A) Printer B) Switch C) Router D) Hub
A) Monitor B) Google Drive C) RAM D) Keyboard
A) Extranet B) Internet C) Intranet D) Web browser
A) Connecting computers in a network B) Sending instant messages C) Installing antivirus software D) Trick used to steal personal information online
A) Linux B) Windows C) TikTok D) Excel
A) Antivirus B) Firewall C) Browser D) Compiler
A) RAM B) Memory card C) Flash drive D) Hard disk
A) Send messages immediately through the internet B) Install software programs C) Repair computers D) Scan documents
A) PAN B) LAN C) WAN D) MAN
A) Yahoo B) Google C) Bing D) Chrome
A) Formatting B) Editing C) Downloading D) Backup
A) Only lowercase letters B) Short and simple C) Combination of letters, numbers, and symbols D) Only numbers
A) WAN B) MAN C) LAN D) PAN
A) Virus B) Worm C) Trojan cow D) Trojan horse
A) E-commerce B) Video conferencing C) E-learning D) E-banking
A) Scanner B) Plotter C) Printer D) Firewall
A) White hat hacker B) Black hat hacker C) Grey hat hacker D) System analyst
A) Install software B) Search for information on the internet C) Design websites D) Repair networks
A) Secondary storage B) Cache memory C) CPU register D) RAM
A) Business promotion B) Learning opportunities C) Privacy risks D) Networking |