
B) A type of desktop computer
C) A storage device for media
D) A network server for business use
Answer: A
61. Which of the following best describes a server?
A) A mobile device used for browsing
B) A powerful computer that serves other computers in a network
8
C) A handheld device for accessing social media
D) A type of input device for digital media
Answer: B
62. How is a botnet best described?
A) A group of secure computers
B) A network of compromised computers or mobile devices
C) A collection of healthy devices on a network
D) An encryption technique
Correct Answer: B
63. What does a biometric device do?
A. Stores passwords securely
B. Authenticates a person’s identity using personal characteristics
C. Creates secure digital signatures
D. Encrypts data for transmission
Correct Answer: B
64. What is two-step verification?
A. A method that requires a single password for access
B. A security measure using two separate methods to verify a user's identity
C. A biometric authentication process
D. An online activation process
Correct Answer: B
65. What is digital forensics?
A. The study of encryption methods
B. The discovery, collection, and analysis of evidence found on computers and networks
C. The creation of digital signatures
D. The process of deactivating software
Correct Answer: B
66. What is a digital signature?
A. A visual representation of a signature
B. An encrypted code attached to an electronic message to verify the sender's identity
C. A password for accessing files
D. A numeric PIN for software access
Correct Answer: B
67. What characterizes a secure site?
A. It offers free software downloads
B. It uses encryption techniques to secure its data
C. It has no access controls
D. It is only accessible via mobile devices
Correct Answer: B
68. What is the primary purpose of access controls in a network?
A. To monitor network speed
B. To define who can access resources and what actions they can take
C. To install software updates
D. To increase data storage capacity
Correct Answer: B
69. What is the fundamental building block of all digital systems?
9
A) Transistor
B) Resistor
C) Capacitor
D) Diode
Answer: A) Transistor
70. Which of the following is not an operating system?
A) Windows
B) Linux
C) MacOS
D) Python
Answer: D) Python
71. What is the primary function of the CPU in a computer?
A) Store data
B) Perform arithmetic and logic operations
C) Manage power supply
D) Display graphical output
Answer: B) Perform arithmetic and logic operations
72. Which of the following is an example of application software?
A) MS Word
B) BIOS
C) UNIX
D) RAM
Answer: A) MS Word
73. Which of the following is not a type of computer network?
A) LAN
B) WAN
C) PAN
D) RUN
Answer: D) RUN
74. Which of the following is considered volatile memory?
A) ROM
B) RAM
C) SSD
D) Hard Disk
Answer: B) RAM
75. What does GUI stand for?
A) General User Interface
B) Graphical User Interface
C) Generated User Input
D) Global User Index
Answer: B) Graphical User Interface
76. What is the full form of ALU in the context of computing?
A) Arithmetic Logic Unit
B) Automatic Logic Unit
C) Algebraic Logic Unit
10
D) Applied Logic Unit
Answer: A) Arithmetic Logic Unit
77. Which of the following storage devices typically has the largest capacity?
A) CD-ROM
B) USB Flash Drive
C) Hard Disk Drive
D) RAM
Answer: C) Hard Disk Drive
78. Which one of these is an example of an input device?
A) Printer
B) Monitor
C) Keyboard
D) Speaker
Answer: C) Keyboard
79. What is the term for a network of interconnected devices within a small area, like a building or campus?
A) WAN
B) LAN
C) MAN
D) VPN
Answer: B) LAN
80. What is the name of the protocol used to transfer files between computers on the internet?
A) HTTP
B) FTP
C) SMTP
D) IMAP
Answer: B) FTP
81. Which of the following is an example of system software?
A) Antivirus Software
B) Microsoft Word
C) Operating System
D) Web Browser
Answer: C) Operating System
82. A ________ is a software program that provides services to other software programs.
A) Database
B) Server
C) Client
D) Router
Answer: B) Server
83. ________ is the main permanent storage device used in most computers today.
A) ROM
B) Hard Disk
C) RAM
D) Cache
Answer: B) Hard Disk
84. A ________ is a sequence of instructions written to perform a specified task.
A) Process
11
B) Program
C) Code
D) Thread
Answer: B) Program
85. What is an example of an output device?
A) Scanner
B) Printer
C) Microphone
D) Keyboard
Answer: B
86. Which type of device is a game console?
A) Input device
B) Mobile device
C) Output device
D) Storage device
Answer: B
87. What is the relationship between the web and the Internet?
A) They are the same thing
B) The web is a part of the Internet
C) The Internet is a part of the web
D) They do not interact
Answer: B
88. Which of the following is a use of technology in manufacturing?
A) Processing financial transactions
B) Managing inventory through automation and robotics
C) Creating elearning platforms
D) Conducting online marketing
Answer: B
89. How does technology benefit the travel industry?
A) By making travel arrangements more difficult
B) By improving navigation and booking systems
C) By increasing the cost of flights
D) By limiting the use of GPS
Answer: B
90. Which of the following is an example of technology use in science?
A) Manufacturing goods
B) Online social networking
C) Conducting research with advanced computing tools
D) Streaming movies and TV shows
Answer: C
91. Which of the following technologies allows users to interact with a digital environment using gestures and
movements?
A) Augmented reality
B) Virtual reality
C) Word processing
D) 3D printing
12
Answer: B
92. Which device is used to scan printed text into a digital format?
A) Webcam
B) Scanner
C) Printer
D) Projector
Answer: B
93. Which of these best describes cloud computing?
A) A way to store data in external hard drives
B) Storing and accessing data over the Internet
C) A wireless communication protocol
D) A program that controls network servers
Answer: B
94. Which of the following is a key feature of a 3D printer?
A) It prints text on paper
B) It creates physical objects layer by layer
C) It only works with plastic materials
D) It scans documents into digital form
Answer: B
95. What is the main advantage of solidstate drives (SSDs) over traditional hard disks?
A) Lower price
B) Greater storage capacity
C) Faster data access speed
D) More durability
Answer: C
96. What is a search engine primarily used for?
A) To play video games
B) To find information on the web
C) To access mobile apps
D) To interact with social networks
Answer: B
97. Which of the following devices is most commonly used for video input?
A) Printer
B) Webcam
C) Monitor
D) Mouse
Answer: B
98. What is the purpose of recycling old computers as part of green computing?
A) To make profit
B) To reduce electronic waste
C) To upgrade the computer’s software
D) To increase processing speed
Answer: B
99. Which of the following is an advantage of cloud storage?
A) Accessible from anywhere with Internet connection
B) Less secure than local storage
13
C) Only available on mobile devices
D) Requires frequent maintenance
Answer: A
84. What is an example of digital media?
A) Ebooks
B) Printed textbooks
C) Paper maps
D) Film cameras
Answer: A
100. What is the function of a communications device in a network?
A) To store data
B) To transfer data between devices
C) To print documents
D) To create a backup of files
Answer: B
101. What technology is commonly used in a wireless network?
A) USB
B) Bluetooth
C) Ethernet
D) Optical fiber
Answer: B
102. Which of the following is an example of an application software?
A) Operating system
B) Word processor
C) Printer driver
D) BIOS
Answer: B
103. Which of the following is the main function of a network?
A) To provide storage for data
B) To connect computers and devices for sharing data
C) To process graphics
D) To install applications
Answer: B
104. A compromised computer or device is commonly referred to as:
A) Host
B) Drone
C) Zombie
D) Bot
Correct Answer: C
105. A distributed denial-of-service (DDoS) attack involves:
A) An attack originating from a single device
B) Multiple compromised devices overwhelming a service
C) Enhancing system availability
D) A physical breach in security
Correct Answer: B
106. In software, a "back door" allows:
14
A) Extra security measures
B) Improved system performance
C) Circumventing security controls
D) Encryption of sensitive data
Correct Answer: C
107. The term "spoofing" in cybersecurity refers to:
A) Creating counterfeit software
B) Masking network traffic to appear legitimate
C) Deactivating security controls
D) Installing harmful software
Correct Answer: B
108. Access controls determine:
A) Restrictions on physical access only
B) Who can access a system, when, and the allowed actions
C) Tools for tracking network performance
D) Various encryption methods
Correct Answer: B
109. An audit trail in a computer system logs:
A) Only successful access attempts
B) Both successful and failed access attempts
C) User permissions and roles
D) Methods for data encryption
Correct Answer: B
110. A passphrase typically consists of:
A) A short numeric password
B) A combination of words, often with varying capitalization and punctuation
C) A single word used for authentication
D) An encryption key type
Correct Answer: B
111. A PIN (Personal Identification Number) is:
A) A mixture of letters and numbers
B) A numeric password selected by the user or assigned by an organization
C) An encrypted security code
D) A biometric identifier
Correct Answer: B
112. Biometric devices are used for:
A) Storing passwords securely
B) Verifying identity through physical characteristics
C) Generating secure digital signatures
D) Encrypting transmitted data
Correct Answer: B
113. What type of computer is designed for portability and typically runs on battery power?
A) Desktop
B) Laptop
C) Server
D) Mainframe
15
Answer: B
114. Which of the following is NOT a characteristic of a desktop computer?
A) Designed for stationary use
B) Portable
C) Has separate components like monitor and keyboard
D) More powerful than most portable devices
Answer: B
115. Which device is primarily used to store and manage resources for a network of computers?
A) Tablet
B) Server
C) Smartphone
D) Laptop
Answer: B
116. Which of these devices is most commonly used by gamers for immersive experiences?
A) Laptop
B) Game Console
C) Tablet
D) Ebook Reader
Answer: B
117. A portable computer that is smaller than a laptop but typically larger than a smartphone is known as a:
A) Tablet
B) Desktop
C) Server
D) Game Console
Answer: A
118. What type of user is most likely to use a high-performance desktop known as a “workstation”?
A) Casual home user
B) Power user
C) Mobile user
D) Small office/home office user
Answer: B
119. 7. Which device is considered a portable media player?
A) Smartphone
B) Laptop
C) MP3 player
D) Game console
Answer: C
120. What is the primary function of an ebook reader?
A) Browsing the Internet
B) Reading digital books
C) Playing video games
D) Capturing photos
Answer: B
121. Which of the following is NOT a function of a digital camera?
A) Taking photographs
B) Recording videos
16
C) Printing photos
D) Storing images digitally
Answer: C
122. Which type of computer is most commonly used in businesses to provide services to multiple users?
A) Laptop
B) Desktop
C) Server
D) Tablet
Answer: C
123. Which of the following is an input device used to capture video?
A) Monitor
B) Webcam
C) Printer
D) Projector
Answer: B
124. Which of the following is used to convert printed text into digital form?
A) Printer
B) Keyboard
C) Scanner
D) Microphone
Answer: C
125. Which of the following devices is used to control a pointer on a screen?
A) Monitor
B) Printer
C) Mouse
D) Speaker
Answer: C
126. What type of device is a monitor?
A) Input device
B) Output device
C) Storage device
D) Processing device
Answer: B
127. Which device allows you to enter data into a computer using speech?
A) Keyboard
B) Mouse
C) Microphone
D) Scanner
Answer: C
128. What is the primary function of a printer?
A) Inputting text
B) Displaying video
C) Producing physical copies of documents
D) Storing data
Answer: C
129. Which of the following devices would you use to listen to music on a computer?
17
A) Keyboard
B) Printer
C) Headphones
D) Mouse
Answer: C
130. What device is commonly used for gaming to provide a visual display?
A) Monitor
B) Webcam
C) Scanner
D) Keyboard
Answer: A
131. Which of these devices is primarily used for video output?
A) Webcam
B) Speaker
C) Projector
D) Mouse
Answer: C
132. Which of the following is NOT considered an output device?
A) Display
B) Speakers
C) Printer
D) Mouse
Answer: D
133. Which of the following is a form of nonvolatile storage?
A) RAM
B) CPU cache
C) Hard disk drive (HDD)
D) Processor
Answer: C
134. Which device uses flash memory to store data?
A) Optical disc
B) Hard disk
C) USB flash drive
D) Tape drive
Answer: C
135. What is the function of memory in a computer?
A) To process data
B) To store data and instructions temporarily
C) To display graphics
D) To output audio
Answer: B
136. Which of the following is used for long-term data storage?
A) RAM
B) ROM
C) Hard drive
D) CPU cache
18
Answer: C
137. Which type of storage device is the fastest for reading and writing data?
A) Solid-state drive (SSD)
B) Hard disk drive (HDD)
C) Optical disc
D) USB flash drive
Answer: A
138. What is the main advantage of cloud storage?
A) It's cheaper than physical storage
B) It allows access from any device with Internet access
C) It doesn't require any maintenance
D) It offers more storage space than hard drives
Answer: B
139. Which of these is an example of optical storage?
A) Solidstate drive (SSD)
B) Hard disk
C) DVD
D) Flash drive
Answer: C
140. Which of the following is a portable storage medium?
A) DVD
B) RAM
C) Processor
D) Monitor
Answer: A
141. What is the role of a storage device in a computer?
A) To process data
B) To output information
C) To store data permanently or temporarily
D) To input data into the system
Answer: C
142. Which of the following is NOT a form of secondary storage?
A) Hard drive
B) USB drive
C) RAM
D) Optical disc
Answer: C
143. What is the primary function of a network?
A) To connect multiple computers for communication and resource sharing
B) To store data
C) To display multimedia
D) To manage operating systems
Answer: A
144. Which of the following technologies enables wireless networking?
A) USB
B) Ethernet
19
C) WiFi
D) Optical fiber
Answer: C
145. What is a web server?
A) A device used to browse the Internet
B) A computer that delivers requested web pages to users
C) A type of cloud storage
D) A portable input device
Answer: B
146. What is the World Wide Web (WWW)?
A) A software application used to browse the Internet
B) A global collection of linked web pages
C) A type of data storage
D) A method of transmitting data across networks
147. Which of the following is an example of an online social network?
A) Google
B) Amazon
C) Facebook
D) Wikipedia
Answer: C
148. What does a search engine do?
A) It stores websites
B) It finds websites and web content related to a specific topic
C) It hosts webpages
D) It plays videos and audio
Answer: B
149. What is an Internet browser used for?
A) Writing programs
B) Displaying web pages on a device
C) Searching the web
D) Managing files
Answer: B
150. Which of the following is NOT a feature of the Internet?
A) Access to global communication
B) Electronic commerce
C) Data storage on personal hard drives
D) Social networking platforms
151. Which of the following is considered part of the Internet?
A) Web pages
B) Hard drives
C) RAM
D) USB flash drives
152. Which of the following describes the function of an online social network?
A) Facilitating business transactions
B) Enabling users to share interests and communicate
C) Developing software applications
20
D) Storing multimedia files
153. What is software?
A) A physical part of the computer
B) Instructions that tell the computer what to do
C) A type of input device
D) A hardware component that stores data
Answer: B
154. Which of the following is NOT an operating system?
A) Microsoft Word
B) Windows
C) macOS
D) Linux
Answer: A
155. Which of these is an example of application software?
A) Windows
B) Microsoft Word
C) BIOS
D) CPU
156. What is the purpose of system software?
A) To manage and control hardware
B) To edit documents
C) To play multimedia files
D) To browse the Internet
Answer: A
157. Which of the following tasks is typically performed by an operating system?
A) Writing documents
B) Managing memory and hardware resources
C) Designing web pages
D) Developing software
Answer: B
158. Which of the following best describes the installation of software?
A) Copying data from a file
B) Setting up software to work with a computer
C) Uploading files to the cloud
D) Deleting unwanted programs
Answer: B
159. Which of the following is a function of a software developer?
A) Creating hardware
B) Writing code for programs and apps
C) Repairing damaged computers
D) Designing web pages
Answer: B
160. Which of these is an example of system software?
A) Photoshop
B) Google Chrome
C) Linux
21
D) Microsoft Excel
Answer: C
161. Which software is used to view web pages?
A) Word processor
B) Browser
C) Spreadsheet
D) Database
Answer: B
162. Which of the following is NOT a type of application software?
A) Spreadsheet
B) Operating system
C) Web browser
D) Database
Answer: B
163. Which of the following is a common type of malware?
A) Virus
B) Hard drive
C) Browser
D) Router
Answer: A
164. What is the main goal of green computing?
A) To develop faster computers
B) To reduce environmental waste and energy usage
C) To improve online security
D) To increase storage capacity
Answer: B
165. Which of the following is considered a security risk to digital devices?
A) Printer
B) Virus
C) Flash drive
D) Monitor
Answer: B
166. What is one strategy of green computing?
A) Using older hardware to save money
B) Reducing electricity consumption
C) Increasing the number of devices in use
D) Avoiding the use of cloud storage
Answer: B
167. What does “privacy” refer to in the context of digital safety?
A) The security of a network connection
B) Protecting personal information from unauthorized access
C) Recycling old computer parts
D) Using firewalls to block malware
Answer: B
168. Which of the following is NOT considered a privacy risk?
A) Sharing personal details online
22
B) Using strong passwords
C) Storing sensitive information without encryption
D) Giving out login credentials
Answer: B
169. What does green computing involve?
A) Increasing storage space
B) Extending the lifespan of computers
C) Improving online communication
D) Reducing computer performance
Answer: B
170. Which of the following practices can help reduce digital security risks?
A) Using antivirus software
B) Printing out sensitive documents
C) Disabling all software updates
D) Not using a password for accounts
Answer: A
171. Which of the following describes malware?
A) Software that improves a computer’s performance
B) Software designed to harm or exploit a computer
C) Hardware designed to store sensitive information
D) Hardware that prevents hacking attempts
Answer: B
172. Which of the following is an example of a security measure for protecting computers?
A) Using public WiFi
B) Avoiding software updates
C) Installing a firewall
D) Turning off the computer after use
Answer: C
173. Which of the following is NOT a common use of technology in education?
A) Online learning platforms
B) Virtual classrooms
C) Online banking
D) Educational apps
Answer: C
174. Which of the following is a common use of technology in healthcare?
A) Storing medical records in the cloud
B) Hosting social media platforms
C) Streaming entertainment
D) Manufacturing goods
Answer: A
175. What is one way technology has transformed the retail industry?
A) Providing more efficient manufacturing processes
B) Enabling online shopping and ecommerce
C) Increasing the cost of goods
D) Reducing the need for software
Answer: B
23
176. Which of the following is a benefit of using technology in government services?
A) Increasing bureaucracy
B) Reducing accessibility of information
C) Facilitating digital recordkeeping
D) Reducing the use of social media
Answer: C
177. What is the primary use of technology in the finance sector?
A) Designing medical equipment
B) Enhancing cybersecurity measures
C) Managing accounts and conducting online transactions
D) Conducting scientific research
Answer: C
178. Which of the following describes a key benefit of technology in the entertainment industry?
A) It makes content creation slower
B) It restricts access to multimedia content
C) It enables streaming services to deliver content to users globally
D) It reduces the quality of digital content
Answer: C
179. How has technology improved communication in business?
A) By reducing the speed of communication
B) By providing email, video conferencing, and instant messaging tools
C) By limiting access to social media
D) By eliminating the need for facetoface communication
Answer: B
180. Which of the following describes artificial intelligence (AI)?
A) A technology that allows machines to simulate human intelligence
B) A type of input device
C) A hardware component used for processing data
D) A method of storing large amounts of data
Answer: A
181. Which of the following is a benefit of using a VPN (Virtual Private Network)?
A) Faster Internet speeds
B) Enhanced security and privacy when accessing the Internet
C) Easier access to local files
D) Reduced need for software updates
Answer: B
24