Types of Information
Which of the following is NOT a type of information?
A) Descriptive
B) Prescriptive
C) Random
D) Predictive
Answer: C) Random
Prescriptive information is used to:
A) Describe past events
B) Make recommendations
C) Predict future occurrences
D) Diagnose issues
Answer: B) Make recommendations
Which type of information helps in forecasting future trends?
A) Descriptive
B) Predictive
C) Prescriptive
D) Diagnostic
Answer: B) Predictive
2. Importance of Information Processing
Information processing involves the following EXCEPT:
A) Storage
B) Manipulation
C) Deletion
D) Dissemination
Answer: C) Deletion
Which of these is an application of information processing in healthcare?
A) Digital patient records
B) Manual book-keeping
C) Handwritten prescriptions
D) Filing cabinets
Answer: A) Digital patient records
One major reason businesses rely on information processing is:
A) To reduce profits
B) To improve decision-making
C) To increase expenses
D) To avoid data storage
Answer: B) To improve decision-making
3. How Computers Work
Which part of the computer is responsible for processing data?
A) Monitor
B) Keyboard
C) Central Processing Unit (CPU)
D) Printer
Answer: C) Central Processing Unit (CPU)
The device that sends information into the computer is called:
A) Output device
B) Input device
C) Storage device
D) Processing unit
Answer: B) Input device
Which of these is NOT an output device?
A) Monitor
B) Printer
C) Mouse
D) Speaker
Answer: C) Mouse
4. Historical Development of Computers
Who is known as the father of the computer?
A) Alan Turing
B) John von Neumann
C) Charles Babbage
D) Bill Gates
Answer: C) Charles Babbage
Which computer generation used vacuum tubes?
A) First
B) Second
C) Third
D) Fourth
Answer: A) First
Which generation of computers introduced microprocessors?
A) Second
B) Third
C) Fourth
D) Fifth
Answer: C) Fourth
5. Types of Computers
Which of the following is the most powerful type of computer?
A) Supercomputer
B) Minicomputer
C) Microcomputer
D) Workstation
Answer: A) Supercomputer
A personal computer (PC) is an example of a:
A) Supercomputer
B) Mainframe
C) Microcomputer
D) Minicomputer
Answer: C) Microcomputer
Mainframe computers are mainly used in:
A) Homes
B) Large organizations
C) Personal tasks
D) Schools only
Answer: B) Large organizations
6. Computer Hardware
The physical components of a computer are called:
A) Software
B) Hardware
C) Firmware
D) Data
Answer: B) Hardware
Which of these is an example of a storage device?
A) RAM
B) ROM
C) Hard disk
D) CPU
Answer: C) Hard disk
Which of these is NOT an input device?
A) Keyboard
B) Mouse
C) Monitor
D) Scanner
Answer: C) Monitor
7. Computer Storage Devices
What is the primary function of RAM?
A) Permanent storage
B) Temporary memory for active processes
C) Display graphics
D) Store only audio files
Answer: B) Temporary memory for active processes
ROM stands for:
A) Read Online Memory
B) Random Operating Memory
C) Read-Only Memory
D) Rotational Output Module
Answer: C) Read-Only Memory
Which of these is a secondary storage device?
A) RAM
B) Hard disk
C) Cache memory
D) Registers
Answer: B) Hard disk
8. Software and Operating Systems
The system software that manages computer hardware is called:
A) Antivirus
B) Web browser
C) Operating System
D) Word processor
Answer: C) Operating System
An example of application software is:
A) Windows
B) Microsoft Word
C) Linux
D) macOS
Answer: B) Microsoft Word
Which of these is NOT an example of system software?
A) Compiler
B) Utility programs
C) Windows
D) Photoshop
Answer: D) Photoshop
9. Internet and Networking
What does URL stand for?
A) Universal Resource Location
B) Uniform Resource Locator
C) Unique Resource Link
D) User Reference Label
Answer: B) Uniform Resource Locator
Which protocol is used for sending emails?
A) FTP
B) HTTP
C) SMTP
D) IP
Answer: C) SMTP
Which of these is an example of a web browser?
A) Google Chrome
B) Microsoft Word
C) Windows Explorer
D) File Manager
Answer: A) Google Chrome
10. Cybersecurity and Computer Ethics
A malicious software designed to damage a computer system is called:
A) Firewall
B) Virus
C) Cloud computing
D) Algorithm
Answer: B) Virus
A strong password should contain:
A) Only lowercase letters
B) A mix of letters, numbers, and symbols
C) Only numbers
D) A simple word
Answer: B) A mix of letters, numbers, and symbols
Which of the following is an unethical computer practice?
A) Using antivirus software
B) Hacking into another person's computer
C) Updating your system regularly
D) Creating backups
Answer: B) Hacking into another person's computer
SECTION 1: Types of Information
What is the importance of information processing in society?
1. A. Reduces the need for technology
2. B. Helps in decision-making ✅
3. C. Eliminates human involvement
4. D. Slows down communication
Which of the following is NOT a type of information?
1. A. Textual
2. B. Graphical
3. C. Emotional ✅
4. D. Numerical
SECTION 2: Information Processing and Its Role in Society
What does information processing involve?
1. A. Storing and retrieving information
2. B. Collecting and organizing data
3. C. Transforming data into useful information
4. D. All of the above ✅
The main purpose of information processing is to:
1. A. Replace humans in decision-making
2. B. Improve the efficiency of operations ✅
3. C. Increase paperwork in offices
4. D. Slow down communication flow
SECTION 3: Historical Development of Computers
Who is regarded as the "Father of Computers"?
1. A. Steve Jobs
2. B. Charles Babbage ✅
3. C. Alan Turing
4. D. Bill Gates
What is the earliest known computing device?
1. A. ENIAC
2. B. Abacus ✅
3. C. Punch card machine
4. D. IBM PC
Which generation of computers used vacuum tubes?
1. A. First ✅
2. B. Second
3. C. Third
4. D. Fourth
The major improvement in the third generation of computers was:
1. A. Use of transistors
2. B. Use of integrated circuits (ICs) ✅
3. C. Use of vacuum tubes
4. D. Use of AI technology
SECTION 4: Computer Hardware and Peripheral Devices
Which of the following is NOT an input device?
1. A. Keyboard
2. B. Mouse
3. C. Printer ✅
4. D. Scanner
The component that houses the CPU, RAM, and storage devices is called:
1. A. Monitor
2. B. Motherboard ✅
3. C. Keyboard
4. D. Mouse
What does the CPU stand for?
1. A. Central Processing Unit ✅
2. B. Central Peripheral Unit
3. C. Computer Personal Unit
4. D. Central Power Unit
Which of these is an output device?
1. A. Mouse
2. B. Speaker ✅
3. C. Joystick
4. D. Scanner
What is the function of an external hard drive?
1. A. To input data
2. B. To store data externally ✅
3. C. To process information
4. D. To display images
SECTION 5: Computer Storage Devices
Which of these is a primary storage device?
1. A. Hard drive
2. B. RAM ✅
3. C. USB flash drive
4. D. DVD
ROM stands for:
1. A. Read Only Memory ✅
2. B. Random Only Memory
3. C. Read Operating Memory
4. D. Random Open Memory
What is the main difference between RAM and ROM?
1. A. RAM is temporary; ROM is permanent ✅
2. B. ROM is faster than RAM
3. C. RAM can only read data
4. D. ROM is volatile memory
Which storage device has the largest capacity?
1. A. CD-ROM
2. B. DVD
3. C. Blu-ray Disc
4. D. External Hard Drive ✅
SECTION 6: How the Computer Works
The functional parts of a computer include:
1. A. Input, process, output, storage ✅
2. B. Monitor, CPU, printer, RAM
3. C. Mouse, keyboard, speaker, USB
4. D. None of the above
The brain of the computer is:
1. A. Monitor
2. B. CPU ✅
3. C. RAM
4. D. Keyboard
Which of these is responsible for executing program instructions?
1. A. RAM
2. B. Processor (CPU) ✅
3. C. Hard drive
4. D. Monitor
More Objective Questions with Answers
SECTION 7: Classification of Computers
1. Computers are classified based on which of the following?
A. Size and function ✅
B. Color and speed
C. Shape and weight
D. Brand and model
1. Which of the following is NOT a type of computer based on size?
A. Supercomputer
B. Mainframe computer
C. Hybrid computer ✅
D. Minicomputer
1. A computer that is used for complex scientific calculations is called:
A. Microcomputer
B. Minicomputer
C. Supercomputer ✅
D. Laptop
1. Which of the following computers is mostly used by banks for transactions?
A. Supercomputer
B. Minicomputer
C. Mainframe computer ✅
D. Embedded computer
1. A microcomputer is also known as a:
A. Personal computer (PC) ✅
B. Mainframe computer
C. Supercomputer
D. Minicomputer
SECTION 8: Operating Systems and Software
1. What is the primary function of an operating system?
A. To process user data
B. To manage computer hardware and software ✅
C. To perform calculations
D. To store data permanently
1. Which of the following is NOT an operating system?
A. Windows
B. Linux
C. Microsoft Office ✅
D. macOS
1. The two main types of software are:
A. System software and application software ✅
B. Hardware and firmware
C. Windows and MacOS
D. RAM and ROM
1. What is an example of application software?
A. Microsoft Word ✅
B. Windows 10
C. Linux Kernel
D. BIOS
1. Which of the following is NOT an example of system software?
A. macOS
B. Android OS
C. Photoshop ✅
D. Windows 11
SECTION 9: Computer Networks and the Internet
1. What does LAN stand for?
A. Large Area Network
B. Local Area Network ✅
C. Logical Access Node
D. Long Access Network
1. Which type of network covers the largest geographical area?
A. LAN
B. MAN
C. WAN ✅
D. PAN
1. What is the full meaning of Wi-Fi?
A. Wireless Fidelity ✅
B. Wired Fidelity
C. Wide Fiber
D. Wireless Finder
1. The internet is an example of a:
A. LAN
B. WAN ✅
C. MAN
D. PAN
1. A device that connects multiple networks together is called a:
A. Switch
B. Router ✅
C. Modem
D. Hub
SECTION 10: Data Representation in Computers
1. The smallest unit of data in a computer is called a:
A. Byte
B. Bit ✅
C. Kilobyte
D. Megabyte
1. One byte consists of how many bits?
A. 2
B. 4
C. 8 ✅
D. 16
1. Which numbering system is used by computers?
A. Decimal
B. Octal
C. Hexadecimal
D. Binary ✅
1. The binary number system consists of which two digits?
A. 0 and 1 ✅
B. 1 and 2
C. 0 and 9
D. 2 and 3
1. What is the decimal equivalent of the binary number 1010?
A. 8
B. 9
C. 10 ✅
D. 11
SECTION 11: Cybersecurity and Computer Ethics
What is the practice of protecting computer systems from cyber threats called?
A. Cybersecurity ✅
B. Data Processing
C. Information Management
D. Computer Networking
Which of the following is an example of malicious software?
A. Antivirus
B. Firewall
C. Trojan Horse ✅
D. Router
Phishing is a method used by hackers to:
A. Physically damage computers
B. Trick users into giving sensitive information ✅
C. Improve network security
D. Speed up internet connections
What is the main function of an antivirus program?
A. To create computer viruses
B. To delete files from a computer
C. To detect and remove malicious software ✅
D. To increase internet speed
A strong password should contain:
A. Only lowercase letters
B. A mix of letters, numbers, and symbols ✅
C. Just numbers
D. Your birth date
SECTION 12: Emerging Technologies
Artificial Intelligence (AI) refers to:
A. Robots replacing humans
B. Machines that mimic human intelligence ✅
C. A new type of programming language
D. A type of computer virus
Virtual Reality (VR) is used in:
A. Gaming and simulations ✅
B. Data processing
C. Antivirus protection
D. Power management
What is the name of the technology that enables objects to connect to the internet?
A. Cloud computing
B. Augmented reality
C. Internet of Things (IoT) ✅
D. Machine Learning
Blockchain technology is commonly associated with:
A. Online banking
B. Cryptocurrency transactions ✅
C. Internet browsing
D. Word processing
What does 5G technology improve?
A. Data storage capacity
B. Wireless network speed and efficiency ✅
C. Processor performance
D. Cybersecurity threats
SECTION 13: Computer Storage and Memory
1. Which of the following is a type of primary memory?
A. Hard disk
B. RAM ✅
C. CD-ROM
D. USB drive
ROM stands for:
A. Read Only Memory ✅
B. Random Output Memory
C. Run-On Memory
D. Rotational Optical Memory
What happens to data stored in RAM when the computer is turned off?
A. It is permanently saved
B. It is erased ✅
C. It is transferred to ROM
D. It moves to the hard drive
Which of the following is an example of secondary storage?
A. Cache memory
B. SSD (Solid State Drive) ✅
C. RAM
D. CPU registers
The speed of a hard drive is measured in:
A. GHz
B. RPM (Revolutions Per Minute) ✅
C. Megabytes per second
D. Hertz
SECTION 14: Input and Output Devices
Which of the following is an input device?
A. Monitor
B. Printer
C. Keyboard ✅
D. Speaker
A device used to capture physical documents and convert them into digital format
is called a:
A. Printer
B. Scanner ✅
C. Speaker
D. Projector
Which device is primarily used for video conferencing?
A. Webcam ✅
B. Microphone
C. Keyboard
D. Joystick
Which of these is NOT an example of an output device?
A. Monitor
B. Projector
C. Speaker
D. Mouse ✅
What type of printer uses toner instead of ink?
A. Inkjet printer
B. Dot matrix printer
C. Laser printer ✅
D. Thermal printer
SECTION 15: Computer Architecture and Components
The CPU is also known as:
A. Central Processing Unit ✅
B. Central Program Unit
C. Core Programming Utility
D. Central Peripheral Unit
The part of the CPU responsible for performing arithmetic and logical operations
is called:
A. Control Unit (CU)
B. Arithmetic Logic Unit (ALU) ✅
C. Memory Unit
D. Cache memory
The function of the Control Unit (CU) in the CPU is to:
A. Perform calculations
B. Execute arithmetic operations
C. Direct the flow of instructions ✅
D. Store data permanently
What does BIOS stand for?
A. Basic Input Output System ✅
B. Binary Integrated Operating System
C. Base Information on Software
D. Bitwise Input Optimization System
What type of memory is used to temporarily store frequently accessed data?
A. Hard drive
B. RAM
C. Cache memory ✅
D. ROM
SECTION 16: Number Systems and Conversions
The decimal number 15 is represented in binary as:
A. 1110
B. 1111 ✅
C. 1010
D. 1101
The hexadecimal equivalent of the decimal number 255 is:
A. FF ✅
B. F0
C. A1
D. 1F
What is the octal equivalent of the binary number 101010?
A. 42
B. 52 ✅
C. 24
D. 62
A nibble consists of how many bits?
A. 2
B. 4 ✅
C. 8
D. 16
Which numbering system is base 16?
A. Decimal
B. Binary
C. Octal
D. Hexadecimal ✅
SECTION 17: Computer Security and Privacy
1. A firewall is used to:
A. Speed up internet connections
B. Protect a network from unauthorized access ✅
C. Remove computer viruses
D. Store passwords
What is spyware?
A. Software used for security testing
B. A program that secretly monitors user activities ✅
C. A type of antivirus software
D. A hacking technique
What is the best way to protect sensitive information online?
A. Use a strong password and two-factor authentication ✅
B. Share passwords with trusted friends
C. Store passwords in a notepad file
D. Use a short and simple password
Which of the following is an example of two-factor authentication (2FA)?
A. Entering a username and password
B. Using fingerprint recognition and a password ✅
C. Logging in with just a password
D. Using only a PIN code
A cybercriminal who uses hacking skills for ethical purposes is called a:
A. Black hat hacker
B. White hat hacker ✅
C. Grey hat hacker
D. Script kiddie
SECTION 18: Networking and Internet
1. What does LAN stand for?
A. Local Area Network ✅
B. Large Automated Network
C. Long Access Node
D. Linked Active Network
1. Which device is used to connect multiple networks together?
A. Switch
B. Router ✅
C. Hub
D. Modem
1. What does IP stand for in networking?
A. Internet Provider
B. Internal Protocol
C. Internet Protocol ✅
D. Instant Processing
1. Which of the following is NOT an example of a web browser?
A. Google Chrome
B. Mozilla Firefox
C. Microsoft Word ✅
D. Safari
1. What is the full meaning of HTTP?
A. Hypertext Transfer Protocol ✅
B. High Text Transfer Process
C. Hyperlink and Text Transmission Protocol
D. Hyper Transfer and Text Programming
1. Which protocol is used to send emails?
A. HTTP
B. FTP
C. SMTP ✅
D. POP3
1. The unique address assigned to a computer on a network is called:
A. MAC address
B. IP address ✅
C. URL
D. DNS
1. What does DNS stand for?
A. Data Network System
B. Domain Name System ✅
C. Dynamic Network Security
D. Direct Node Synchronization
1. A VPN is used for:
A. Blocking ads on websites
B. Secure and private browsing ✅
C. Increasing internet speed
D. Downloading large files faster
1. The function of a modem is to:
A. Convert digital signals to analog and vice versa ✅
B. Store network data
C. Assign IP addresses to devices
D. Act as a firewall
SECTION 19: Software and Operating Systems
1. Which of the following is an operating system?
A. MS Word
B. Windows 10 ✅
C. Google Chrome
D. Python
1. The software that manages computer hardware is called:
A. Application software
B. System software ✅
C. Utility software
D. Middleware
1. Which of these is an example of an open-source operating system?
A. Windows 11
B. macOS
C. Linux ✅
D. iOS
1. What does GUI stand for?
A. Graphical User Interface ✅
B. General Utility Input
C. Graphic Upload Integration
D. Global Utility Index
1. Which of these is an example of an application software?
A. Windows 10
B. Google Chrome ✅
C. BIOS
D. File Explorer
1. A file extension of .xls or .xlsx is associated with:
A. MS Word
B. MS Excel ✅
C. MS PowerPoint
D. MS Access
1. Which of the following is NOT a function of an operating system?
A. Managing hardware resources
B. Running application software
C. Writing and editing documents ✅
D. Handling user input and output
1. What is the default file extension of MS Word documents?
A. .txt
B. .docx ✅
C. .pdf
D. .pptx
1. Which key combination is used to force quit an application on Windows?
A. Ctrl + P
B. Alt + F4 ✅
C. Shift + Tab
D. Ctrl + X
1. What is the purpose of defragmentation in an operating system?
A. To free up RAM space
B. To remove viruses
C. To organize fragmented files for better performance ✅
D. To install new updates
SECTION 20: Database Management Systems
1. What does SQL stand for?
A. Structured Query Language ✅
B. System Quality Logic
C. Sequential Query List
D. Standard Query Layout
1. Which of the following is a database management system?
A. MySQL ✅
B. MS Paint
C. Adobe Photoshop
D. Google Chrome
1. What type of database structure is based on tables and relations?
A. Hierarchical database
B. Relational database ✅
C. Network database
D. Object-oriented database
1. Which SQL command is used to retrieve data from a database?
A. DELETE
B. UPDATE
C. SELECT ✅
D. INSERT
1. What is the primary key in a database?
A. A unique identifier for each record ✅
B. A duplicate key used for backup
C. A secret password to access data
D. A key that connects tables together
SECTION 21: Cybersecurity and Data Protection
1. What is the main goal of cybersecurity?
A. To increase internet speed
B. To protect systems and networks from attacks ✅
C. To create computer viruses
D. To improve software design
1. A strong password should include:
A. Only lowercase letters
B. A mix of letters, numbers, and symbols ✅
C. Your birthdate
D. Only uppercase letters
1. What is phishing?
A. A cyberattack where hackers trick users into revealing personal
information ✅
B. A method of encrypting files
C. A way to improve network security
D. A system for protecting hardware devices
1. Which of the following is NOT a type of malware?
A. Trojan horse
B. Firewall ✅
C. Ransomware
D. Spyware
1. A firewall is used to:
A. Filter incoming and outgoing network traffic ✅
B. Create backup files
C. Speed up computer performance
D. Manage software updates
1. What does VPN stand for?
A. Virtual Private Network ✅
B. Virtual Public Node
C. Verified Personal Network
D. Virtual Packet Number
1. What is the purpose of two-factor authentication (2FA)?
A. To allow multiple users to access an account
B. To add an extra layer of security ✅
C. To automatically update passwords
D. To speed up login processes
1. A DDoS attack is used to:
A. Encrypt user data for protection
B. Overload a system with excessive traffic ✅
C. Prevent software updates
D. Scan for malware
1. What is social engineering in cybersecurity?
A. Hacking software applications
B. Manipulating people to reveal confidential information ✅
C. Developing social media security tools
D. A method of encrypting network traffic
1. Which of the following is a safe online practice?
A. Clicking on unknown email links
B. Using public Wi-Fi without a VPN
C. Keeping software updated regularly ✅
D. Using the same password for all accounts
SECTION 22: Cloud Computing and Storage
1. What is cloud computing?
A. Storing data in physical hard drives
B. Delivering computing services over the internet ✅
C. A type of high-speed processor
D. A method of encrypting data
1. Which of the following is an example of a cloud storage service?
A. Microsoft Word
B. Google Drive ✅
C. VLC Media Player
D. WinRAR
1. The benefit of using cloud computing is:
A. Limited storage capacity
B. Easy remote access to data ✅
C. Requires expensive hardware
D. Data cannot be backed up
1. What is the full meaning of IaaS in cloud computing?
A. Internet and Application Services
B. Infrastructure as a Service ✅
C. Internet and Automated Security
D. Integrated Application Software
1. Which of the following is NOT a cloud service provider?
A. Amazon Web Services (AWS)
B. Google Cloud
C. Oracle Cloud
D. Adobe Photoshop ✅
1. What does SaaS stand for?
A. Software and Application Security
B. Software as a Service ✅
C. Secure Automated System
D. System and Application Software
1. Which cloud model provides virtualized computing resources over the
internet?
A. PaaS
B. IaaS ✅
C. SaaS
D. VPN
1. Cloud storage services store data in:
A. Local hard drives
B. Physical CDs and DVDs
C. Remote data centers ✅
D. Computer RAM
1. The benefit of hybrid cloud computing is:
A. It combines private and public cloud features ✅
B. It is only accessible on mobile devices
C. It has unlimited storage
D. It does not require an internet connection
1. What is the disadvantage of cloud computing?
A. It requires an internet connection to access data ✅
B. It is completely free to use
C. It cannot be used for business purposes
D. It is only available for personal use
SECTION 23: Networking and Internet Technologies
1. What does IP stand for in networking?
A. Internet Protocol ✅
B. Internal Processing
C. Information Pathway
D. Intelligent Program
1. What is the purpose of a router in a network?
A. To store data permanently
B. To connect multiple networks together ✅
C. To provide security against malware
D. To process programming commands
1. Which of the following is NOT a type of network?
A. LAN
B. WAN
C. HTTP ✅
D. MAN
1. What does DNS stand for?
A. Digital Network Service
B. Domain Name System ✅
C. Data Navigation System
D. Distributed Network Server
1. What is the function of a DNS server?
A. It translates domain names into IP addresses ✅
B. It connects computers to Wi-Fi
C. It encrypts files for security
D. It provides cloud storage
1. What type of network is commonly used in small offices and homes?
A. WAN
B. LAN ✅
C. MAN
D. VPN
1. The protocol used for sending emails is:
A. FTP
B. SMTP ✅
C. HTTP
D. DHCP
1. Which of the following is a wireless networking technology?
A. Ethernet
B. Wi-Fi ✅
C. USB
D. SATA
1. The default gateway in networking refers to:
A. The main path for sending data to external networks ✅
B. The physical connection to a computer
C. A type of firewall
D. A computer's storage location
1. The speed of an internet connection is measured in:
A. Megabytes
B. Gigahertz
C. Bits per second ✅
D. Pixels
SECTION 24: Software Development and Programming
1. Which of the following is a programming language?
A. HTML
B. Python ✅
C. Windows
D. Excel
1. What is source code?
A. The compiled version of a program
B. The original code written by a programmer ✅
C. A database storage system
D. A type of network protocol
1. What does IDE stand for in programming?
A. Internet Data Exchange
B. Integrated Development Environment ✅
C. Intelligent Data Execution
D. Internal Device Emulator
1. Which of these is a markup language?
A. C++
B. Java
C. HTML ✅
D. Python
1. What is the primary function of a compiler?
A. To execute JavaScript code in a browser
B. To convert source code into machine code ✅
C. To check network connections
D. To store user credentials
1. What type of loop executes at least once before checking the condition?
A. While loop
B. Do-while loop ✅
C. For loop
D. Infinite loop
1. What is a variable in programming?
A. A fixed value in a program
B. A storage location for data ✅
C. A type of software error
D. A network device
1. What does SQL stand for?
A. Standard Query Level
B. Structured Query Language ✅
C. Software Query Logic
D. Secure Question Language
1. Which SQL statement is used to retrieve data from a database?
A. INSERT
B. UPDATE
C. DELETE
D. SELECT ✅
1. In object-oriented programming (OOP), what is an object?
A. A blueprint for creating a program
B. An instance of a class ✅
C. A function inside a program
D. A special type of loop
SECTION 25: Artificial Intelligence and Machine Learning
1. What is Artificial Intelligence (AI)?
A. A type of computer virus
B. A branch of computer science focused on creating intelligent machines
✅
C. A method of speeding up software installation
D. A network protocol
1. What is machine learning (ML)?
A. A subset of AI that allows machines to learn from data ✅
B. A programming language
C. A method of securing networks
D. A system for storing large files
1. Which of the following is an example of AI in daily life?
A. Handwritten letters
B. Email spam filters ✅
C. Manual data entry
D. Paper-based filing systems
1. What is the purpose of natural language processing (NLP)?
A. To enable computers to understand human language ✅
B. To increase internet speed
C. To enhance computer hardware performance
D. To develop new programming languages
1. What is the full meaning of ANN in AI?
A. Advanced Neural Network
B. Artificial Neural Network ✅
C. Automated Network Node
D. Artificial Number Notation
1. What type of AI system can learn from experience?
A. Rule-based system
B. Machine Learning system ✅
C. Static Algorithm
D. Wired Network System
1. In AI, what is a chatbot?
A. A type of hardware device
B. A computer program designed to simulate human conversation ✅
C. A method for encrypting messages
D. A video conferencing tool
1. What is the main purpose of deep learning?
A. To create network connections
B. To build models that can recognize patterns in large datasets ✅
C. To install software applications
D. To improve battery life in mobile phones
1. AI-powered image recognition is commonly used in:
A. Online banking
B. Facial recognition systems ✅
C. Cloud storage services
D. Spreadsheet applications
1. What is an example of weak AI?
A. Siri or Google Assistant ✅
B. A self-aware robot
C. A machine that thinks like a human
D. A general-purpose AI with full human intelligence
SECTION 26: Cybersecurity and Data Protection
1. What does VPN stand for?
A. Virtual Personal Network
B. Virtual Private Network ✅
C. Verified Protected Network
D. Virtual Processing Node
1. What is the main purpose of a firewall?
A. To block unauthorized access to a network ✅
B. To increase internet speed
C. To store backup data
D. To provide free internet access
1. Which of the following is a cyber attack?
A. Data encryption
B. Phishing ✅
C. Software installation
D. Cloud computing
1. A strong password should include:
A. Only letters
B. A combination of letters, numbers, and symbols ✅
C. Just numbers
D. Simple words for easy recall
1. What does two-factor authentication (2FA) do?
A. It allows users to access websites faster
B. It adds an extra layer of security during login ✅
C. It automatically updates passwords
D. It increases internet bandwidth
1. Malware is a term used for:
A. A computer programming tool
B. Harmful software like viruses and ransomware ✅
C. A database storage method
D. A type of hardware device
1. What is phishing?
A. A method used to hack passwords through guessing
B. A cyber attack where attackers trick users into revealing sensitive
information ✅
C. A way of speeding up internet connections
D. A type of firewall security
1. What type of software prevents and detects computer viruses?
A. Firewall
B. Antivirus software ✅
C. Cloud storage
D. Programming IDE
1. Which of the following is an example of encryption?
A. Converting plain text into a secret code ✅
B. Deleting unwanted files
C. Installing a new operating system
D. Sending emails without attachments
1. What does HTTPS stand for?
A. Hyperlink Text Processing System
B. Hypertext Transfer Protocol Secure ✅
C. High Transmission Protocol System
D. Hyper Tool Protection System
SECTION 27: Operating Systems and System Software
1. Which of the following is an operating system?
A. Microsoft Word
B. Linux ✅
C. Google Chrome
D. HTML
1. What is the primary function of an operating system?
A. To manage hardware and software resources ✅
B. To create and edit documents
C. To browse the internet
D. To design websites
1. Which of these is NOT an operating system?
A. Windows
B. macOS
C. Python ✅
D. Ubuntu
1. What does GUI stand for?
A. Graphical User Interface ✅
B. General User Interaction
C. Global Usage Identifier
D. General Utility Input
1. Which of the following operating systems is open-source?
A. Windows
B. macOS
C. Linux ✅
D. iOS
1. What does BIOS stand for in computing?
A. Binary Input Output System
B. Basic Input Output System ✅
C. Basic Internet Operating System
D. Backup Integrated Operating Software
1. What is the purpose of the task manager in Windows?
A. To monitor and manage system performance ✅
B. To design graphics
C. To store web pages
D. To manage programming languages
1. What is multitasking in an operating system?
A. Running multiple applications at the same time ✅
B. Using different programming languages
C. Encrypting and decrypting data
D. Storing multiple files in the cloud
1. The kernel of an operating system is responsible for:
A. Managing system resources ✅
B. Displaying web pages
C. Running Microsoft Word
D. Formatting documents
1. What is the function of the Recycle Bin in Windows?
A. To delete files permanently
B. To store deleted files temporarily ✅
C. To install new software
D. To save backup files automatically
SECTION 28: Database Management Systems (DBMS)
1. What does DBMS stand for?
A. Data Backup Management Software
B. Database Management System ✅
C. Dynamic Binary Memory Storage
D. Digital Backup Management System
1. Which of these is a relational database management system (RDBMS)?
A. MySQL ✅
B. Windows
C. HTML
D. PowerPoint
1. What is a primary key in a database?
A. A unique identifier for each record in a table ✅
B. A type of password for a database
C. A method of encrypting database information
D. A special type of programming language
1. What does SQL stand for?
A. Software Query Language
B. Structured Query Language ✅
C. Standard Quality Language
D. Server Query List
1. The command used to delete a table in SQL is:
A. REMOVE TABLE
B. DELETE TABLE
C. DROP TABLE ✅
D. ERASE TABLE
1. What is the function of the JOIN statement in SQL?
A. It combines rows from two or more tables based on a related column ✅
B. It removes duplicate records
C. It deletes rows from a database
D. It creates a new table
1. Which of the following is an example of a database?
A. Google Docs
B. Microsoft Excel
C. Oracle ✅
D. Adobe Photoshop
1. In SQL, which clause is used to filter records?
A. SORT
B. FILTER
C. WHERE ✅
D. SEARCH
1. A foreign key in a database is used to:
A. Define relationships between tables ✅
B. Store passwords
C. Increase database size
D. Change table structures
1. What does NoSQL stand for?
A. Non-Standard Query Language
B. Not Only SQL ✅
C. Numerical SQL
D. Network Oriented SQL
SECTION 29: Networking and Internet Technologies
1. What does IP stand for in networking?
A. Internet Protocol ✅
B. Internal Processing
C. Interconnected Program
D. Internet Provider
1. Which of the following is an example of a wired network connection?
A. Wi-Fi
B. Bluetooth
C. Ethernet ✅
D. 5G
1. What is the function of a router in a network?
A. To store web pages
B. To connect multiple networks and direct data traffic ✅
C. To increase processor speed
D. To manage operating systems
1. Which of these protocols is used for sending emails?
A. FTP
B. SMTP ✅
C. HTTP
D. SNMP
1. What does DNS stand for?
A. Data Network Server
B. Dynamic Name Service
C. Domain Name System ✅
D. Digital Networking Setup
1. A MAC address is used to identify:
A. A device on a network ✅
B. A Wi-Fi signal strength
C. A computer’s IP address
D. A website domain name
1. The speed of data transmission is measured in:
A. Kilobytes
B. Megahertz
C. Bits per second (bps) ✅
D. Gigabytes
1. What is bandwidth in networking?
A. The amount of data that can be transmitted over a network in a given
time ✅
B. The frequency of an internet signal
C. The number of users connected to a network
D. The length of a network cable
1. The device that connects a local network to the internet is called a:
A. Switch
B. Hub
C. Modem ✅
D. Firewall
1. Which of the following is NOT a type of network topology?
A. Star
B. Mesh
C. Tree
D. Loop ✅
SECTION 30: Programming and Software Development
1. What does IDE stand for in programming?
A. Internet Data Exchange
B. Integrated Development Environment ✅
C. Interactive Data Encryption
D. Internal Digital Execution
1. Which of the following is a high-level programming language?
A. Java ✅
B. Assembly
C. Machine Code
D. Binary
1. The syntax of a programming language refers to:
A. The way statements must be written ✅
B. The speed of program execution
C. The security level of a program
D. The memory size of a program
1. What does HTML stand for?
A. Hypertext Transfer Markup Language
B. Hypertext Markup Language ✅
C. High-Tech Markup Language
D. Hyperlink Text Management Language
1. Which of these is an interpreted programming language?
A. Java
B. Python ✅
C. C++
D. Assembly
1. In object-oriented programming, an object is:
A. A collection of data and methods that act on the data ✅
B. A type of database storage method
C. A type of hardware component
D. A software installation tool
1. The C programming language was developed by:
A. James Gosling
B. Dennis Ritchie ✅
C. Guido van Rossum
D. Linus Torvalds
1. A loop in programming is used for:
A. Storing data in a file
B. Repeating a set of instructions multiple times ✅
C. Creating a database table
D. Encrypting passwords
1. What is the function of a compiler?
A. To convert source code into machine code ✅
B. To store programming files
C. To speed up internet access
D. To create graphical interfaces
1. Which of the following is an example of a scripting language?
A. Java
B. Python ✅
C. C++
D. Assembly