- 1. Information is data that has been organized and structured to provide meaning and value. It plays a crucial role in decision-making, problem-solving, and knowledge-sharing. In today's digital world, information is abundant and easily accessible through various channels such as the internet, databases, and digital media. It can take many forms, including text, images, audio, and video. Effectively managing and utilizing information is essential for individuals, organizations, and society to stay informed, innovate, and thrive in a fast-paced and interconnected world.
What is data that is organized and processed to have meaning?
A) Information B) Wisdom C) Communication D) Knowledge
- 2. What is the term used to describe the protection of information assets from unauthorized access, use, disclosure, disruption, modification, or destruction?
A) Network security B) Data privacy C) Cybersecurity D) Information security
- 3. Which term refers to the process of encoding information in a way that only authorized parties can access it?
A) Encryption B) Decoding C) Decryption D) Encoding
- 4. What does the term 'metadata' refer to in the context of information?
A) Data about data B) Structured data C) Real-time data D) Data encryption
- 5. What type of information describes the characteristics of data?
A) Metadata B) Content C) Document D) Index
- 6. Which term refers to the process of converting data into an understandable format?
A) Data encoding B) Data extraction C) Data visualization D) Data transformation
- 7. Which of the following is a common method for storing and organizing information?
A) Database B) Presentation slide C) Spreadsheet D) Word document
- 8. What does the term 'information overload' refer to?
A) Lack of information B) Excessive amount of information C) Access to limited information D) Disorganized information
- 9. What is the term used to describe the process of combining data from multiple sources?
A) Data integration B) Data aggregation C) Data analysis D) Data consolidation
- 10. Which term refers to the practice of ensuring that information is available when needed?
A) Information availability B) Information retrieval C) Information security D) Information storage
- 11. Which term refers to the process of identifying patterns and trends in data?
A) Data mining B) Data processing C) Data visualization D) Data analysis
- 12. Which term refers to the process of verifying the accuracy and reliability of data?
A) Data integration B) Data validation C) Data mining D) Data cleansing
- 13. Which term refers to the practice of protecting sensitive information from unauthorized access?
A) Data breach B) Data encryption C) Data masking D) Data security
- 14. What is the term used to describe the process of converting data into a standard format?
A) Data validation B) Data normalization C) Data aggregation D) Data transformation
- 15. Which term refers to the practice of ensuring data is consistent and accurate across systems?
A) Data encryption B) Data integrity C) Data validation D) Data cleaning
- 16. Which type of software analyzes and interprets data to uncover patterns and insights?
A) Antivirus software B) Business intelligence (BI) software C) Graphic design software D) Word processing software
- 17. Which of the following is a characteristic of big data?
A) Security B) Volume C) Accuracy D) Accessibility
- 18. Which of the following organizations is responsible for defining standards for the World Wide Web?
A) IEEE B) W3C C) IETF D) ISO
- 19. Which type of data storage device has no moving parts and provides faster data access?
A) CD-ROM B) Solid State Drive (SSD) C) Floppy Disk D) Hard Disk Drive (HDD)
- 20. Which of the following is an example of unstructured data?
A) Social media posts B) Database records C) Email messages D) Spreadsheets
- 21. Which term describes the act of filtering or restricting access to certain information on the internet?
A) Decryption B) Encryption C) Firewall D) Censorship
- 22. Which of the following is an example of a social media platform?
A) Facebook B) Adobe Photoshop C) Excel Spreadsheet D) Microsoft Word
- 23. Which technology allows the transmission of data over long distances using cables or light pulses?
A) Wi-Fi B) Fiber optics C) Bluetooth D) Copper wires
- 24. What does the acronym 'WWW' stand for?
A) Wireless Web Watch B) Web Warrior Workstation C) World Wide Web D) We Will Win
- 25. What is an IP address?
A) A password for logging into a website B) A unique numerical label assigned to a device connected to a computer network C) A type of computer virus D) An email address
- 26. What does HTML stand for?
A) Hypertext Markup Language B) High-Tech Modern Link C) Home Tool Management Language D) Hyperlink Text Messaging Language
- 27. In the context of email, what does 'CC' stand for?
A) Carbon Copy B) Contact Coordinator C) Copy Content D) Computer Code
- 28. Which of the following is a popular web hosting service?
A) Amazon B) GoDaddy C) Uber D) Netflix
- 29. What is the main advantage of cloud computing in terms of storing and accessing information?
A) Slow access speed B) Limited storage space C) Scalability and flexibility D) High cost
- 30. What does the abbreviation 'VPN' stand for?
A) Virtual Private Network B) Very Personal Notebook C) Voice Programming Network D) Visual Privacy Notification
- 31. What does the abbreviation URL stand for?
A) United Resource Language B) Underground Routing Link C) Uniform Resource Locator D) User Registry Language
- 32. What technology is used to transmit data over telephone lines?
A) Modem B) Wi-Fi C) Ethernet D) Bluetooth
- 33. What is the file format for an electronic document that can contain text, images, and hyperlinks?
A) PDF B) ZIP C) MP3 D) JPEG
- 34. What is the term for a collection of related web pages typically identified with a common domain name?
A) Forum B) Blog C) Ebook D) Website
- 35. What is the term used for a set of rules for exchanging electronic information?
A) Hyperlink B) Syntax C) Protocol D) Algorithm
- 36. What is the term for software designed to block unauthorized access while permitting authorized communications?
A) Firewall B) Malware C) Encryption D) Phishing
- 37. Which of the following is a method of authentication that requires users to provide two pieces of unique information?
A) Two-factor authentication B) Token authentication C) Single sign-on D) Biometric authentication
- 38. What is the protocol used for transmitting web pages over the internet?
A) SMTP B) HTTP C) FTP D) TCP
- 39. What does the abbreviation 'LAN' stand for?
A) Long Antenna Network B) Local Area Network C) Limited Access Node D) Large Access Network
- 40. Which of the following is an example of a database management system (DBMS)?
A) HTML B) Python C) CSS D) MySQL
|