A) Router B) Hub C) Printer D) Switch
A) Google Drive B) Keyboard C) RAM D) Monitor
A) Extranet B) Internet C) Intranet D) Web browser
A) Trick used to steal personal information online B) Installing antivirus software C) Connecting computers in a network D) Sending instant messages
A) Linux B) Excel C) Windows D) TikTok
A) Antivirus B) Firewall C) Compiler D) Browser
A) Flash drive B) RAM C) Hard disk D) Memory card
A) Install software programs B) Send messages immediately through the internet C) Scan documents D) Repair computers
A) LAN B) WAN C) PAN D) MAN
A) Bing B) Chrome C) Google D) Yahoo
A) Formatting B) Editing C) Downloading D) Backup
A) Short and simple B) Only numbers C) Combination of letters, numbers, and symbols D) Only lowercase letters
A) MAN B) WAN C) PAN D) LAN
A) Virus B) Worm C) Trojan cow D) Trojan horse
A) E-commerce B) Video conferencing C) E-learning D) E-banking
A) Printer B) Firewall C) Plotter D) Scanner
A) System analyst B) White hat hacker C) Black hat hacker D) Grey hat hacker
A) Repair networks B) Search for information on the internet C) Install software D) Design websites
A) CPU register B) RAM C) Secondary storage D) Cache memory
A) Business promotion B) Networking C) Privacy risks D) Learning opportunities |