What does CPU stand for? a) Central Processing Unit b) Central Program Unit c) Computer Personal Unit d) Centralized Processing Unit Answer: a) Central Processing Unit
What is the primary function of an operating system? a) To manage hardware and software resources b) To provide internet access c) To run applications only d) To increase system speed Answer: a) To manage hardware and software resources
What is RAM used for in a computer? a) Permanent storage b) Temporary storage while tasks are being processed c) To store the operating system only d) To connect to peripheral devices Answer: b) Temporary storage while tasks are being processed
Which of the following is an example of system software? a) Microsoft Word b) Adobe Photoshop c) Windows 10 d) Google Chrome Answer: c) Windows 10
What is a computer network? a) A group of computers that are physically connected b) A collection of software applications c) A system for managing databases d) A program that analyzes data Answer: a) A group of computers that are physically connected
Which of the following is not a programming language? a) Python b) HTML c) SQL d) Microsoft Office Answer: d) Microsoft Office
What does “GUI” stand for? a) General User Interface b) Graphical User Interface c) Guided User Interface d) Global User Interface Answer: b) Graphical User Interface
What is the purpose of an algorithm? a) To execute commands b) To process data c) To provide a step-by-step solution to a problem d) To store data Answer: c) To provide a step-by-step solution to a problem
Which of the following represents a valid variable name in programming? a) 1stVariable b) first-variable c) firstVariable d) first variable Answer: c) firstVariable
What does the term “byte” refer to? a) A unit of processing speed b) A unit of data storage c) A unit of memory d) A unit of time Answer: b) A unit of data storage
Which of the following is an input device? a) Monitor b) Keyboard c) Printer d) Speaker Answer: b) Keyboard
What is the primary purpose of a database? a) To store data in an organized manner b) To run applications c) To manage hardware resources d) To protect data from unauthorized access Answer: a) To store data in an organized manner
What is an example of a web browser? a) Microsoft Word b) Windows Explorer c) Google Chrome d) Adobe Reader Answer: c) Google Chrome
Which of the following describes cloud computing? a) Storing data on local drives b) Accessing and storing data over the internet c) Using computers in a network d) Running applications on desktop computers Answer: b) Accessing and storing data over the internet
What is the function of a firewall? a) To speed up internet connection b) To protect a network from unauthorized access c) To store files d) To manage software updates Answer: b) To protect a network from unauthorized access
What does HTML stand for? a) Hypertext Markup Language b) High-Level Text Markup Language c) Hyperlink and Text Markup Language d) Hypertext Multi-language Answer: a) Hypertext Markup Language
Which of the following is a characteristic of open-source software? a) It is always free to use. b) Its source code is available for anyone to modify. c) It is maintained by a single organization. d) It cannot be distributed. Answer: b) Its source code is available for anyone to modify.
What is the function of a compiler? a) To run code b) To convert source code into machine code c) To store code d) To edit code Answer: b) To convert source code into machine code
Which component of a computer is considered the “brain”? a) Hard drive b) RAM c) CPU d) Motherboard Answer: c) CPU
What is a primary advantage of using spreadsheets? a) They are only used for calculations. b) They can only handle small amounts of data. c) They allow for easy data analysis and visualization. d) They require no training to use. Answer: c) They allow for easy data analysis and visualization.
What does the term “malware” refer to? a) Software designed to improve performance b) Software that is harmful to computers c) Software that is free to use d) Software that enhances security Answer: b) Software that is harmful to computers
Which of the following is not a function of an operating system? a) Managing files b) Compiling programs c) Managing hardware resources d) Running applications Answer: b) Compiling programs
What does “URL” stand for? a) Uniform Resource Locator b) Uniform Resource Link c) Universal Resource Locator d) Universal Resource Link Answer: a) Uniform Resource Locator
Which of the following is an example of system software? a) Microsoft Excel b) Ubuntu c) Google Docs d) Mozilla Firefox Answer: b) Ubuntu
What is the main purpose of a search engine? a) To store data b) To provide access to the internet c) To help users find information on the web d) To protect websites from threats Answer: c) To help users find information on the web
Which of the following describes an algorithm? a) A set of instructions for solving a problem b) A programming language c) A type of data structure d) A software application Answer: a) A set of instructions for solving a problem
What does “IP” stand for in networking? a) Internet Protocol b) Internet Project c) Internal Protocol d) Information Packet Answer: a) Internet Protocol
Which of the following is an example of secondary storage? a) RAM b) CPU c) Hard Drive d) Cache Answer: c) Hard Drive
What is the primary role of a network router? a) To connect devices to the internet b) To store data c) To manage user accounts d) To protect against malware Answer: a) To connect devices to the internet
Which of the following programming constructs allows for decision-making? a) Loop b) Variable c) Conditional statement d) Function Answer: c) Conditional statement
What is the purpose of backup software? a) To increase system speed b) To protect data by creating copies c) To run applications faster d) To delete unnecessary files Answer: b) To protect data by creating copies
Which of the following is a characteristic of a client-server model? a) All devices are equal in processing power. b) Clients request services from servers. c) It does not require a network. d) It is limited to local operations. Answer: b) Clients request services from servers.
What does “SQL” stand for? a) Standard Query Language b) Structured Query Language c) Simple Query Language d) Sequential Query Language Answer: b) Structured Query Language
Which of the following is a valid HTML element? a) b) [head] c) {head} d) Answer: a)
What is the function of a keyboard? a) To display output b) To store data c) To input data d) To connect to the internet Answer: c) To input data
Which of the following protocols is used for secure data transmission? a) HTTP b) FTP c) HTTPS d) SMTP Answer: c) HTTPS
What is a disadvantage of using open-source software? a) Lack of customization b) Potential for security vulnerabilities c) Higher costs d) Limited user community Answer: b) Potential for security vulnerabilities
Which of the following is an example of application software? a) Windows OS b) Microsoft PowerPoint c) Linux d) BIOS Answer: b) Microsoft PowerPoint
What is the purpose of a software license? a) To allow unrestricted use of software b) To define how software can be used and distributed c) To increase the cost of software d) To prevent software from being updated Answer: b) To define how software can be used and distributed
What is the function of a motherboard in a computer? a) To process data b) To connect all components together c) To store information d) To provide power to the CPU Answer: b) To connect all components together
Which of the following best describes phishing? a) A legitimate marketing strategy b) A method for securing passwords c) A fraudulent attempt to obtain sensitive information d) A process of data encryption Answer: c) A fraudulent attempt to obtain sensitive information
What is the term for the physical parts of a computer? a) Software b) Hardware c) Firmware d) Middleware Answer: b) Hardware
What is the primary purpose of using an antivirus program? a) To increase internet speed b) To protect against malware and viruses c) To enhance graphics d) To improve battery life Answer: b) To protect against malware and viruses
What does the term “bytecode” refer to? a) The code that is executed directly by the CPU b) A lower-level representation of code that can be executed by a virtual machine c) The source code of a program d) A type of data encryption Answer: b) A lower-level representation of code that can be executed by a virtual machine
Which of the following describes the purpose of a cache memory? a) To provide long-term storage b) To increase the speed of data access c) To protect against data loss d) To manage peripheral devices Answer: b) To increase the speed of data access
What is the role of the command line interface (CLI)? a) To provide a graphical user interface b) To allow users to interact with the system using text commands c) To improve system performance d) To manage network settings Answer: b) To allow users to interact with the system using text commands
What is a URL shortener? a) A tool for creating longer URLs b) A service that converts long URLs into shorter, more manageable links c) A method for encoding URLs d) A type of web browser Answer: b) A service that converts long URLs into shorter, more manageable links
What is the primary purpose of a data model? a) To visualize complex data structures b) To define how data is organized and accessed c) To enhance system performance d) To encrypt sensitive data Answer: b) To define how data is organized and accessed
Which of the following is a commonly used file format for images? a) .exe b) .jpg c) .txt d) .mp4 Answer: b) .jpg
What does the acronym “BIOS” stand for? a) Basic Input Output System b) Binary Input Output System c) Basic Integrated Operating System d) Binary Integrated Operating System Answer: a) Basic Input Output System