Practice Questions
Practice Questions
Lecture 1 Questions
Question 1: What is the primary purpose of an operating system in a computer?
• A) The keyboard
• B) The monitor
• C) The microprocessor
• D) The mouse
• Correct Answer: C) The microprocessor
Question 4: Which type of memory loses its content when the power is turned
off?
• A) Hard Disk
• B) Solid-State Drive (SSD)
• C) Read-Only Memory (ROM)
• D) Random Access Memory (RAM)
• Correct Answer: D) Random Access Memory (RAM)
• A) RAM
• B) The CPU
• C) Hard disk
• D) The motherboard
• Correct Answer: C) Hard disk
Question 8: What does the term "embedded operating system" refer to?
Question 11: What is the primary function of the World Wide Web?
Question 12: What technology is essential for connecting different devices over
the Internet?
• A) USB cables
• B) Bluetooth
• C) Network Protocols
• D) HDMI
• Correct Answer: C) Network Protocols
Question 14: Which device is NOT considered part of the Internet of Things
(IoT)?
• A) A smart refrigerator
• B) A desktop calculator
• C) A fitness tracker
• D) An autonomous vehicle
• Correct Answer: B) A desktop calculator
Question 15: Who typically assumes the role of developing and maintaining
websites and web resources?
• A) Network Administrator
• B) Software Engineer
• C) Webmaster
• D) Technical Writer
• Correct Answer: C) Webmaster
Question 16: What project is credited with laying the foundational work for the
Internet in 1969?
• A) Microsoft Windows
• B) The World Wide Web Consortium (W3C)
• C) ARPANET
• D) IBM PC Development
• Correct Answer: C) ARPANET
Question 17: Which device is a primary tool for accessing Internet resources?
• A) Calculator
• B) Browser
• C) Printer
• D) Fax Machine
• Correct Answer: B) Browser
Question 18: What is NOT a common type of file found on the Web?
• A) Document File
• B) Worksheet File
• C) Database File
• D) Hardware File
• Correct Answer: D) Hardware File
Question 19: What concept involves the sharing of information via a network like
the Internet?
• A) Connectivity
• B) Isolation
• C) Segmentation
• D) Centralization
• Correct Answer: A) Connectivity
Question 20: Which of the following is not a force of technology mentioned in the
presentation?
• A) Cloud Computing
• B) Wireless Technology
• C) Print Media
• D) Internet of Things (IoT)
• Correct Answer: C) Print Media
Lecture 2 Questions
Question 1: What is the primary function of connectivity in terms of computing?
• A) A corporate intranet
• B) A home Wi-Fi network
• C) The Internet
• D) A school's computer lab network
• Correct Answer: C) The Internet
Question 3: What has cloud computing enabled users to access more of?
• A) Physical computers
• B) Internet resources
• C) Paper documents
• D) Local storage devices
• Correct Answer: B) Internet resources
Question 9: The part of a URL that specifies the location or address of a resource
is known as the:
• A) Protocol
• B) Domain name
• C) Browser
• D) Operating system
• Correct Answer: B) Domain name
• A) Web-based email
• B) Client-based email
• C) Cloud-based email
• D) Server-based email
• Correct Answer: B) Client-based email
Question 11: Which term describes the interconnected mesh of computers and
data lines known as the Internet?
• A) The Web
• B) The Cloud
• C) Network
• D) The Mesh
• Correct Answer: C) Network
Question 12: What year was the World Wide Web introduced?
• A) 1969
• B) 1985
• C) 1991
• D) 2000
• Correct Answer: C) 1991
Question 14: What is the primary protocol used for web traffic?
• A) FTP
• B) HTTP
• C) SMTP
• D) HTTPS
• Correct Answer: D) HTTPS
• A) Commercial entities.
• B) Educational institutions.
• C) Government entities.
• D) Network services.
• Correct Answer: C) Government entities.
• A) Client-based email can only send messages, while web-based can send and receive.
• B) Client-based email requires software installation on a computer.
• C) Web-based email cannot handle attachments.
• D) Client-based email is less secure than web-based email.
• Correct Answer: B) Client-based email requires software installation on a computer.
• A) Cyberbullying prevention.
• B) Email marketing regulations.
• C) Social media privacy.
• D) Online shopping security.
• Correct Answer: B) Email marketing regulations.
Question 20: What does GUI stand for, and what does it allow users to do?
• A) General User Interface; it allows users to input general commands in any application.
• B) Graphical User Interface; it allows users to interact with electronic devices through
graphical icons.
• C) Guided User Interaction; it guides users through complex software setups.
• D) Global Unification Interface; it standardizes software interfaces globally.
• Correct Answer: B) Graphical User Interface; it allows users to interact with electronic
devices through graphical icons.
Lecture 3 Questions
Question 1: What is the primary role of an operating system (OS)?
• A) Windows
• B) Android
• C) macOS
• D) Linux
• Correct Answer: C) macOS
• A) Rebooting
• B) Booting
• C) Initializing
• D) Waking up
• Correct Answer: B) Booting
Question 7: Which feature of an operating system provides a visual interface
with icons, windows, and menus?
• A) Proprietary software
• B) Open-source software
• C) Freeware
• D) Shareware
• Correct Answer: B) Open-source software
• A) Command-Line Interface
• B) Common Language Interface
• C) Computer-Linked Interface
• D) Command-Linked Interface
• Correct Answer: A) Command-Line Interface
• A) Windows 10
• B) macOS
• C) Linux
• D) iOS
• Correct Answer: C) Linux
Question 11: Which term describes the process of starting a computer that has
been turned off?
• A) Warm boot
• B) Cold boot
• C) Reboot
• D) Quick start
• Correct Answer: B) Cold boot
Question 12: What does "GUI" stand for in the context of operating systems?
• A) General User Interface
• B) Graphical User Interface
• C) Generic Utility Interface
• D) Guided User Interaction
• Correct Answer: B) Graphical User Interface
• A) Multitasking
• B) Gesture Control
• C) Scalability and reliability
• D) Icons and pointers
• Correct Answer: C) Scalability and reliability
Question 14: What is the primary difference between desktop and mobile
operating systems?
Question 15: Which operating system is known for its open-source nature?
• A) Windows
• B) macOS
• C) Linux
• D) iOS
• Correct Answer: C) Linux
Question 16: What does the term "booting" refer to in the context of operating
systems?
• A) Menus
• B) Spell check
• C) Windows
• D) Icons
• Correct Answer: B) Spell check
Question 20: Which operating system feature allows for the execution of multiple
applications at the same time?
• A) Booting
• B) Multitasking
• C) Gesture Control
• D) File Management
• Correct Answer: B) Multitasking
Lecture 4 Questions
Question 1: What are web bugs used for?
• A) Web browsers
• B) Office software
• C) Anti-Spyware programs
• D) Operating Systems
• Correct Answer: C) Anti-Spyware programs
• A) Phishing emails
• B) Smishing
• C) Vishing
• D) Fishing
• Correct Answer: A) Phishing emails
Question 7: What action should you take if you receive a phishing email?
Question 8: Which attack intercepts and relays messages between two parties
without their knowledge?
• A) SQL Injection
• B) Man-in-the-middle Attack
• C) Cross-Site Scripting (XSS)
• D) Buffer Overflow
• Correct Answer: B) Man-in-the-middle Attack
Question 12: Which term refers to software that hides its presence while
providing unauthorized access to a computer?
• A) Adware
• B) Rootkit
• C) Ransomware
• D) Firewall
• Correct Answer: B) Rootkit
Question 13: What does a Buffer Overflow attack exploit?
Question 14: What action can help protect against the exploitation of unpatched
software vulnerabilities?
Question 16: Why are strong, unique passwords important for online security?
Question 17: What is the recommended response if you suspect a message is part
of a smishing attack?
Question 22: How can organizations best protect themselves against ransomware
attacks?
• A) SQL Injection
• B) Buffer Overflow
• C) Phishing
• D) Cross-Site Scripting (XSS)
• Correct Answer: C) Phishing
Question 24: True or False: A backdoor in a computer system allows for
bypassing normal authentication processes.
Question 25: Which type of attack involves exploiting a vulnerability before it's
known to the vendor?
• A) Denial of Service
• B) Man-in-the-middle
• C) Zero-day exploit
• D) Advanced Persistent Threat
• Correct Answer: C) Zero-day exploit
• A) Virus
• B) Worm
• C) Trojan Horse
• D) Ransomware
• Correct Answer: C) Trojan Horse
Question 28: Which method is NOT a way to perform and automate important
security tasks?
• A) Security Suites
• B) Password Managers
• C) Manual software updates
• D) Firewalls
• Correct Answer: C) Manual software updates
Question 30: True or False: Anti-Spyware programs are designed to detect web
bugs and monitoring software.
Lecture 5 Questions
Question 1: What is the primary use of Microsoft Word?
• A) Spreadsheet calculations
• B) Database management
• C) Word processing
• D) Presentation design
• Correct Answer: C) Word processing
Question 2: Where can you find the minimize, maximize/restore, and close
buttons in Microsoft Word?
• A) Status bar
• B) Ribbon
• C) Title bar
• D) Quick Access Toolbar
• Correct Answer: C) Title bar
Question 3: What does the Quick Access Toolbar in Microsoft Word contain by
default?
• A) Menu Bar
• B) Toolbars
• C) Ribbon
• D) Status Bar
• Correct Answer: C) Ribbon
Question 5: The 'File Tab' menu contains commands most commonly associated
with what?
• A) Text formatting
• B) The file
• C) Adding elements to the document
• D) Reviewing the document
• Correct Answer: B) The file
• A) Spreadsheets
• B) Presentations
• C) Databases
• D) Documents
• Correct Answer: D) Documents
Question 7: In Microsoft Word, what happens when you click the minimize
button?
Question 8: How can you restore a minimized document to its original shape and
size in Microsoft Word?
Question 9: What file extensions are typically associated with Microsoft Word
documents?
• A) .xls or .xlsx
• B) .ppt or .pptx
• C) .doc or .docx
• D) .mdb
• Correct Answer: C) .doc or .docx
Question 10: How can you customize the Ribbon in Microsoft Word?
Question 11: What is the purpose of the 'Print Layout' view in Microsoft Word?
• A) To format text
• B) To design web pages
• C) To visualize how a document will look when printed
• D) To simplify document sharing
• Correct Answer: C) To visualize how a document will look when printed
• A) Web Layout
• B) Draft
• C) Outline
• D) Read Mode
• Correct Answer: A) Web Layout
Question 13: How can you save a Microsoft Word document as a PDF?
Question 14: Where is the Ruler located in the Microsoft Word document
window?
Question 16: How can you open an existing document in Microsoft Word?
Question 17: In Microsoft Word, what does the 'Save As' function allow you to
do?
Question 19: Which feature allows you to create a duplicate of the selected text in
Microsoft Word?
21
Question 20: What is the primary function of the 'Undo'
command in Microsoft Word's Quick Access Toolbar?
Question 21: How can you adjust the margins of a document in Microsoft Word?
Question 22: Which of the following is NOT a tab found in the Microsoft Word
Ribbon?
• A) File
• B) Edit
• C) Review
• D) References
• Correct Answer: B) Edit
Question 23: In Microsoft Word, how do you insert a hyperlink into your
document?
Question 24: Which feature in Word allows you to see how your document will
look on the web?
22
Question 25: How can you remove the background of an
image inserted into a Word document?
Question 26: What is the shortcut key to save a document in Microsoft Word?
• A) Ctrl + S
• B) Ctrl + N
• C) Ctrl + C
• D) Ctrl + P
• Correct Answer: A) Ctrl + S
Question 27: Which function do you use to check the spelling and grammar in
your Word document?
Question 28: How can you increase the indent of a paragraph in Microsoft
Word?
Question 29: Which tab in Microsoft Word would you use to insert a table into
your document?
• A) File
• B) Insert
• C) Layout
• D) References
• Correct Answer: B) Insert
23
Question 30: What is the purpose of the 'Track
Changes' feature in Microsoft Word?
Question 31: How do you change the line spacing in a Word document?
Question 32: Which feature in Word helps you insert a pre-designed cover page
quickly?
Question 33: How can you protect a document in Word from being edited?
Question 35: In Word, how can you add a caption to a figure or table?
24
• A) References > Insert Caption
• B) Insert > Text > Caption
• C) Layout > Caption
• D) Design > Add Caption
• Correct Answer: A) References > Insert Caption
Question 36: What is the shortcut for opening the 'Find' dialog box in Word?
• A) Ctrl + F
• B) Ctrl + H
• C) Ctrl + G
• D) Ctrl + B
• Correct Answer: A) Ctrl + F
Question 38: Which of the following options allows you to change the theme of
your document in Word?
Question 39: How can you view the word count of your document in Word?
Question 40: What is the purpose of the 'Mail Merge' feature in Word?
25
• Correct Answer: C) To create personalized documents for
mass mailing from a template
26
27