A) Printer B) Switch C) Hub D) Router
A) Google Drive B) Keyboard C) RAM D) Monitor
A) Internet B) Extranet C) Intranet D) Web browser
A) Connecting computers in a network B) Trick used to steal personal information online C) Installing antivirus software D) Sending instant messages
A) TikTok B) Excel C) Linux D) Windows
A) Compiler B) Antivirus C) Firewall D) Browser
A) Memory card B) Hard disk C) Flash drive D) RAM
A) Send messages immediately through the internet B) Scan documents C) Install software programs D) Repair computers
A) MAN B) PAN C) WAN D) LAN
A) Bing B) Chrome C) Google D) Yahoo
A) Backup B) Editing C) Downloading D) Formatting
A) Only lowercase letters B) Only numbers C) Short and simple D) Combination of letters, numbers, and symbols
A) WAN B) LAN C) MAN D) PAN
A) Trojan cow B) Virus C) Worm D) Trojan horse
A) E-banking B) E-commerce C) Video conferencing D) E-learning
A) Scanner B) Plotter C) Firewall D) Printer
A) System analyst B) White hat hacker C) Grey hat hacker D) Black hat hacker
A) Install software B) Repair networks C) Search for information on the internet D) Design websites
A) CPU register B) Cache memory C) Secondary storage D) RAM
A) Privacy risks B) Networking C) Learning opportunities D) Business promotion |