A) A software program for editing documents B) A physical device used for storing data C) A type of computer virus D) A global network that connects millions of computers and other electronic devices around the world.
A) Sharing personal information B) Hacking into someone's account C) Spreading viruses intentionally D) Communication
A) Harassing people online B) Education and research C) Online discrimination D) Bullying online
A) Social anticipation B) Social networking C) Downloading copyrighted content D) Spreading malware
A) Not sure B) False C) Not really D) True
A) Easy money B) Easy jobs C) Easy communication D) Easy food
A) Access to people's personal information B) Access to information C) Guaranteed weight loss just by browsing D) Instant fluency in any language
A) Universal access to accurate medical diagnosis B) Online education C) Online anonymity D) Complete immunity from cyber threats
A) No B) I don't think so C) Yes D) Maybe
A) I don't know B) Yes C) I don't think so D) No
A) Social media has made everyone feel isolated B) The internet causes distance between family members C) Online learning has decreased student engagement D) Cyber crime and hacking
A) Online shopping has reduced customer spending B) Addiction and time wasting C) The internet leads to boredom D) The internet has led to a decline in misinformation
A) Spreading false information B) It causes a significant decrease in screen time C) Improved mental health for users D) Leads to increased physical activity among users
A) Privacy issues B) Secondary issues C) Primary issues D) Parental issues
A) I don't think so B) No C) Lies D) Yes
A) It is feeling safe at home. B) It refers to the practice and precautions that help protect people when using the internet. C) It means living right D) It is being safe at work
A) It is your mood while using the internet. B) It is the proper and acceptable behavior when using the internet. C) It is being disrespectful online D) It is being rude online
A) Keep personal information private. B) Download attachments from unknown emails C) Share personal information publicly on social media D) Use a public wifi for sensitive transactions
A) Use easy passwords for your social media accounts B) Click on every link that looks interesting C) Avoid talking to strangers online D) Sharing your password with friends
A) Beware of scams and fake websites B) Visit any website that works on your phone C) Use any website you see D) Click on any links you receive
A) Word processing is a software used for playing music and videos. B) Word processing is the use of a computer and software application to create, edit, format, store and print text documents. C) Word processing means sending files from one computer to another through the internet. D) Word processing is the act of repairing damaged computer hardware.
A) Hardware debugging B) Video rendering C) Documents D) CPU formatting
A) Network routing B) Automatic Internet Backup Synchronization C) Text editing D) Document compression management
A) Spell check and grammar check B) Hardware-Integrated Font Calibration C) Network-Based Text Transmission Protocols D) Central processing optimization
A) Word processing helps repair damaged computer hardware. B) Word processing increases a computer’s storage capacity. C) Word processing improves the speed of a computer’s internet connection. D) Word processing saves time and effort.
A) Word processing increases the lifespan of a computer’s battery. B) Word processing protects a computer from viruses. C) Word processing allows a computer to function without an operating system. D) Word processing makes editing faster.
A) Word processing helps increase the computer’s RAM size. B) Word processing speeds up the processor and makes the computer run faster. C) Word processing enables a computer to connect to Wi-Fi automatically. D) Neat and professional output.
A) Computer programming is fixing broken computer screens and keyboards. B) Computer programming means using a computer only to browse the internet and watch videos. C) Computer programming is the process of painting and designing computer hardware. D) It is the process of writing instructions that a computer can understand and execute.
A) To increase the computer’s battery life. B) To solve problems using the computer C) To repair and replace faulty computer hardware. D) To clean viruses and malware from the computer.
A) To create software applications B) Problem solving C) Boosts economic growth D) To clean dust and maintain the computer’s physical components.
A) To clean a computer’s internal components B) To store, process and analyze data C) To increase the physical speed of a computer’s processor D) To make humans smarter instantly
A) Algorithm B) Values C) Variables D) Integer overflow
A) Bitflow analysis B) Flowchart C) Algorithmic procrastination D) Data shadowing
A) Debugging B) Version control C) Programming language D) API(Application programming interface)
A) Code error B) Global error C) Syntax error D) Object error
A) Natural error B) illogical error C) Typographical error D) Logical error
A) Runtime error B) Operating error C) Execute error D) Thinking error
A) Immediate coding B) Problem definition. C) Deployment without review D) Testing only at the end
A) Testing is optional B) Analysis C) Design after coding D) Deployment without maintenance
A) Skipping analysis B) Final deployment without user feedback C) Testing before design D) Coding |