A) Printer B) Hub C) Switch D) Router
A) Keyboard B) Google Drive C) RAM D) Monitor
A) Web browser B) Internet C) Intranet D) Extranet
A) Connecting computers in a network B) Trick used to steal personal information online C) Installing antivirus software D) Sending instant messages
A) TikTok B) Excel C) Linux D) Windows
A) Firewall B) Antivirus C) Compiler D) Browser
A) Flash drive B) Hard disk C) RAM D) Memory card
A) Repair computers B) Send messages immediately through the internet C) Install software programs D) Scan documents
A) WAN B) MAN C) LAN D) PAN
A) Bing B) Chrome C) Yahoo D) Google
A) Backup B) Editing C) Downloading D) Formatting
A) Short and simple B) Combination of letters, numbers, and symbols C) Only lowercase letters D) Only numbers
A) WAN B) PAN C) LAN D) MAN
A) Trojan horse B) Virus C) Worm D) Trojan cow
A) Video conferencing B) E-commerce C) E-banking D) E-learning
A) Plotter B) Scanner C) Printer D) Firewall
A) Grey hat hacker B) White hat hacker C) Black hat hacker D) System analyst
A) Search for information on the internet B) Repair networks C) Design websites D) Install software
A) RAM B) CPU register C) Cache memory D) Secondary storage
A) Networking B) Privacy risks C) Business promotion D) Learning opportunities |