Introduction to Computer Technology Practice Exam Quiz

Get solved practice exam answers for your midterm and final examinations

Introduction to Computer Technology Practice Exam Quiz

 

Which of the following is a fundamental component of information technology systems?

User Interface
B. Database
C. Hardware
D. All of the above
Answer: D

What does “IT” stand for in the context of information technology?

Information Transmission
B. Internet Technology
C. Information Technology
D. Integrated Technology
Answer: C

Which of the following best defines data privacy?

Protecting data from unauthorized access
B. Ensuring data is kept secure in the cloud
C. Managing who has access to personal or sensitive data
D. Backing up data regularly
Answer: C

The process of converting data into a code to prevent unauthorized access is called:

Authentication
B. Encryption
C. Decryption
D. Validation
Answer: B

Which of the following is NOT an example of hardware?

Central Processing Unit (CPU)
B. Random Access Memory (RAM)
C. Operating System
D. Monitor
Answer: C

The primary role of software in a computer system is to:

Process data
B. Store files permanently
C. Manage hardware resources
D. Perform computations
Answer: C

What type of network is used within a single building or campus?

WAN (Wide Area Network)
B. LAN (Local Area Network)
C. PAN (Personal Area Network)
D. VPN (Virtual Private Network)
Answer: B

Which of the following is a fundamental characteristic of e-business?

It is entirely conducted offline.
B. It integrates online and offline business processes.
C. It excludes mobile technology.
D. It is not concerned with security.
Answer: B

In the context of m-business, “m” stands for:

Mobile
B. Management
C. Modern
D. Mainframe
Answer: A

A firewall is primarily used to:

Store backup files
B. Encrypt network traffic
C. Prevent unauthorized network access
D. Enhance wireless signal strength
Answer: C

Which of the following is NOT a core function of an operating system?

Managing memory and storage
B. Providing a user interface
C. Performing application-specific tasks
D. Managing hardware resources
Answer: C

What is the smallest unit of data in a computer system?

Byte
B. Bit
C. Kilobyte
D. Megabyte
Answer: B

Which of the following is an example of system software?

Microsoft Word
B. Adobe Photoshop
C. Linux Operating System
D. Google Chrome
Answer: C

Data integrity refers to:

The speed of data transfer
B. The accuracy and reliability of data
C. The security of data
D. The storage capacity of a system
Answer: B

Cloud computing primarily provides:

Physical hardware resources
B. Localized storage options
C. On-demand computing services over the internet
D. Secure firewalls for organizations
Answer: C

Which of the following is an example of primary storage?

Hard Drive
B. RAM
C. USB Drive
D. CD-ROM
Answer: B

In a database, a collection of related data fields is known as a:

Table
B. Record
C. Attribute
D. File
Answer: B

Which of the following best defines cybersecurity?

Creating user-friendly interfaces
B. Protecting systems and networks from digital attacks
C. Storing large volumes of data
D. Encrypting all user data
Answer: B

An IP address is used to:

Connect devices via Bluetooth
B. Identify a device on a network
C. Encrypt sensitive files
D. Store a list of authorized users
Answer: B

Which of these devices connects multiple computers in a network?

Modem
B. Router
C. USB Hub
D. Printer
Answer: B

A primary feature of e-commerce is:

Selling products exclusively in physical stores
B. Providing goods and services online
C. Avoiding digital marketing strategies
D. Operating offline transactions
Answer: B

What is the primary purpose of an antivirus program?

Encrypt data
B. Detect and remove malicious software
C. Increase processing speed
D. Manage files in the operating system
Answer: B

Which of the following storage devices is volatile?

RAM
B. SSD
C. Hard Disk Drive
D. Flash Drive
Answer: A

The term “phishing” refers to:

Tracking user behavior online
B. Fraudulent attempts to acquire sensitive information
C. Encrypting sensitive data
D. Deploying firewalls
Answer: B

A database management system (DBMS) is responsible for:

Generating code
B. Managing data storage and retrieval
C. Managing hardware resources
D. Creating software updates
Answer: B

What is a significant advantage of cloud storage?

It is free of cost.
B. Data is accessible from anywhere with internet access.
C. It eliminates the need for an internet connection.
D. It is faster than local storage.
Answer: B

Which of the following is an example of a mobile operating system?

Windows 10
B. macOS
C. iOS
D. Ubuntu
Answer: C

The term “open-source software” refers to:

Software developed by a single entity
B. Software whose source code is freely available to the public
C. Software with restricted licensing agreements
D. Proprietary software distributed by organizations
Answer: B

In computer networks, what does “bandwidth” refer to?

The frequency of wireless signals
B. The maximum data transfer rate of a network
C. The storage capacity of a device
D. The length of a network cable
Answer: B

A VPN is used to:

Securely access a private network over the internet
B. Increase internet download speeds
C. Manage multiple devices in a LAN
D. Protect against computer viruses
Answer: A

 

Which of the following is a characteristic of information technology in organizations?

It operates independently of business strategies.
B. It integrates people, processes, and technology.
C. It replaces traditional management practices.
D. It is only relevant for IT departments.
Answer: B

What does the term “scalability” refer to in IT systems?

The ability to process large volumes of data quickly
B. The ability to increase or decrease system resources as needed
C. The capability to secure data across multiple locations
D. The measurement of network latency
Answer: B

Which of the following is a benefit of using relational databases?

Increased data redundancy
B. Simplified data relationships
C. Easy scalability
D. Reduced data integrity
Answer: C

A URL is used to:

Identify the location of a resource on the internet
B. Encrypt sensitive user data
C. Connect devices within a LAN
D. Define database relationships
Answer: A

What is the main function of a cache in a computer system?

Permanent data storage
B. Temporary data storage to speed up processes
C. Increase the size of the hard drive
D. Prevent unauthorized access to the system
Answer: B

Which of the following is an example of a high-level programming language?

Machine Code
B. Assembly Language
C. Python
D. Binary
Answer: C

What does the acronym HTTP stand for?

HyperText Transfer Protocol
B. High Transfer Technology Protocol
C. Hyperlink Transmission Process
D. Host-to-Host Transfer Protocol
Answer: A

Which of the following is an example of an e-business activity?

Conducting employee training online
B. Selling products in physical stores
C. Using paper invoices for payments
D. Marketing campaigns through direct mail
Answer: A

Which of the following storage technologies uses no moving parts?

Hard Disk Drive (HDD)
B. Solid State Drive (SSD)
C. CD-ROM
D. Floppy Disk
Answer: B

Which of these terms refers to a wireless networking technology?

LAN
B. Ethernet
C. Wi-Fi
D. IP
Answer: C

The primary purpose of RAID technology in data storage is to:

Reduce network bandwidth
B. Encrypt stored data
C. Improve data redundancy and performance
D. Increase processor speed
Answer: C

Which of the following is a characteristic of artificial intelligence (AI)?

Requires human intervention for all decisions
B. Automates tasks using pre-programmed rules
C. Enables machines to simulate human intelligence
D. Processes only structured data
Answer: C

In the context of networks, the term “latency” refers to:

The maximum speed of a connection
B. The delay in transmitting data from one point to another
C. The strength of a wireless signal
D. The amount of bandwidth used during transmission
Answer: B

A “smart device” is characterized by its ability to:

Connect to the internet and perform automated tasks
B. Store large volumes of data locally
C. Operate without a power source
D. Be used only in industrial applications
Answer: A

Which of the following is an advantage of using open-source software?

It always comes with customer support.
B. It is typically free to use and modify.
C. It has fewer security vulnerabilities.
D. It can only be used in academic settings.
Answer: B

A QR code is most commonly used to:

Secure online transactions
B. Transfer files between computers
C. Provide quick access to information via scanning
D. Encrypt wireless communications
Answer: C

What is the primary function of a domain name system (DNS)?

To provide IP addresses to devices
B. To translate domain names into IP addresses
C. To create secure connections between networks
D. To assign network permissions to users
Answer: B

An example of application software is:

Linux
B. Microsoft Excel
C. BIOS
D. Wi-Fi Router
Answer: B

What is the role of a network switch?

To connect multiple networks together
B. To forward data packets between devices in a single network
C. To assign IP addresses to devices
D. To create a secure connection over the internet
Answer: B

Which of the following best describes “big data”?

Small, structured datasets
B. Extremely large and complex datasets
C. Data stored on personal devices
D. Data that requires minimal processing
Answer: B

 

Which of the following is an example of hardware?

Web browser
B. Printer
C. Operating system
D. Database management system
Answer: B

Which type of memory is volatile and loses its content when power is turned off?

ROM
B. Flash Memory
C. RAM
D. SSD
Answer: C

A firewall is primarily used to:

Store backup data
B. Encrypt files
C. Monitor and control incoming and outgoing network traffic
D. Optimize system performance
Answer: C

Which of the following best describes “cloud computing”?

Storing data on physical servers locally
B. Accessing services and resources over the internet
C. Building local area networks
D. Installing software on personal devices
Answer: B

The primary purpose of encryption is to:

Reduce data redundancy
B. Prevent unauthorized access to data
C. Improve internet speeds
D. Organize data efficiently
Answer: B

In which of the following network topologies is every device connected to a central hub?

Star
B. Ring
C. Mesh
D. Bus
Answer: A

Which of these is an example of system software?

Adobe Photoshop
B. Microsoft Word
C. Linux Operating System
D. Google Chrome
Answer: C

The “Internet of Things” (IoT) refers to:

A network of interconnected devices capable of data exchange
B. The study of online consumer behavior
C. Cloud computing services for enterprises
D. A method of encrypting wireless networks
Answer: A

Which of the following is NOT a characteristic of mobile computing?

Portability
B. High energy consumption
C. Wireless communication
D. Access to cloud resources
Answer: B

A database management system (DBMS) is used to:

Manage a company’s finances
B. Control access to websites
C. Organize, store, and retrieve data efficiently
D. Encrypt sensitive information
Answer: C

Which type of malware disguises itself as legitimate software?

Trojan Horse
B. Ransomware
C. Spyware
D. Worm
Answer: A

The smallest unit of digital data is called a:

Byte
B. Bit
C. Nibble
D. Word
Answer: B

Which of the following is an example of e-commerce?

Writing a blog post
B. Purchasing a product from an online store
C. Watching a tutorial on YouTube
D. Sending an email
Answer: B

Which device connects a local network to the internet?

Router
B. Switch
C. Hub
D. Modem
Answer: A

Which protocol is primarily used for email transmission?

FTP
B. HTTP
C. SMTP
D. SNMP
Answer: C

What is the role of a VPN (Virtual Private Network)?

To enhance the speed of an internet connection
B. To secure a user’s connection over a public network
C. To store large volumes of data locally
D. To improve network latency
Answer: B

What does “phishing” refer to in cybersecurity?

Attempting to gain unauthorized access to a network
B. Sending fraudulent emails to steal sensitive information
C. Installing malicious software on a victim’s device
D. Disrupting network traffic with excessive requests
Answer: B

A packet in a network is:

A physical piece of hardware
B. A unit of data transmitted over a network
C. A software component of a router
D. A firewall configuration file
Answer: B

Which type of storage is typically used for long-term archival purposes?

RAM
B. Cache Memory
C. Magnetic Tape
D. Solid-State Drive (SSD)
Answer: C

What does an IP address uniquely identify?

A physical device in a network
B. A user’s identity online
C. A website’s location in a database
D. A data packet in transit
Answer: A

 

What is the primary purpose of a CPU (Central Processing Unit)?

To store data permanently
B. To process and execute instructions
C. To connect devices in a network
D. To manage the display of graphics
Answer: B

Which of the following is an example of an input device?

Monitor
B. Printer
C. Keyboard
D. Speaker
Answer: C

The term “bandwidth” refers to:

The physical size of a network cable
B. The amount of data that can be transmitted over a network in a given time
C. The latency of a network connection
D. The number of users on a network
Answer: B

Which of these is a feature of peer-to-peer (P2P) networks?

Centralized control of data
B. Equal privileges for all devices
C. High dependency on a server
D. Dedicated devices for network security
Answer: B

Which of the following storage devices is known for its portability and large storage capacity?

Optical Disc
B. External Hard Drive
C. Cloud Storage
D. RAM Module
Answer: B

Which of these is an example of a secondary storage device?

Cache
B. SSD
C. RAM
D. Register
Answer: B

What does “two-factor authentication” (2FA) involve?

Using two passwords for one account
B. Combining a username and password
C. Verifying identity through two separate methods
D. Encrypting data twice
Answer: C

A botnet is primarily used to:

Improve network speed
B. Conduct cyberattacks using multiple compromised devices
C. Manage network traffic
D. Encrypt files for security
Answer: B

Which of the following best describes a “web browser”?

A tool for editing websites
B. A software application for accessing information on the World Wide Web
C. A protocol for sending data over the internet
D. A server for hosting websites
Answer: B

Which of the following is considered a disadvantage of cloud computing?

Accessibility from multiple devices
B. Dependence on an internet connection
C. Scalability of resources
D. Cost-effectiveness
Answer: B

What does a computer’s BIOS (Basic Input/Output System) do?

Manages network traffic
B. Initiates hardware during boot-up
C. Runs application software
D. Stores user files permanently
Answer: B

Which of the following is an example of an operating system?

Adobe Photoshop
B. macOS
C. Google Drive
D. MySQL
Answer: B

In a database, a “primary key” is used to:

Secure the database from unauthorized access
B. Uniquely identify each record
C. Create a backup of the database
D. Link the database to external systems
Answer: B

What is the primary function of an ISP (Internet Service Provider)?

To develop software applications
B. To provide internet access to users
C. To host websites on servers
D. To manufacture networking equipment
Answer: B

Which of these is NOT a characteristic of a strong password?

Contains a mix of letters, numbers, and symbols
B. Is at least 8 characters long
C. Includes personal information like a birthdate
D. Is not easily guessable
Answer: C

What is the primary function of a database query?

To encrypt database records
B. To retrieve specific information from a database
C. To delete redundant data from a database
D. To optimize database performance
Answer: B

In a network, the function of a “proxy server” is to:

Store backup data
B. Act as an intermediary between a user and the internet
C. Encrypt all network communications
D. Provide internet access to local devices
Answer: B

Which type of network spans a large geographical area?

LAN
B. WAN
C. PAN
D. CAN
Answer: B

What is the function of a data packet in networking?

It encrypts data for secure transmission
B. It divides data into manageable units for transmission
C. It identifies the source of network traffic
D. It prevents data loss during transmission
Answer: B

What does “machine learning” refer to?

The process of manually programming machines
B. Machines adapting and improving based on data
C. Machines performing tasks without algorithms
D. Automation of repetitive tasks
Answer: B

 

Which type of software is used to perform a specific task, such as word processing or spreadsheet creation?

System software
B. Utility software
C. Application software
D. Firmware
Answer: C

The main purpose of an IP address is to:

Encrypt data during transmission
B. Identify a device on a network
C. Store data permanently
D. Improve network speed
Answer: B

What does the term “bit” stand for in computing?

Binary Information Technology
B. Binary Digit
C. Byte Information Transfer
D. Basic Information Token
Answer: B

Which of the following is an advantage of using solid-state drives (SSDs) over hard disk drives (HDDs)?

Larger storage capacity
B. Higher durability and faster read/write speeds
C. Lower cost per GB
D. Compatibility with older systems
Answer: B

Which programming language is primarily used for web development on the client side?

Python
B. JavaScript
C. C++
D. SQL
Answer: B

What is the purpose of a “cache” in computing?

To permanently store large amounts of data
B. To store frequently accessed data temporarily for faster retrieval
C. To secure data using encryption
D. To organize data in hierarchical structures
Answer: B

Which of the following is a characteristic of a relational database?

Data is stored in hierarchical structures
B. Data is organized into tables with rows and columns
C. Data is stored in a single, flat file
D. Data is only accessible through programming languages
Answer: B

Which technology allows a user to run multiple operating systems on a single physical machine?

Virtualization
B. Cloud Computing
C. Multiprocessing
D. Load Balancing
Answer: A

Which network device is responsible for directing data packets between networks?

Switch
B. Router
C. Modem
D. Hub
Answer: B

What is the role of DNS (Domain Name System) in networking?

Encrypt data transmissions
B. Assign IP addresses to devices
C. Translate domain names into IP addresses
D. Control network traffic
Answer: C

What does the term “open-source software” mean?

Software that is free to use and modify
B. Software that is only available to developers
C. Software that has no copyright restrictions
D. Software that is not secure
Answer: A

Which of these is an example of an m-business activity?

Selling goods through a physical store
B. Purchasing items using a mobile app
C. Managing files on a desktop computer
D. Sending marketing emails
Answer: B

A LAN (Local Area Network) is typically confined to:

A city
B. A single building or campus
C. A country
D. The internet
Answer: B

Which of the following is an example of cybercrime?

Writing a program for data analysis
B. Accessing a computer system without authorization
C. Sharing photos on social media
D. Updating operating system software
Answer: B

Which type of software license allows unlimited installations but requires users to pay for usage?

Open-source
B. Proprietary
C. Subscription-based
D. Freeware
Answer: C

What does the term “IoT” stand for in computing?

Internet of Technology
B. Integration of Transactions
C. Internet of Things
D. Information on Technology
Answer: C

Which of the following storage types is considered non-volatile?

RAM
B. Cache
C. ROM
D. Virtual Memory
Answer: C

Which of the following is an example of phishing?

Using malware to disrupt a computer system
B. Sending fraudulent emails to steal sensitive information
C. Creating fake websites to steal data
D. Using encrypted communication to protect data
Answer: B

What is the purpose of HTTP (Hypertext Transfer Protocol)?

To manage file storage on a local network
B. To transfer files securely over the internet
C. To enable communication between web browsers and servers
D. To encrypt online transactions
Answer: C

What does “multi-tasking” mean in the context of operating systems?

Running multiple operating systems on one computer
B. Running several programs simultaneously
C. Using multiple processors for one application
D. Installing various software packages
Answer: B

 

What does “BIOS” stand for?

Basic Internet Operating System
B. Binary Input Output System
C. Basic Input Output System
D. Basic Integrated Operating Software
Answer: C

Which of the following best describes e-business?

Business conducted only via email
B. Business processes conducted over the internet
C. Business transactions conducted through face-to-face meetings
D. Business activities conducted within a private network
Answer: B

What is the role of a firewall in computer networks?

To connect multiple devices
B. To secure networks by filtering traffic
C. To increase internet speed
D. To analyze stored data
Answer: B

Which of the following is an example of software?

Motherboard
B. RAM
C. Operating System
D. Ethernet Cable
Answer: C

What is the main purpose of encryption in data security?

To speed up data transfer
B. To compress files
C. To protect data from unauthorized access
D. To duplicate files for backups
Answer: C

A pixel in a digital image is best described as:

A vector element
B. A single point of color
C. A hardware component
D. A compressed file format
Answer: B

Which of these is considered a hardware component?

Spreadsheet software
B. Processor
C. Cloud storage
D. Antivirus application
Answer: B

What is the primary function of RAM in a computer?

To execute stored programs
B. To store data permanently
C. To temporarily store data being processed
D. To manage network connections
Answer: C

What does “HTTP” stand for?

Hypertext Transfer Protocol
B. Hyperlink Text Processor
C. High Transfer Protocol
D. Hyperlink Transfer Program
Answer: A

Which of the following is an example of system software?

Microsoft Excel
B. Google Chrome
C. Linux
D. Adobe Photoshop
Answer: C

What does the term “plug and play” refer to in computing?

Installing applications without user input
B. Using devices without manual configuration
C. Connecting multiple devices to a network
D. Playing media files automatically
Answer: B

Which of the following is NOT an operating system?

macOS
B. Windows
C. Python
D. Linux
Answer: C

What is a VPN primarily used for?

Creating faster network connections
B. Encrypting internet traffic and hiding user identity
C. Managing files in a cloud environment
D. Hosting websites on secure servers
Answer: B

Which of the following is an advantage of cloud computing?

Complete offline functionality
B. Reduced dependency on hardware
C. Increased cost for small businesses
D. Complex configuration
Answer: B

What is the primary purpose of the motherboard in a computer?

To execute applications
B. To store files permanently
C. To connect and coordinate all computer components
D. To supply power to the CPU
Answer: C

Which of the following represents an IPv6 address?

192.168.0.1
B. 255.255.255.0
C. 2001:0db8:85a3:0000:0000:8a2e:0370:7334
D. www.example.com
Answer: C

In the context of email, what does “BCC” stand for?

Blind Carbon Copy
B. Bulk Communication Channel
C. Backup Contact Copy
D. Blind Central Communication
Answer: A

Which storage technology uses no moving parts?

Hard Disk Drive (HDD)
B. Solid-State Drive (SSD)
C. Optical Disc
D. Tape Drive
Answer: B

What is the purpose of a database index?

To compress database files
B. To speed up data retrieval
C. To back up data regularly
D. To create complex queries
Answer: B

Which of the following is an example of a primary storage device?

SSD
B. Cache
C. USB Flash Drive
D. CD-ROM
Answer: B

 

What does GUI stand for in computing?

General User Interaction
B. Graphical User Interface
C. Global User Integration
D. General Unified Interface
Answer: B

Which of the following is an example of a web browser?

Linux
B. Chrome
C. Excel
D. MySQL
Answer: B

Which of the following protocols is used to send email messages?

HTTP
B. FTP
C. SMTP
D. IMAP
Answer: C

Which part of a computer system performs arithmetic and logic operations?

RAM
B. Motherboard
C. CPU
D. Hard Drive
Answer: C

What is the function of an operating system?

To design web pages
B. To manage hardware and software resources
C. To compile programming code
D. To act as antivirus software
Answer: B

What does the term “bandwidth” refer to in networking?

The physical width of a network cable
B. The total data transfer capacity of a network
C. The number of connected devices in a network
D. The strength of a Wi-Fi signal
Answer: B

Which of the following is a characteristic of open-source software?

The source code is freely available for modification
B. It requires a subscription fee for updates
C. It is only accessible by the vendor’s approval
D. It has a fixed user interface with no customization
Answer: A

What is the main advantage of using cloud storage?

It requires no internet connection
B. Data is accessible from any device with internet access
C. It is the fastest storage option available
D. It eliminates all security risks
Answer: B

Which of the following types of memory is volatile?

ROM
B. SSD
C. RAM
D. Flash Memory
Answer: C

What does “IP” stand for in IP address?

Internet Protocol
B. Internal Process
C. Integrated Packet
D. Instant Provider
Answer: A

Which of these technologies allows multiple devices to connect wirelessly to a local network?

Ethernet
B. Wi-Fi
C. Bluetooth
D. Fiber Optics
Answer: B

Which of the following is NOT a function of a database management system (DBMS)?

Data storage and retrieval
B. Data analysis
C. Data visualization
D. Data encryption
Answer: C

What is a key characteristic of a peer-to-peer (P2P) network?

Centralized control
B. All devices have equal roles and responsibilities
C. High server dependency
D. Limited scalability
Answer: B

Which of the following file extensions indicates a compressed file?

.exe
B. .txt
C. .zip
D. .html
Answer: C

What is the primary purpose of a spreadsheet program?

To create presentations
B. To manage and analyze data using tables and formulas
C. To design web pages
D. To edit multimedia files
Answer: B

Which of the following is considered a peripheral device?

CPU
B. RAM
C. Printer
D. Motherboard
Answer: C

What does “URL” stand for?

Uniform Resource Locator
B. Unified Routing Layer
C. Universal Resource List
D. Uniform Registration Label
Answer: A

Which of the following best defines malware?

Software that helps in system optimization
B. Hardware designed to store data securely
C. Malicious software designed to harm or exploit systems
D. A secure protocol for data transfer
Answer: C

Which component of a computer is primarily responsible for rendering graphics?

Network Card
B. Graphics Processing Unit (GPU)
C. Sound Card
D. CPU
Answer: B

What is an advantage of IPv6 over IPv4?

Faster data transfer
B. Larger address space for connected devices
C. Reduced need for encryption
D. Simplified network configurations
Answer: B

 

What is the purpose of a cache in a computer system?

To permanently store files
B. To temporarily store frequently accessed data for faster retrieval
C. To encrypt sensitive data
D. To allocate more memory to the CPU
Answer: B

Which of the following devices is considered an input device?

Monitor
B. Keyboard
C. Printer
D. Speaker
Answer: B

What is the primary purpose of a router in a network?

To connect devices within a local network
B. To provide power to devices
C. To store data
D. To manage email traffic
Answer: A

What is the binary equivalent of the decimal number 10?

1000
B. 1010
C. 1111
D. 1100
Answer: B

Which of the following is NOT an example of an operating system?

iOS
B. Android
C. Apache
D. Windows
Answer: C

What type of software is used to create, edit, and format text documents?

Spreadsheet software
B. Word processing software
C. Presentation software
D. Database software
Answer: B

Which of the following best describes a Wide Area Network (WAN)?

A network within a single building
B. A network that connects devices over a large geographical area
C. A network for a single department
D. A network restricted to wireless connections
Answer: B

What is the function of a domain name system (DNS)?

To encrypt internet traffic
B. To translate domain names into IP addresses
C. To host websites on servers
D. To provide email services
Answer: B

What is the smallest unit of data in a computer?

Byte
B. Bit
C. Kilobyte
D. Megabyte
Answer: B

Which of the following is an example of system software?

Microsoft Word
B. Google Chrome
C. Windows OS
D. Adobe Photoshop
Answer: C

Which type of malware locks users out of their systems until a payment is made?

Spyware
B. Ransomware
C. Adware
D. Worm
Answer: B

What is the main purpose of an Ethernet cable?

To power network devices
B. To transmit data in a wired network
C. To connect wireless devices
D. To store large amounts of data
Answer: B

What does “IoT” stand for?

Internet of Technology
B. Integration of Telecommunication
C. Internet of Things
D. Information on Time
Answer: C

Which of the following is NOT a characteristic of RAM?

Volatile memory
B. Used for temporary data storage
C. Non-volatile memory
D. Faster than hard drives
Answer: C

What is a subnet mask used for in networking?

To encrypt data packets
B. To divide an IP address into network and host portions
C. To prevent unauthorized access
D. To optimize data transmission speed
Answer: B

What does the term “phishing” refer to in cybersecurity?

Sending fake emails to obtain sensitive information
B. Encrypting data to protect against hackers
C. Tracking user activities without consent
D. Spamming users with irrelevant ads
Answer: A

Which protocol is commonly used to transfer files over the internet?

FTP
B. HTTP
C. SMTP
D. POP
Answer: A

What does the term “hotspot” refer to in networking?

A secure method of transmitting files
B. A device used for encrypting data
C. A location where wireless internet access is available
D. A server that hosts websites
Answer: C

Which of the following best describes the term “latency”?

The total data transferred in a given time
B. The delay in data transfer over a network
C. The speed at which data is transmitted
D. The number of connected devices in a network
Answer: B

What is the function of a database query?

To format data for printing
B. To retrieve specific information from a database
C. To permanently delete records
D. To create data visualizations
Answer: B

 

Which of the following is an example of application software?

Windows 10
B. Adobe Photoshop
C. BIOS
D. UNIX
Answer: B

What does “HTTP” stand for?

Hyper Transfer Text Protocol
B. Hyper Text Transfer Protocol
C. Hyper Text Transmission Protocol
D. High Text Transfer Protocol
Answer: B

Which of the following devices stores data permanently?

RAM
B. Cache
C. SSD
D. CPU
Answer: C

What does the term “firewall” refer to in computer security?

A software or hardware that prevents unauthorized access to a network
B. A virus protection tool
C. A type of malware
D. A physical barrier in a data center
Answer: A

What is the main purpose of an IP address?

To identify devices on a network
B. To encrypt internet traffic
C. To store user data
D. To secure files in a computer
Answer: A

Which of the following is NOT a type of computer network?

LAN
B. MAN
C. CAN
D. WAN
Answer: C

What does “SSD” stand for?

Secure Storage Drive
B. Solid State Drive
C. System Storage Device
D. Super Speed Drive
Answer: B

Which programming language is primarily used for web development?

Python
B. JavaScript
C. C++
D. COBOL
Answer: B

What is the purpose of a CPU clock speed?

To measure the amount of data a CPU can process per second
B. To regulate the voltage supplied to the CPU
C. To manage the CPU temperature
D. To determine the lifespan of the CPU
Answer: A

What is “encryption” in computer security?

A process of compressing files
B. A method to prevent unauthorized data access by converting it into an unreadable format
C. A technique to duplicate data
D. A process of deleting sensitive information
Answer: B

What does the term “ping” refer to in networking?

The strength of a network signal
B. A tool used to test the reachability of a host on a network
C. The maximum speed of a network
D. A type of malware
Answer: B

Which of the following storage units is the largest?

Kilobyte
B. Gigabyte
C. Terabyte
D. Megabyte
Answer: C

What does the term “cloud computing” mean?

Storing data on a local hard drive
B. Storing and accessing data and programs over the internet
C. Running software directly from CDs or DVDs
D. Running offline applications without internet connectivity
Answer: B

What does “VPN” stand for?

Virtual Processing Node
B. Virtual Private Network
C. Visual Protocol Network
D. Virtual Proxy Node
Answer: B

Which of the following is a primary characteristic of m-business?

Conducting business through mobile devices
B. Exclusively using email for communication
C. Managing businesses without software tools
D. Building applications for desktop-only environments
Answer: A

What is the purpose of a backup?

To optimize the speed of a computer
B. To store copies of data to protect against loss
C. To clean up unused files on a system
D. To encrypt sensitive information
Answer: B

What is a MAC address used for?

Identifying a device on a local network
B. Encrypting data packets
C. Determining internet speed
D. Compressing files
Answer: A

What does “BIOS” stand for?

Basic Input/Output System
B. Binary Integrated Operating System
C. Built-In Output Software
D. Basic Integrated Operating System
Answer: A

Which type of database is organized into rows and columns?

Relational Database
B. Object-Oriented Database
C. Hierarchical Database
D. NoSQL Database
Answer: A

Which of the following is a primary function of a file system?

Managing how data is stored and retrieved on a storage device
B. Compressing files for storage efficiency
C. Encrypting files for security
D. Detecting viruses on a hard drive
Answer: A

 

What is the purpose of an operating system?

To manage hardware resources and provide services for application software
B. To design and create websites
C. To serve as a database management tool
D. To provide cybersecurity solutions
Answer: A

Which type of memory is permanent and cannot be modified by normal users?

RAM
B. Cache
C. ROM
D. Flash Memory
Answer: C

What is the primary use of a spreadsheet application?

Creating text documents
B. Analyzing and managing numerical data
C. Designing websites
D. Managing email accounts
Answer: B

Which of the following is an advantage of cloud storage?

Requires no internet connection
B. Accessible from any device with an internet connection
C. Always free for unlimited storage
D. Only available on local networks
Answer: B

What is the role of a GPU in a computer system?

Handles all input/output operations
B. Processes and renders graphics for display
C. Manages system security
D. Stores data for the operating system
Answer: B

Which type of software license allows free use, modification, and distribution?

Proprietary software
B. Open-source software
C. Shareware
D. Freeware
Answer: B

What is a “hot swappable” device?

A device that can be replaced or removed without shutting down the system
B. A device that can overheat when used extensively
C. A device that encrypts data for secure communication
D. A device designed to work only with high-speed networks
Answer: A

What is the function of a compiler?

To execute programs line by line
B. To translate high-level code into machine code
C. To detect and remove malware
D. To compress large files
Answer: B

Which of the following is NOT a characteristic of Big Data?

Volume
B. Velocity
C. Variety
D. Virtualization
Answer: D

What does “URL” stand for?

Uniform Resource Locator
B. Universal Routing Link
C. Unified Research Language
D. User Resource Link
Answer: A

What is the primary purpose of a database index?

To compress data for storage
B. To improve the speed of data retrieval
C. To back up data automatically
D. To encrypt sensitive information
Answer: B

Which layer of the OSI model is responsible for error detection and correction?

Physical Layer
B. Data Link Layer
C. Network Layer
D. Application Layer
Answer: B

What is the primary purpose of a “cache memory”?

To store backup data
B. To speed up access to frequently used data
C. To manage large files
D. To encrypt user data
Answer: B

Which of the following is NOT an advantage of digital communication?

High speed
B. Ease of storage
C. Signal degradation over distance
D. Cost-effectiveness
Answer: C

What does “SMTP” stand for?

Simple Mail Transfer Protocol
B. Secure Mail Transmission Program
C. Server Message Transport Protocol
D. Safe Message Transfer Protocol
Answer: A

Which type of malware replicates itself without user action?

Virus
B. Worm
C. Spyware
D. Trojan Horse
Answer: B

What is the hexadecimal equivalent of the binary number 1101?

D
B. E
C. B
D. F
Answer: A

Which of the following best describes “phishing”?

A method to extract sensitive information through fraudulent emails or websites
B. A technique used to encrypt sensitive data
C. A method of distributing malware
D. A tool to optimize network performance
Answer: A

What is the primary purpose of a “kernel” in an operating system?

To manage user accounts
B. To handle system-level resource management and process control
C. To protect the system from malware
D. To provide graphical user interface tools
Answer: B

Which of the following is NOT a common feature of mobile operating systems?

Multitasking capabilities
B. File management systems
C. Integrated telecommunication tools
D. High-performance database management
Answer: D

 

Which of the following is an example of an input device?

Printer
B. Monitor
C. Keyboard
D. Speaker
Answer: C

What is the primary function of the ALU (Arithmetic Logic Unit) in a CPU?

To store data temporarily
B. To perform mathematical calculations and logical operations
C. To manage memory allocation
D. To connect the CPU to external devices
Answer: B

Which type of computer memory is volatile?

ROM
B. Flash memory
C. RAM
D. Hard drive
Answer: C

What does the acronym “USB” stand for?

Universal Service Bus
B. Unified Serial Bus
C. Universal Serial Bus
D. Unified Storage Bus
Answer: C

What is a “bit” in computing?

A unit of measurement for storage capacity
B. A binary digit that represents a 0 or 1
C. A type of input device
D. A programming language
Answer: B

Which of the following is a key benefit of using an SSD over a traditional HDD?

Higher power consumption
B. Slower data access times
C. Faster data access times
D. More storage space
Answer: C

Which of the following devices is commonly used for wireless communication?

Ethernet cable
B. Bluetooth adapter
C. USB flash drive
D. External hard drive
Answer: B

Which of the following protocols is used to send emails over the internet?

FTP
B. HTTP
C. SMTP
D. POP3
Answer: C

What is the function of a router in a network?

To connect different networks and forward data packets between them
B. To provide encryption for secure communication
C. To connect a device to a local network
D. To store and manage data on a local machine
Answer: A

Which of the following is an example of system software?

Google Chrome
B. Microsoft Word
C. Windows operating system
D. Adobe Photoshop
Answer: C

What is the function of a server in a client-server network?

To store data and provide services to client devices
B. To transmit data between devices
C. To connect devices to a network
D. To manage and display graphical user interfaces
Answer: A

Which of the following is an example of a “cloud-based” service?

Dropbox
B. Microsoft Word
C. Adobe Acrobat Reader
D. Google Chrome
Answer: A

What is the role of DNS (Domain Name System) in internet communication?

To translate domain names into IP addresses
B. To protect websites from malware
C. To create websites
D. To block unwanted websites
Answer: A

What is the function of the “bios” in a computer?

To store permanent data for the operating system
B. To control the CPU’s power supply
C. To perform basic hardware initialization and boot the operating system
D. To manage network connections
Answer: C

What does “Wi-Fi” stand for?

Wireless Fidelity
B. Wireless Field
C. Wireless Frequency
D. Wide Field
Answer: A

Which of the following is an example of an open-source operating system?

Windows 10
B. MacOS
C. Linux
D. iOS
Answer: C

Which of the following devices is used to connect a computer to the internet via a wired connection?

Modem
B. Router
C. Switch
D. Hub
Answer: A

Which of the following is an example of a social media platform?

Google
B. Instagram
C. LinkedIn
D. Both B and C
Answer: D

What is the purpose of RAID (Redundant Array of Independent Disks)?

To improve system performance through disk mirroring or striping
B. To encrypt data stored on hard drives
C. To back up data in the cloud
D. To manage user access to network resources
Answer: A

What does the term “open-source software” mean?

Software that is available for free, but cannot be modified
B. Software that is sold with a commercial license
C. Software whose source code is available for modification and distribution
D. Software that is not compatible with most devices
Answer: C

 

What is the primary purpose of a “firewall” in a network?

To physically secure a building
B. To monitor and control incoming and outgoing network traffic
C. To convert digital signals into analog signals
D. To monitor employee internet usage
Answer: B

Which of the following is an example of a non-volatile memory?

RAM
B. Cache
C. ROM
D. Register
Answer: C

What is the primary purpose of an IP address in a network?

To protect data through encryption
B. To identify a device on a network
C. To regulate network traffic
D. To store data on a server
Answer: B

What does “HTTPS” stand for?

HyperText Transfer Protocol Secure
B. HyperTerminal Transport Protocol Security
C. HyperText Transport Protocol Service
D. Hypertext Technology Secure
Answer: A

Which of the following is used to connect devices within a local area network (LAN)?

Router
B. Switch
C. Modem
D. Hub
Answer: B

What is the main function of a “switch” in a network?

To amplify network signals
B. To route traffic between different networks
C. To connect devices within the same network and manage data traffic
D. To connect the network to the internet
Answer: C

What is the primary function of an operating system?

To provide security updates
B. To execute applications and manage hardware resources
C. To store user data
D. To protect against viruses
Answer: B

What is an example of a “relational database”?

MySQL
B. MongoDB
C. Apache Hadoop
D. Google Firebase
Answer: A

What is the primary purpose of “virtualization” in computing?

To provide internet access
B. To allow multiple operating systems to run on the same hardware
C. To improve data encryption
D. To store backup data in the cloud
Answer: B

Which of the following is NOT an example of an input device?

Keyboard
B. Mouse
C. Printer
D. Scanner
Answer: C

Which of the following is used to prevent unauthorized access to a network?

Encryption
B. Firewall
C. Compression
D. Router
Answer: B

Which type of memory is used to store the BIOS in a computer?

RAM
B. ROM
C. Cache
D. Flash Memory
Answer: B

What is the main purpose of the “Cloud” in computing?

To manage on-site servers
B. To provide storage and services over the internet
C. To create and store personal files
D. To install operating systems
Answer: B

Which of the following is a characteristic of “cloud computing”?

Storage is limited to local devices
B. Data is stored on a centralized server and accessed over the internet
C. It requires physical hardware installation at the user’s location
D. The internet connection is optional for access
Answer: B

What is the primary function of a “database management system” (DBMS)?

To protect against viruses
B. To provide access to email accounts
C. To organize, store, and retrieve data
D. To enable internet connectivity
Answer: C

What is a “bit” in computing terms?

A unit of data representing either 1 or 0
B. A large data storage unit
C. A process in the operating system
D. A program that runs on a server
Answer: A

Which of the following is used to connect to the internet?

Flash drive
B. Modem
C. Printer
D. Monitor
Answer: B

What is the primary benefit of a “solid-state drive” (SSD) over a traditional “hard disk drive” (HDD)?

Higher storage capacity
B. Faster data access and transfer speeds
C. Lower cost per gigabyte
D. Larger physical size
Answer: B

Which of the following is an example of “software as a service” (SaaS)?

Microsoft Office
B. Google Drive
C. Amazon Web Services (AWS)
D. IBM Cloud
Answer: B

What is the primary function of “RAM” (Random Access Memory)?

To store data permanently
B. To store data temporarily for quick access by the CPU
C. To power the computer when the system is turned off
D. To store multimedia files
Answer: B

 

Which of the following is used to store permanent data in a computer?

RAM
B. ROM
C. Cache
D. Virtual memory
Answer: B

Which of the following is an example of an input device?

Monitor
B. Printer
C. Keyboard
D. Speaker
Answer: C

What is the main function of the CPU (Central Processing Unit)?

To provide power to the computer
B. To store user data
C. To perform calculations and execute instructions
D. To manage network traffic
Answer: C

What does the term “URL” stand for?

Uniform Resource Locator
B. Unified Resource Locator
C. Universal Resource Locator
D. Uniform Retrieval Locator
Answer: A

What is the primary purpose of an operating system?

To manage hardware and software resources
B. To store data
C. To provide security for data
D. To send and receive email
Answer: A

Which of the following is an example of a volatile memory?

Flash memory
B. ROM
C. RAM
D. Hard drive
Answer: C

What is the function of an “optical drive” in a computer?

To provide internet access
B. To store and retrieve data on optical disks
C. To manage network connections
D. To process data in the CPU
Answer: B

Which of the following is NOT a type of computer hardware?

CPU
B. RAM
C. Windows operating system
D. Monitor
Answer: C

What is the function of a “router” in a network?

To encrypt data for security
B. To direct data packets between different networks
C. To store user data
D. To provide a connection to a wireless network
Answer: B

What does the acronym “HTTP” stand for?

HyperText Transfer Protocol
B. Hyper Terminal Transfer Protocol
C. Hypertext Translation Protocol
D. HyperText Template Protocol
Answer: A

Which of the following is used for short-range wireless communication between devices?

Ethernet
B. Bluetooth
C. Wi-Fi
D. Fiber optics
Answer: B

Which of the following devices converts digital signals into analog signals?

Modem
B. Router
C. Switch
D. Firewall
Answer: A

Which of the following is the main component responsible for processing information in a computer?

Memory
B. Hard drive
C. CPU
D. Graphics card
Answer: C

What does the acronym “Wi-Fi” stand for?

Wireless Fidelity
B. Wide Frequency Interface
C. Wireless Fiber Integration
D. Wireless Internet Forum
Answer: A

What type of software is Microsoft Excel?

Operating system
B. Spreadsheet software
C. Web browser
D. Database management system
Answer: B

Which of the following is an example of system software?

Google Chrome
B. Microsoft Word
C. Windows OS
D. Photoshop
Answer: C

Which of the following is used to store large amounts of data in a computer?

RAM
B. ROM
C. Hard disk drive (HDD)
D. Cache
Answer: C

What is the main function of a “firewall” in a network?

To protect the network from malware
B. To monitor and control incoming and outgoing network traffic
C. To encrypt data
D. To manage network devices
Answer: B

What is the primary purpose of “cloud computing”?

To provide storage and services over the internet
B. To increase the speed of a local area network
C. To store data on physical servers
D. To provide a connection to the internet
Answer: A

Which of the following is an example of a database management system (DBMS)?

Microsoft Excel
B. Oracle Database
C. Adobe Photoshop
D. Microsoft Word
Answer: B

 

What is the purpose of the “Boot Process” in a computer?

To power on the computer
B. To start the operating system
C. To manage the computer’s memory
D. To connect to the internet
Answer: B

Which of the following is NOT an example of a storage device?

Hard disk
B. Flash drive
C. RAM
D. Optical disk
Answer: C

What is the primary function of an “Internet Service Provider” (ISP)?

To store website data
B. To provide a connection to the internet
C. To protect against cyber threats
D. To host cloud services
Answer: B

Which of the following is an example of a “primary storage” device?

Hard drive
B. RAM
C. USB drive
D. CD
Answer: B

Which protocol is commonly used to transfer files over the internet?

FTP
B. HTTP
C. HTTPS
D. SMTP
Answer: A

What does the term “HTTP” stand for?

HyperText Transfer Protocol
B. HyperText Transmission Protocol
C. Hyper Terminal Text Protocol
D. High Transmission Transfer Protocol
Answer: A

Which of the following is an example of an output device?

Keyboard
B. Mouse
C. Monitor
D. Scanner
Answer: C

What does a “Router” do in a network?

Routes data packets to their destination within a network
B. Converts digital signals to analog signals
C. Stores network data
D. Provides physical connections between devices
Answer: A

Which type of cable is commonly used to connect devices within a local area network (LAN)?

Fiber optic cable
B. USB cable
C. Ethernet cable
D. Coaxial cable
Answer: C

Which of the following is the primary function of a “modem”?

To manage network traffic
B. To connect devices to the internet by converting digital signals into analog signals
C. To provide wireless network connectivity
D. To store files
Answer: B

What is the primary purpose of “encryption” in data security?

To store data on a server
B. To convert data into a secure format to prevent unauthorized access
C. To monitor network traffic
D. To protect physical hardware
Answer: B

Which of the following is NOT an example of software?

Microsoft Word
B. Linux
C. RAM
D. Adobe Photoshop
Answer: C

What is a “proxy server” used for?

To provide network security by acting as an intermediary between users and the internet
B. To manage email communication
C. To store user data
D. To perform calculations
Answer: A

Which of the following is a type of “malware”?

Email
B. Antivirus software
C. Virus
D. Web browser
Answer: C

What is the primary function of “system software”?

To manage hardware and provide a platform for running applications
B. To provide internet access
C. To store user files
D. To manage network communication
Answer: A

Which type of network topology connects all devices to a single central device?

Bus topology
B. Star topology
C. Ring topology
D. Mesh topology
Answer: B

What is the main difference between RAM and ROM?

RAM is volatile, and ROM is non-volatile
B. ROM is used for temporary storage, and RAM is used for permanent storage
C. RAM stores data for long periods, and ROM only stores programs
D. ROM is faster than RAM
Answer: A

Which of the following is a cloud-based storage service?

Dropbox
B. USB flash drive
C. CD
D. External hard drive
Answer: A

Which of the following is an example of a “data breach”?

A computer virus affecting a network
B. Unauthorized access to confidential data
C. An employee losing their work laptop
D. A user deleting a file by accident
Answer: B

What does “IP” in “IP address” stand for?

International Protocol
B. Internet Protocol
C. Internal Processing
D. Internet Path
Answer: B

 

What is the primary function of an operating system?

To store data permanently
B. To manage hardware and software resources
C. To run web browsers
D. To perform calculations
Answer: B

Which of the following devices is responsible for converting digital signals to analog signals?

Modem
B. Router
C. Switch
D. Bridge
Answer: A

What is a “DNS” (Domain Name System) used for?

To map domain names to IP addresses
B. To provide encryption for internet traffic
C. To secure user data from malware
D. To connect local networks
Answer: A

Which of the following is the most commonly used type of memory in computers?

Cache memory
B. Flash memory
C. RAM
D. ROM
Answer: C

What is the main purpose of “data compression”?

To increase the size of files
B. To convert analog signals into digital signals
C. To reduce the size of files for faster transmission
D. To encrypt data
Answer: C

Which of the following is an example of a wireless communication technology?

USB
B. Ethernet
C. Bluetooth
D. Fiber optics
Answer: C

What does the “cloud” refer to in computing?

Remote servers used to store data and run applications
B. A network of connected devices
C. A local server in a home network
D. A backup system on a hard drive
Answer: A

What is the function of an “antivirus” software?

To manage network traffic
B. To protect the computer from viruses and other malware
C. To connect computers to the internet
D. To provide cloud storage
Answer: B

Which of the following is NOT an example of a “web browser”?

Google Chrome
B. Mozilla Firefox
C. Microsoft Excel
D. Safari
Answer: C

Which type of network is used to connect devices within a small geographic area, like a home or office?

WAN (Wide Area Network)
B. LAN (Local Area Network)
C. MAN (Metropolitan Area Network)
D. VPN (Virtual Private Network)
Answer: B

Which of the following is the main function of a “hub” in a network?

To encrypt data
B. To direct data packets to their destinations
C. To filter and manage network traffic
D. To connect multiple devices within a network
Answer: D

What is “cloud storage”?

A type of external hard drive
B. A remote service for storing and managing data over the internet
C. A method for encrypting data
D. A network protocol
Answer: B

Which of the following is a commonly used programming language?

HTML
B. Photoshop
C. Microsoft Excel
D. PowerPoint
Answer: A

What is the main function of a “switch” in a network?

To filter and route data packets
B. To connect multiple devices and manage data traffic
C. To monitor security breaches
D. To store data for future use
Answer: B

What does the acronym “VPN” stand for?

Virtual Private Network
B. Verified Protocol Network
C. Video Protocol Node
D. Virtual Processing Node
Answer: A

Which of the following is an example of a computer’s “user interface”?

The screen display
B. The keyboard and mouse
C. The CPU
D. The network router
Answer: B

What does the acronym “SQL” stand for?

Structured Query Language
B. System Query Language
C. Simple Query Language
D. Secure Query Language
Answer: A

Which of the following is a type of “input device”?

Printer
B. Speaker
C. Microphone
D. Monitor
Answer: C

What is the primary function of an “SSD” (Solid State Drive)?

To store data in a permanent form
B. To manage memory allocation
C. To perform calculations
D. To encrypt data
Answer: A

Which of the following is an example of “system software”?

Microsoft Word
B. Windows Operating System
C. Google Chrome
D. Adobe Photoshop
Answer: B

 

Which of the following is a characteristic of “cloud computing”?

It requires local servers for storage
B. It allows users to store and access data over the internet
C. It can only be accessed on personal computers
D. It is slower than traditional data storage methods
Answer: B

Which of the following devices is used to store data temporarily for the CPU to access quickly?

Hard disk drive
B. RAM
C. Flash drive
D. Optical disk
Answer: B

What does “Wi-Fi” stand for?

Wireless Frequency Identification
B. Wireless Fidelity
C. Wide Field Internet
D. Wireless Functional Interface
Answer: B

What is the purpose of a “firewall” in network security?

To block malware from entering the network
B. To monitor network traffic and prevent unauthorized access
C. To store sensitive data
D. To increase the speed of the internet connection
Answer: B

Which of the following is a cloud service provider?

Amazon Web Services (AWS)
B. IBM
C. Microsoft Office
D. Sony
Answer: A

What is the function of “virtualization” in computing?

It creates a simulated environment for running multiple operating systems on a single machine
B. It increases the speed of the CPU
C. It stores large amounts of data
D. It provides real-time data backup
Answer: A

Which of the following is NOT an example of an “operating system”?

Windows 10
B. macOS
C. Ubuntu
D. Microsoft Word
Answer: D

What is the main function of “BIOS” (Basic Input Output System)?

To manage and control all hardware components during startup
B. To store files and documents
C. To run applications like browsers and games
D. To provide a graphical user interface
Answer: A

Which type of network connects computers within a limited geographic area such as a building?

WAN (Wide Area Network)
B. MAN (Metropolitan Area Network)
C. LAN (Local Area Network)
D. VPN (Virtual Private Network)
Answer: C

What does the term “RAM” stand for?

Read Access Memory
B. Random Access Memory
C. Remote Access Memory
D. Readable Access Memory
Answer: B

Which of the following is an example of a “search engine”?

Google
B. Windows
C. Facebook
D. Skype
Answer: A

What is the primary function of a “network switch”?

To establish internet connections
B. To manage traffic between network devices
C. To store data for future use
D. To provide wireless connectivity
Answer: B

What does “HTTP” stand for?

HyperText Transfer Protocol
B. High Text Transmission Protocol
C. Hyper Transmission Text Protocol
D. High Transmission Text Protocol
Answer: A

Which of the following is an example of a “public key” in encryption?

An email address
B. A unique encryption key used to encrypt messages for a recipient
C. A password stored on a server
D. A physical USB key used to access data
Answer: B

What is a “data backup”?

A software program used for data analysis
B. A process of copying and storing data to prevent loss
C. A network device that manages file storage
D. A type of encryption used to secure data
Answer: B

Which of the following is an example of a “computer virus”?

Malware that corrupts or destroys data
B. A web browser
C. An operating system
D. A cloud storage service
Answer: A

What is the function of an “SSD” (Solid State Drive) in a computer?

It acts as the main processor of the computer
B. It stores data persistently and is faster than traditional hard drives
C. It connects the computer to a network
D. It runs applications like browsers and word processors
Answer: B

Which of the following is an example of “two-factor authentication”?

Using a password and an additional code sent to your phone
B. Using only a password
C. Using a USB drive to log in
D. Using a fingerprint scanner alone
Answer: A

What does the term “browser cache” refer to?

The storage space used by the operating system
B. The temporary storage of web data for faster access in future sessions
C. The location where files are permanently stored on a computer
D. The storage area for email messages
Answer: B

Which of the following is an example of a “network protocol”?

HTML
B. TCP/IP
C. Excel
D. PowerPoint
Answer: B

 

What is the purpose of “encryption” in computer security?

To speed up data processing
B. To convert data into a secure format that can only be read with the correct key
C. To monitor network traffic
D. To store data securely
Answer: B

What does “IP” stand for in networking?

Internet Protocol
B. Internal Processing
C. Input Power
D. Integrated Processor
Answer: A

Which of the following is an example of an “input device”?

Monitor
B. Printer
C. Keyboard
D. Speaker
Answer: C

What is a “router” used for in a computer network?

To store data for future access
B. To connect different networks and route data between them
C. To filter out spam emails
D. To secure a network from external threats
Answer: B

What is the function of a “hard disk drive” (HDD)?

To execute applications
B. To store data permanently
C. To process data in real-time
D. To connect to the internet
Answer: B

Which of the following is the primary function of “RAM”?

To store data permanently
B. To provide temporary storage for data that is actively used by the CPU
C. To handle internet connectivity
D. To run applications
Answer: B

What does “URL” stand for in internet terminology?

Uniform Resource Locator
B. Universal Resource Locator
C. Uniform Readable Link
D. Unsecured Resource Locator
Answer: A

What is the main function of a “web server”?

To store email messages
B. To process data for applications
C. To host websites and deliver web pages to users
D. To provide cloud storage
Answer: C

Which of the following is an example of an “output device”?

Keyboard
B. Monitor
C. Scanner
D. Microphone
Answer: B

Which of the following is the purpose of “data mining”?

To encrypt sensitive data
B. To analyze large datasets for patterns and useful information
C. To back up data to prevent loss
D. To protect a network from external attacks
Answer: B

What is “e-commerce”?

The process of buying and selling goods and services over the internet
B. A method of encrypting online data
C. A type of computer networking
D. A technique for managing online privacy
Answer: A

Which of the following is a primary function of “middleware”?

To encrypt data for secure transmission
B. To provide a communication layer between different software applications
C. To store data permanently
D. To monitor and filter internet traffic
Answer: B

Which type of software is “Microsoft Word”?

System software
B. Utility software
C. Application software
D. Network software
Answer: C

What is “spam” in the context of email communication?

Securely encrypted email
B. Unsolicited and often irrelevant email messages
C. Official company communication
D. A method of sending encrypted emails
Answer: B

What does “HTML” stand for?

HyperText Markup Language
B. High-Tech Machine Language
C. Hyper Transfer Media Link
D. Host Transfer Markup Language
Answer: A

What is a “URL” used for?

To encrypt data over the internet
B. To access websites on the internet
C. To store website data locally
D. To run web applications
Answer: B

Which of the following is a characteristic of “virtual memory”?

It is the permanent storage used for operating systems
B. It extends the available RAM by using a portion of the hard drive
C. It is used only in gaming computers
D. It stores data in a cloud environment
Answer: B

What does “FTP” stand for in internet terms?

File Transfer Protocol
B. File Text Processing
C. Functional Text Processing
D. File Transmission Protocol
Answer: A

Which of the following is used to provide “remote access” to a computer network?

VPN (Virtual Private Network)
B. SSD (Solid State Drive)
C. RAM (Random Access Memory)
D. DNS (Domain Name System)
Answer: A

What is the purpose of “data redundancy” in databases?

To store backup copies of data in multiple locations
B. To increase the speed of data retrieval
C. To prevent unauthorized access to the database
D. To store data in an encrypted format
Answer: A

 

Which of the following is an example of a “database management system” (DBMS)?

Microsoft Word
B. MySQL
C. Adobe Photoshop
D. Google Chrome
Answer: B

What is the purpose of “data normalization” in databases?

To convert data into a readable format
B. To ensure data is stored efficiently and without redundancy
C. To back up data
D. To encrypt data for security
Answer: B

What does “SSL” stand for in internet security?

Secure Storage Layer
B. Secure Socket Layer
C. Simple Security Layer
D. Secure System Link
Answer: B

Which of the following is a type of “secondary storage”?

RAM
B. CPU
C. Hard Disk Drive (HDD)
D. Cache memory
Answer: C

Which of the following is an example of “machine learning”?

A program that automatically updates software
B. A computer learning to recognize patterns in data
C. A computer program that manually solves math problems
D. A computer that interacts with users using a command line
Answer: B

Which of the following is the purpose of a “content management system” (CMS)?

To track network traffic
B. To organize and manage digital content such as websites and blogs
C. To store financial data securely
D. To analyze system performance
Answer: B

Which of the following is a major benefit of using “cloud storage”?

Higher electricity costs
B. Increased need for physical storage space
C. Accessibility of data from any device with an internet connection
D. Faster processing of data on local devices
Answer: C

What is the role of a “web browser”?

To display web pages and enable interaction with websites
B. To create web pages
C. To manage network security
D. To handle email communication
Answer: A

What does “BIOS” stand for in computer systems?

Binary Input Output System
B. Basic Input Output System
C. Basic Internal Operating System
D. Binary Internal Operating System
Answer: B

Which of the following is an example of “open-source software”?

Microsoft Windows
B. Adobe Illustrator
C. Linux
D. Microsoft Word
Answer: C

What is the purpose of “two-factor authentication”?

To store user data securely
B. To require two different types of identification for login security
C. To monitor network traffic
D. To increase processing speed
Answer: B

Which of the following is the primary purpose of “data compression”?

To reduce the size of files for easier storage and transfer
B. To store data securely
C. To process data faster
D. To encrypt data for security
Answer: A

What is the function of “DNS” (Domain Name System)?

To encrypt data for secure transmission
B. To translate domain names into IP addresses
C. To store email messages
D. To manage network traffic
Answer: B

What does “Wi-Fi” technology use to transmit data?

Wired cables
B. Radio waves
C. Infrared signals
D. Optical fibers
Answer: B

Which of the following is an example of “system software”?

Microsoft Excel
B. Linux operating system
C. Adobe Photoshop
D. Google Chrome
Answer: B

Which of the following describes “cloud computing”?

Storing data on a physical disk that is directly connected to a computer
B. Running applications and storing data over the internet
C. Transmitting data using optical fiber cables
D. Encrypting data on local storage devices
Answer: B

What is a “phishing” attack?

A form of email fraud where attackers attempt to steal sensitive information by pretending to be trustworthy entities
B. A method of securing data on a website
C. A technique for compressing data files
D. A type of password encryption
Answer: A

Which of the following best defines “software as a service” (SaaS)?

A software development model in which users must buy software licenses
B. A cloud-based service model where users access software applications over the internet
C. A type of software used for network security
D. A type of database management system
Answer: B

What is a “load balancer” used for in network management?

To speed up internet connections
B. To distribute incoming network traffic across multiple servers to ensure optimal performance
C. To monitor network traffic for malicious activity
D. To back up data to cloud storage
Answer: B

 

What is the primary function of an “operating system”?

To run applications
B. To manage hardware resources and provide a user interface
C. To store data securely
D. To protect against cyberattacks
Answer: B

What does “HTTP” stand for in internet terminology?

HyperText Transfer Protocol
B. Hyper Transfer Text Protocol
C. High-Tech Transfer Protocol
D. HyperTerminal Transport Protocol
Answer: A

Which of the following is the main function of a “firewall”?

To encrypt data during transmission
B. To monitor network traffic for malicious activities
C. To create backup copies of important files
D. To manage user accounts and passwords
Answer: B

Which of the following is an example of a “non-volatile memory”?

RAM
B. Cache memory
C. Hard disk drive
D. CPU register
Answer: C

What is the role of “CPU” (Central Processing Unit) in a computer system?

To store data permanently
B. To perform calculations and execute instructions
C. To handle internet connectivity
D. To manage power usage
Answer: B

Which of the following is an example of “cloud storage”?

A local external hard drive
B. Google Drive
C. A CD-ROM
D. A USB flash drive
Answer: B

Which of the following is the primary function of “cache memory”?

To store large files for long-term use
B. To speed up data access by temporarily storing frequently accessed data
C. To manage the power supply of the system
D. To provide network security
Answer: B

What does “BIOS” do during the computer startup process?

It installs the operating system
B. It initializes hardware components and performs the boot-up sequence
C. It connects to the internet
D. It stores user data securely
Answer: B

Which of the following is the primary use of “public key encryption”?

To provide high-speed data transmission
B. To encrypt and decrypt data using a pair of keys—one public and one private
C. To filter internet traffic
D. To back up files securely
Answer: B

What is “Big Data”?

Data stored in a small database
B. A set of data so large or complex that traditional data processing methods cannot handle it
C. A type of file compression
D. A method of encrypting files
Answer: B

Which of the following is an example of “programming language”?

HTML
B. Linux
C. Microsoft Word
D. Google Chrome
Answer: A

What does “VPN” stand for and what is its primary purpose?

Virtual Protocol Network, used for secure data encryption
B. Virtual Private Network, used for secure connections over the internet
C. Video Processing Network, used for media content management
D. Virtual Processing Node, used for system load balancing
Answer: B

What does “SSD” stand for and how is it different from an HDD?

Solid State Drive, faster and more durable than Hard Disk Drives
B. Secure Storage Drive, less secure than Hard Disk Drives
C. System Storage Drive, slower than Hard Disk Drives
D. Secondary Storage Drive, provides better encryption than Hard Disk Drives
Answer: A

Which of the following is a feature of “open-source software”?

It is free to use, and users can modify the source code
B. It is protected by strict copyrights and cannot be modified
C. It requires users to pay for updates
D. It can only be used by developers
Answer: A

What is the purpose of an “API” (Application Programming Interface)?

To protect data during transmission
B. To allow different software applications to communicate with each other
C. To increase the processing speed of applications
D. To store data in an encrypted format
Answer: B

What is a “botnet”?

A type of encryption for network security
B. A collection of devices infected with malware, controlled remotely for malicious purposes
C. A method of securing data during transmission
D. A type of network protocol used for communication
Answer: B

What is “data mining”?

The process of storing data in a secure format
B. The process of analyzing large datasets to extract useful patterns and information
C. The process of creating backups of data
D. The process of encrypting data for security
Answer: B

Which of the following is an example of a “network topology”?

Google Drive
B. Star
C. Python
D. Google Chrome
Answer: B

What is the main function of a “server” in a computer network?

To create software applications
B. To store and manage data and resources that can be accessed by clients
C. To monitor network traffic
D. To act as a backup device for data
Answer: B

Which of the following is a key feature of “Bluetooth” technology?

High-speed internet access
B. Wireless communication over short distances
C. Secure file storage
D. Long-distance data transmission
Answer: B