MCQ Book 1.1
MCQ Book 1.1
Badipehter Daniel
LEO SERIES 1
TABLE OF CONTENT
Basic 7 (JHS 1) - Computing Topics
Strand 1: Digital Literacy and Safety
1. Introduction to Computers and Digital Literacy
2. Parts of a Computer
3. Basic Computer Operations
4. Operating Systems
5. Introduction to Word Processing
6. Introduction to Spreadsheets
7. Introduction to Databases
8. Introduction to Computer Networks
Strand 2: Internet and Communication Technologies
9. Introduction to the Internet
10. Cybersecurity: Online Safety and Security
Strand 3: Programming and Problem Solving
11. Introduction to Programming (Basics)
12. Problem-Solving with Algorithms
Strand 4: Information Management and Presentation
13. Using Presentation Software (e.g., Microsoft PowerPoint)
14. Basic Data Analysis using Spreadsheets
15. Introduction to Databases for Information Storage
Strand 5: Digital Citizenship and Ethics
16. Digital Citizenship and Online Etiquette
17. Copyright, Privacy, and Online Ethics
Strand 6: Emerging Technologies
18. Introduction to Artificial Intelligence (AI) and Robotics
19. Basic Introduction to Virtual Reality (VR)
20. Introduction to 3D Printing and Modeling
Page 1 of 123
LEO SERIES 2
Page 2 of 123
LEO SERIES 3
C. Internet
D. Database
11. Which component is known as the brain of the computer?
A. Hard Drive
B. CPU
C. RAM
D. Monitor
12. What is the function of the RAM in a computer?
A. It stores files permanently
B. It processes instructions from the CPU
C. It temporarily stores data for quick access
D. It connects to the internet
13. Which device is used to store data permanently?
A. CPU
B. RAM
C. Hard Drive
D. Keyboard
14. What is the function of the motherboard in a computer?
A. To process data
B. To store data
C. To connect and allow communication between other components
D. To display visual output
15. Which of the following is used to input data into a computer?
A. Monitor
B. Mouse
C. Printer
D. Hard Drive
16. What is the role of the graphics card in a computer?
A. To process sound
B. To manage the display and visual output
C. To store files
D. To connect the computer to the internet
17. Which of the following is an output device?
A. Printer
B. Keyboard
C. Mouse
D. CPU
18. What is the purpose of the power supply unit in a computer?
A. To provide power to the motherboard
B. To connect the computer to a network
C. To process the data
D. To store data
19. What is the function of a sound card in a computer?
A. To process sound
B. To connect to the internet
C. To control the display output
D. To manage files
20. Which of the following is an input device that uses touch technology?
A. Printer
B. Touchscreen
C. Speaker
D. Monitor
Page 3 of 123
LEO SERIES 4
21. What is the first thing you should do when you turn on a computer?
A. Open a browser
B. Check the internet connection
C. Start the operating system
D. Install new software
22. Which of the following is the correct way to shut down a computer?
A. Press the power button for 5 seconds
B. Turn off the monitor
C. Close all applications and click "Shut Down"
D. Unplug the computer from the socket
23. What is the purpose of the "Task Manager" in Windows?
A. To manage files
B. To monitor system performance and running processes
C. To display the weather
D. To install software
24. How do you save a document in most programs?
A. Press Ctrl + S
B. Press Ctrl + P
C. Press Ctrl + C
D. Press Ctrl + A
25. Which of the following is NOT a method for opening a program?
A. Clicking its shortcut on the desktop
B. Searching for it in the Start menu
C. Typing it directly in the browser
D. Double-clicking its icon
26. Which of these options allows you to copy a selected text or file?
A. Ctrl + C
B. Ctrl + X
C. Ctrl + P
D. Ctrl + V
27. Which key is used to undo an action in most programs?
A. Ctrl + Z
B. Ctrl + A
C. Ctrl + S
D. Ctrl + X
28. What is the function of the "Recycle Bin" on a computer?
A. To store permanent files
B. To temporarily store deleted files
C. To manage network connections
D. To store applications
29. What is the correct way to maximize a window in Windows?
A. Double-click the window title bar
B. Click the minimize button
C. Press Alt + F4
D. Right-click the taskbar
30. Which of the following is a way to close a program?
A. Press Ctrl + C
B. Press Ctrl + F
C. Press Alt + F4
D. Press Ctrl + V
31. What is an operating system?
A. A program that allows the user to interact with hardware
B. A type of hardware used to process data
Page 4 of 123
LEO SERIES 5
C. A device used to store data
D. A peripheral device for input/output operations
32. Which of the following is an example of an operating system?
A. Microsoft Office
B. Google Chrome
C. Windows 10
D. Excel
33. What is the primary purpose of an operating system?
A. To manage the hardware and software resources of the computer
B. To help with internet browsing
C. To create documents and spreadsheets
D. To play games
34. Which of the following operating systems is used on Mac computers?
A. Windows 10
B. iOS
C. macOS
D. Linux
35. What feature does an operating system manage?
A. Communication between devices only
B. Hardware, software, and system resources
C. Installing software only
D. Printing documents
36. What is the taskbar in Windows used for?
A. To display the system time
B. To access the Start menu and running programs
C. To display notifications only
D. To manage network connections
37. Which of the following is NOT a function of the operating system?
A. File management
B. Network management
C. Graphics design
D. Memory management
38. In Windows, what does the 'Control Panel' allow you to do?
A. View the list of running applications
B. Control hardware settings and system configurations
C. Manage user files
D. Open a web browser
39. What is the purpose of a 'file system' in an operating system?
A. To store and organize files
B. To manage network connections
C. To display system messages
D. To execute applications
40. What does the "Task Manager" in Windows help you with?
A. Restarting the computer
B. Monitoring running applications and performance
C. Creating files
D. Installing new software
41. Which of the following software is commonly used for word processing?
A. Microsoft Word
B. Excel
C. PowerPoint
D. Photoshop
Page 5 of 123
LEO SERIES 6
42. In word processing, what does the 'Bold' formatting option do?
A. It changes the font style
B. It increases the font size
C. It makes the text darker and thicker
D. It changes the text color
43. What is the purpose of the 'Spell Check' feature in word processors?
A. To format text
B. To correct errors in spelling
C. To print documents
D. To change the font size
44. Which of the following is used to insert a page break in Microsoft Word?
A. Ctrl + P
B. Ctrl + S
C. Ctrl + Enter
D. Ctrl + Z
45. Which of the following is an option in the 'Page Layout' menu of a word processor?
A. Adjusting margins
B. Changing font style
C. Adding clipart
D. Inserting hyperlinks
46. In Microsoft Word, what does the 'Align Left' option do?
A. Aligns text to the center
B. Aligns text to the right
C. Aligns text to the left side of the page
D. Makes the text bold
47. What is the purpose of the 'Header' and 'Footer' in a document?
A. To add images to the document
B. To include information that appears on every page
C. To format the text style
D. To add a page border
48. Which key is used to undo an action in most word processors?
A. Ctrl + C
B. Ctrl + Z
C. Ctrl + P
D. Ctrl + A
49. What is the function of the 'Save As' option in word processors?
A. To close the document
B. To create a new document
C. To save the document with a new name or location
D. To print the document
50. In Microsoft Word, which of the following can you insert using the 'Insert' tab?
A. Text formatting options
B. Tables, images, and hyperlinks
C. Page borders
D. Editing tools
51. Which of the following is an example of spreadsheet software?
A. Microsoft Excel
B. Adobe Photoshop
C. Mozilla Firefox
D. Microsoft Word
52. What is the primary function of a spreadsheet?
A. To store images
B. To manage text documents
Page 6 of 123
LEO SERIES 7
C. To organize, analyze, and manipulate data in tables
D. To design websites
53. In a spreadsheet, what is a 'cell'?
A. A unit used to store data
B. A type of formula
C. A section of the header
D. A type of chart
54. Which of the following symbols is used for addition in spreadsheet formulas?
A. +
B. -
C. *
D. /
55. What does the 'SUM' function do in a spreadsheet?
A. Multiplies values
B. Adds values together
C. Divides values
D. Finds the average of values
56. Which of the following is a valid function in Excel?
A. =ADD(A1, A2)
B. =SUM(A1, A2)
C. =SUBTRACT(A1, A2)
D. =MULTIPLY(A1, A2)
57. In Excel, how do you enter a formula into a cell?
A. Type it directly in the cell with the equals sign (=)
B. Select the cell and click 'Formula'
C. Press Ctrl + F
D. Double-click the cell
58. Which of the following is used to organize data in a spreadsheet?
A. Text box
B. Rows and columns
C. Graphs
D. Hyperlinks
59. Which of the following is NOT a feature of a spreadsheet?
A. Calculations using formulas
B. Storing documents as text
C. Sorting and filtering data
D. Creating graphs and charts
60. In Excel, which of the following options would you use to change the appearance of data in a cell?
A. Format Cells
B. Insert Function
C. Filter
D. Data Validation
61. What is a database?
A. A tool for browsing the internet
B. A program used for creating documents
C. A collection of organized data that can be easily accessed, managed, and updated
D. A type of spreadsheet
62. Which of the following is a common example of a database software?
A. Microsoft Excel
B. Microsoft Access
C. Adobe Photoshop
D. Mozilla Firefox
Page 7 of 123
LEO SERIES 8
63. What is a 'table' in a database?
A. A collection of related data organized in rows and columns
B. A feature used for creating reports
C. A collection of formulas used for calculations
D. A section for storing multimedia files
64. In a database, what does 'SQL' stand for?
A. Standard Query Language
B. Simple Quality List
C. Structured Query Language
D. Search Query Logic
65. Which of the following operations can be performed in a database?
A. Storing data only
B. Sorting, filtering, and querying data
C. Designing websites
D. Creating documents
66. What is a 'primary key' in a database?
A. A field used to uniquely identify each record
B. A button used for deleting records
C. A field used for formatting data
D. A method of sorting data
67. Which of the following is used to retrieve specific data from a database?
A. Filter
B. Query
C. Calculation
D. Format
68. What is a 'form' in database software?
A. A tool for formatting text
B. A type of report
C. An interface used to enter data into a database
D. A field used to store images
69. In a database, what is a 'record'?
A. A single column
31. What is an operating system?
A. A program that allows the user to interact with hardware
B. A type of hardware used to process data
C. A device used to store data
D. A peripheral device for input/output operations
32. Which of the following is an example of an operating system?
A. Microsoft Office
B. Google Chrome
C. Windows 10
D. Excel
33. What is the primary purpose of an operating system?
A. To manage the hardware and software resources of the computer
B. To help with internet browsing
C. To create documents and spreadsheets
D. To play games
34. Which of the following operating systems is used on Mac computers?
A. Windows 10
B. iOS
C. macOS
D. Linux
Page 8 of 123
LEO SERIES 9
35. What feature does an operating system manage?
A. Communication between devices only
B. Hardware, software, and system resources
C. Installing software only
D. Printing documents
36. What is the taskbar in Windows used for?
A. To display the system time
B. To access the Start menu and running programs
C. To display notifications only
D. To manage network connections
37. Which of the following is NOT a function of the operating system?
A. File management
B. Network management
C. Graphics design
D. Memory management
38. In Windows, what does the 'Control Panel' allow you to do?
A. View the list of running applications
B. Control hardware settings and system configurations
C. Manage user files
D. Open a web browser
39. What is the purpose of a 'file system' in an operating system?
A. To store and organize files
B. To manage network connections
C. To display system messages
D. To execute applications
40. What does the "Task Manager" in Windows help you with?
A. Restarting the computer
B. Monitoring running applications and performance
C. Creating files
D. Installing new software
41. Which of the following software is commonly used for word processing?
A. Microsoft Word
B. Excel
C. PowerPoint
D. Photoshop
42. In word processing, what does the 'Bold' formatting option do?
A. It changes the font style
B. It increases the font size
C. It makes the text darker and thicker
D. It changes the text color
43. What is the purpose of the 'Spell Check' feature in word processors?
A. To format text
B. To correct errors in spelling
C. To print documents
D. To change the font size
44. Which of the following is used to insert a page break in Microsoft Word?
A. Ctrl + P
B. Ctrl + S
C. Ctrl + Enter
D. Ctrl + Z
45. Which of the following is an option in the 'Page Layout' menu of a word processor?
A. Adjusting margins
B. Changing font style
Page 9 of 123
LEO SERIES 10
C. Adding clipart
D. Inserting hyperlinks
46. In Microsoft Word, what does the 'Align Left' option do?
A. Aligns text to the center
B. Aligns text to the right
C. Aligns text to the left side of the page
D. Makes the text bold
47. What is the purpose of the 'Header' and 'Footer' in a document?
A. To add images to the document
B. To include information that appears on every page
C. To format the text style
D. To add a page border
48. Which key is used to undo an action in most word processors?
A. Ctrl + C
B. Ctrl + Z
C. Ctrl + P
D. Ctrl + A
49. What is the function of the 'Save As' option in word processors?
A. To close the document
B. To create a new document
C. To save the document with a new name or location
D. To print the document
50. In Microsoft Word, which of the following can you insert using the 'Insert' tab?
A. Text formatting options
B. Tables, images, and hyperlinks
C. Page borders
D. Editing tools
51. Which of the following is an example of spreadsheet software?
A. Microsoft Excel
B. Adobe Photoshop
C. Mozilla Firefox
D. Microsoft Word
52. What is the primary function of a spreadsheet?
A. To store images
B. To manage text documents
C. To organize, analyze, and manipulate data in tables
D. To design websites
53. In a spreadsheet, what is a 'cell'?
A. A unit used to store data
B. A type of formula
C. A section of the header
D. A type of chart
54. Which of the following symbols is used for addition in spreadsheet formulas?
A. +
B. -
C. *
D. /
55. What does the 'SUM' function do in a spreadsheet?
A. Multiplies values
B. Adds values together
C. Divides values
D. Finds the average of values
Page 10 of 123
LEO SERIES 11
56. Which of the following is a valid function in Excel?
A. =ADD(A1, A2)
B. =SUM(A1, A2)
C. =SUBTRACT(A1, A2)
D. =MULTIPLY(A1, A2)
57. In Excel, how do you enter a formula into a cell?
A. Type it directly in the cell with the equals sign (=)
B. Select the cell and click 'Formula'
C. Press Ctrl + F
D. Double-click the cell
58. Which of the following is used to organize data in a spreadsheet?
A. Text box
B. Rows and columns
C. Graphs
D. Hyperlinks
59. Which of the following is NOT a feature of a spreadsheet?
A. Calculations using formulas
B. Storing documents as text
C. Sorting and filtering data
D. Creating graphs and charts
60. In Excel, which of the following options would you use to change the appearance of data in a cell?
A. Format Cells
B. Insert Function
C. Filter
D. Data Validation
61. What is a database?
A. A tool for browsing the internet
B. A program used for creating documents
C. A collection of organized data that can be easily accessed, managed, and updated
D. A type of spreadsheet
62. Which of the following is a common example of a database software?
A. Microsoft Excel
B. Microsoft Access
C. Adobe Photoshop
D. Mozilla Firefox
63. What is a 'table' in a database?
A. A collection of related data organized in rows and columns
B. A feature used for creating reports
C. A collection of formulas used for calculations
D. A section for storing multimedia files
64. In a database, what does 'SQL' stand for?
A. Standard Query Language
B. Simple Quality List
C. Structured Query Language
D. Search Query Logic
65. Which of the following operations can be performed in a database?
A. Storing data only
B. Sorting, filtering, and querying data
C. Designing websites
D. Creating documents
66. What is a 'primary key' in a database?
A. A field used to uniquely identify each record
B. A button used for deleting records
Page 11 of 123
LEO SERIES 12
C. A field used for formatting data
D. A method of sorting data
67. Which of the following is used to retrieve specific data from a database?
A. Filter
B. Query
C. Calculation
D. Format
68. What is a 'form' in database software?
A. A tool for formatting text
B. A type of report
C. An interface used to enter data into a database
D. A field used to store images
69. In a database, what is a 'record'?
A. A single column of data
B. A collection of related fields in a table
C. A search query
D. A report generated by the database
70. What is a 'report' in a database?
A. A method for storing data
B. A tool for analyzing data
C. A printable output of selected data
D. A program used to create tables
71. Which of the following is an example of presentation software?
A. Microsoft Word
B. Microsoft PowerPoint
C. Adobe Photoshop
D. Google Chrome
72. In PowerPoint, which view allows you to edit the slides and see the presentation as a sequence?
A. Normal view
B. Slide Sorter view
C. Reading view
D. Presenter view
73. Which of the following can be inserted into a PowerPoint slide?
A. Text
B. Images
C. Videos
D. All of the above
74. What is a slide layout in PowerPoint?
A. The background design of the slide
B. The order in which slides are shown
C. The arrangement of text and objects on a slide
D. The style of transitions between slides
75. What is the default transition between slides in PowerPoint?
A. Fade
B. Push
C. Wipe
D. None
76. Which of the following is NOT a common feature in presentation software?
A. Slide transitions
B. Inserting charts
C. Calculating data
D. Adding animations
Page 12 of 123
LEO SERIES 13
77. In PowerPoint, how can you insert a new slide into a presentation?
A. Right-click on a slide and select "New Slide"
B. Press Ctrl + N
C. Click on "Insert" and select "New Slide"
D. Use the "Slide Sorter" view
78. In a PowerPoint presentation, what does the "Slide Master" allow you to do?
A. Insert images into slides
B. Change the layout of all slides in the presentation
C. Add animations to slides
D. Record voice narration for slides
79. What is a 'transition' in PowerPoint?
A. The way text appears on a slide
B. The effect that occurs when you move from one slide to the next
C. The way a slide is printed
D. The font used in the slide
80. Which option in PowerPoint allows you to view a slide show from the beginning?
A. Slide Show > From Beginning
B. Home > Start Presentation
C. View > Play Presentation
D. File > Show All
81. Which of the following is an example of a digital communication tool?
A. Microsoft Word
B. Google Docs
C. Email
D. Microsoft Excel
82. Which of the following is a feature of an email?
A. Inserting multimedia files like pictures or videos
B. Editing web pages
C. Creating databases
D. Developing spreadsheets
83. What is the function of a 'Reply All' button in an email?
A. To reply to only the sender of the email
B. To reply to the sender and all other recipients of the email
C. To forward the email to a new recipient
D. To send an automatic response
84. What does 'cc' stand for in an email?
A. Close Copy
B. Carbon Copy
C. Credit Copy
D. Contact Copy
85. Which of the following is an online collaboration tool?
A. Google Docs
B. Microsoft Excel
C. Adobe Illustrator
D. Mozilla Firefox
86. Which of the following is a digital platform used for video conferencing?
A. Zoom
B. Microsoft Excel
C. WordPress
D. Google Calendar
87. What is the primary purpose of cloud storage?
A. To store files on your computer
B. To store files and data on remote servers accessible via the internet
Page 13 of 123
LEO SERIES 14
C. To print documents
D. To display web pages
88. Which of the following is an example of a cloud-based storage service?
A. Dropbox
B. Adobe Illustrator
C. Microsoft PowerPoint
D. Notepad
89. Which of the following is a benefit of using collaborative tools like Google Docs?
A. Limited access to data
B. Easy sharing and real-time collaboration
C. Cannot edit documents simultaneously
D. Reduces communication
90. Which of the following is a feature of video conferencing software like Zoom or Microsoft Teams?
A. Real-time voice and video communication
B. Offline document editing
C. No ability to share screens
D. Only allows text-based communication
91. What does "Digital Citizenship" refer to?
A. The ability to use technology without the internet
B. The practice of using technology responsibly and ethically
C. The act of accessing technology without permission
D. The design of a digital device
92. Which of the following is an example of unethical behavior online?
A. Respecting others' privacy
B. Sharing personal passwords without permission
C. Reporting fake news
D. Avoiding cyberbullying
93. What is 'cyberbullying'?
A. Sending emails to friends
B. Using the internet to harass or intimidate others
C. Watching educational videos online
D. Participating in online discussions
94. Why is it important to respect copyright laws when using digital content?
A. To avoid creating new content
B. To ensure creators receive credit for their work and avoid legal issues
C. To limit the use of digital devices
D. To avoid installing software
95. What does 'phishing' refer to in the context of digital security?
A. Legitimate email communication
B. Fraudulent attempts to obtain sensitive information by pretending to be trustworthy sources
C. Sharing data responsibly
D. Encrypting email messages
96. What is the best way to protect your privacy online?
A. By sharing your passwords with friends
B. By regularly updating privacy settings and using strong passwords
C. By avoiding using any online services
D. By sharing personal information on social media
97. What should you do if you receive a suspicious email asking for personal information?
A. Open the attachment and respond immediately
B. Ignore it and delete the email
C. Share the email with friends
D. Respond with your personal details to verify the request
Page 14 of 123
LEO SERIES 15
98. What is 'identity theft'?
A. Using your real name on social media
B. The unauthorized use of someone's personal information to commit fraud
C. Creating new online accounts
D. Sharing your data with trusted websites
99. Which of the following is an example of good cybersecurity practice?
A. Reusing the same password across different websites
B. Updating software regularly and using antivirus software
C. Clicking on all pop-up ads
D. Sharing passwords with friends for convenience
100.What should you do before downloading an app or software?
A. Skip reading the permissions
B. Check reviews and permissions to ensure it is safe and trustworthy
C. Ignore the developer information
D. Always download from unknown sources
101.What is the primary purpose of using encryption on digital data?
A. To make data easier to access
B. To protect data from unauthorized access
C. To make data available offline
D. To store data in the cloud
102.Which of the following is a common sign of a phishing attempt?
A. A professional email address from a well-known company
B. A request for personal information or login credentials
C. A subject line with a formal greeting
D. An attachment that appears to be a PDF document
103.What is a firewall used for in cybersecurity?
A. To block unwanted data from entering or leaving a network
B. To provide a backup for deleted files
C. To speed up internet connection
D. To encrypt passwords
104.Which of the following is the best practice to secure online accounts?
A. Use the same password for multiple accounts
B. Use strong, unique passwords for each account
C. Share passwords with trusted friends
D. Avoid using a password manager
105.What does the term 'two-factor authentication' mean?
A. Using a password only to access accounts
B. Verifying identity using two different methods, such as a password and a text message code
C. Using facial recognition to unlock accounts
D. Using only a fingerprint to access accounts
106.What should you do if you notice suspicious activity on your online accounts?
A. Ignore the activity and continue as normal
B. Change your password immediately and report the incident
C. Log out and avoid using the account again
D. Delete your account permanently
107.Which of the following is a type of malware?
A. Internet browsers
B. Antivirus programs
C. Computer viruses
D. Digital cameras
108.What does 'data breach' mean?
A. A situation where data is copied by authorized users
B. A situation where personal data is exposed or accessed by unauthorized individuals
Page 15 of 123
LEO SERIES 16
C. A backup of files being lost
D. The compression of data to reduce storage space
109.Which of the following is NOT a recommended action to ensure the privacy of your online data?
A. Avoid sharing personal information on unsecured websites
B. Keep your passwords confidential and use complex ones
C. Frequently change your passwords
D. Share your password with others for convenience
110.What does 'secure socket layer' (SSL) refer to?
A. A type of firewall
B. A method for encrypting data sent over the internet
C. A type of malware
D. A platform for hosting websites
111.Which of the following is a benefit of using technology in education?
A. Increased screen time leading to eye strain
B. Easier access to educational resources and learning tools
C. Constant distractions from social media
D. Increased dependence on devices
112.What is one of the risks of excessive screen time?
A. Improved focus and concentration
B. Eye strain and headaches
C. Enhanced sleep quality
D. Better communication skills
113.Which of the following is a way to protect your eyes when using a computer for long periods?
A. Keep the screen brightness at the highest setting
B. Use blue light blocking glasses or screen filters
C. Focus on the screen without taking breaks
D. Avoid blinking when reading on the screen
114.What is the '20-20-20' rule in relation to screen time?
A. Every 20 minutes, look at something 20 feet away for 20 seconds
B. Take a 20-minute break every hour
C. Spend 20 minutes of screen time on educational apps
D. Use the screen for no more than 20 minutes in a day
115.Which of the following is a healthy practice for managing technology use?
A. Limiting screen time to specific periods and taking regular breaks
B. Using digital devices at all hours of the day and night
C. Avoiding physical activity during online sessions
D. Only using devices with high screen brightness
116.What is digital addiction?
A. A positive relationship with technology
B. Excessive and compulsive use of digital devices to the detriment of daily life
C. Learning how to use technology efficiently
D. Being proficient in using technology
117.What is an example of 'tech neck'?
A. The pain from sitting too close to a screen
B. The discomfort or stiffness caused by looking down at a screen for long periods
C. The strain caused by typing too fast
D. The eye strain from high brightness
118.What is a recommended way to improve posture when using technology?
A. Slouching to reduce strain on the back
B. Sitting with your back straight and your eyes level with the screen
C. Using the device on your lap
D. Lying down while using a laptop
Page 16 of 123
LEO SERIES 17
119.How can you ensure that digital devices do not disrupt your sleep?
A. Use them right before bed
B. Reduce screen time in the hour before going to bed
C. Increase the screen brightness at night
D. Use the devices on your bed
120.Which of the following is a positive outcome of integrating technology into education?
A. Increased student engagement and access to diverse learning materials
B. Decreased interaction with teachers and peers
C. The need for constant device upgrades
D. Reduced opportunities for face-to-face learning
13. Digital Footprint
121.What is a 'digital footprint'?
A. A physical mark left by digital devices
B. The trail of data you leave behind when using the internet
C. The amount of time spent using devices
D. The storage capacity of a device
122.Which of the following can contribute to your digital footprint?
A. Photos you upload to social media
B. Emails you send
C. Websites you visit
D. All of the above
123.Why is it important to be aware of your digital footprint?
A. Because it can affect your reputation online and offline
B. Because it determines the speed of your internet connection
C. Because it is private and cannot be accessed by others
D. Because it only relates to the content you post on social media
124.Which of the following is a good practice for managing your digital footprint?
A. Sharing personal information on public forums
B. Using privacy settings to control what others can see
C. Ignoring security settings for convenience
D. Posting anything without considering the consequences
125.Which of the following is a consequence of having a negative digital footprint?
A. You may have difficulty finding job opportunities
B. You are more likely to receive online recommendations
C. Your social media posts will go viral
D. You will have unlimited access to online services
126.How can you reduce your digital footprint?
A. Delete old accounts you no longer use
B. Share every detail of your life online
C. Avoid using privacy settings
D. Avoid using the internet
127.What should you do before posting something online?
A. Think about how it may affect your reputation or others
B. Post immediately without considering consequences
C. Avoid reading the content before posting
D. Post everything, as it will be erased quickly
128.What is the best way to manage your digital identity?
A. Ignore privacy settings and share everything
B. Carefully monitor and manage your online presence
C. Use multiple fake identities online
D. Only use social media when you are offline
129.How can employers view your digital footprint?
A. They cannot access any of your online information
Page 17 of 123
LEO SERIES 18
B. They can search your name and view your social media profiles
C. They can only access your email
D. They cannot search for your online activity
130.Which of the following is a way to improve your digital reputation?
A. Share harmful or negative content online
B. Engage in responsible and respectful online behavior
C. Keep all your accounts open and unprotected
D. Post content that will upset others
131.What is the best way to ensure that children are using the internet safely?
A. Allow them to use the internet without supervision
B. Set up parental controls and monitor their online activity
C. Restrict their use of all digital devices
D. Give them access to only educational websites
132.What is the purpose of setting parental controls on devices?
A. To block the internet completely
B. To limit access to inappropriate content and monitor online activity
C. To allow unlimited access to all websites
D. To disable all apps and games
133.What should you do if you encounter inappropriate content online?
A. Ignore it and continue browsing
B. Report it to the website administrator or relevant authorities
C. Share it with friends
D. Download the content for future use
134.Which of the following is the most secure way to create a password?
A. Use personal information like your name or birthday
B. Use a simple word or phrase you can easily remember
C. Use a combination of uppercase and lowercase letters, numbers, and symbols
D. Use the same password for all your accounts
135.Which of the following is NOT a safe practice for online shopping?
A. Using a credit card on secure websites with 'https'
B. Sharing credit card details on unsecured websites
C. Checking reviews of products and sellers
D. Keeping your account login details private
136.Which of the following is an example of a secure website?
A. A website with 'http://' in the URL
B. A website with 'https://' in the URL
C. A website with no URL
D. A website with a blue background
137.How can you prevent identity theft online?
A. Share your personal information openly
B. Use strong, unique passwords and avoid public Wi-Fi networks for sensitive activities
C. Keep your personal details in a public file
D. Click on links in unsolicited emails
138.What should you do when you encounter an online scam?
A. Report the scam to the authorities and avoid responding
B. Participate to learn more
C. Share the scam with others to warn them
D. Ignore it and hope it will stop
139.What is the safest way to connect to public Wi-Fi?
A. Use a virtual private network (VPN) to secure your connection
B. Log into sensitive accounts like online banking
C. Share your Wi-Fi password with others
D. Disable your firewall to avoid connection issues
Page 18 of 123
LEO SERIES 19
140.Which of the following is a common indicator of a scam email?
A. Professional language and formatting
B. A request for urgent action, such as account verification
C. A known sender with a valid email address
D. Clear instructions to unsubscribe
141.Which of the following tools can help students organize their study materials?
A. Google Docs
B. Microsoft Word
C. Evernote
D. All of the above
142.Which of the following is an example of a cloud-based document editor?
A. Microsoft Word
B. Google Docs
C. Adobe Acrobat
D. Notepad
143.Which of the following is a benefit of using online research tools?
A. Access to a limited number of sources
B. Ability to conduct research from anywhere with an internet connection
C. No need for citations or references
D. Avoiding the need to evaluate sources for reliability
144.What is an interactive whiteboard used for?
A. To print documents
B. To store digital files
C. To display and manipulate content in a classroom setting
D. To access the internet
145.Which of the following is a feature of Google Classroom?
A. Video conferencing
B. Real-time document editing and sharing
C. Assignments and grading tools
D. All of the above
146.Which of the following is NOT an online learning platform?
A. Coursera
B. Khan Academy
C. Google Docs
D. Edmodo
147.What does the term 'e-learning' refer to?
A. Learning that takes place without the internet
B. Learning using digital resources like videos, online courses, and web-based content
C. Learning from textbooks
D. Learning in a traditional classroom without technology
148.Which tool is often used for video-based lessons and lectures?
A. Zoom
B. Google Calendar
C. Adobe Photoshop
D. Notepad
149.Which feature of Google Docs allows for real-time collaboration on documents?
A. Spell check
B. Shared editing and commenting
C. Page layout
D. Template gallery
150.Which of the following is a primary advantage of using digital tools for learning?
A. Reducing the amount of time spent learning
B. Making learning more interactive and accessible
Page 19 of 123
LEO SERIES 20
C. Limiting access to educational resources
D. Replacing teachers
151.What is the purpose of using an antivirus software?
A. To make a computer faster
B. To protect a computer from viruses and other malicious software
C. To improve the appearance of the operating system
D. To encrypt internet traffic
152.Which of the following should you do when using a public computer?
A. Avoid accessing sensitive accounts or entering personal information
B. Use the computer for online banking
C. Save passwords in the browser
D. Leave the computer unlocked after use
153.Which of the following is an example of a 'strong password'?
A. '123456'
B. 'password'
C. 'qwerty'
D. 'N5t@fr3nCh@11'
154.What is the first step you should take if you suspect your computer is infected with malware?
A. Turn off the computer and disconnect from the internet
B. Ignore it and continue working
C. Open suspicious emails to check for any updates
D. Run a virus scan after connecting to public Wi-Fi
155.What is a 'secure password manager'?
A. A software that helps you create and securely store passwords
B. A tool for managing emails
C. A website for sharing passwords
D. A service that resets your passwords
156.Which of the following actions can help prevent data theft on mobile devices?
A. Using a simple password
B. Avoiding screen locks
C. Installing apps only from trusted sources
D. Keeping your device unlocked at all times
157.What is a 'secure connection' in the context of browsing the web?
A. Using an internet connection with no encryption
B. Connecting to websites that use 'https' to encrypt data
C. Using a public Wi-Fi network without protection
D. Avoiding the use of passwords
158.Which of the following is a common method used to back up data?
A. Storing data on external hard drives
B. Printing data for offline use
C. Saving data on random websites
D. Storing files in temporary folders
159.What is 'social engineering' in the context of digital security?
A. A method of increasing online followers
B. A technique used to manipulate individuals into revealing personal information
C. A way to reduce screen time
D. A tool for creating digital content
160.What does the term 'data loss prevention' (DLP) refer to?
A. A method to prevent the storage of large files
B. Tools and processes to prevent unauthorized access or loss of sensitive data
C. The automatic deletion of unwanted files
D. Compressing files for storage
Page 20 of 123
LEO SERIES 21
161.What is the primary purpose of privacy settings on social media?
A. To make your profile private only to friends
B. To prevent others from finding your profile
C. To control who can see your posts and personal information
D. To increase the number of followers on your account
162.Which of the following is an example of inappropriate content on social media?
A. Sharing a birthday greeting
B. Posting offensive language or images
C. Updating your status with a motivational quote
D. Sharing a fun video with friends
163.What should you do if you receive a bullying message on social media?
A. Respond aggressively
B. Ignore it and continue using social media
C. Report the message to the platform and block the user
D. Share it with others to get attention
164.Which of the following is a good practice to ensure your safety on social media?
A. Share your exact location regularly with all followers
B. Post everything that happens in your life, even private details
C. Adjust your privacy settings and avoid oversharing personal details
D. Use the same password for all your social media accounts
165.What is a common sign of a fake social media account?
A. A verified checkmark next to the username
B. A profile with few friends or followers and no posts
C. Regular, professional posts
D. The account follows a large number of users with no mutual connections
166.What is 'catfishing' in the context of social media?
A. Creating fake accounts to trick others into thinking they are someone else
B. Posting photos of pets to attract followers
C. Sharing personal achievements on social media
D. Encouraging others to share fake news
167.Which of the following is a responsible use of social media?
A. Sharing only what you want others to know about your life
B. Posting private messages between you and others publicly
C. Posting personal photos and sensitive information without permission
D. Accepting friend requests from unknown people without thinking
168.What is the impact of oversharing on social media?
A. It helps you build a stronger relationship with friends
B. It can expose you to privacy risks and harm your reputation
C. It improves your social media following
D. It creates trust with all online users
169.How can you manage your online reputation?
A. Post whatever you like without considering the consequences
B. Regularly check what others are posting about you and delete inappropriate content
C. Keep your posts private and avoid engaging with anyone online
D. Ignore negative feedback and never respond
170.Which of the following should you do if someone online asks for your personal information?
A. Share your details as soon as possible
B. Ignore them and move on
C. Report the request to the platform's support team and block the person
D. Respond with your personal information to avoid conflict
171.What is 'digital citizenship'?
A. Being a responsible and ethical user of technology
B. Owning multiple digital devices
Page 21 of 123
LEO SERIES 22
C. Spending as much time online as possible
D. Using technology only for entertainment
172.Which of the following is an example of ethical use of technology?
A. Using software without paying for it
B. Downloading movies from illegal websites
C. Respecting others' privacy by not sharing their personal information without permission
D. Using someone else's account without their consent
173.What is plagiarism in the context of using digital content?
A. Using online resources to create something new
B. Copying someone else's work and presenting it as your own
C. Citing sources correctly in your work
D. Taking ideas from different sources and remixing them
174.Why is it important to respect others' intellectual property?
A. To avoid being sued
B. To promote innovation and creativity
C. To gain popularity on social media
D. To reduce the amount of online content
175.Which of the following is a consequence of unethical use of technology?
A. Legal actions and loss of privileges
B. Increased followers on social media
C. Better grades in school
D. More online engagement and feedback
176.What is an example of responsible content creation online?
A. Posting content that is respectful, factual, and does not harm others
B. Posting without considering the consequences
C. Sharing content with the intent to deceive others
D. Using someone else's work without giving credit
177.Which of the following actions is an example of unethical behavior on the internet?
A. Giving credit to original authors of online content
B. Spreading false information or rumors
C. Asking for permission before sharing someone's work
D. Using public domain content in your own projects
178.What is the purpose of citing sources when using digital resources?
A. To avoid plagiarizing
B. To reduce the time spent on research
C. To make your content more interesting
D. To increase the number of views on your post
179.Which of the following actions helps maintain an ethical online presence?
A. Posting everything without considering privacy
B. Following online trends without thinking critically
C. Engaging in respectful conversations and avoiding harmful behavior
D. Only using technology for personal entertainment
180.What should you do if you realize that you have inadvertently shared false information online?
A. Ignore it and hope no one notices
B. Delete the post and apologize for the mistake
C. Share it more widely to fix the problem
D. Defend the information without evidence
181.What is cyberbullying?
A. Bullying through digital platforms like social media, text messages, or websites
B. Harassing someone in person
C. Using technology to educate others
D. Using technology to help friends
Page 22 of 123
LEO SERIES 23
182.Which of the following is an example of cyberbullying?
A. Sending hurtful or threatening messages online
B. Sending positive and supportive messages
C. Sharing educational resources with classmates
D. Engaging in online discussions politely
183.What should you do if you are a victim of cyberbullying?
A. Ignore the bullying and do nothing
B. Report the incident to a trusted adult and block the bully
C. Respond aggressively to the bully
D. Share the incident with everyone online
184.What is the best way to help someone who is being cyberbullied?
A. Ignore the situation and avoid getting involved
B. Support the victim, report the bully, and encourage them to talk to a trusted adult
C. Join the bullying to fit in
D. Spread the bullying content to others
185.What is one of the most important steps in preventing cyberbullying?
A. Encouraging others to share hurtful content
B. Creating a supportive and respectful online environment
C. Ignoring people who are being bullied
D. Sharing personal information about others
186.What does the term 'doxxing' refer to in the context of cyberbullying?
A. Sharing someone's personal information online without their consent
B. Posting memes to entertain people
C. Encouraging others to block someone
D. Sending anonymous messages
187.What should you do if you see someone being cyberbullied online?
A. Ignore the situation and continue using the internet
B. Join the bully to make the situation worse
C. Report the incident to the platform and support the victim
D. Post negative comments about the victim
188.Which of the following is an effect of cyberbullying on victims?
A. Increased confidence and self-esteem
B. Mental health issues, including depression and anxiety
C. Improved social relationships
D. Positive effects on school performance
189.Which of the following is NOT a sign of someone being cyberbullied?
A. Becoming withdrawn or avoiding social interactions
B. Posting positive and uplifting messages online
C. Showing signs of distress or anxiety
D. Avoiding school or online activities
190.How can schools help prevent cyberbullying?
A. By ignoring the situation and allowing students to resolve it on their own
B. By teaching students about respectful online behavior and providing resources for victims
C. By restricting the use of digital devices completely
D. By punishing students who use technology
191. What is a common risk of clicking on unknown links in emails or messages?
A. It leads to new opportunities
B. It could lead to phishing attacks or malware infections
C. It improves your social media engagement
D. It helps you discover new websites
192. How can you verify the authenticity of an email or message from an unknown sender?
A. Click the link to see where it leads
B. Check for spelling or grammatical errors, and verify the sender’s address
Page 23 of 123
LEO SERIES 24
C. Reply to the sender asking for more information
D. Forward the email to all your contacts to get their opinion
193. Which of the following is a strong password practice?
A. Using your name and birthdate as a password
B. Using a long combination of letters, numbers, and symbols
C. Using the same password for all your accounts
D. Sharing your password with friends for safekeeping
194. Why is it important to log out of online accounts when using shared or public devices?
A. To avoid the website from remembering your login credentials
B. To prevent others from accessing your account without your permission
C. To make sure the device runs faster
D. To keep your account active
195. What is a good practice for handling your personal data online?
A. Share personal information with anyone online for convenience
B. Use different passwords for each of your online accounts and avoid sharing them
C. Store all your personal information in one file on your computer
D. Keep your personal data open to everyone to increase your social media presence
196. What should you do if a website asks for too much personal information that seems unnecessary?
A. Provide the information to get quick access
B. Ignore the request and close the website
C. Enter only the required information and check for legitimacy
D. Share all your details to avoid suspicion
197. What is 'phishing' in the context of online safety?
A. Sending emails with free offers to help you win prizes
B. A method of obtaining sensitive information such as passwords or credit card details by pretending to
be someone else
C. A type of social media game
D. A secure method to verify your online transactions
198. What is the best action to take if you believe you've been a victim of identity theft online?
A. Ignore it and continue using the affected services
B. Report it to the relevant authorities and change your passwords immediately
C. Share your experience with friends to alert them
D. Delete all your online accounts
199. How can a strong password be described?
A. Easy to remember, such as your pet's name
B. A combination of your first and last names
C. A random mix of uppercase letters, lowercase letters, numbers, and symbols
D. The same as your username
ANSWERS TO OBJECTIVE TEST
Question Answer Question Answer Question Answer Question Answer Question Answer
Number Number Number Number Number
1 B 41 A 81 B 121 A 161 C
2 C 42 C 82 C 122 B 162 C
3 A 43 B 83 A 123 C 163 B
4 B 44 A 84 B 124 A 164 C
5 C 45 D 85 D 125 C 165 D
6 A 46 B 86 C 126 B 166 A
7 D 47 C 87 B 127 D 167 A
8 B 48 D 88 B 128 C 168 B
9 A 49 A 89 D 129 B 169 B
10 C 50 B 90 C 130 B 170 C
11 A 51 A 91 B 131 C 171 A
12 B 52 B 92 A 132 A 172 C
13 C 53 C 93 B 133 D 173 B
14 B 54 D 94 D 134 B 174 B
15 A 55 A 95 B 135 D 175 A
Page 24 of 123
LEO SERIES 25
16 C 56 C 96 A 136 A 176 A
17 D 57 B 97 B 137 B 177 B
18 B 58 A 98 C 138 C 178 A
19 C 59 B 99 B 139 B 179 C
20 A 60 C 100 A 140 A 180 C
21 D 61 B 101 C 141 C 181 A
22 B 62 A 102 B 142 D 182 A
23 A 63 C 103 A 143 B 183 B
24 C 64 B 104 D 144 B 184 B
25 D 65 A 105 C 145 A 185 B
26 A 66 D 106 B 146 B 186 A
27 B 67 A 107 A 147 C 187 C
28 C 68 C 108 C 148 C 188 B
29 D 69 B 109 B 149 D 189 B
30 B 70 A 110 D 150 A 190 B
31 A 71 C 111 A 151 B 191 B
32 C 72 B 112 C 152 A 192 B
33 B 73 D 113 B 153 C 193 B
34 D 74 C 114 A 154 B 194 B
35 A 75 A 115 D 155 A 195 B
36 C 76 D 116 C 156 B 196 C
37 B 77 B 117 B 157 A 197 B
38 A 78 C 118 A 158 D 198 B
39 C 79 A 119 D 159 C 199 C
40 D 80 B 120 B 160 A
Page 25 of 123
LEO SERIES 26
C. United Resource Locator
D. Universal Return Locator
7. Which of the following is a type of email account provider?
A. Facebook
B. Gmail
C. YouTube
D. Instagram
8. What is the term used for protecting a computer or network from malicious software?
A. Data recovery
B. Internet browsing
C. Antivirus software
D. File sharing
9. Which of the following is considered a form of digital communication?
A. Telephone call
B. Email
C. Face-to-face conversation
D. Letter writing
10. What is a "social media platform"?
A. A website that allows people to connect and share content online
B. A hardware device used for communication
C. A type of computer virus
D. A software used for creating documents
11. Which of the following is a popular video conferencing tool?
A. WhatsApp
B. Zoom
C. Snapchat
D. Instagram
12. What does "cloud computing" refer to?
A. Storing and accessing data over the internet instead of on a computer’s hard drive
B. A type of computer virus
C. A program for editing photos
D. A way of storing documents offline
13. What is a "digital footprint"?
A. A printout of all the documents you have created
B. A record of your activities on the internet
C. A type of computer virus
D. A way to measure computer speed
14. What is the purpose of a firewall?
A. To block internet access to all websites
B. To protect a computer from unauthorized access over the internet
C. To clean up the computer’s hard drive
D. To increase internet speed
15. Which of the following is a secure internet connection?
A. HTTP
B. HTTPS
C. FTP
D. UDP
16. What does the "@" symbol in an email address represent?
A. A space in the email address
B. A separator between the username and domain
C. A type of encryption
D. A special character used in social media
Page 26 of 123
LEO SERIES 27
17. Which of the following best describes "phishing"?
A. A method of securing passwords
B. Sending fraudulent emails to obtain personal information
C. A way of speeding up internet browsing
D. A type of software for video editing
18. Which of the following is a consequence of sharing too much personal information online?
A. Increased privacy
B. Identity theft
C. Faster internet speed
D. More accurate search results
19. What is the purpose of a "VPN" (Virtual Private Network)?
A. To browse the internet faster
B. To protect your online privacy by encrypting your internet connection
C. To send emails securely
D. To manage social media accounts
20. What is an online platform used for creating and sharing videos?
A. WhatsApp
B. TikTok
C. WordPress
D. Excel
21. Which of the following is an example of a file sharing service?
A. Dropbox
B. Adobe Acrobat
C. VLC Media Player
D. Excel
22. Which of the following helps prevent malware from accessing your computer?
A. Antivirus software
B. Word processor
C. File compression
D. Email service
23. What does the term "streaming" refer to?
A. Downloading a file for offline use
B. Playing audio or video content over the internet without downloading it
C. Uploading files to cloud storage
D. A type of email service
24. What is the main benefit of using social media?
A. To connect with friends and share content
B. To create and edit documents
C. To store large files
D. To play video games
25. What does "Wi-Fi" stand for?
A. Wireless Internet Function
B. Wireless Fidelity
C. Web Internet Frequency
D. World Internet Flow
26. What is the primary function of a modem in an internet connection?
A. To store files
B. To transmit data to and from the internet
C. To increase internet speed
D. To protect the network from malware
27. Which of the following is a web application used for creating and managing documents online?
A. Google Docs
B. VLC Media Player
Page 27 of 123
LEO SERIES 28
C. Adobe Photoshop
D. Windows Media Player
28. Which of the following is a form of cyberbullying?
A. Sending encouraging messages
B. Sharing videos of positive events
C. Posting harmful comments or threats online
D. Writing positive blog posts
29. Which of the following is a feature of the "Incognito Mode" in web browsers?
A. It blocks pop-up ads
B. It encrypts your internet connection
C. It prevents browsing history from being saved
D. It increases browsing speed
30. Which of the following is NOT a type of communication on the internet?
A. Instant messaging
B. Video conferencing
C. File downloading
D. Email
31. What is the main purpose of a "search engine optimization" (SEO) strategy?
A. To improve website visibility in search engine results
B. To create and edit photos
C. To create a website’s layout
D. To increase internet speed
32. Which of the following is a commonly used video streaming service?
A. Microsoft Office
B. YouTube
C. Google Chrome
D. WordPress
33. Which of the following is a method of authenticating a user’s identity online?
A. Two-factor authentication
B. Data compression
C. Video streaming
D. File sharing
34. What does the term "cookies" refer to in internet browsing?
A. A type of malware
B. Small files that store browsing information
C. A security measure for websites
D. A type of browser
35. What is the purpose of a "browser cache"?
A. To store files temporarily to improve browsing speed
B. To store passwords
C. To download files faster
D. To prevent websites from being accessed
36. What is a URL shortener used for?
A. To send large files via email
B. To change a URL into a shorter format
C. To increase the security of a URL
D. To convert text into URLs
37. What is a "wiki"?
A. A form of social media
B. A website that allows users to collaboratively edit content
C. A type of computer virus
D. A file storage system
Page 28 of 123
LEO SERIES 29
38. Which of the following is an example of a cloud storage service?
A. Google Drive
B. Microsoft Word
C. Spotify
D. Skype
39. Which of the following is NOT a form of internet communication?
A. Email
B. Face-to-face conversation
C. Video call
D. Instant messaging
40. What is the primary role of an internet service provider (ISP)?
A. To provide computer hardware
B. To offer internet access to customers
C. To create websites
D. To send emails
41. What is the primary purpose of an email attachment?
A. To send a text message
B. To send files along with the email
C. To store email settings
D. To send video files only
42. What does "phishing" mean in the context of internet security?
A. A method to back up data
B. The process of sending fake emails to steal personal information
C. The act of creating a new website
D. A technique for downloading software
43. What type of network allows computers to connect over long distances, like between cities or countries?
A. LAN (Local Area Network)
B. PAN (Personal Area Network)
C. MAN (Metropolitan Area Network)
D. WAN (Wide Area Network)
44. Which of the following is a commonly used method to protect your online identity?
A. Public Wi-Fi
B. Strong password and two-factor authentication
C. Automatic login
D. Using the same password for all accounts
45. Which of the following is an example of a secure website address?
A. ftp://www.example.com
B. http://www.example.com
C. https://www.example.com
D. www.example.com
46. What is an online identity management service?
A. A service used to back up files
B. A tool for designing websites
C. A platform to manage multiple online accounts and logins
D. A program for editing videos
47. What does the term "online shopping" refer to?
A. Purchasing items in physical stores
B. Buying goods and services through the internet
C. Browsing websites for entertainment
D. Communicating with friends over the internet
48. Which of the following is a popular search engine?
A. YouTube
B. Google
Page 29 of 123
LEO SERIES 30
C. Facebook
D. Instagram
49. What is the primary purpose of a search engine?
A. To send emails
B. To store files
C. To help users find information online
D. To block harmful websites
50. What is the main function of a web server?
A. To host websites and deliver content to users' browsers
B. To create and edit images
C. To manage email accounts
D. To play videos
51. What is "bandwidth" in the context of the internet?
A. The speed of a computer’s processor
B. The amount of data that can be transferred over a network in a given time
C. The size of a hard drive
D. The amount of storage on a website
52. What does "HTTP" stand for?
A. Hyper Text Transfer Protocol
B. High Transmission Text Protocol
C. Hyper Transmission Time Protocol
D. Hyper Text Telecommunication Protocol
53. What is the function of a DNS (Domain Name System)?
A. To store files on the internet
B. To convert human-readable website names into IP addresses
C. To edit website content
D. To secure email messages
54. What is "video conferencing"?
A. Sending messages through video clips
B. A meeting that takes place over the internet using video and audio
C. Watching movies online
D. Editing videos with others
55. What is the role of a web host?
A. To create websites
B. To store website files and make them accessible online
C. To provide security for websites
D. To send emails
56. Which of the following is an example of a social networking platform?
A. Twitter
B. Microsoft Office
C. Windows Explorer
D. Adobe Photoshop
57. What does "HTTPs" signify in a website address?
A. The site is not secure
B. The site uses an encrypted connection for security
C. The site is under maintenance
D. The site is hosted in another country
58. Which of the following is a commonly used cloud storage provider?
A. Microsoft PowerPoint
B. Dropbox
C. Adobe Photoshop
D. Microsoft Word
Page 30 of 123
LEO SERIES 31
59. What is a "download" in the context of the internet?
A. The process of uploading a file to the internet
B. A file you view without saving
C. The process of transferring a file from the internet to your device
D. A file you create on your computer
60. Which of the following is an example of a peer-to-peer (P2P) network?
A. A network where devices share resources directly with each other
B. A centralized network where all data is stored on one server
C. A type of social media platform
D. A cloud storage service
61. What does "malware" stand for?
A. Malicious software that harms or disrupts devices and networks
B. A type of computer hardware
C. A secure online communication tool
D. A backup storage device
62. What is a "pop-up" window?
A. A small window that opens automatically on a website, usually for ads or information
B. A tool for editing documents
C. A type of email notification
D. A type of software update
63. Which of the following is a characteristic of a strong password?
A. It is easy to remember
B. It contains personal information like a name or birthdate
C. It is a mix of letters, numbers, and symbols
D. It is the same as your username
64. What is the main function of a router?
A. To send and receive emails
B. To store files on the network
C. To connect different networks and direct data traffic
D. To manage website security
65. What does "e-commerce" refer to?
A. Editing websites
B. Selling goods and services online
C. Managing email accounts
D. Creating social media posts
66. What does "web 2.0" refer to?
A. The first version of the World Wide Web
B. The ability to create and interact with content on the internet
C. A new type of email service
D. A web hosting service
67. Which of the following is an example of a collaborative tool?
A. Google Docs
B. Windows Media Player
C. Adobe Illustrator
D. Microsoft Excel
68. What is the term for a "public network" like the internet?
A. LAN (Local Area Network)
B. WAN (Wide Area Network)
C. VPN (Virtual Private Network)
D. PAN (Personal Area Network)
69. What does "streaming" allow users to do?
A. Watch content on demand over the internet without downloading it
B. Download content to watch later
Page 31 of 123
LEO SERIES 32
C. Share files over a network
D. Encrypt content for secure viewing
70. What is the purpose of the "Reply All" function in email?
A. To delete an email
B. To send a response to everyone included in the original message
C. To forward the message to another person
D. To add an attachment to an email
71. What does a "social media influencer" do?
A. Designs websites
B. Promotes products or services through social media platforms
C. Writes software for websites
D. Helps people to create passwords
72. What is the primary advantage of using online collaboration tools?
A. They help with editing photos
B. They allow people to work together on documents in real-time
C. They help to speed up internet connections
D. They create and manage social media accounts
73. What is "Bluetooth" primarily used for?
A. Wireless communication between devices over short distances
B. Storing files on cloud services
C. Sending emails to devices
D. Browsing websites
74. What is the function of an IP address?
A. To track a user's online activity
B. To provide a unique address for each device on the internet or a network
C. To store web browser history
D. To compress files for faster downloading
75. What does the "Share" button on most social media platforms do?
A. Allows you to download content
B. Allows you to share content with your followers or friends
C. Allows you to log out of the platform
D. Allows you to edit your profile
76. What is the primary purpose of the "incognito" or "private browsing" mode in web browsers?
A. To save browsing history
B. To hide browsing activity from other users on the same device
C. To automatically delete cookies from websites
D. To block all advertisements
77. What is the role of an internet service provider (ISP)?
A. To provide the hardware for your computer
B. To offer access to the internet
C. To create websites
D. To design mobile apps
78. What is an example of a VoIP (Voice over Internet Protocol) service?
A. Gmail
B. Skype
C. Facebook
D. Google Docs
79. What does "cookies" refer to in the context of web browsing?
A. A type of website
B. Small pieces of data stored by websites on a user's device
C. A way to store video content
D. A kind of secure password
Page 32 of 123
LEO SERIES 33
80. What is the meaning of "malicious code"?
A. Code written to improve website performance
B. Code written to harm or exploit devices and networks
C. Code used to back up data
D. Code that manages the user interface
81. Which of the following is an example of an online payment system?
A. PayPal
B. Microsoft Word
C. Google Drive
D. Internet Explorer
82. What is "cloud computing"?
A. Storing data on physical devices only
B. Using remote servers on the internet to store, manage, and process data
C. A type of email encryption
D. A tool for designing websites
83. What is the purpose of a "firewall" in internet security?
A. To create backup copies of data
B. To monitor and control incoming and outgoing network traffic based on security rules
C. To store passwords securely
D. To host websites
84. What does the term "URL" stand for?
A. Uniform Resource Locator
B. Universal Reference Language
C. User Request Link
D. Uniform Retrieval Location
85. Which of the following describes a "blog"?
A. A place to share photos and videos only
B. A personal website or web page used for sharing opinions or information regularly
C. A type of online store
D. A tool for encrypting emails
86. What does "uploading" a file mean?
A. Downloading a file from the internet
B. Sending a file from your device to the internet or a cloud service
C. Viewing a file on your computer
D. Printing a file
87. Which of the following is a key feature of social media platforms?
A. Providing email services
B. Allowing users to create, share, and interact with content
C. Encrypting messages for privacy
D. Hosting large business networks
88. What does "Wi-Fi" refer to?
A. A type of computer virus
B. A wireless networking technology for connecting devices to the internet
C. A device used for downloading files
D. A software for email management
89. What is the meaning of "spam" in the context of email?
A. Unsolicited and usually irrelevant or inappropriate messages sent over the internet
B. Encrypted messages sent securely
C. Regularly scheduled emails from a known source
D. Files attached to emails
90. What does "social engineering" mean in cybersecurity?
A. Using encryption to protect data
B. Manipulating people into revealing confidential information through deception
Page 33 of 123
LEO SERIES 34
C. The process of setting up firewalls
D. Encrypting passwords for protection
91. Which of the following is an example of a search engine optimization (SEO) technique?
A. Using paid advertisements on social media
B. Writing code for websites
C. Using keywords to increase a website's visibility in search results
D. Storing data on cloud services
92. What is the purpose of a VPN (Virtual Private Network)?
A. To increase internet speed
B. To protect the privacy and security of internet traffic by masking your IP address
C. To host a website
D. To create and edit documents
93. What is "data encryption"?
A. The process of compressing data to save space
B. The process of converting data into a secure format to prevent unauthorized access
C. The process of sharing data over the internet
D. The process of deleting data permanently
94. What is the main function of a "browser"?
A. To store email messages
B. To provide a secure connection to the internet
C. To allow users to navigate websites and access content on the web
D. To edit images
95. What does "HTTPS" stand for?
A. Hyper Transfer Protocol Secure
B. Hyper Text Transfer Protocol Secure
C. Hyper Textual Secure Protocol
D. High Transfer Protocol Secure
96. What is a "domain name"?
A. A password used to log into a website
B. A unique address used to access websites on the internet
C. A network that connects devices
D. A type of social media account
97. Which of the following is an example of a wireless communication protocol?
A. USB
B. Wi-Fi
C. Ethernet
D. HDMI
98. What does "cloud storage" allow users to do?
A. Store data on local devices
B. Backup data to an external hard drive
C. Store data remotely on servers that can be accessed via the internet
D. Encrypt files for privacy
99. What is a "social media platform"?
A. A type of email service
B. A website or app used for social networking and sharing content
C. A program for editing video files
D. A search engine
100. What is the primary function of a "web browser"?
A. To create websites
B. To allow users to access websites on the internet
C. To encrypt online communication
D. To store files securely
Page 34 of 123
LEO SERIES 35
101. What does "streaming" refer to?
A. Storing media files on a device
B. Watching or listening to media content in real-time without downloading it
C. Editing video content online
D. Sending media files to another device
102. What is the term used to describe harmful software such as viruses and worms?
A. Spam
B. Malware
C. Cookies
D. Pop-ups
103. Which of the following best describes a "search engine"?
A. A tool that encrypts data on websites
B. A program that allows you to create websites
C. A tool that helps users find websites or information on the internet
D. A tool that backs up your data
104. What does "cloud-based storage" mean?
A. Storing data on external hard drives
B. Storing data remotely on servers accessible over the internet
C. Storing data only on a local device
D. Storing data on social media platforms
105. Which of the following is a web browser used to access websites on the internet?
A. Microsoft Word
B. Google Chrome
C. Excel
D. Adobe Reader
106. What is "two-factor authentication"?
A. A method of verifying a user's identity with two separate methods
B. A way to create stronger passwords
C. A method of encrypting messages
D. A way to hide online activity
107. What is the main function of a "web proxy"?
A. To store data securely on the web
B. To provide internet access by acting as an intermediary between a user and a website
C. To host websites on the internet
D. To create websites
108. What does "URL" stand for?
A. Uniform Resource Locator
B. Unified Reference Locator
C. Universal Resource Locator
D. Uniform Retrieval Link
109. Which of the following is an example of a communication app?
A. Zoom
B. Google Chrome
C. Adobe Photoshop
D. Microsoft Excel
110. What is a "domain name"?
A. A unique address used to identify a website on the internet
B. The name of a web browser
C. A storage device for backing up data
D. A secure file transfer tool
111. What is a "web cookie"?
A. A small piece of data stored by a website on your device
B. A software that blocks advertisements
Page 35 of 123
LEO SERIES 36
C. A feature that allows video streaming
D. A device used for data encryption
112. What does the term "phishing" refer to in the context of online security?
A. A way of tracking a user’s browsing activity
B. A method of stealing personal information through fake emails or websites
C. A tool to create secure passwords
D. A type of virus used to attack devices
113. What is a "peer-to-peer" (P2P) network?
A. A network where all devices are connected to a central server
B. A network where users connect directly with each other to share resources
C. A wireless network used for streaming content
D. A cloud-based storage network
114. Which of the following is the purpose of "cookies" on a website?
A. To improve website speed
B. To store information about the user's browsing activity
C. To allow users to watch videos online
D. To encrypt website data
115. What is the main benefit of using "cloud computing"?
A. It provides free internet access
B. It allows users to store and access data online from anywhere
C. It speeds up internet connections
D. It creates websites for users
116. What is the primary purpose of a "firewall" in network security?
A. To protect a network by monitoring incoming and outgoing traffic
B. To create backups of all network files
C. To design websites
D. To improve the internet speed of a network
117. What is a "social media platform"?
A. A service used to share video games
B. A tool to create websites
C. A platform where users can create profiles, connect with others, and share content
D. A service used to host emails
118. What does "HTTPS" indicate about a website?
A. The site is under construction
B. The site is using an encrypted connection for secure data transmission
C. The site does not accept any personal information
D. The site is not accessible
119. Which of the following is a method to ensure secure online payments?
A. Using a credit card with no limit
B. Using a strong password and secure payment gateway
C. Clicking on pop-up advertisements
D. Sharing credit card details via email
120. What is a "web server"?
A. A device used to access websites
B. A machine that stores data on the internet
C. A program that encrypts website data
D. A device used to create content for websites
121. What does "social engineering" mean in the context of online security?
A. Creating websites
B. Using manipulation to trick people into giving away confidential information
C. Encrypting passwords
D. Writing code for websites
Page 36 of 123
LEO SERIES 37
122. Which of the following is a feature of a "web browser"?
A. It stores passwords securely
B. It allows users to visit websites and access online content
C. It manages email accounts
D. It encrypts online communication
123. What is the primary function of "email encryption"?
A. To make emails appear in different languages
B. To convert email messages into a secure format that only the recipient can read
C. To delete emails automatically
D. To store emails in the cloud
124. What is a "digital footprint"?
A. A collection of all the devices used by a person
B. A record of a person’s online activity and presence
C. A tool for monitoring email messages
D. A software used to delete data
125. What is the difference between "uploading" and "downloading" data?
A. Uploading means transferring data from the internet to a device, while downloading means
transferring data from a device to the internet
B. Uploading means transferring data from a device to the internet, while downloading means
transferring data from the internet to a device
C. Both terms mean the same thing
D. Uploading refers to viewing files online, while downloading refers to creating files
126. What does "data compression" refer to?
A. Deleting unnecessary files
B. Converting data into a format that reduces its size for easier storage or transmission
C. Encrypting data for security
D. Converting data into a readable format
127. What is the primary function of a "modem"?
A. To connect a computer to the internet via a telephone line
B. To store files on the internet
C. To manage email accounts
D. To improve the speed of web browsers
128. What is "video conferencing"?
A. Watching videos over the internet
B. Communicating with others through a video and audio link over the internet
C. Editing videos online
D. Sharing video files between devices
129. What does "social media" allow users to do?
A. Browse websites anonymously
B. Store files online
C. Create profiles, share content, and interact with others online
D. Encrypt online communication
130. What is an "IP address"?
A. A unique identifier assigned to each device connected to a network
B. A secure code used for encryption
C. A tool for creating websites
D. A type of social media profile
141. Which of the following is an example of a "search engine"?
A. Google
B. Skype
C. Microsoft Office
D. WhatsApp
Page 37 of 123
LEO SERIES 38
142. What is the primary purpose of "two-factor authentication"?
A. To encrypt messages
B. To verify a user's identity with two different methods
C. To create strong passwords
D. To store personal information securely
143. What is "cloud computing"?
A. Storing data on physical devices only
B. Using remote servers over the internet to store and manage data
C. A tool for designing websites
D. A method for deleting files permanently
144. What is a "web cookie" used for?
A. To enhance website functionality by storing user data
B. To track and store browsing activity
C. To protect websites from attacks
D. To improve the speed of websites
145. What is a "social media platform"?
A. A platform that hosts personal emails
B. A tool for creating websites
C. A platform for sharing content and connecting with others online
D. A cloud service for storing data
146. What is "spam" in the context of emails?
A. Legitimate marketing emails
B. Unsolicited and often irrelevant or malicious emails
C. Emails that are encrypted for privacy
D. Emails from family members
147. Which of the following is an example of a "cloud storage" service?
A. Google Drive
B. Adobe Photoshop
C. Microsoft Word
D. Zoom
148. What does "HTTPS" stand for in website security?
A. Hyper Text Transfer Protocol Secure
B. Hyper Transfer Protocol Secure
C. High Transfer Protocol Security
D. Hyper Textual Security Protocol
149. What is the primary purpose of an "antivirus" program?
A. To protect devices from malware and viruses
B. To manage email accounts
C. To store files securely
D. To improve internet speed
150. What does "malware" refer to?
A. Software designed to harm or exploit a computer or network
B. A type of internet browser
C. Software used for website design
D. A program for file management
151. Which of the following is an example of an online communication tool?
A. WhatsApp
B. Adobe Illustrator
C. Excel
D. Microsoft Word
152. What is the role of a "web browser"?
A. To create websites
B. To access and view websites on the internet
Page 38 of 123
LEO SERIES 39
C. To store encrypted files
D. To improve device performance
153. What does "URL" stand for?
A. Unified Resource Locator
B. Uniform Resource Locator
C. Universal Retrieval Locator
D. User Resource Locator
154. What is a "domain name" in the context of the internet?
A. The name of a computer or device
B. The unique address of a website on the internet
C. A tool for creating websites
D. A type of security system
155. What is "cloud-based storage"?
A. A device for encrypting data
B. Storing data remotely on servers accessible via the internet
C. A tool for creating websites
D. A program for creating email accounts
156. What is the primary benefit of using "social media"?
A. To store personal documents
B. To connect with people and share content online
C. To monitor network security
D. To create websites
157. What is the role of "firewalls" in online security?
A. To block malicious websites and restrict unauthorized access
B. To speed up internet connections
C. To store private data securely
D. To monitor website traffic
158. What does "data encryption" do?
A. It converts data into a secure format to prevent unauthorized access
B. It reduces the size of files for faster transmission
C. It stores files in the cloud
D. It compresses data to save storage space
159. Which of the following is an example of a "search engine"?
A. Google
B. YouTube
C. Twitter
D. Facebook
160. What does "Wi-Fi" allow users to do?
A. Browse the internet without cables by connecting to a wireless network
B. Create websites
C. Monitor network traffic
D. Encrypt data
161. What does "social engineering" refer to in online security?
A. Using psychological manipulation to trick individuals into divulging confidential information
B. Encrypting online data
C. Creating websites
D. A method of backing up data
162. What is the purpose of an "internet service provider" (ISP)?
A. To provide internet access to users
B. To store files on the internet
C. To host websites
D. To create software
Page 39 of 123
LEO SERIES 40
163. What does "streaming" mean?
A. Storing videos on a device
B. Watching or listening to media content in real-time without downloading it
C. Uploading videos to the internet
D. Compressing video files for sharing
164. Which of the following is a common method for protecting online privacy?
A. Using weak passwords
B. Enabling two-factor authentication
C. Sharing personal information online
D. Disabling all software updates
165. What is the purpose of "two-factor authentication"?
A. To allow users to create stronger passwords
B. To verify a user’s identity by using two different methods
C. To improve website design
D. To delete online activity
166. What is "phishing"?
A. A form of identity theft using fake websites or emails to steal personal information
B. The process of compressing data
C. A method of securing network traffic
D. A way of deleting cookies
167. What is the main difference between "HTTP" and "HTTPS"?
A. HTTP encrypts data while HTTPS does not
B. HTTPS encrypts data to secure communication between the server and the client
C. HTTP is used for websites, while HTTPS is used for email
D. There is no difference
168. Which of the following is an example of "peer-to-peer" (P2P) communication?
A. Skype
B. Microsoft Word
C. Google Drive
D. Dropbox
169. What is "malware"?
A. Software used to block advertisements
B. Software designed to damage or disrupt devices or networks
C. Software that stores files on the internet
D. Software for creating websites
170. What is the role of a "web proxy"?
A. To store files securely online
B. To act as an intermediary between a user and a website
C. To increase internet speed
D. To encrypt data
171. What does "URL" stand for?
A. Uniform Resource Locator
B. Universal Resource Locator
C. User Referral Locator
D. Uniform Retrieval Locator
172. What is the function of "cloud storage"?
A. To store data remotely and access it from anywhere
B. To delete files securely
C. To back up data on physical devices
D. To encrypt data
173. What is an example of a "cloud-based service"?
A. Google Drive
B. Microsoft Excel
Page 40 of 123
LEO SERIES 41
C. Skype
D. Photoshop
174. What is the main purpose of using a "VPN" (Virtual Private Network)?
A. To access websites more quickly
B. To protect the privacy and security of online activity
C. To watch videos without interruption
D. To create websites securely
175. What does "spam" refer to in email communication?
A. Unsolicited and irrelevant emails often used for advertising or fraud
B. Official business communications
C. Emails that are encrypted for security
D. Personal messages from friends
176. What does "social media" allow users to do?
A. Create social profiles and interact with other users
B. Encrypt private data
C. Build websites
D. Host email accounts
177. What is an example of "online shopping"?
A. Amazon
B. Skype
C. Dropbox
D. Microsoft Excel
178. What is the meaning of "cloud computing"?
A. The process of installing software on physical servers
B. Using remote servers to store and process data over the internet
C. The storage of personal information on social media
D. Storing data only on external drives
179. What is the purpose of a "firewall"?
A. To protect a network by blocking unauthorized access
B. To speed up internet browsing
C. To store passwords securely
D. To monitor email activity
180. What does "email encryption" do?
A. Compresses email content
B. Protects the content of an email by converting it into a secure format
C. Deletes email messages automatically
D. Sends email without attachments
181. What is the function of an "IP address"?
A. To identify a device on a network
B. To send and receive emails
C. To encrypt internet traffic
D. To monitor internet speed
182. What does "bandwidth" refer to in internet communication?
A. The amount of data transmitted per second over a network
B. The physical location of an internet service provider
C. The speed at which websites load
D. The type of internet connection
183. What is "file sharing"?
A. Storing files on a personal computer
B. Distributing files over the internet to multiple users
C. Compressing files to reduce their size
D. Deleting files from the cloud
Page 41 of 123
LEO SERIES 42
184. What is "peer-to-peer" (P2P) file sharing?
A. Transmitting files between devices without a server
B. Storing files in a remote cloud
C. Sharing files with friends through email
D. Compressing files for storage
185. Which of the following is an example of a "video conferencing" tool?
A. Zoom
B. Instagram
C. Microsoft Excel
D. Adobe Acrobat
186. What is "phishing" in the context of online security?
A. Tricking users into providing sensitive information through fraudulent emails or websites
B. Protecting passwords using encryption
C. A method of storing data on remote servers
D. A tool for compressing files
187. Which of the following is a benefit of using "cloud storage"?
A. It provides remote access to data from any location
B. It requires physical storage devices
C. It makes files inaccessible
D. It prevents file sharing
188. What is a "search engine"?
A. A tool for finding information on the internet
B. A software used to create websites
C. A program for editing images
D. A method for encrypting data
189. What is the purpose of "data backup"?
A. To copy and store data in case of data loss
B. To compress files for storage
C. To share data over the internet
D. To create a new email account
190. What does "cyberbullying" involve?
A. Using the internet to harass or harm others
B. Using encrypted messages
C. Sharing files securely
D. Protecting privacy online
191. What is the primary use of a "web application"?
A. To access and interact with data via the internet
B. To create desktop applications
C. To protect against cyber threats
D. To store files on local devices
192. What is the role of an "SSL certificate" on a website?
A. To establish a secure connection between a website and a user's browser
B. To store data on a server
C. To increase the website's loading speed
D. To provide a domain name for the website
193. What is "internet censorship"?
A. The control or restriction of content available on the internet
B. Encrypting internet data
C. Blocking internet access to specific websites
D. Protecting user privacy online
194. What does "cookie tracking" do on websites?
A. Tracks user behavior and preferences to improve website experience
B. Deletes browsing history automatically
Page 42 of 123
LEO SERIES 43
C. Encrypts passwords and other sensitive data
D. Compresses files for faster download
195. Which of the following is an example of a "search engine"?
A. Yahoo
B. Facebook
C. Instagram
D. Skype
196. What is the function of an "email client"?
A. To send, receive, and manage email messages
B. To store files on a server
C. To create social media posts
D. To secure internet connections
197. What does "HTTPS" stand for?
A. HyperText Transfer Protocol Secure
B. High Transfer Protocol Security
C. Hyper Transfer Protocol Secure
D. HyperTextual Secure Protocol
198. What is "social networking"?
A. A platform for creating and maintaining online personal relationships
B. Encrypting social media messages
C. Storing personal information online
D. A method for securing internet traffic
199. What is the primary purpose of "data encryption"?
A. To secure information by converting it into a format that is unreadable without the proper decryption
key
B. To compress files for storage
C. To send data over the internet
D. To monitor website activity
200. What does "Wi-Fi" stand for?
A. Wireless Fidelity
B. Wide Fidelity
C. Wireless Fiber
D. Wide Fiber
ANSWERS TO OBJECTIVE TEST
1 C 21 B 41 A
2 B 22 A 42 C
3 B 23 D 43 C
4 B 24 A 44 B
5 C 25 C 45 B
6 B 26 A 46 B
7 A 27 B 47 A
8 B 28 C 48 A
9 C 29 A 49 B
10 A 30 B 50 B
11 C 31 B 51 C
12 C 32 A 52 A
13 D 33 C 53 A
14 C 34 D 54 C
15 A 35 A 55 B
16 B 36 C 56 B
17 C 37 C 57 B
18 B 38 B 58 B
Page 43 of 123
LEO SERIES 44
19 A 39 A 59 B
20 B 40 C 60 B
61 C 81 C 101 A
62 B 82 B 102 B
63 A 83 D 103 C
64 D 84 A 104 B
65 B 85 C 105 A
66 A 86 B 106 A
67 A 87 D 107 C
68 A 88 A 108 B
69 B 89 C 109 B
70 B 90 A 110 C
71 C 91 B 111 C
72 A 92 B 112 A
73 C 93 A 113 B
74 D 94 C 114 C
75 A 95 B 115 D
76 C 96 A 116 A
77 B 97 B 117 B
78 A 98 D 118 C
79 B 99 B 119 C
80 C 100 C 120 D
81 C 121 A 141 B
82 B 122 B 142 B
83 D 123 A 143 B
84 A 124 C 144 B
85 C 125 A 145 C
86 B 126 B 146 B
87 D 127 D 147 A
88 A 128 C 148 B
89 C 129 A 149 A
90 A 130 B 150 B
91 B 131 C 151 A
92 B 132 A 152 B
93 A 133 A 153 B
94 C 134 C 154 B
95 B 135 A 155 B
96 A 136 B 156 B
97 B 137 B 157 A
98 D 138 A 158 A
99 B 139 A 159 A
100 C 140 C 160 A
161 B 162 A 163 B
164 B 165 B 166 A
167 B 168 A 169 B
170 B 171 A 172 B
173 A 174 B 175 A
176 B 177 A 178 B
179 A 180 B 181 A
182 A 183 B 184 A
185 A 186 A 187 A
188 A 189 A 190 A
191 A 192 A 193 A
Page 44 of 123
LEO SERIES 45
194 A 195 A 196 A
197 A 198 A 199 A
200 A
Strand 3: Programming and Problem Solving - Questions
1. What is the first step in solving a problem using a computer?
A. Writing code
B. Defining the problem
C. Debugging the code
D. Testing the solution
2. What does an algorithm represent?
A. A programming language
B. A set of instructions for solving a problem
C. A hardware component
D. A type of software
3. Which of the following is the primary programming language for building web pages?
A. Python
B. JavaScript
C. HTML
D. C++
4. What is a loop in programming?
A. A type of function
B. A way of repeating a block of code
C. A data structure
D. A syntax error
5. Which of these is an example of a conditional statement in programming?
A. if
B. loop
C. array
D. function
6. What does "debugging" refer to in programming?
A. Writing code
B. Testing software
C. Fixing errors in the code
D. Compiling the program
7. What is a variable in programming?
A. A fixed value
B. A data type
C. A placeholder for data
D. A function
8. Which of the following is an example of a high-level programming language?
A. Assembly
B. Machine code
C. Python
D. Binary
9. What does the term "syntax" refer to in programming?
A. The logic of the code
B. The structure of the programming language
C. The speed of the program
D. The type of variables used
10. Which of the following operations does the “if” statement perform?
A. Repeats a block of code
B. Executes code based on a condition
Page 45 of 123
LEO SERIES 46
C. Assigns a value to a variable
D. Terminates the program
11. What is a flowchart used for in programming?
A. To design the user interface
B. To visualize the structure of the code
C. To outline the logic of a program
D. To compile the program
12. What is the purpose of the “while” loop in programming?
A. To execute a block of code once
B. To execute a block of code repeatedly until a condition is false
C. To call a function
D. To check for syntax errors
13. What is an array in programming?
A. A single data element
B. A collection of similar data elements
C. A function
D. A data structure used to store integers
14. Which of the following is not a programming language?
A. Python
B. Java
C. HTML
D. HTTP
15. What is an algorithm?
A. A graphical representation of code
B. A type of data structure
C. A set of steps for solving a problem
D. A mathematical operation
16. What is the purpose of a "for" loop in programming?
A. To repeat a set of instructions a specific number of times
B. To execute code based on a condition
C. To create functions
D. To define variables
17. What does a "function" do in a program?
A. It stores data
B. It repeats instructions
C. It defines a block of code to perform a specific task
D. It checks for errors
18. Which of these is a correct example of a loop structure?
A. if-else
B. for
C. return
D. variable
19. What is a “break” statement used for in programming?
A. To terminate the entire program
B. To exit a loop early
C. To define a function
D. To declare a variable
20. Which of the following statements is true about programming languages?
A. All programming languages are the same
B. Every programming language has its own syntax and rules
C. Programming languages cannot be used to build websites
D. Only high-level languages are useful for programming
Page 46 of 123
LEO SERIES 47
21. What is the purpose of an “if-else” condition in programming?
A. To repeat code until a condition is met
B. To define a function
C. To execute code based on a condition
D. To store data
22. Which of the following is not a data type in programming?
A. Integer
B. String
C. Float
D. Loop
23. What is a "compiler" in programming?
A. A tool that executes a program
B. A tool that converts high-level code to machine code
C. A tool for writing algorithms
D. A tool for storing variables
24. What is a "runtime error" in programming?
A. An error that occurs when compiling the code
B. An error that occurs during the execution of a program
C. An error caused by invalid syntax
D. An error caused by incorrect variable declarations
25. Which of the following is an example of object-oriented programming?
A. Python
B. Assembly
C. C++
D. HTML
26. What does the term “iteration” mean in programming?
A. A type of data structure
B. A way of repeating code multiple times
C. A process for debugging code
D. A way of optimizing performance
27. What is the difference between a function and a method in programming?
A. A method is a special function in object-oriented programming
B. A function returns a value, while a method does not
C. A method is used only in web development
D. There is no difference
28. What is a pseudocode?
A. A programming language
B. A way of writing algorithms using natural language
C. A syntax error
D. A data structure
29. What does “declaration” of a variable mean in programming?
A. Defining a variable's type and name
B. Assigning a value to a variable
C. Storing a variable in memory
D. Calling a function
30. What is the function of a “switch” statement in programming?
A. To compare multiple conditions and execute corresponding blocks of code
B. To assign values to variables
C. To repeat a block of code
D. To exit from a loop
31. What is the difference between a "while loop" and a "for loop"?
A. "For loop" runs a set number of times, while "while loop" runs indefinitely
B. "While loop" runs a set number of times, while "for loop" runs indefinitely
Page 47 of 123
LEO SERIES 48
C. "For loop" is used for repeating code based on a condition
D. "While loop" is used when the number of iterations is known
32. What does "encapsulation" mean in object-oriented programming?
A. Hiding the internal state and only exposing relevant data and functions
B. Storing data in memory
C. Writing efficient algorithms
D. Using recursion to solve problems
33. What is recursion in programming?
A. A function calling itself
B. A loop structure
C. A method for sorting data
D. A way to handle errors
34. Which of the following is the correct way to start a comment in Python?
A. #
B. //
C. /*
D. !
35. What is a “tuple” in programming?
A. An unordered collection of elements
B. An ordered, immutable collection of elements
C. A type of loop
D. A temporary storage location
36. What is the purpose of the “continue” statement in programming?
A. To skip the current iteration of a loop and proceed to the next iteration
B. To exit the loop immediately
C. To define a function
D. To return a value from a function
37. Which of these is an example of a simple problem-solving technique in programming?
A. Debugging
B. Algorithm design
C. Data storage
D. Variable declaration
38. What is a “method” in programming?
A. A function that belongs to a class in object-oriented programming
B. A type of data structure
C. A loop structure
D. A variable
39. What does a “class” represent in object-oriented programming?
A. A function
B. A blueprint for creating objects
C. A way to declare variables
D. A type of error
40. What is the first step when creating a program?
A. Writing the code
B. Testing the program
C. Defining the problem
D. Debugging the code
41. What is a "data structure" in programming?
A. A way to store and organize data efficiently
B. A function to manipulate data
C. A loop to repeat code
D. A type of algorithm
Page 48 of 123
LEO SERIES 49
42. What does the term “variable assignment” refer to in programming?
A. Storing data in a file
B. Giving a variable a value
C. Defining the structure of a program
D. Writing a function
43. What is an example of a looping structure?
A. Function
B. If statement
C. For loop
D. Class
44. What is the importance of problem decomposition in programming?
A. To break down complex problems into smaller, more manageable parts
B. To create reusable functions
C. To optimize code
D. To handle errors
45. Which of the following would most likely be used in a for loop?
A. A fixed number of iterations
B. A condition that evaluates to true
C. A function call
D. An input from the user
46. What is an exception in programming?
A. An unexpected event or error that disrupts the normal flow of execution
B. A function call
C. A type of data
D. A loop structure
47. What does "iteration" mean in the context of loops?
A. A single execution of a loop
B. A way to define a variable
C. A way to create a method
D. A technique for handling exceptions
48. What does the term "parameter" refer to in programming?
A. A variable that holds data for a function
B. A block of code
C. A way to store data
D. A data structure
49. Which of the following is an example of a basic data type?
A. Integer
B. List
C. Dictionary
D. Class
50. What does “return” do in a function?
A. It assigns a value to a variable
B. It terminates the function and returns a result to the calling code
C. It starts a loop
D. It defines a new variable
51. What is an index in the context of an array?
A. The value stored at a particular position in the array
B. The length of the array
C. The position of an element in the array
D. A function used to retrieve data from the array
52. What is the purpose of the “try” and “except” block in Python?
A. To handle exceptions or errors in the program
B. To repeat a block of code
Page 49 of 123
LEO SERIES 50
C. To define functions
D. To test the program
53. Which of the following is a logical operator?
A. ==
B. +
C. &&
D. =
54. What is the output of the expression 3 + 2 * 5?
A. 25
B. 13
C. 16
D. 10
55. What is a “binary search” algorithm used for?
A. To find a specific item in a sorted list
B. To sort a list of elements
C. To calculate the average of a list
D. To store data in a list
56. What does the “else” part of an “if-else” condition do?
A. It executes when the condition is true
B. It executes when the condition is false
C. It exits the program
D. It defines a variable
57. What is a stack in programming?
A. A data structure where the last element added is the first one to be removed
B. A collection of similar elements
C. A type of loop
D. A method of sorting data
58. Which of the following defines a “bug” in a program?
A. A tool for debugging code
B. A mistake or error in the code
C. A function in the program
D. A type of data
59. What is the result of a program when there is a syntax error?
A. The program runs but produces incorrect results
B. The program crashes or does not run
C. The program executes successfully
D. The program is debugged automatically
60. What does an "IDE" stand for in programming?
A. Integrated Design Environment
B. Integrated Development Environment
C. Instructional Data Environment
D. Information Data Environment
61. What is the purpose of a "return statement" in a function?
A. To call a function
B. To return a value from the function to the calling code
C. To end the program
D. To declare a variable
62. What is a "list" in Python?
A. A mutable, ordered collection of elements
B. A collection of unique elements
C. A data structure for storing key-value pairs
D. A loop structure
Page 50 of 123
LEO SERIES 51
63. Which of the following is an example of a boolean expression?
A. 2 + 2
B. if x > 5
C. "Hello World"
D. x = 10
64. What does a “break” statement do in a loop?
A. Skips to the next iteration
B. Exits the loop entirely
C. Defines a function
D. Creates a condition
65. What does the term “syntax error” refer to?
A. A logical mistake in the program
B. A runtime error
C. An error due to incorrect code formatting or structure
D. An error in the algorithm
66. What is an example of a recursive function?
A. A function that calls itself
B. A function that takes an array as input
C. A function that returns a value
D. A function that prints output
67. What is the purpose of an "if-else" statement?
A. To repeat a block of code
B. To compare values and execute code based on conditions
C. To create a loop
D. To define a class
68. What is the main difference between a "while loop" and a "for loop"?
A. A for loop repeats indefinitely, while a while loop has a fixed number of iterations
B. A while loop repeats indefinitely, while a for loop repeats a fixed number of times
C. A for loop is used only for numeric values
D. A while loop is faster than a for loop
69. Which of the following is used to handle exceptions in Python?
A. Try and except
B. If and else
C. For loop
D. While loop
70. What is the output of the following code: print(2 + 3 * 4)?
A. 14
B. 20
C. 18
D. 10
71. What is a function in programming?
A. A block of code that performs a specific task
B. A way to store data
C. A loop structure
D. A data type
72. What is the purpose of a "class" in object-oriented programming?
A. To define a function
B. To create reusable templates for objects
C. To store data
D. To define a variable
73. Which of these is a valid Python function definition?
A. function myFunction()
B. def myFunction():
Page 51 of 123
LEO SERIES 52
C. def myFunction{}
D. function myFunction{}
74. Which of the following is used to define a function in Python?
A. function
B. def
C. func
D. funcdef
75. What does "object-oriented programming" focus on?
A. Organizing code into objects and classes
B. Storing data in arrays
C. Writing low-level code
D. Performing mathematical operations
76. What is the first step in creating an algorithm?
A. Debugging
B. Identifying the problem to solve
C. Writing the code
D. Testing the solution
77. What is an example of an "if statement" in Python?
A. if x == 10:
B. while x == 10:
C. for x in range(10):
D. function x():
78. What is a method in object-oriented programming?
A. A function that is associated with an object
B. A type of loop
C. A block of code that repeats
D. A way to store data
79. What does "inheritance" mean in object-oriented programming?
A. The ability of a class to inherit properties and methods from another class
B. A way of handling errors
C. A way to store data
D. The process of compiling code
80. Which of the following statements is true about a "for loop"?
A. It repeats a block of code a fixed number of times
B. It repeats indefinitely
C. It calls functions
D. It defines variables
81. What is an "array" in programming?
A. A collection of elements that are all of the same data type
B. A function that performs a task
C. A loop structure
D. A mathematical operation
82. What is the purpose of "modulus" in programming?
A. To divide two numbers
B. To find the remainder after division
C. To multiply two numbers
D. To subtract two numbers
83. What does the term "logical operators" refer to in programming?
A. Operators that perform arithmetic calculations
B. Operators that test relationships between values
C. Operators used in loops
D. Operators used to assign values
Page 52 of 123
LEO SERIES 53
84. Which of these is not a data structure?
A. Array
B. Function
C. List
D. Stack
85. What is a “string” in programming?
A. A sequence of characters
B. A data structure
C. A loop structure
D. A function
86. What is the purpose of a “while loop”?
A. To repeat a block of code while a condition is true
B. To store data
C. To define a class
D. To compare two values
87. Which of the following is an example of a comparison operator?
A. +
B. =
C. ==
D. *
88. What is the purpose of "indexing" in an array?
A. To define the type of elements
B. To retrieve or modify elements at a specific position
C. To repeat code
D. To define a function
89. What is a "debugger" used for in programming?
A. To store data
B. To detect and fix errors in code
C. To create algorithms
D. To define variables
90. What is an example of a "logical error" in programming?
A. A function that does not return a value
B. A program that runs without producing the expected result
C. A syntax error in the code
D. A runtime error
91. Which of these is a valid loop structure in Python?
A. for
B. if-else
C. def
D. return
92. What is the role of an IDE (Integrated Development Environment)?
A. To write, test, and debug code in a single interface
B. To compile code
C. To store data
D. To define variables
93. What is a key benefit of using functions in programming?
A. They store data
B. They allow code to be reused
C. They sort data
D. They repeat loops
94. What does the term "parameter" mean in the context of a function?
A. A variable used inside the function to accept input
B. A function that returns a value
Page 53 of 123
LEO SERIES 54
C. A way to store data
D. A method used in a class
95. What is a "comment" in programming used for?
A. To declare a variable
B. To provide explanations about the code for readability
C. To store data
D. To define a loop
96. What is an example of a recursive function?
A. A function that calls itself
B. A function that takes multiple arguments
C. A function that repeats a block of code
D. A function that returns an error
97. What does the term "inheritance" mean in object-oriented programming?
A. A way to reuse code by inheriting properties and methods from a parent class
B. A method to store data
C. A way to handle errors
D. A way to define variables
98. What is the difference between a "while loop" and a "for loop"?
A. A while loop repeats indefinitely, while a for loop repeats a fixed number of times
B. A for loop repeats indefinitely, while a while loop repeats a set number of times
C. A for loop is only used with numbers
D. A while loop executes only once
99. What is the purpose of an "else" statement in an if-else block?
A. To execute when the condition is true
B. To execute when the condition is false
C. To repeat the code
D. To terminate the program
100. What is an example of a "function"?
A. def myFunction():
B. if x == 10:
C. for x in range(10):
D. class MyClass:
101. What is the correct way to define a variable in Python?
A. var x = 10
B. x := 10
C. int x = 10
D. x = 10
102. Which operator is used to calculate the remainder of a division?
A. /
B. %
C. *
D. //
103. Which of the following is an example of a conditional statement in Python?
A. if x > 10:
B. for i in range(10):
C. while x != 0:
D. def myFunction():
104. What is the term for a function that calls itself?
A. Recursive function
B. Iterative function
C. Looping function
D. Anonymous function
Page 54 of 123
LEO SERIES 55
105. What is the purpose of a "while loop"?
A. To iterate over a collection of items
B. To repeat a block of code as long as a condition is true
C. To call a function
D. To define a class
106. What is the main purpose of an algorithm?
A. To store data
B. To break down a problem into steps for solving it
C. To define a class
D. To display output
107. In programming, what is a “string”?
A. A list of integers
B. A sequence of characters
C. A loop structure
D. A type of operator
108. What is the purpose of the “continue” statement in a loop?
A. To exit the loop
B. To skip the current iteration and continue with the next one
C. To define a function
D. To check a condition
109. What is a "list" in Python?
A. A set of key-value pairs
B. A data structure used for storing multiple items in a single variable
C. A way to handle exceptions
D. A way to define a function
110. What is the result of 10 // 3 in Python?
A. 3.0
B. 3
C. 3.33
D. 10
111. How do you define a dictionary in Python?
A. dict = []
B. dict = {}
C. dict = ()
D. dict = <>
112. What is a class in object-oriented programming?
A. A function that defines a block of code
B. A blueprint for creating objects
C. A way to perform calculations
D. A collection of values
113. Which keyword is used to define a function in Python?
A. function
B. def
C. fun
D. func
114. What is an example of a "for loop" in Python?
A. for x in range(10):
B. while x == 10:
C. if x > 10:
D. def myFunction():
115. What does the “elif” statement do in an if-else block?
A. Checks for an additional condition
B. Loops through a collection of items
Page 55 of 123
LEO SERIES 56
C. Defines a new function
D. Exits the program
116. What does “break” do in a loop?
A. Skips the current iteration
B. Exits the loop entirely
C. Stops the program
D. Continues to the next block of code
117. What is the output of print(2 + 3 * 4)?
A. 14
B. 20
C. 18
D. 10
118. What is an example of an "infinite loop"?
A. while True:
B. for i in range(10):
C. while x < 10:
D. for x in range(0, 10, 2):
119. Which of these is an example of a nested loop?
A. for x in range(10): for y in range(10):
B. for x in range(10):
C. while x < 10:
D. if x > 10:
120. What does the “else” clause do in an if-else statement?
A. Executes code when the condition is false
B. Executes code when the condition is true
C. Ends the program
D. Creates an infinite loop
121. What is the output of the code print(2 * 3 + 5)?
A. 11
B. 21
C. 15
D. 10
122. What is the difference between a "list" and a "tuple" in Python?
A. A list is immutable, while a tuple is mutable
B. A list is mutable, while a tuple is immutable
C. A list stores key-value pairs, while a tuple stores values only
D. There is no difference
123. Which of these is an example of a "comparison operator"?
A. ==
B. =
C. &
D. ++
124. What is the purpose of the “append()” method in Python?
A. To add an element to the end of a list
B. To remove an element from a list
C. To sort a list
D. To replace an element in a list
125. What is a "tuple" in Python?
A. A mutable collection of values
B. A type of operator
C. An immutable collection of values
D. A function
Page 56 of 123
LEO SERIES 57
126. Which operator is used to compare two values for equality in Python?
A. ==
B. =
C. ===
D. !=
127. What is the purpose of a "for loop"?
A. To iterate over a range of values or a collection of items
B. To check a condition
C. To define a class
D. To store a collection of items
128. What is the result of 5 * 2 - 4?
A. 10
B. 6
C. 4
D. 12
129. What is an example of an “exception”?
A. A “ZeroDivisionError” when dividing by zero
B. A syntax error
C. A logical error in a program
D. A memory allocation error
130. What does the term "recursion" mean in programming?
A. A function that repeats a block of code
B. A function that calls itself
C. A method to find prime numbers
D. A type of loop
131. What is the purpose of the “break” statement in a loop?
A. To skip to the next iteration
B. To exit the loop completely
C. To execute code when a condition is true
D. To define a variable
132. Which of these is an example of a function in Python?
A. def myFunction():
B. for x in range(10):
C. while x > 5:
D. class MyClass:
133. What is the correct syntax for a comment in Python?
A. // This is a comment
B. # This is a comment
C. /* This is a comment */
D. comment: This is a comment
134. What is the purpose of the "input()" function in Python?
A. To print a message to the console
B. To receive input from the user
C. To create a variable
D. To define a function
135. What is an example of a “logical operator” in Python?
A. and
B. +
C. =
D. //
136. What is the purpose of “elif” in an if-else block?
A. To execute an additional condition if the previous ones are false
B. To end the loop
Page 57 of 123
LEO SERIES 58
C. To store values
D. To create a function
137. What is the result of 10 / 3 in Python?
A. 3.33
B. 3
C. 10
D. 3.0
138. What is the purpose of “continue” in a loop?
A. To exit the loop
B. To skip the current iteration and continue with the next
C. To call a function
D. To define a class
139. What is the main characteristic of a “list” in Python?
A. It can only contain numbers
B. It is immutable
C. It is mutable and ordered
D. It is a key-value pair collection
140. What is an example of a "nested loop"?
A. for i in range(3): for j in range(3):
B. for i in range(3):
C. while i < 3:
D. if i == 3:
141. What is the output of the following Python code?
x = [1, 2, 3]
x.append(4)
print(x)
A. [1, 2, 3]
B. [1, 2, 3, 4]
C. [4, 1, 2, 3]
D. Error
142. What is the purpose of the “pass” statement in Python?
A. To exit a loop
B. To define a class
C. To mark a place where code will be written later
D. To return a value
143. Which of the following is used to define a function in Python?
A. func
B. function
C. def
D. method
144. What is the output of the following code?
x = 10
y = 20
print(x == y)
A. True
B. False
C. Error
D. None
145. What is the result of 4 ** 2 in Python?
A. 8
B. 16
C. 4
D. 2
Page 58 of 123
LEO SERIES 59
146. Which of these data types is immutable in Python?
A. List
B. Dictionary
C. Tuple
D. Set
147. What does the "range()" function do in Python?
A. Returns a list of values
B. Generates a sequence of numbers
C. Creates a new function
D. Defines a class
148. How do you create a set in Python?
A. set = []
B. set = {}
C. set = ()
D. set = set()
149. What does the is operator do in Python?
A. Checks if two variables have the same value
B. Checks if two variables are the same object in memory
C. Assigns a value to a variable
D. Checks if a variable is of a specific data type
150. What is the correct syntax for a "for loop" in Python?
A. for i in range(0, 10):
B. for i = 0 to 10:
C. for i in 10:
D. for (i=0; i<10; i++):
151. What is the output of the following Python code?
x = [1, 2, 3]
x.remove(2)
print(x)
A. [1, 2, 3]
B. [1, 3]
C. [2, 3]
D. Error
152. Which of the following is used to terminate a loop in Python?
A. break
B. continue
C. exit
D. stop
153. What does the del statement do in Python?
A. Deletes an element from a list
B. Deletes a variable
C. Deletes a function
D. All of the above
154. What is the output of the following code?
x = [1, 2, 3]
x.insert(1, 4)
print(x)
A. [1, 4, 2, 3]
B. [4, 1, 2, 3]
C. [1, 2, 3, 4]
D. Error
155. What is the purpose of the else statement in a loop in Python?
A. Executes code when the loop completes normally (not by a break)
Page 59 of 123
LEO SERIES 60
B. Skips the current iteration of the loop
C. Ends the program
D. Defines a new function
156. How do you check if a value exists in a list in Python?
A. if x in list:
B. if list.contains(x):
C. if x.exists(list):
D. if list.has(x):
157. What is the purpose of the try and except blocks in Python?
A. To define a function
B. To handle errors and exceptions
C. To create loops
D. To declare variables
158. What is the output of len("Hello") in Python?
A. 5
B. 6
C. 4
D. 0
159. What is the result of the following expression: 3 + 4 * 2?
A. 14
B. 11
C. 7
D. 10
160. Which of the following is a valid list in Python?
A. [1, "hello", 3.14]
B. (1, "hello", 3.14)
C. {1, "hello", 3.14}
D. [1; "hello"; 3.14]
161. What is the purpose of the in operator in Python?
A. Checks if a value exists in a list, string, or other iterable
B. Compares two variables for equality
C. Defines a new function
D. Assigns a value to a variable
162. How do you define a method in Python?
A. method myMethod():
B. def myMethod():
C. function myMethod():
D. create myMethod():
163. Which of the following is the correct way to check the length of a string in Python?
A. length("Hello")
B. len("Hello")
C. string.length("Hello")
D. "Hello".size()
164. What is the result of 3 ** 2 in Python?
A. 9
B. 6
C. 8
D. 2
165. Which of the following is a valid Python variable name?
A. 1variable
B. variable_name
C. variable name
D. @variable
Page 60 of 123
LEO SERIES 61
166. What is the output of the following code?
x = 10
y=5
print(x / y)
A. 2.0
B. 2
C. 15
D. 5
167. What is the correct way to start a comment in Python?
A. //
B. #
C. /*
D. <!--
168. What is the purpose of the return statement in a function?
A. To exit a loop
B. To call a function
C. To return a value from a function
D. To print a message
169. What is the result of 10 % 3 in Python?
A. 3
B. 1
C. 2
D. 0
170. How do you define a variable in Python?
A. var x = 10
B. x := 10
C. x = 10
D. 10 = x
171. What is the purpose of a function in programming?
A. To store data
B. To perform a specific task when called
C. To define a class
D. To print output
172. What is the result of list("hello") in Python?
A. ['h', 'e', 'l', 'l', 'o']
B. "hello"
C. ['hello']
D. Error
173. How do you concatenate two strings in Python?
A. string1 + string2
B. string1.append(string2)
C. string1.add(string2)
D. string1.merge(string2)
174. Which of these is the correct way to handle exceptions in Python?
A. try: except:
B. catch:
C. error:
D. handle:
175. What does the range() function return in Python?
A. A list of numbers
B. A string
C. A tuple
D. A sequence of numbers
Page 61 of 123
LEO SERIES 62
176. What is the purpose of the elif statement?
A. To check multiple conditions in an if-else block
B. To create a loop
C. To declare a variable
D. To exit a function
177. What is the result of 2 + 3 * 4 in Python?
A. 14
B. 20
C. 10
D. 5
178. What is the purpose of the input() function?
A. To display output
B. To receive input from the user
C. To declare a variable
D. To perform a mathematical operation
179. What will be the output of the following code?
x = [1, 2, 3]
x.pop(0)
print(x)
A. [1, 2, 3]
B. [2, 3]
C. [1, 3]
D. Error
180. Which of the following is a valid Python tuple?
A. [1, 2, 3]
B. (1, 2, 3)
C. {1, 2, 3}
D. 1, 2, 3
181. What will be the output of the following Python code?
x = "Python"
print(x[2:])
A. "Py"
B. "tho"
C. "thon"
D. "P"
182. What is the output of the following Python code?
x = [5, 10, 15]
x[1] = 20
print(x)
A. [5, 10, 15]
B. [5, 20, 15]
C. [20, 10, 15]
D. [5, 10, 20]
183. Which of the following is the correct way to define a dictionary in Python?
A. dict = {}
B. dict = []
C. dict = ()
D. dict = //
184. How do you access the value associated with a key in a Python dictionary?
A. dict(key)
B. dict[key]
C. dict.key()
D. dict.key
Page 62 of 123
LEO SERIES 63
185. What is the result of True + 1 in Python?
A. 1
B. 2
C. Error
D. True
186. How would you define a class in Python?
A. class MyClass():
B. def MyClass():
C. function MyClass():
D. new MyClass():
187. What will the following code print?
x=7
y=3
print(x // y)
A. 2.33
B. 2
C. 3
D. 21
188. What is the purpose of the continue statement in a loop?
A. To exit the loop
B. To skip the current iteration and move to the next one
C. To stop the program
D. To call a function
189. What will be the output of this code?
x = {1, 2, 3, 4}
x.add(5)
print(x)
A. {1, 2, 3, 4}
B. {1, 2, 3, 4, 5}
C. [1, 2, 3, 4, 5]
D. Error
190. Which of the following statements about Python functions is correct?
A. A function must always return a value
B. A function can return multiple values
C. Functions cannot have parameters
D. A function cannot call another function
191. How can you define a default parameter value in Python?
A. def function(parameter=10):
B. def function(parameter:10):
C. def function(parameter[10]):
D. def function(parameter?=10):
192. What is the output of the following code?
x=4
x=x+1
print(x)
A. 4
B. 5
C. 6
D. 1
193. What is the function of the random module in Python?
A. To generate random numbers
B. To define a list
Page 63 of 123
LEO SERIES 64
C. To create loops
D. To handle exceptions
194. Which of the following is the correct syntax for an "if" statement in Python?
A. if condition:
B. if (condition)
C. if {condition}
D. if condition then:
195. What is the output of the following code?
x = 10
if x > 5:
print("Greater")
else:
print("Smaller")
A. Greater
B. Smaller
C. Error
D. None
196. Which of the following is an example of a Python iterable?
A. List
B. Dictionary
C. String
D. All of the above
197. What is the purpose of the join() method in Python?
A. To add elements to a list
B. To combine elements of an iterable into a string
C. To remove elements from a list
D. To reverse a string
198. How would you represent an empty dictionary in Python?
A. {}
B. []
C. ()
D. null
199. What will be the output of the following Python code?
x = "hello"
y = x.upper()
print(y)
A. hello
B. HELLO
C. Hello
D. Error
200. What is the output of the following Python code?
x = [1, 2, 3, 4]
y = x.pop()
print(y)
A. [1, 2, 3]
B. 1
C. 4
D. Error
ANSWERS TO OBJECTIVE TEST
Question Answer Question Answer Question Answer Question Answer Question Answer
No. No. No. No. No.
1 C 2 C 3 B 4 D 5 B
6 B 7 C 8 C 9 D 10 C
11 B 12 C 13 A 14 D 15 B
Page 64 of 123
LEO SERIES 65
16 A 17 A 18 B 19 C 20 D
21 B 22 A 23 D 24 B 25 A
26 D 27 C 28 B 29 A 30 C
31 B 32 C 33 B 34 A 35 D
36 C 37 A 38 D 39 C 40 B
41 C 42 A 43 D 44 C 45 B
46 D 47 C 48 B 49 A 50 B
51 C 52 A 53 D 54 C 55 A
56 C 57 B 58 A 59 D 60 B
61 C 62 A 63 D 64 C 65 B
66 D 67 A 68 C 69 B 70 A
71 B 72 C 73 A 74 D 75 B
76 C 77 A 78 D 79 B 80 A
81 C 82 D 83 A 84 B 85 C
86 A 87 B 88 D 89 C 90 B
91 D 92 A 93 C 94 B 95 D
96 C 97 B 98 A 99 D 100 C
101 B 102 C 103 A 104 D 105 B
106 C 107 A 108 D 109 B 110 A
111 C 112 D 113 B 114 A 115 C
116 D 117 B 118 A 119 C 120 B
121 A 122 C 123 B 124 D 125 C
126 A 127 B 128 C 129 D 130 A
131 B 132 D 133 C 134 A 135 B
136 A 137 D 138 C 139 B 140 A
141 D 142 C 143 B 144 A 145 D
146 C 147 B 148 A 149 D 150 B
151 A 152 C 153 D 154 B 155 A
156 B 157 C 158 D 159 A 160 C
161 B 162 A 163 D 164 B 165 A
166 C 167 B 168 D 169 A 170 B
171 D 172 A 173 C 174 B 175 A
176 C 177 B 178 A 179 D 180 B
181 C 182 B 183 A 184 B 185 B
186 A 187 B 188 B 189 B 190 B
191 A 192 B 193 A 194 A 195 A
196 D 197 B 198 A 199 B 200 C
Page 66 of 123
LEO SERIES 67
A. =SUM()
B. =AVERAGE()
C. =MAX()
D. =MIN()
16. What type of software is Microsoft PowerPoint?
A. Word processing software
B. Spreadsheet software
C. Presentation software
D. Database software
17. Which of the following is used to create a presentation in Microsoft PowerPoint?
A. Text boxes only
B. Slides
C. Cells
D. Tables
18. In PowerPoint, what is the purpose of the "Slide Sorter" view?
A. To add transitions to slides
B. To arrange the order of slides
C. To create a new slide
D. To print the slides
19. What does the term 'data visualization' refer to?
A. Storing data in a database
B. Displaying data using graphs and charts
C. Encrypting data for security
D. Compressing data for storage
20. What is the main purpose of using charts in presentations?
A. To add text to slides
B. To summarize and display data visually
C. To animate slides
D. To create complex tables
21. What is a common format used for storing images in a presentation?
A. .mp4
B. .jpg
C. .pdf
D. .exe
22. Which of the following is an example of a graphical element used in presentations?
A. Table
B. Image
C. Chart
D. All of the above
23. In Excel, what is a "cell" defined as?
A. A column
B. A row
C. The intersection of a row and column
D. A type of data
24. What is the use of conditional formatting in Excel?
A. To apply colors to a worksheet
B. To apply styles based on specific conditions
C. To hide certain data
D. To protect the data
25. Which of the following is a primary function of a spreadsheet program?
A. Writing and editing text
B. Organizing and analyzing data
C. Storing multimedia files
Page 67 of 123
LEO SERIES 68
D. Creating animations
26. In Excel, what is the default file extension when saving a workbook?
A. .xls
B. .xlsx
C. .docx
D. .pptx
27. What is the main purpose of "data cleaning" in data management?
A. To collect new data
B. To remove or correct errors in data
C. To store data securely
D. To visualize data
28. Which of the following is NOT an example of a data visualization tool?
A. Microsoft Excel
B. Google Sheets
C. Adobe Photoshop
D. Tableau
29. What does the "VLOOKUP" function in Excel do?
A. Creates a list of unique values
B. Finds a value in a row and returns a corresponding value from another column
C. Calculates the sum of a range of cells
D. Counts the number of cells in a range
30. In Excel, which function is used to calculate the number of cells that meet a specific condition?
A. =COUNTA()
B. =SUM()
C. =COUNTIF()
D. =IF()
31. What is the primary purpose of a "pivot table" in Excel?
A. To display data in a graphical format
B. To filter and summarize data
C. To create new data entries
D. To calculate the sum of data
32. What type of chart would be most suitable for comparing the sales performance of different products?
A. Line chart
B. Bar chart
C. Pie chart
D. Histogram
33. Which of the following is the correct syntax to calculate the total of cells A1 to A10 in Excel?
A. =SUM(A1:A10)
B. =ADD(A1:A10)
C. =TOTAL(A1:A10)
D. =PLUS(A1:A10)
34. What is the term for arranging data in an orderly fashion, typically alphabetically or numerically?
A. Sorting
B. Filtering
C. Merging
D. Grouping
35. What type of data is best stored in a table format?
A. Text documents
B. Numerical data
C. Multimedia files
D. Raw data that needs to be organized
36. Which of the following would be considered a "text-based" data type in Excel?
A. Number
Page 68 of 123
LEO SERIES 69
B. Date
C. Boolean
D. String
37. What is a "cell reference" in Excel?
A. The address of a cell in the form of a column letter and row number
B. The value stored in a cell
C. The name given to a cell
D. The formula used in a cell
38. What does the "SUMIF" function in Excel do?
A. Adds all the values in a range
B. Adds the values in a range based on a given condition
C. Adds all unique values in a range
D. Adds only positive values in a range
39. What does the "LEFT" function in Excel do?
A. Extracts a given number of characters from the right side of a string
B. Extracts a given number of characters from the left side of a string
C. Converts text to uppercase
D. Removes extra spaces from a string
40. What is the function of the "Freeze Panes" feature in Excel?
A. To secure the data in a cell
B. To freeze the rows or columns while scrolling
C. To highlight a specific cell
D. To merge multiple cells
41. In PowerPoint, which of the following is used to enhance the visual appeal of a presentation?
A. Animations
B. Textboxes
C. Tables
D. Footnotes
42. What is the default slide layout in PowerPoint?
A. Title Slide
B. Blank Slide
C. Title and Content
D. Two Content
43. Which of the following PowerPoint views is used to edit the content of a single slide?
A. Slide Sorter
B. Notes Page
C. Slide Show
D. Normal
44. Which of the following can be inserted in a PowerPoint slide?
A. Video
B. Sound
C. Image
D. All of the above
45. What is the purpose of using a "transition" in PowerPoint?
A. To change the layout of a slide
B. To apply effects when moving from one slide to another
C. To add animations to the text
D. To create hyperlinks within a slide
46. What feature in PowerPoint allows you to add dynamic effects to individual elements on a slide?
A. Slide transition
B. Animation
C. Background theme
D. Slide sorter
Page 69 of 123
LEO SERIES 70
47. What is the function of the "Design" tab in PowerPoint?
A. To create and organize slides
B. To customize the appearance of the slides
C. To add animations and transitions
D. To insert multimedia files
48. What does the "Slide Show" feature in PowerPoint allow you to do?
A. View the presentation as a slideshow
B. Add new slides to the presentation
C. Insert multimedia elements into the presentation
D. Rearrange the order of slides
49. Which of the following is a way to improve the readability of a presentation?
A. Using too many fonts
B. Using a dark background with light text
C. Using large amounts of text on each slide
D. Using small font sizes
50. Which of the following can be inserted into a PowerPoint slide to add interactivity?
A. Hyperlinks
B. Images
C. Video clips
D. All of the above
51. Which of the following is used to remove duplicate values in Excel?
A. Remove Duplicates Tool
B. Clear Content Tool
C. Hide Duplicates Tool
D. Filter Tool
52. In PowerPoint, what is the purpose of the "Slide Master" feature?
A. To create new slides
B. To design the overall look of slides
C. To insert images into slides
D. To add animations to slides
53. Which of the following tools is used to check spelling in Microsoft Excel?
A. Spell Checker
B. Grammar Check
C. Proofing
D. Word Count
54. What does the "HYPERLINK" function do in Excel?
A. It links cells to each other
B. It allows you to link to a web page or another document
C. It merges cells
D. It provides data validation for cells
55. In Excel, how would you display data in a pie chart format?
A. Select the data and choose the Pie Chart option from the Insert tab
B. Use the VLOOKUP function
C. Use the SUMIF function
D. Use the IFERROR function
56. What is a "Bar Chart" used for in data presentation?
A. Displaying time trends
B. Showing proportions
C. Comparing data across categories
D. Showing frequency distribution
57. What is the default view in Microsoft PowerPoint?
A. Slide Sorter View
B. Notes Page View
Page 70 of 123
LEO SERIES 71
C. Normal View
D. Reading View
58. What is a "cell range" in Excel?
A. A single cell
B. A row of cells
C. A group of cells selected together
D. A row of columns
59. How can you add a hyperlink to a PowerPoint slide?
A. Insert > Hyperlink
B. Slide Show > Hyperlink
C. Design > Hyperlink
D. Animations > Hyperlink
60. In Excel, what would the function =COUNTIF(A1:A10,">5") do?
A. Count the cells with values greater than 5 in the range A1:A10
B. Count the cells with values less than 5 in the range A1:A10
C. Sum the values greater than 5 in the range A1:A10
D. Count the total number of cells in the range A1:A10
61. In PowerPoint, what is the function of "Presenter View"?
A. To add animations to slides
B. To view speaker notes while presenting
C. To create transitions between slides
D. To share the presentation with others
62. What is the best file format for saving a PowerPoint presentation for sharing online?
A. .jpg
B. .pptx
C. .pdf
D. .exe
63. Which of the following can be used to apply the same format to multiple cells in Excel?
A. Format Painter
B. Merge Cells
C. Freeze Panes
D. Data Validation
64. In Excel, how do you change the background color of a cell?
A. Right-click the cell and select 'Format Cells'
B. Use the 'Insert' menu
C. Select 'Home' and use the fill color tool
D. Select 'Data' and apply the background tool
65. What is the function of the "Insert" tab in PowerPoint?
A. To adjust the timing of slides
B. To add multimedia elements to the slides
C. To format the text on slides
D. To apply transitions to slides
66. What is an example of a multimedia element you can add to a PowerPoint presentation?
A. Images
B. Videos
C. Audio files
D. All of the above
67. Which of the following is an example of a "metadata" in Excel?
A. The file name of a workbook
B. The formulas in a cell
C. The data entered into a cell
D. The chart in the workbook
68. What is the purpose of "cell protection" in Excel?
Page 71 of 123
LEO SERIES 72
A. To change the font style
B. To prevent accidental changes to data
C. To highlight specific cells
D. To merge cells
69. Which of the following is NOT a valid function in Excel?
A. =COUNT()
B. =SUMIF()
C. =ADD()
D. =AVERAGE()
70. In PowerPoint, what type of content can be added using the "Text Box" tool?
A. Images
B. Text
C. Videos
D. Charts
71. Which of the following is a valid data type in Microsoft Excel?
A. Boolean
B. Integer
C. Date
D. All of the above
72. In Excel, what does the "Filter" tool do?
A. Sorts the data alphabetically
B. Hides certain data based on specific conditions
C. Calculates the sum of data
D. Merges cells
73. What is a primary benefit of using conditional formatting in Excel?
A. To automatically delete data
B. To apply specific formatting to data based on criteria
C. To create hyperlinks
D. To merge cells
74. What is the "Sum" function used for in Excel?
A. To calculate the average of a range of cells
B. To find the maximum value in a range of cells
C. To add up all the values in a range of cells
D. To count the number of cells with data
75. In Excel, what would the formula =AVERAGE(B1:B5) do?
A. Add up the values in B1 to B5
B. Count the number of cells in B1 to B5
C. Return the highest value in B1 to B5
D. Calculate the average of the values in B1 to B5
76. Which of the following is NOT a valid type of PowerPoint transition?
A. Fade
B. Wipe
C. Zoom
D. Rotate
77. In Excel, what does the "COUNT" function do?
A. Counts the number of empty cells in a range
B. Counts the number of cells that contain numeric data in a range
C. Counts the total number of cells in a range
D. Counts the number of text-based cells in a range
78. In PowerPoint, what is the purpose of using the "Animation Pane"?
A. To apply transitions between slides
B. To add and control the animations applied to elements within a slide
C. To add multimedia files
Page 72 of 123
LEO SERIES 73
D. To view speaker notes
79. Which of the following is the most suitable chart for displaying the market share of companies in a
specific industry?
A. Pie chart
B. Line chart
C. Bar chart
D. Histogram
80. What is the default font in Microsoft PowerPoint?
A. Calibri
B. Arial
C. Times New Roman
D. Verdana
81. In PowerPoint, which of the following can be used to apply a professional design template to all slides in
the presentation?
A. Slide Master
B. Animation
C. Slide Sorter
D. Notes Page
82. In Excel, what would the function =MIN(A1:A10) do?
A. Find the highest value in the range A1:A10
B. Count the number of cells in the range A1:A10
C. Calculate the average of the range A1:A10
D. Find the lowest value in the range A1:A10
83. In PowerPoint, what is the purpose of the "Notes Pane"?
A. To display notes for each slide for the presenter
B. To view the entire presentation
C. To view slide transitions
D. To add new slides
84. What type of data would you store in a relational database?
A. Images
B. Customer information
C. Videos
D. All of the above
85. What is the purpose of "data validation" in Excel?
A. To allow only specific types of data to be entered into a cell
B. To merge cells
C. To add images to cells
D. To calculate totals
86. Which of the following is a valid Excel formula for calculating the total of cells A1 through A5?
A. =SUM(A1, A2, A3, A4, A5)
B. =ADD(A1:A5)
C. =TOTAL(A1:A5)
D. =SUM(A1:A5)
87. In PowerPoint, which of the following actions can you perform in the "Slide Show" tab?
A. Reorder slides
B. Set the timing for automatic slide transitions
C. Add animations to the slides
D. Insert tables and images
88. In Excel, which chart type would be best for comparing sales performance over multiple years?
A. Pie chart
B. Line chart
C. Column chart
D. Radar chart
Page 73 of 123
LEO SERIES 74
89. What is the best method for organizing data in Excel for future use?
A. Using tables and named ranges
B. Storing data in a text file
C. Using pictures
D. Merging cells
90. In Excel, what is a "function"?
A. A pre-defined formula
B. A group of cells
C. A graphic element
D. A formatting tool
91. In Excel, what is the purpose of the "VLOOKUP" function?
A. To find the average of a range
B. To look up a value in a table
C. To filter data based on specific criteria
D. To merge multiple cells
92. What is the default slide size in PowerPoint?
A. A4
B. 4:3
C. 16:9
D. 11x8.5
93. In PowerPoint, what does the "Slide Sorter" view allow you to do?
A. Add text to slides
B. Rearrange slides and view thumbnails
C. Set slide timings
D. Change slide layout
94. Which of the following is NOT a feature of a PowerPoint slide?
A. Title
B. Content
C. Page numbers
D. Slide transitions
95. In Excel, what is the purpose of the "CONCATENATE" function?
A. To add multiple cells together
B. To combine text from multiple cells into one
C. To remove duplicates from a data range
D. To calculate the average of a range
96. In Excel, how do you create a drop-down list in a cell?
A. Use the "Data Validation" tool
B. Use the "VLOOKUP" function
C. Use the "Sort" tool
D. Use the "Insert" menu
97. Which of the following is used to display hierarchical relationships in Excel?
A. Pie Chart
B. SmartArt
C. Scatter Plot
D. Histogram
98. What does the "Format Cells" option in Excel allow you to do?
A. Insert new cells
B. Change the appearance of cell content
C. Sort data
D. Filter data
99. What is the correct function for calculating the number of cells in a range that contain numbers in Excel?
A. =COUNT()
B. =COUNTA()
Page 74 of 123
LEO SERIES 75
C. =COUNTIF()
D. =COUNTBLANK()
100. In PowerPoint, what does the "Animation Pane" allow you to do?
A. Add new slides to the presentation
B. Adjust the timing and order of animations
C. Apply themes to slides
D. Insert pictures and videos
101. What is the "SUMIF" function used for in Excel?
A. To sum values in a range based on a condition
B. To find the average of a range based on a condition
C. To check for errors in a range
D. To count the number of non-blank cells
102. In Excel, which of the following functions is used to calculate the average of a set of values?
A. =SUM()
B. =AVERAGE()
C. =MAX()
D. =MIN()
103. Which of the following is NOT a type of chart available in PowerPoint?
A. Column Chart
B. Line Chart
C. Radar Chart
D. Waterfall Chart
104. In Excel, what is the use of the "IF" function?
A. To perform logical tests and return values based on the condition
B. To add values in a range
C. To calculate the sum of a range
D. To find the largest value in a range
105. What is the purpose of using templates in PowerPoint?
A. To design custom transitions
B. To apply a predefined design to slides
C. To add animation to text
D. To add multimedia elements to slides
106. What is the correct function for finding the highest value in a range in Excel?
A. =MAX()
B. =MIN()
C. =AVERAGE()
D. =COUNT()
107. In Excel, which of the following functions can be used to count the number of cells that contain text?
A. =COUNTIF()
B. =COUNTA()
C. =COUNTBLANK()
D. =COUNT()
108. In PowerPoint, what is the "Design Ideas" feature used for?
A. To change the design of a single slide
B. To apply slide transitions
C. To suggest design layouts for slides
D. To insert shapes and images
109. How would you change the layout of a slide in PowerPoint?
A. Select the "Design" tab and choose a layout
B. Use the "Home" tab and select a new layout
C. Use the "Insert" tab and select a layout
D. Click "Slide Master" to change the layout
110. What is the purpose of the "Data Validation" tool in Excel?
Page 75 of 123
LEO SERIES 76
A. To restrict the type of data entered into a cell
B. To validate the accuracy of the data
C. To format cells in a specific way
D. To filter out specific data
111. In PowerPoint, which of the following can you use to add a new slide to the presentation?
A. Insert > New Slide
B. Home > New Slide
C. Design > New Slide
D. View > New Slide
112. In Excel, what is the result of using the "NOW()" function?
A. It returns the current date
B. It returns the current time
C. It returns the current date and time
D. It returns the date 30 days from today
113. In PowerPoint, what does the "Slide Transition" feature allow you to do?
A. Add effects to elements within a slide
B. Set the timing for automatic slide changes
C. Change the background of a slide
D. Add multimedia content to slides
114. What does the "COUNTIF" function do in Excel?
A. Counts the number of cells in a range that meet a condition
B. Counts the total number of non-empty cells
C. Finds the average of a range
D. Sums the values of a range
115. Which feature in Excel allows you to automatically fill cells with data based on a pattern?
A. AutoFill
B. Copy-Paste
C. Flash Fill
D. Data Validation
116. What is the default page orientation in PowerPoint?
A. Portrait
B. Landscape
C. Square
D. Custom
117. In Excel, which tool is used to combine multiple rows or columns into one?
A. Merge Cells
B. Insert Rows
C. Split Cells
D. Wrap Text
118. In PowerPoint, what is the "Slide Show" tab used for?
A. To add new slides
B. To set the presentation options and play the presentation
C. To insert charts and graphs
D. To create animations
119. What is the function of the "SUM" function in Excel?
A. To count the number of cells in a range
B. To calculate the average of a range
C. To add up values in a range
D. To find the maximum value in a range
120. In PowerPoint, which of the following is used to create animations for slide elements?
A. Animations Pane
B. Transition Pane
C. Format Pane
Page 76 of 123
LEO SERIES 77
D. Slide Layout Pane
121. What is the "Text Box" tool used for in PowerPoint?
A. To add video content
B. To add text content to a slide
C. To add pictures to slides
D. To create charts
122. Which of the following is an example of conditional formatting in Excel?
A. Changing the font color based on cell value
B. Merging cells
C. Sorting data in alphabetical order
D. Creating a pie chart
123. How would you add a comment to a cell in Excel?
A. Right-click the cell and select "Insert Comment"
B. Use the "Insert" tab to add comments
C. Use the "Home" tab to add comments
D. Use the "Data" tab to insert comments
124. In PowerPoint, which of the following is the main function of the "Notes Pane"?
A. To view the full presentation
B. To add detailed notes for the presenter
C. To insert multimedia content
D. To apply transitions to slides
125. In Excel, what does the "AutoSum" function do?
A. Automatically calculates the sum of a range of numbers
B. Automatically sorts data
C. Automatically creates a pie chart
D. Automatically formats a table
126. In Excel, which of the following functions calculates the total number of cells in a range?
A. =COUNT()
B. =COUNTA()
C. =COUNTBLANK()
D. =COUNTO()
127. In PowerPoint, how can you add a hyperlink to a slide?
A. Insert > Hyperlink
B. Design > Hyperlink
C. View > Hyperlink
D. Slide > Hyperlink
128. In Excel, how do you freeze the top row of a spreadsheet?
A. View > Freeze Panes > Freeze Top Row
B. Data > Freeze Panes > Freeze Top Row
C. Home > Freeze Panes > Freeze Top Row
D. Review > Freeze Panes > Freeze Top Row
129. In PowerPoint, which feature is used to create a chart in a slide?
A. Insert > Chart
B. Home > Chart
C. Design > Chart
D. View > Chart
130. In Excel, which of the following is a text formatting option?
A. Bold
B. Filter
C. Freeze Panes
D. Sort
131. How can you resize a picture in PowerPoint?
A. Right-click on the picture and select "Resize"
Page 77 of 123
LEO SERIES 78
B. Drag the corner handles of the picture
C. Use the "Home" tab to resize
D. Use the "Insert" tab to resize
132. What is the function of the "COUNT" function in Excel?
A. Counts the number of cells in a range that contain numbers
B. Counts the number of non-empty cells
C. Finds the highest value in a range
D. Adds the values in a range
133. In PowerPoint, which of the following is used to apply a consistent design throughout the presentation?
A. Slide Master
B. Slide Layout
C. Slide Show
D. Design Ideas
134. In Excel, which function is used to find the number of characters in a cell?
A. =LEN()
B. =COUNT()
C. =SUM()
D. =SEARCH()
135. Which of the following is used to create a bulleted list in PowerPoint?
A. Home > Bullets
B. Design > Bullets
C. Insert > Bullets
D. Slide Show > Bullets
136. What is the purpose of the "SUMPRODUCT" function in Excel?
A. Multiplies corresponding elements in given arrays and returns the sum
B. Adds the numbers in a range
C. Subtracts values in a range
D. Counts the number of non-empty cells
137. In Excel, how would you change the background color of a cell?
A. Use the "Fill Color" tool in the "Home" tab
B. Use the "Data Validation" tool
C. Use the "Merge Cells" tool
D. Use the "Format Cells" option in the "Insert" tab
138. In PowerPoint, what is the purpose of the "Master Slide"?
A. To apply a design layout to individual slides
B. To create a background that appears on all slides
C. To add sound effects to the slides
D. To arrange the slides in order
139. Which of the following is the correct function for finding the smallest value in a range in Excel?
A. =MAX()
B. =MIN()
C. =AVERAGE()
D. =COUNT()
140. In PowerPoint, which of the following allows you to rehearse timings for your presentation?
A. Slide Show > Rehearse Timings
B. Home > Rehearse Timings
C. Insert > Rehearse Timings
D. View > Rehearse Timings
141. What does the "Find and Replace" feature in Excel do?
A. Finds specific text or numbers in the spreadsheet and replaces them with new content
B. Finds the sum of values in a range
C. Replaces the formatting of a range
D. Replaces old charts with new charts
Page 78 of 123
LEO SERIES 79
142. What is the function of "Slide Layouts" in PowerPoint?
A. To add content to slides
B. To change the overall design of the presentation
C. To organize and position elements on slides
D. To add transitions between slides
143. In Excel, which of the following tools is used to organize data in ascending or descending order?
A. Sort
B. Filter
C. Freeze Panes
D. Merge Cells
144. How do you add a table to a slide in PowerPoint?
A. Insert > Table
B. Design > Table
C. Slide Show > Table
D. Home > Table
145. What is the function of the "AutoFilter" tool in Excel?
A. To filter data based on specific criteria
B. To format cells based on their content
C. To sum a range of cells
D. To create a new chart
146. How would you add a new row to a table in Excel?
A. Right-click the row and select "Insert"
B. Use the "Insert" menu
C. Use the "Data" tab
D. Use the "Home" tab
147. Which of the following file extensions is used for PowerPoint presentations?
A. .xls
B. .ppt
C. .docx
D. .txt
148. In Excel, how do you insert a new worksheet?
A. Click the "+" button at the bottom of the screen
B. Use the "Insert" tab
C. Right-click a worksheet tab and select "Insert"
D. Use the "View" tab
149. What is the purpose of the "Transpose" function in Excel?
A. To switch the rows and columns of data
B. To calculate the average of a range
C. To sort data in alphabetical order
D. To apply conditional formatting
150. What does the "Remove Duplicates" function do in Excel?
A. Deletes duplicate rows in a range of data
B. Removes blank cells from a range
C. Counts the number of unique items
D. Replaces values in a range
151. In PowerPoint, which of the following is used to add an image to a slide?
A. Insert > Image
B. Home > Image
C. Design > Image
D. Insert > Picture
152. In Excel, how can you automatically calculate the sum of a range of numbers?
A. Use the AutoSum button
B. Type "=SUM()" manually
Page 79 of 123
LEO SERIES 80
C. Use the Calculate tool
D. Use the "Formulas" tab
153. What is the primary purpose of a "Chart" in Excel?
A. To display data in a graphical format
B. To sort data in ascending or descending order
C. To add colors to cells
D. To create pivot tables
154. In PowerPoint, how can you apply a transition effect between slides?
A. Transitions > Apply Transition
B. Design > Transitions
C. Insert > Transition
D. View > Transition
155. Which of the following is the function to calculate the average of a range in Excel?
A. =MAX()
B. =AVERAGE()
C. =SUM()
D. =COUNT()
156. In Excel, how do you display gridlines on a worksheet?
A. View > Show > Gridlines
B. Format > Gridlines
C. Data > Gridlines
D. Insert > Gridlines
157. In PowerPoint, which of the following is used to insert a table into a slide?
A. Insert > Table
B. Design > Table
C. Home > Table
D. View > Table
158. Which of the following file formats can Excel save a spreadsheet as?
A. .xlsx, .csv, .pdf
B. .ppt, .docx, .txt
C. .jpg, .png, .gif
D. .html, .rtf, .xml
159. How would you change the orientation of a slide in PowerPoint?
A. Design > Slide Orientation
B. View > Slide Orientation
C. Insert > Slide Orientation
D. Home > Slide Orientation
160. In Excel, which function is used to find the largest number in a range?
A. =MIN()
B. =AVERAGE()
C. =MAX()
D. =COUNT()
161. What feature in Excel allows you to analyze data in different ways by arranging it in rows and
columns?
A. Pivot Table
B. Filter
C. Conditional Formatting
D. Sort
162. In PowerPoint, how can you add a video to a slide?
A. Insert > Video
B. Design > Video
C. Slide Show > Video
D. Insert > Media > Video
Page 80 of 123
LEO SERIES 81
163. In Excel, which of the following is used to combine data from multiple cells into one cell?
A. CONCATENATE function
B. SUM function
C. AVERAGE function
D. VLOOKUP function
164. What is the purpose of using "Slide Layouts" in PowerPoint?
A. To change the design of the slide
B. To apply a predefined structure to a slide
C. To add animations to the slide
D. To insert text into a slide
165. In Excel, which function allows you to search for a value in a table and return a corresponding value?
A. VLOOKUP()
B. COUNTIF()
C. SUMIF()
D. INDEX()
166. What does the "Merge & Center" option in Excel do?
A. Merges selected cells and centers the content
B. Merges cells without centering content
C. Merges cells with a border
D. Centers text in the current cell
167. In PowerPoint, which of the following allows you to change the background of a slide?
A. Design > Background Styles
B. Insert > Background
C. Home > Background
D. Slide Show > Background
168. How do you change the font style of text in PowerPoint?
A. Home > Font
B. Design > Font
C. View > Font
D. Slide Show > Font
169. In Excel, how do you format numbers as currency?
A. Use the "Currency" format in the "Number" tab
B. Use the "Text" format
C. Use the "General" format
D. Use the "Date" format
170. How do you delete a slide in PowerPoint?
A. Select the slide and press "Delete"
B. Right-click on the slide and select "Remove"
C. Home > Remove Slide
D. View > Delete Slide
171. What does the "Freeze Panes" option in Excel do?
A. Locks rows or columns to remain visible while scrolling
B. Freezes the data in a cell
C. Creates a new worksheet
D. Changes the color of the panes
172. In PowerPoint, how can you apply a design theme to the entire presentation?
A. Design > Themes
B. Home > Themes
C. View > Themes
D. Slide Show > Themes
173. What is the function of the "Conditional Formatting" tool in Excel?
A. To change the appearance of a cell based on its content
B. To sort data in a range
Page 81 of 123
LEO SERIES 82
C. To filter data in a range
D. To create a new chart
174. Which of the following is used to check for spelling and grammar errors in PowerPoint?
A. Review > Spelling
B. Insert > Spelling
C. Home > Spelling
D. View > Spelling
175. How can you add a hyperlink to a slide in PowerPoint?
A. Insert > Link
B. Design > Hyperlink
C. Home > Hyperlink
D. Insert > Hyperlink
176. In Excel, which of the following tools allows you to sort data alphabetically?
A. Sort
B. Filter
C. Freeze Panes
D. Group
177. In PowerPoint, which of the following features allows you to add animation to an element?
A. Animations > Add Animation
B. Slide Show > Add Animation
C. Home > Add Animation
D. Insert > Add Animation
178. In Excel, which tool would you use to highlight duplicate values in a range of cells?
A. Conditional Formatting > Highlight Cells Rules > Duplicate Values
B. Data > Highlight Duplicates
C. Home > Find Duplicates
D. Review > Highlight Duplicates
179. In PowerPoint, how would you add a transition effect between slides?
A. Transitions > Select Transition
B. Home > Select Transition
C. View > Transitions
D. Insert > Transition
180. In Excel, how can you protect a worksheet from unauthorized editing?
A. Use the "Protect Sheet" option
B. Use the "Hide" function
C. Use the "Lock" function
D. Use the "Save As" function
181. In PowerPoint, how do you add notes to a slide?
A. View > Notes Page
B. Insert > Notes
C. Slide Show > Notes
D. Home > Notes
182. In Excel, which of the following allows you to split text into different columns?
A. Text to Columns
B. Merge Cells
C. Group Cells
D. Align Text
183. In PowerPoint, what is the function of the "Slide Show" tab?
A. To start and control the presentation
B. To add and edit slides
C. To apply design themes
D. To insert text and objects
184. What is the function of the "Fill Handle" in Excel?
Page 82 of 123
LEO SERIES 83
A. To copy the contents of a cell to adjacent cells
B. To calculate a sum of numbers
C. To format text in a cell
D. To create a chart
185. In PowerPoint, how can you insert a new slide?
A. Home > New Slide
B. Insert > New Slide
C. Slide Show > New Slide
D. View > New Slide
186. Which of the following can you use in Excel to remove all the formatting from a cell?
A. Clear Formats
B. Delete Content
C. Clear All
D. Remove Borders
187. In PowerPoint, which of the following is used to add an audio clip to a slide?
A. Insert > Audio
B. Insert > Media > Audio
C. Slide Show > Audio
D. Design > Audio
188. In Excel, how would you display a cell’s content in a different color based
on its value?
A. Use Conditional Formatting
B. Use a Custom Format
C. Use the Format Painter
D. Use the Text Color tool
189. In PowerPoint, what does the "Animation Pane" allow you to do?
A. Manage and customize the animations applied to objects on a slide
B. Add new animations
C. Edit slide layouts
D. Insert new slides
190. In Excel, which of the following functions is used to find the square root of a number?
A. =SQRT()
B. =POWER()
C. =EXP()
D. =ROOT()
191. In PowerPoint, what is the function of the "Presenter View"?
A. Allows you to see the current slide and notes while presenting
B. Displays a list of slides in the presentation
C. Shows the slide in full-screen mode
D. Changes the background of the presentation
192. In Excel, how can you add a comment to a cell?
A. Right-click the cell and select "Insert Comment"
B. Use the "Insert" menu
C. Use the "Review" tab
D. Use the "Home" tab
193. What is the purpose of "Page Setup" in PowerPoint?
A. To adjust slide size and orientation
B. To apply design themes
C. To organize slide content
D. To animate the slides
194. How do you make a chart title dynamic in Excel?
A. By linking it to a cell that changes
B. By using the "Format" tab
Page 83 of 123
LEO SERIES 84
C. By using the "Insert" tab
D. By entering the title manually
195. In PowerPoint, which of the following is used to add a hyperlink to an external website?
A. Insert > Link
B. Design > Link
C. Home > Hyperlink
D. Slide Show > Hyperlink
196. In Excel, how can you highlight cells with specific text using Conditional Formatting?
A. Home > Conditional Formatting > Text that Contains
B. Review > Conditional Formatting > Text that Contains
C. Data > Conditional Formatting > Text that Contains
D. View > Conditional Formatting > Text
197. What is the default file format for saving PowerPoint presentations?
A. .pptx
B. .pdf
C. .docx
D. .txt
198. In Excel, how would you print only the selected range of cells?
A. Select the range > File > Print > Print Selection
B. File > Print > Print Entire Workbook
C. File > Print > Print Current Sheet
D. File > Print > Print All Sheets
199. What does the "Protect Workbook" option in Excel do?
A. Prevents others from making changes to the workbook
B. Creates a backup copy of the workbook
C. Saves the workbook as a PDF
D. Prevents printing of the workbook
200. In PowerPoint, how do you change the order of slides?
A. Slide Sorter > Drag to reorder
B. Design > Order Slides
C. View > Change Order
D. Insert > Move Slide
ANSWERS TO OBJECTIVE TEST
Question Answer Question Answer Question Answer Question Answer Question Answer
1 C 2 A 3 B 4 A 5 A
6 C 7 A 8 B 9 D 10 C
11 D 12 A 13 A 14 C 15 B
16 A 17 C 18 A 19 D 20 B
21 C 22 B 23 D 24 A 25 A
26 C 27 B 28 D 29 A 30 A
31 C 32 D 33 A 34 B 35 A
36 A 37 C 38 B 39 A 40 A
41 D 42 B 43 C 44 A 45 B
46 C 47 D 48 A 49 A 50 C
51 A 52 B 53 C 54 D 55 B
56 A 57 C 58 D 59 B 60 A
61 C 62 A 63 D 64 A 65 C
66 A 67 B 68 C 69 A 70 D
71 B 72 A 73 C 74 A 75 D
76 C 77 A 78 B 79 C 80 A
81 C 82 A 83 D 84 C 85 A
86 B 87 A 88 C 89 A 90 B
91 A 92 D 93 B 94 A 95 C
96 A 97 C 98 B 99 D 100 A
101 B 102 C 103 D 104 A 105 B
106 A 107 C 108 B 109 D 110 A
Page 84 of 123
LEO SERIES 85
111 C 112 A 113 B 114 C 115 D
116 B 117 A 118 D 119 B 120 A
121 A 122 C 123 D 124 A 125 B
126 C 127 A 128 B 129 C 130 A
131 D 132 B 133 A 134 C 135 A
136 C 137 A 138 D 139 B 140 A
141 C 142 B 143 A 144 C 145 D
146 A 147 B 148 C 149 D 150 B
151 A 152 B 153 A 154 C 155 D
156 A 157 C 158 B 159 D 160 C
161 A 162 D 163 B 164 C 165 A
166 C 167 D 168 A 169 B 170 A
171 B 172 C 173 A 174 D 175 A
176 C 177 A 178 B 179 D 180 A
181 B 182 A 183 C 184 D 185 A
186 C 187 D 188 B 189 A 190 D
191 B 192 A 193 D 194 A 195 C
196 B 197 A 198 D 199 A 200 A
Page 85 of 123
LEO SERIES 86
8. What is the purpose of online privacy settings?
A. To make your information available to everyone
B. To protect your personal information from others
C. To allow strangers to contact you
D. To increase your online followers
9. Which of these is a form of responsible internet use?
A. Sharing your passwords with others
B. Respecting others' opinions online
C. Posting personal details publicly
D. Visiting inappropriate websites
10. What is a strong password?
A. A combination of your name and birthdate
B. A simple word you can easily remember
C. A mix of letters, numbers, and special characters
D. A short word with no numbers
11. What does the term “digital literacy” refer to?
A. Being able to read and write in English
B. Knowing how to use digital devices effectively
C. Having a computer at home
D. Understanding how to use social media
12. What is a potential risk of sharing too much personal information online?
A. Making new friends
B. Being targeted by cybercriminals
C. Increasing online visibility
D. Gaining followers quickly
13. What is netiquette?
A. The rules of online behavior
B. A type of online video game
C. An online shopping platform
D. A social media platform
14. What does it mean to be a responsible online consumer?
A. Sharing your financial information freely
B. Researching before making online purchases
C. Clicking on all online ads
D. Copying others' work and passing it as your own
15. What is the role of a password manager?
A. To help you remember your passwords
B. To change your passwords regularly
C. To protect you from cyberbullying
D. To store pictures and videos securely
16. Why should you be cautious about downloading files from the internet?
A. Some files may contain viruses or malware
B. They may take up too much space on your device
C. They may not be compatible with your device
D. They may be fun to use
17. What is a digital footprint?
A. The total amount of data stored on your device
B. The trail of data you leave behind when using the internet
C. The number of websites you visit each day
D. The battery usage on your device
18. Which of the following is an example of ethical online behavior?
A. Respecting others' privacy online
B. Posting offensive content
Page 86 of 123
LEO SERIES 87
C. Using someone else's account without permission
D. Sharing your friend's password
19. What should you do if you receive a suspicious email?
A. Open the email and click the links
B. Reply to the sender
C. Delete the email and report it
D. Share the email with friends
20. What is the purpose of parental control software?
A. To track your internet usage
B. To block access to harmful content for children
C. To speed up your internet connection
D. To allow unrestricted access to all websites
21. Which of the following is the best way to protect your privacy online?
A. Share personal information only with friends
B. Avoid using strong passwords
C. Use privacy settings on social media
D. Post your location on social media
22. What is the importance of digital ethics?
A. To increase social media followers
B. To ensure that online activities are respectful and lawful
C. To help improve your digital skills
D. To promote online gaming
23. What does the term “cyberbullying” refer to?
A. Using the internet for research
B. Online harassment or bullying
C. Sharing useful information online
D. Writing a positive review online
24. What is the first step in responding to cyberbullying?
A. Retaliate with harsh words
B. Share the content with everyone
C. Save the evidence and report it
D. Delete the account of the person bullying
25. What is digital consent?
A. Agreeing to share personal data with websites
B. Permission to access someone’s personal information online
C. Receiving explicit permission before using someone’s online content
D. Agreeing to follow someone on social media
26. What is the key principle of responsible digital citizenship?
A. Protecting your own rights but ignoring others
B. Respecting others’ rights and behaving ethically online
C. Copying content from other sources freely
D. Spending excessive time online without considering others
27. What should you do if you accidentally share something private online?
A. Leave it and move on
B. Apologize and delete it immediately
C. Share more private details to cover up
D. Tell everyone about the mistake
28. Why is it important to cite sources when using information from the internet?
A. To avoid plagiarism
B. To make your work longer
C. To confuse your audience
D. To avoid reading books
29. What does online privacy refer to?
Page 87 of 123
LEO SERIES 88
A. The ability to hide your online activities from everyone
B. Protecting personal data and information on the internet
C. Sharing all your personal details online
D. Posting photos without any restrictions
30. Which of the following is an example of responsible internet use?
A. Posting inappropriate pictures
B. Sharing rumors without checking facts
C. Using copyrighted material without permission
D. Respecting others’ opinions in online discussions
31. What is phishing?
A. A type of online game
B. A method used to trick people into revealing sensitive information
C. A way to increase online followers
D. A safe way to exchange information online
32. Why is it important to avoid oversharing on social media?
A. To protect your personal information
B. To increase the number of likes
C. To get more friends
D. To promote your brand
33. What should you do if you receive an email asking for personal information?
A. Respond with your information immediately
B. Ignore it and report it to the authorities
C. Click on the link and follow the instructions
D. Share it with your friends
34. What does the term "ethical hacking" refer to?
A. Hacking for malicious purposes
B. Hacking to test the security of systems with permission
C. Creating computer viruses
D. Hacking into social media accounts
35. What should you do if you encounter offensive content online?
A. Share it with others
B. Report it and block the user if necessary
C. Ignore it and move on
D. Engage in a heated discussion
36. Which of the following is a way to protect your digital identity?
A. Using the same password for all accounts
B. Sharing your password with friends
C. Using two-factor authentication
D. Posting your birthdate and address online
37. What is online reputation management?
A. Sharing everything you do on social media
B. Managing how your online presence is perceived by others
C. Avoiding the use of social media altogether
D. Increasing the number of followers on social media
38. What is the most responsible action when you see someone being cyberbullied?
A. Ignore the situation
B. Share the bullying incident online
C. Report the incident to the appropriate authorities
D. Retaliate against the bully
39. Why is it important to maintain strong online security practices?
A. To make browsing faster
B. To protect your personal data from cyber threats
Page 88 of 123
LEO SERIES 89
C. To improve your social media followers
D. To make your computer run faster
40. Which of the following is considered an ethical use of online content?
A. Copying and pasting articles without permission
B. Giving credit to the author when using online content
C. Downloading music without paying for it
D. Uploading videos without the creator’s consent
41. What is the most ethical action to take when using someone else's work online?
A. Use the work without crediting the creator
B. Ask for permission and give proper credit
C. Download it and keep it for personal use only
D. Post it as your own work
42. What does “digital etiquette” refer to?
A. The rules of good behavior when online
B. The use of emojis in communication
C. Creating digital content
D. Managing online advertising
43. How can you protect your privacy on social media?
A. Share all your personal details with everyone
B. Regularly update your privacy settings
C. Use a fake name on social media
D. Post everything about your daily routine
44. What is the purpose of two-factor authentication?
A. To make it easier to remember passwords
B. To add an extra layer of security to your accounts
C. To share your account information with others
D. To block unwanted online ads
45. What should you do if someone sends you a mean message online?
A. Respond with a more hurtful message
B. Tell an adult or report the behavior
C. Ignore it and hope it stops
D. Forward the message to others
46. Why is it important to respect copyright laws online?
A. To avoid legal consequences
B. To get more likes on your content
C. To improve your online reputation
D. To create your own content
47. What is an example of unethical behavior online?
A. Respecting others’ online content
B. Sharing someone else’s personal information without permission
C. Giving credit when using someone’s work
D. Protecting your online privacy
48. What is a key concept of digital citizenship?
A. Downloading as much as you can from the internet
B. Engaging responsibly and ethically in digital spaces
C. Playing games online all day
D. Sharing everything about your life online
49. What is the main goal of internet safety education?
A. To encourage sharing personal data online
B. To promote safe, responsible, and ethical behavior on the internet
C. To teach how to hack accounts
D. To build websites
50. What does the “right to be forgotten” mean in digital ethics?
Page 89 of 123
LEO SERIES 90
A. Your data can be erased from the internet upon request
B. You can access someone’s private information without their consent
C. Your identity can be changed online
D. You can delete other people's online posts
51. What should you do if you find an online video that is offensive to others?
A. Report it to the platform hosting the video
B. Share it with your followers
C. Ignore it and move on
D. Leave a hateful comment on the video
52. How can you promote a positive online environment?
A. Participate in cyberbullying
B. Share respectful and kind comments
C. Post harmful content
D. Avoid engaging with others
53. What is the best way to handle sensitive personal information online?
A. Share it with anyone who asks
B. Keep it private and only share it with trusted sources
C. Post it on social media
D. Use it to create online profiles
54. What does the term "cybersecurity" refer to?
A. A type of online game
B. Protecting computers, networks, and data from cyberattacks
C. Creating online content
D. Browsing the internet without safety
55. What is a privacy policy on websites?
A. A statement outlining how a website collects and uses personal data
B. A set of rules for using the website
C. Instructions on how to download content
D. A list of online games available on the website
56. What is the main objective of anti-cyberbullying programs?
A. To encourage people to be more aggressive online
B. To stop the harmful effects of cyberbullying and educate users
C. To promote online advertisements
D. To monitor online traffic
57. What should you do if you notice your social media account has been hacked?
A. Ignore it and hope it fixes itself
B. Change your passwords and report the incident
C. Share your account information with others
D. Delete your account permanently
58. How can you avoid being scammed online?
A. Share your credit card details with untrusted websites
B. Only shop from trusted and secure websites
C. Use the same password for all accounts
D. Ignore warning messages from websites
59. What is the ethical way to use images found on the internet?
A. Use them without crediting the creator
B. Ask for permission or use images with the appropriate license
C. Download them without thinking about ownership
D. Edit the image and claim it as your own
60. Why is it important to keep your software and devices updated?
A. To increase battery life
B. To ensure the latest security measures are in place
Page 90 of 123
LEO SERIES 91
C. To get more online friends
D. To make your device faster
61. Which of the following is an example of responsible online behavior?
A. Spreading rumors online
B. Sharing helpful and respectful content
C. Sharing private information without permission
D. Using strong language in discussions
62. What is the purpose of an online reputation?
A. To improve your chances of going viral
B. To control how others perceive you on the internet
C. To collect as many followers as possible
D. To get as many likes on your posts as possible
63. What is one of the dangers of sharing too much personal information on social media?
A. It can help you become famous
B. It can lead to identity theft or fraud
C. It can improve your online reputation
D. It can help you connect with new friends
64. Which of the following is an example of ethical use of technology?
A. Hacking a website to obtain private information
B. Copying homework from the internet without citation
C. Using technology to communicate with others respectfully
D. Using someone else’s digital artwork as your own
65. How can you protect your digital footprint?
A. By being careful about the information you share online
B. By deleting all your online accounts
C. By sharing everything on social media
D. By using a fake name for your accounts
66. What is the best way to handle an online disagreement?
A. Engage in a heated argument
B. Respectfully express your opinion and avoid insults
C. Ignore the situation entirely
D. Block the other person immediately
67. What does the term “digital footprint” mean?
A. The traces of your online activities
B. The security of your online accounts
C. The devices you use to connect to the internet
D. The software you use for browsing the internet
68. What is the significance of a strong password?
A. It makes your account easier to hack
B. It helps protect your account from unauthorized access
C. It allows you to share your account freely
D. It ensures you never forget your password
69. Why is it important to be careful about the images and videos you share online?
A. They may be used without your permission
B. They could end up on websites you don’t control
C. They could be misused by others
D. All of the above
70. What is the correct action when you receive a suspicious email?
A. Open it and click on the links
B. Reply with your personal information
C. Mark it as spam and delete it
D. Share the email with all your contacts
71. What is an important factor in preventing online scams?
Page 91 of 123
LEO SERIES 92
A. Clicking on every advertisement
B. Being cautious when giving out personal details
C. Using the same password across all accounts
D. Downloading files from unknown sources
72. Which of the following is a digital citizenship responsibility?
A. Engaging in cyberbullying
B. Ignoring the privacy settings on your social media
C. Sharing and creating content that benefits others
D. Copying and pasting other people’s work
73. What should you do if you notice someone is being bullied online?
A. Ignore it and keep browsing
B. Report the bullying to a trusted adult or platform
C. Join in on the bullying
D. Share the incident with others to make it worse
74. What does the term “fake news” refer to?
A. News that is accurate but controversial
B. Stories or information that is deliberately misleading or false
C. News that spreads quickly online
D. Popular news topics that everyone talks about
75. What is one way to protect your personal information while shopping online?
A. Share your credit card details with every website
B. Shop only on trusted and secure websites with HTTPS
C. Use the same password for all online accounts
D. Ignore the privacy policies of online stores
76. What is the first step in protecting your online privacy?
A. Share all your personal details on social media
B. Use complex passwords and change them regularly
C. Disable privacy settings on your accounts
D. Trust any website that asks for your information
77. What is a consequence of oversharing on social media?
A. You may connect with more people
B. You may increase your popularity
C. Your personal information could be exposed to a wider audience
D. Your privacy will be fully protected
78. Why is it important to regularly check the security settings of your online accounts?
A. To ensure your accounts are not being hacked
B. To change your privacy settings and restrict access to personal information
C. To make your accounts less accessible to others
D. To increase the number of friends or followers
79. What does it mean to have “digital etiquette”?
A. The ability to use all devices and programs
B. Practicing respectful and responsible behavior while communicating online
C. Posting anything you want without consequences
D. Downloading as much content as possible
80. What is the best way to maintain online privacy?
A. Share your passwords with everyone you know
B. Set strong passwords and limit what you share on social media
C. Never use any privacy settings
D. Post your personal details regularly
81. What is one of the risks associated with sharing too much personal information online?
A. You can receive more advertisements
B. It can lead to identity theft
Page 92 of 123
LEO SERIES 93
C. It can help you make new friends
D. It will not have any consequences
82. What is the ethical action when using digital content created by someone else?
A. Copy it and say it’s yours
B. Give credit to the creator and follow copyright rules
C. Change the name and use it
D. Share it without attribution
83. What is a major disadvantage of participating in online forums without thinking about privacy?
A. You can make new connections
B. Your personal information can be exposed or stolen
C. You can engage in meaningful conversations
D. You can increase your followers
84. What is a key practice of ethical digital citizenship?
A. Using others' content without permission
B. Engaging in respectful communication and following laws
C. Ignoring others' privacy
D. Sharing personal information publicly
85. What should you do if you find sensitive information about someone online?
A. Share it with everyone
B. Respect their privacy and do not share it without permission
C. Use the information to cause harm
D. Delete it from the internet immediately
86. What is one of the best ways to prevent identity theft online?
A. Share your personal information freely on social media
B. Use strong, unique passwords and enable two-factor authentication
C. Save your passwords in an unprotected document
D. Share your credit card details with untrusted websites
87. How can you ensure that your online behavior aligns with digital ethics?
A. By respecting others’ opinions and rights in digital spaces
B. By ignoring any online rules or guidelines
C. By posting private information about others
D. By engaging in harmful and abusive language
88. What should you do if you encounter an inappropriate or offensive post online?
A. Ignore it and move on
B. Engage in arguments or insults
C. Report the post to the relevant platform or authority
D. Share the post to your followers
89. Which of the following best represents the concept of "netiquette"?
A. A set of guidelines for responsible online behavior
B. A way to hack into other people’s accounts
C. A platform for spreading false information
D. A method for downloading content illegally
90. What is one key responsibility of a digital citizen?
A. To always share all personal data with others
B. To be respectful and considerate while communicating online
C. To create fake profiles to deceive others
D. To spread rumors or false information
91. What is the purpose of encryption in protecting your online communications?
A. To make your data easily accessible to others
B. To protect your data by converting it into unreadable text
C. To delete your online history
D. To hide your online identity from others
92. What does the term “phishing” refer to in the context of internet security?
Page 93 of 123
LEO SERIES 94
A. A type of online scam designed to steal personal information
B. A new social media platform
C. A type of online game
D. A strategy for marketing
93. What is a good rule to follow when posting images or videos online?
A. Post everything without considering the potential consequences
B. Be aware of the impact of your content on others and ensure it is appropriate
C. Use filters and edit all your posts before sharing
D. Only post images of others without asking for permission
94. Which of the following best describes the principle of "digital privacy"?
A. Keeping all your personal data public for everyone to access
B. Using passwords and encryption to protect your online data
C. Sharing all your data with unknown people online
D. Posting as much personal information as possible
95. What is the most effective way to avoid online scams and fraud?
A. Provide your personal and financial details to any website that asks for them
B. Only trust well-known websites and verify their security measures
C. Click on any link sent via email or social media
D. Share your bank account details with everyone online
96. What should you do if you suspect that someone is impersonating you online?
A. Ignore the situation and hope it resolves itself
B. Report the impersonation to the platform and take steps to recover your account
C. Engage with the impersonator and try to reason with them
D. Share the impersonated profile with others
97. What is one way to practice digital ethics when creating online content?
A. Plagiarize or copy content without attribution
B. Give credit to the creators of any material you use
C. Post other people’s private content without their consent
D. Use offensive language in your posts
98. What should you do if you receive an unsolicited email asking for your personal information?
A. Ignore the email and delete it
B. Respond with your personal information
C. Click on the link provided in the email
D. Forward the email to your friends
99. What is one of the key principles of digital citizenship?
A. To ignore online etiquette
B. To respect others and engage in ethical behavior online
C. To copy and redistribute online content without permission
D. To spread hate and negativity in digital spaces
100. Why is it important to regularly review the privacy settings on your social media accounts?
A. To make sure you share everything publicly
B. To restrict who can see your information and protect your privacy
C. To gain more followers
D. To share all your personal data with advertisers
101. What should you do if you encounter a website that asks for excessive personal information?
A. Share your information immediately
B. Exit the website and report it if necessary
C. Trust the website and continue using it
D. Share your information with friends on social media
102. How does digital etiquette differ from traditional etiquette?
A. Digital etiquette only applies to online gaming
B. Digital etiquette focuses on respectful behavior in digital spaces
Page 94 of 123
LEO SERIES 95
C. Digital etiquette is not important
D. There is no difference
103. Which of the following is an example of online harassment?
A. Respectfully disagreeing with someone online
B. Posting harmful comments or threatening behavior towards someone
C. Sharing positive and helpful advice online
D. Liking someone’s post
104. What is one way to promote a positive digital environment?
A. Share negative content to get more attention
B. Post content that adds value to the community and engages respectfully
C. Engage in online fights
D. Avoid posting altogether
105. How can you help someone who is being cyberbullied online?
A. Ignore the situation
B. Support the victim and report the bullying to the appropriate authorities
C. Join the bullying to make it worse
D. Ignore the victim’s request for help
106. What is a key component of maintaining a strong digital presence?
A. Regularly posting controversial content
B. Posting content that is respectful and aligns with your values
C. Sharing everything about your personal life
D. Copying others’ content
107. What is an example of respecting intellectual property online?
A. Using someone else’s work without credit
B. Giving credit to the creator of the content you use
C. Ignoring copyright laws
D. Downloading content for free without permission
108. Why is it important to be cautious when using free Wi-Fi networks?
A. They are faster than paid networks
B. They may not be secure, leading to the risk of data theft
C. They are completely safe to use without precautions
D. They are generally free from hacking attempts
109. What does it mean to "opt-out" of a digital service?
A. You choose to leave or unsubscribe from the service
B. You increase your data usage
C. You subscribe to the service for a fee
D. You share your data with the service provider
110. What is a safe practice when using public computers or networks?
A. Use your personal passwords without worry
B. Always log out of your accounts when finished
C. Share your password with the next user
D. Leave your personal files on the computer
111.What should you do if a friend shares an inappropriate or harmful post online?
A. Ignore the post and continue browsing
B. Encourage the friend to remove the post and remind them of the potential consequences
C. Share the post with more people
D. Report the post without informing the friend
112.Which of the following is an example of responsible digital behavior?
A. Respecting the opinions and rights of others online
B. Sharing personal information about others without their consent
C. Engaging in online arguments and insults
D. Posting misleading information to gain followers
113.How can you make sure your personal information is secure while online shopping?
Page 95 of 123
LEO SERIES 96
A. Use weak passwords for faster transactions
B. Avoid using public Wi-Fi when making financial transactions
C. Share your bank details openly on the website
D. Ignore website security alerts and warnings
114.What is the role of digital ethics in education?
A. Encouraging students to copy assignments from the internet
B. Promoting academic integrity and respectful online behavior
C. Allowing students to plagiarize their research papers
D. Ignoring the impact of online content in the classroom
115. What should you do if you find content online that violates your digital rights?
A. Ignore it and continue browsing
B. Contact the website’s administrator or the relevant authorities to report the violation
C. Share the content with your followers
D. Post a comment on the content that could escalate the situation
116.How can you protect your digital footprint?
A. Regularly update your privacy settings and limit what you share online
B. Post everything about your personal life online
C. Ignore privacy settings altogether
D. Share all your passwords publicly
117.Why is it important to have consent before sharing someone’s personal content online?
A. To avoid legal and ethical issues and respect the privacy of others
B. To gain more followers
C. To post content without permission
D. To spread content widely without concern
118.How does respecting online copyright laws affect the digital community?
A. It ensures creators’ intellectual property is protected and encourages fair use
B. It encourages people to steal others’ work
C. It discourages creativity and sharing
D. It has no effect on the digital community
119.What is one way to practice responsible behavior on social media?
A. Engage in harmful or hurtful comments
B. Share everything, regardless of the impact on others
C. Post content that is respectful and mindful of the feelings of others
D. Use the platform to spread misinformation
120.Which of the following is an example of a secure online transaction?
A. Using a website without HTTPS encryption to purchase a product
B. Entering your credit card information on a secure, verified website
C. Sending credit card information over unencrypted email
D. Using public Wi-Fi to complete financial transactions
121.How can you demonstrate respect for digital property when using someone else’s work online?
A. Credit the original creator and seek permission where required
B. Copy the content without any attribution
C. Alter the work and present it as your own
D. Use someone else’s work for free without asking
122.What should you do if you receive an offensive or inappropriate message online?
A. Ignore it and continue chatting
B. Respond with equally offensive messages
C. Block the sender and report the message to the platform
D. Share the message with your friends
123.Why is it important to think critically before sharing news or information online?
A. To ensure that you are not spreading false or misleading information
B. To gain more followers
Page 96 of 123
LEO SERIES 97
C. To spread rumors and gossip
D. To make your opinions heard, regardless of accuracy
124.What is an example of ethical digital content creation?
A. Using someone else’s image without permission
B. Giving proper credit to sources and respecting copyright laws
C. Plagiarizing content and claiming it as your own
D. Sharing content without understanding its origin
125.What should you do before using content found online for a school project?
A. Assume it’s free to use
B. Check the copyright and attribution requirements
C. Ignore the rules and use it anyway
D. Change the author’s name and present it as your own
126.Which of the following best describes the term "digital well-being"?
A. Ignoring the effects of excessive screen time
B. Taking care of your physical and mental health while using digital devices
C. Spending as much time online as possible
D. Using technology only for entertainment purposes
127.How can you help foster a positive digital environment in your community?
A. By respecting others, reporting harmful content, and supporting good practices
B. By ignoring harmful behavior and focusing on your own content
C. By spreading negativity and creating arguments online
D. By posting content to get attention, regardless of its impact
128.Why is it important to verify information before sharing it on social media?
A. To ensure that you are not contributing to the spread of false information
B. To avoid following the crowd
C. To ensure that your post gets more likes
D. To share your opinion on controversial topics
129.What is one of the consequences of engaging in online bullying or harassment?
A. It improves your reputation online
B. It can cause harm to the victim and result in legal consequences
C. It encourages others to follow your lead
D. It has no impact on the online community
130.What should you do if you come across a misleading advertisement online?
A. Share the ad to others without checking its validity
B. Ignore the ad and continue browsing
C. Report the ad to the platform and warn others
D. Engage with the ad and click on it
131.How can you practice respect for others’ privacy online?
A. Share other people’s private messages and photos without permission
B. Only share information that is freely available online
C. Keep personal conversations and content confidential unless otherwise agreed
D. Post private details about others on social media
132. What should you do if you notice that your personal information has been compromised online?
A. Do nothing and hope it doesn’t affect you
B. Immediately change your passwords and notify the relevant authorities or platforms
C. Share the information with others to warn them
D. Ignore the issue and continue using the same accounts
133. What is one key principle of digital literacy?
A. The ability to understand and responsibly use technology for communication and learning
B. The skill to only use technology for entertainment
C. The ability to avoid learning about technology
D. The skill to hack into systems
134. How can you avoid becoming a victim of online scams?
Page 97 of 123
LEO SERIES 98
A. Trust all emails and messages you receive
B. Use strong passwords, verify sources, and avoid sharing personal information with unknown
parties
C. Click on links in unsolicited emails
D. Share your passwords with everyone online
135. How should you handle online content that violates the rights of others?
A. Ignore it and move on
B. Share it as much as possible
C. Report it to the appropriate platform or legal authorities
D. Engage in the dispute and create a public argument
136. What does it mean to be a responsible digital citizen? A. To respect the rights and privacy of
others while using digital technologies
B. To ignore the impact of your online behavior
C. To use the internet for personal gain at all times
D. To disregard digital rules and safety guidelines
137. What is a key responsibility when interacting with others online? A. To act with kindness,
respect, and empathy
B. To ignore others and focus on your own content
C. To criticize others for their opinions
D. To share sensitive information without consent
138. How can digital rights be protected? A. By respecting the privacy and intellectual property of
others
B. By ignoring digital laws and guidelines
C. By sharing personal information freely without concern
D. By using technology to harm others
139. What is one way to prevent identity theft online? A. Use complex passwords and avoid
sharing personal details on insecure websites
B. Share your personal information on social media
C. Use the same password for all online accounts
D. Trust unknown websites with your financial information
140. What is the digital divide? A. The gap between those who have access to modern technology
and those who do not
B. The difference between digital and physical content
C. The rise of new technologies in society
D. The process of hacking into digital systems
141. Which of the following is a consequence of not respecting others' digital privacy? A.
Violating trust and causing harm to the individual
B. Gaining popularity online
C. Helping build a larger network of friends
D. Improving your online security
142. Why should you think critically about what you share online? A. To avoid sharing false or
harmful information that could damage your reputation and others’
B. To increase your online followers
C. To post controversial content and spark debates
D. To gain attention without concern for accuracy
143. How can you ensure that your online actions align with ethical standards? A. By thinking
about the consequences of your actions and respecting others
B. By ignoring others and focusing on your personal agenda
C. By using the internet to spread misinformation
D. By evading digital laws and guidelines
144. What should you do before accepting a friend request from someone you don't know? A.
Check their profile to see if it’s safe to accept the request
B. Accept all friend requests without hesitation
Page 98 of 123
LEO SERIES 99
C. Immediately share your personal information with them
D. Ignore any requests from people you don’t know
145. What should you do if you notice online content that is harmful or offensive? A. Ignore the
content and keep browsing
B. Engage with it and leave negative comments
C. Report the content to the platform or authorities
D. Share the content with your followers
146. What is one example of protecting your digital identity? A. Keeping your passwords secure
and not sharing them with others
B. Using your real name for every online interaction
C. Giving your personal details to anyone who asks online
D. Ignoring all privacy settings and leaving your information public
147. Why is online harassment or cyberbullying harmful? A. It can damage a person’s mental and
emotional well-being
B. It helps people get noticed online
C. It strengthens online communities
D. It encourages others to participate in harmful behavior
148. How can social media be used responsibly? A. By using it to promote kindness, share
accurate information, and respect others’ privacy
B. By posting harmful and offensive comments
C. By ignoring others’ rights and sharing private content
D. By engaging in arguments and spreading negativity
149. What is the best way to protect your online reputation? A. Share content that is positive,
accurate, and respectful of others
B. Post content without thinking about its impact
C. Ignore privacy settings and post freely
D. Engage in arguments online to get attention
150. Why is it important to acknowledge sources when sharing digital content? A. To avoid
plagiarism and give credit to the original creators
B. To make your content seem more important
C. To claim ownership of someone else’s work
D. To increase the number of followers on your profile
151. How can you avoid spreading false information online? A. Verify the facts from credible
sources before sharing content
B. Share everything without questioning its authenticity
C. Only rely on unverified sources for information
D. Spread content to gain more attention
152. What is the significance of online privacy settings? A. They allow you to control what
personal information you share with others
B. They make it harder to connect with new people online
C. They only apply to social media platforms
D. They have no impact on your online security
153. What does it mean to be a responsible online consumer? A. To make informed decisions,
respect online businesses, and protect your personal data
B. To purchase items impulsively without verifying the source
C. To share personal information with all online sellers
D. To ignore reviews and trust all online transactions
154. What is one of the dangers of oversharing personal information on social media? A. It can
make you vulnerable to identity theft and online scams
B. It can help you gain more followers quickly
C. It increases your online influence
D. It allows you to connect with more people easily
Page 99 of 123
LEO SERIES 100
155. What is the main purpose of digital literacy in today’s world? A. To equip individuals with
the skills needed to effectively use technology and the internet
B. To avoid using any digital tools
C. To limit access to technology
D. To ensure only a select few use digital technologies
156. What is one way to ensure that you are acting ethically when creating online content? A.
Give credit to others’ work and follow copyright laws
B. Use others’ content without permission
C. Plagiarize and present it as your own work
D. Ignore others’ intellectual property rights
157. What is an appropriate response if you come across someone engaging in cyberbullying? A.
Report the behavior to the appropriate authorities or platform moderators
B. Encourage others to join in the bullying
C. Ignore it and avoid getting involved
D. Engage in the bullying to defend the victim
158. Why should you be cautious about what you post online? A. Because online content can
remain public forever and affect your reputation
B. Because it will increase your popularity
C. Because it will boost your social media following
D. Because it’s easy to delete everything later
159. What is the digital responsibility of parents when it comes to their children’s online behavior?
A. To monitor and guide their children’s use of digital tools and content
B. To let children use technology without supervision
C. To allow children to use technology without restrictions
D. To encourage children to ignore online safety
160. How can you ensure that you are practicing good online etiquette? A. By treating others with
respect, using proper language, and avoiding offensive content
B. By ignoring the rules and behaving however you want
C. By only posting about yourself
D. By ignoring the impact of your online behavior
161. What is one way to protect your children from inappropriate online content? A. Use parental
controls and monitor their online activity
B. Allow children to access any content they want without supervision
C. Teach children to use technology without any restrictions
D. Disable all security software to improve internet speed
162. How can you report inappropriate content online? A. By using the "Report" feature on the
platform or website
B. By sharing the content with others
C. By ignoring the content and continuing to browse
D. By downloading the content to store for later
163. What should you do if you accidentally share incorrect information online? A. Correct the
mistake and provide accurate information
B. Leave the post as it is and ignore the error
C. Delete the post and hope no one notices
D. Defend the incorrect information and argue with others
164. Why is it important to be aware of the digital footprint you leave behind? A. Because it can
affect your reputation and opportunities in the future
B. Because it helps you gain more followers
C. Because it has no impact on your future
D. Because it allows you to control all online content
165. Which of the following is an example of good digital citizenship? A. Using social media to
promote positivity and support others
B. Engaging in harmful behavior like trolling or spreading negativity
51. What is the main purpose of AI-powered personal assistants like Siri and Alexa?
A. To store data securely
B. To provide voice-activated assistance for tasks and information retrieval
C. To enhance gaming experiences
D. To develop mobile apps
52. What is the role of blockchain in cryptocurrency?
A. Storing personal information
B. Securing and recording digital transactions transparently
C. Designing digital marketing strategies
D. Automating agricultural processes
53. Which of these is an example of predictive analytics?
A. Recommending movies on a streaming platform based on viewing history
B. Building autonomous robots
C. Designing 3D-printed models
D. Enhancing video conferencing systems
54. What is an exoskeleton in robotics used for?
A. Increasing the capacity of IoT networks
B. Assisting humans with enhanced strength and mobility in physical tasks
C. Improving smart home connectivity
D. Automating drone operations
55. Which of the following best explains virtual reality (VR)?
A. It replaces computers with holograms
B. It immerses users in a computer-generated environment using headsets and sensors
C. It speeds up data processing in the cloud
D. It improves biometric recognition
56. How does machine learning differ from traditional programming?
A. It uses pre-defined instructions only
B. It learns patterns from data to improve decision-making without explicit programming
C. It solely focuses on database management
D. It is restricted to financial systems
57. What is the purpose of drones in disaster response?
A. Enhancing smart home devices
B. Delivering supplies and surveying affected areas quickly and efficiently
C. Reducing internet lag in rural areas
D. Monitoring school attendance
58. What is a significant feature of smart home devices?
A. They work without internet connectivity
B. They enable automated and remote control of appliances via IoT
Would you like me to continue with the next set of questions up to 200?