0% found this document useful (0 votes)
40 views124 pages

MCQ Book 1.1

Uploaded by

Danny Brayn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views124 pages

MCQ Book 1.1

Uploaded by

Danny Brayn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 124

GES NEW SYLLABLE COMPUTING

Mastering Computing: A Guide to GES


Basic & Topic Questions

OVER 100+ MULTIPLE CHOICE QUESTIONS

Badipehter Daniel
LEO SERIES 1
TABLE OF CONTENT
Basic 7 (JHS 1) - Computing Topics
Strand 1: Digital Literacy and Safety
1. Introduction to Computers and Digital Literacy
2. Parts of a Computer
3. Basic Computer Operations
4. Operating Systems
5. Introduction to Word Processing
6. Introduction to Spreadsheets
7. Introduction to Databases
8. Introduction to Computer Networks
Strand 2: Internet and Communication Technologies
9. Introduction to the Internet
10. Cybersecurity: Online Safety and Security
Strand 3: Programming and Problem Solving
11. Introduction to Programming (Basics)
12. Problem-Solving with Algorithms
Strand 4: Information Management and Presentation
13. Using Presentation Software (e.g., Microsoft PowerPoint)
14. Basic Data Analysis using Spreadsheets
15. Introduction to Databases for Information Storage
Strand 5: Digital Citizenship and Ethics
16. Digital Citizenship and Online Etiquette
17. Copyright, Privacy, and Online Ethics
Strand 6: Emerging Technologies
18. Introduction to Artificial Intelligence (AI) and Robotics
19. Basic Introduction to Virtual Reality (VR)
20. Introduction to 3D Printing and Modeling

Page 1 of 123
LEO SERIES 2

1. Introduction to Computers and Digital Literacy


Multiple-Choice Questions (MCQs)
1. What is a computer?
A. A device for making phone calls
B. A device used for storing information
C. A device that processes and stores data
D. A device used to watch television
2. Which of the following is NOT a part of a computer system?
A. Monitor
B. Keyboard
C. Smartphone
D. Printer
3. What is the primary function of a computer?
A. To make phone calls
B. To process data
C. To store music
D. To display videos
4. What is meant by ‘digital literacy’?
A. The ability to read books
B. The ability to use a computer and the internet effectively
C. The ability to print documents
D. The ability to write code
5. Which of the following is a type of software?
A. Keyboard
B. Mouse
C. Microsoft Word
D. Monitor
6. What is the main use of a computer in daily life?
A. Making phone calls
B. Gaming
C. Processing and storing information
D. Watching movies only
7. What do we call the visual output of a computer?
A. Printer
B. Monitor
C. Speaker
D. Mouse
8. Which of the following is a common input device?
A. Monitor
B. Printer
C. Keyboard
D. Speaker
9. Which of the following is an example of an operating system?
A. Microsoft Word
B. Windows
C. Google Chrome
D. Excel
10. What is the term used for the physical components of a computer?
A. Software
B. Hardware

Page 2 of 123
LEO SERIES 3
C. Internet
D. Database
11. Which component is known as the brain of the computer?
A. Hard Drive
B. CPU
C. RAM
D. Monitor
12. What is the function of the RAM in a computer?
A. It stores files permanently
B. It processes instructions from the CPU
C. It temporarily stores data for quick access
D. It connects to the internet
13. Which device is used to store data permanently?
A. CPU
B. RAM
C. Hard Drive
D. Keyboard
14. What is the function of the motherboard in a computer?
A. To process data
B. To store data
C. To connect and allow communication between other components
D. To display visual output
15. Which of the following is used to input data into a computer?
A. Monitor
B. Mouse
C. Printer
D. Hard Drive
16. What is the role of the graphics card in a computer?
A. To process sound
B. To manage the display and visual output
C. To store files
D. To connect the computer to the internet
17. Which of the following is an output device?
A. Printer
B. Keyboard
C. Mouse
D. CPU
18. What is the purpose of the power supply unit in a computer?
A. To provide power to the motherboard
B. To connect the computer to a network
C. To process the data
D. To store data
19. What is the function of a sound card in a computer?
A. To process sound
B. To connect to the internet
C. To control the display output
D. To manage files
20. Which of the following is an input device that uses touch technology?
A. Printer
B. Touchscreen
C. Speaker
D. Monitor

Page 3 of 123
LEO SERIES 4
21. What is the first thing you should do when you turn on a computer?
A. Open a browser
B. Check the internet connection
C. Start the operating system
D. Install new software
22. Which of the following is the correct way to shut down a computer?
A. Press the power button for 5 seconds
B. Turn off the monitor
C. Close all applications and click "Shut Down"
D. Unplug the computer from the socket
23. What is the purpose of the "Task Manager" in Windows?
A. To manage files
B. To monitor system performance and running processes
C. To display the weather
D. To install software
24. How do you save a document in most programs?
A. Press Ctrl + S
B. Press Ctrl + P
C. Press Ctrl + C
D. Press Ctrl + A
25. Which of the following is NOT a method for opening a program?
A. Clicking its shortcut on the desktop
B. Searching for it in the Start menu
C. Typing it directly in the browser
D. Double-clicking its icon
26. Which of these options allows you to copy a selected text or file?
A. Ctrl + C
B. Ctrl + X
C. Ctrl + P
D. Ctrl + V
27. Which key is used to undo an action in most programs?
A. Ctrl + Z
B. Ctrl + A
C. Ctrl + S
D. Ctrl + X
28. What is the function of the "Recycle Bin" on a computer?
A. To store permanent files
B. To temporarily store deleted files
C. To manage network connections
D. To store applications
29. What is the correct way to maximize a window in Windows?
A. Double-click the window title bar
B. Click the minimize button
C. Press Alt + F4
D. Right-click the taskbar
30. Which of the following is a way to close a program?
A. Press Ctrl + C
B. Press Ctrl + F
C. Press Alt + F4
D. Press Ctrl + V
31. What is an operating system?
A. A program that allows the user to interact with hardware
B. A type of hardware used to process data

Page 4 of 123
LEO SERIES 5
C. A device used to store data
D. A peripheral device for input/output operations
32. Which of the following is an example of an operating system?
A. Microsoft Office
B. Google Chrome
C. Windows 10
D. Excel
33. What is the primary purpose of an operating system?
A. To manage the hardware and software resources of the computer
B. To help with internet browsing
C. To create documents and spreadsheets
D. To play games
34. Which of the following operating systems is used on Mac computers?
A. Windows 10
B. iOS
C. macOS
D. Linux
35. What feature does an operating system manage?
A. Communication between devices only
B. Hardware, software, and system resources
C. Installing software only
D. Printing documents
36. What is the taskbar in Windows used for?
A. To display the system time
B. To access the Start menu and running programs
C. To display notifications only
D. To manage network connections
37. Which of the following is NOT a function of the operating system?
A. File management
B. Network management
C. Graphics design
D. Memory management
38. In Windows, what does the 'Control Panel' allow you to do?
A. View the list of running applications
B. Control hardware settings and system configurations
C. Manage user files
D. Open a web browser
39. What is the purpose of a 'file system' in an operating system?
A. To store and organize files
B. To manage network connections
C. To display system messages
D. To execute applications
40. What does the "Task Manager" in Windows help you with?
A. Restarting the computer
B. Monitoring running applications and performance
C. Creating files
D. Installing new software
41. Which of the following software is commonly used for word processing?
A. Microsoft Word
B. Excel
C. PowerPoint
D. Photoshop

Page 5 of 123
LEO SERIES 6
42. In word processing, what does the 'Bold' formatting option do?
A. It changes the font style
B. It increases the font size
C. It makes the text darker and thicker
D. It changes the text color
43. What is the purpose of the 'Spell Check' feature in word processors?
A. To format text
B. To correct errors in spelling
C. To print documents
D. To change the font size
44. Which of the following is used to insert a page break in Microsoft Word?
A. Ctrl + P
B. Ctrl + S
C. Ctrl + Enter
D. Ctrl + Z
45. Which of the following is an option in the 'Page Layout' menu of a word processor?
A. Adjusting margins
B. Changing font style
C. Adding clipart
D. Inserting hyperlinks
46. In Microsoft Word, what does the 'Align Left' option do?
A. Aligns text to the center
B. Aligns text to the right
C. Aligns text to the left side of the page
D. Makes the text bold
47. What is the purpose of the 'Header' and 'Footer' in a document?
A. To add images to the document
B. To include information that appears on every page
C. To format the text style
D. To add a page border
48. Which key is used to undo an action in most word processors?
A. Ctrl + C
B. Ctrl + Z
C. Ctrl + P
D. Ctrl + A
49. What is the function of the 'Save As' option in word processors?
A. To close the document
B. To create a new document
C. To save the document with a new name or location
D. To print the document
50. In Microsoft Word, which of the following can you insert using the 'Insert' tab?
A. Text formatting options
B. Tables, images, and hyperlinks
C. Page borders
D. Editing tools
51. Which of the following is an example of spreadsheet software?
A. Microsoft Excel
B. Adobe Photoshop
C. Mozilla Firefox
D. Microsoft Word
52. What is the primary function of a spreadsheet?
A. To store images
B. To manage text documents

Page 6 of 123
LEO SERIES 7
C. To organize, analyze, and manipulate data in tables
D. To design websites
53. In a spreadsheet, what is a 'cell'?
A. A unit used to store data
B. A type of formula
C. A section of the header
D. A type of chart
54. Which of the following symbols is used for addition in spreadsheet formulas?
A. +
B. -
C. *
D. /
55. What does the 'SUM' function do in a spreadsheet?
A. Multiplies values
B. Adds values together
C. Divides values
D. Finds the average of values
56. Which of the following is a valid function in Excel?
A. =ADD(A1, A2)
B. =SUM(A1, A2)
C. =SUBTRACT(A1, A2)
D. =MULTIPLY(A1, A2)
57. In Excel, how do you enter a formula into a cell?
A. Type it directly in the cell with the equals sign (=)
B. Select the cell and click 'Formula'
C. Press Ctrl + F
D. Double-click the cell
58. Which of the following is used to organize data in a spreadsheet?
A. Text box
B. Rows and columns
C. Graphs
D. Hyperlinks
59. Which of the following is NOT a feature of a spreadsheet?
A. Calculations using formulas
B. Storing documents as text
C. Sorting and filtering data
D. Creating graphs and charts
60. In Excel, which of the following options would you use to change the appearance of data in a cell?
A. Format Cells
B. Insert Function
C. Filter
D. Data Validation
61. What is a database?
A. A tool for browsing the internet
B. A program used for creating documents
C. A collection of organized data that can be easily accessed, managed, and updated
D. A type of spreadsheet
62. Which of the following is a common example of a database software?
A. Microsoft Excel
B. Microsoft Access
C. Adobe Photoshop
D. Mozilla Firefox

Page 7 of 123
LEO SERIES 8
63. What is a 'table' in a database?
A. A collection of related data organized in rows and columns
B. A feature used for creating reports
C. A collection of formulas used for calculations
D. A section for storing multimedia files
64. In a database, what does 'SQL' stand for?
A. Standard Query Language
B. Simple Quality List
C. Structured Query Language
D. Search Query Logic
65. Which of the following operations can be performed in a database?
A. Storing data only
B. Sorting, filtering, and querying data
C. Designing websites
D. Creating documents
66. What is a 'primary key' in a database?
A. A field used to uniquely identify each record
B. A button used for deleting records
C. A field used for formatting data
D. A method of sorting data
67. Which of the following is used to retrieve specific data from a database?
A. Filter
B. Query
C. Calculation
D. Format
68. What is a 'form' in database software?
A. A tool for formatting text
B. A type of report
C. An interface used to enter data into a database
D. A field used to store images
69. In a database, what is a 'record'?
A. A single column
31. What is an operating system?
A. A program that allows the user to interact with hardware
B. A type of hardware used to process data
C. A device used to store data
D. A peripheral device for input/output operations
32. Which of the following is an example of an operating system?
A. Microsoft Office
B. Google Chrome
C. Windows 10
D. Excel
33. What is the primary purpose of an operating system?
A. To manage the hardware and software resources of the computer
B. To help with internet browsing
C. To create documents and spreadsheets
D. To play games
34. Which of the following operating systems is used on Mac computers?
A. Windows 10
B. iOS
C. macOS
D. Linux

Page 8 of 123
LEO SERIES 9
35. What feature does an operating system manage?
A. Communication between devices only
B. Hardware, software, and system resources
C. Installing software only
D. Printing documents
36. What is the taskbar in Windows used for?
A. To display the system time
B. To access the Start menu and running programs
C. To display notifications only
D. To manage network connections
37. Which of the following is NOT a function of the operating system?
A. File management
B. Network management
C. Graphics design
D. Memory management
38. In Windows, what does the 'Control Panel' allow you to do?
A. View the list of running applications
B. Control hardware settings and system configurations
C. Manage user files
D. Open a web browser
39. What is the purpose of a 'file system' in an operating system?
A. To store and organize files
B. To manage network connections
C. To display system messages
D. To execute applications
40. What does the "Task Manager" in Windows help you with?
A. Restarting the computer
B. Monitoring running applications and performance
C. Creating files
D. Installing new software
41. Which of the following software is commonly used for word processing?
A. Microsoft Word
B. Excel
C. PowerPoint
D. Photoshop
42. In word processing, what does the 'Bold' formatting option do?
A. It changes the font style
B. It increases the font size
C. It makes the text darker and thicker
D. It changes the text color
43. What is the purpose of the 'Spell Check' feature in word processors?
A. To format text
B. To correct errors in spelling
C. To print documents
D. To change the font size
44. Which of the following is used to insert a page break in Microsoft Word?
A. Ctrl + P
B. Ctrl + S
C. Ctrl + Enter
D. Ctrl + Z
45. Which of the following is an option in the 'Page Layout' menu of a word processor?
A. Adjusting margins
B. Changing font style

Page 9 of 123
LEO SERIES 10
C. Adding clipart
D. Inserting hyperlinks
46. In Microsoft Word, what does the 'Align Left' option do?
A. Aligns text to the center
B. Aligns text to the right
C. Aligns text to the left side of the page
D. Makes the text bold
47. What is the purpose of the 'Header' and 'Footer' in a document?
A. To add images to the document
B. To include information that appears on every page
C. To format the text style
D. To add a page border
48. Which key is used to undo an action in most word processors?
A. Ctrl + C
B. Ctrl + Z
C. Ctrl + P
D. Ctrl + A
49. What is the function of the 'Save As' option in word processors?
A. To close the document
B. To create a new document
C. To save the document with a new name or location
D. To print the document
50. In Microsoft Word, which of the following can you insert using the 'Insert' tab?
A. Text formatting options
B. Tables, images, and hyperlinks
C. Page borders
D. Editing tools
51. Which of the following is an example of spreadsheet software?
A. Microsoft Excel
B. Adobe Photoshop
C. Mozilla Firefox
D. Microsoft Word
52. What is the primary function of a spreadsheet?
A. To store images
B. To manage text documents
C. To organize, analyze, and manipulate data in tables
D. To design websites
53. In a spreadsheet, what is a 'cell'?
A. A unit used to store data
B. A type of formula
C. A section of the header
D. A type of chart
54. Which of the following symbols is used for addition in spreadsheet formulas?
A. +
B. -
C. *
D. /
55. What does the 'SUM' function do in a spreadsheet?
A. Multiplies values
B. Adds values together
C. Divides values
D. Finds the average of values

Page 10 of 123
LEO SERIES 11
56. Which of the following is a valid function in Excel?
A. =ADD(A1, A2)
B. =SUM(A1, A2)
C. =SUBTRACT(A1, A2)
D. =MULTIPLY(A1, A2)
57. In Excel, how do you enter a formula into a cell?
A. Type it directly in the cell with the equals sign (=)
B. Select the cell and click 'Formula'
C. Press Ctrl + F
D. Double-click the cell
58. Which of the following is used to organize data in a spreadsheet?
A. Text box
B. Rows and columns
C. Graphs
D. Hyperlinks
59. Which of the following is NOT a feature of a spreadsheet?
A. Calculations using formulas
B. Storing documents as text
C. Sorting and filtering data
D. Creating graphs and charts
60. In Excel, which of the following options would you use to change the appearance of data in a cell?
A. Format Cells
B. Insert Function
C. Filter
D. Data Validation
61. What is a database?
A. A tool for browsing the internet
B. A program used for creating documents
C. A collection of organized data that can be easily accessed, managed, and updated
D. A type of spreadsheet
62. Which of the following is a common example of a database software?
A. Microsoft Excel
B. Microsoft Access
C. Adobe Photoshop
D. Mozilla Firefox
63. What is a 'table' in a database?
A. A collection of related data organized in rows and columns
B. A feature used for creating reports
C. A collection of formulas used for calculations
D. A section for storing multimedia files
64. In a database, what does 'SQL' stand for?
A. Standard Query Language
B. Simple Quality List
C. Structured Query Language
D. Search Query Logic
65. Which of the following operations can be performed in a database?
A. Storing data only
B. Sorting, filtering, and querying data
C. Designing websites
D. Creating documents
66. What is a 'primary key' in a database?
A. A field used to uniquely identify each record
B. A button used for deleting records

Page 11 of 123
LEO SERIES 12
C. A field used for formatting data
D. A method of sorting data
67. Which of the following is used to retrieve specific data from a database?
A. Filter
B. Query
C. Calculation
D. Format
68. What is a 'form' in database software?
A. A tool for formatting text
B. A type of report
C. An interface used to enter data into a database
D. A field used to store images
69. In a database, what is a 'record'?
A. A single column of data
B. A collection of related fields in a table
C. A search query
D. A report generated by the database
70. What is a 'report' in a database?
A. A method for storing data
B. A tool for analyzing data
C. A printable output of selected data
D. A program used to create tables
71. Which of the following is an example of presentation software?
A. Microsoft Word
B. Microsoft PowerPoint
C. Adobe Photoshop
D. Google Chrome
72. In PowerPoint, which view allows you to edit the slides and see the presentation as a sequence?
A. Normal view
B. Slide Sorter view
C. Reading view
D. Presenter view
73. Which of the following can be inserted into a PowerPoint slide?
A. Text
B. Images
C. Videos
D. All of the above
74. What is a slide layout in PowerPoint?
A. The background design of the slide
B. The order in which slides are shown
C. The arrangement of text and objects on a slide
D. The style of transitions between slides
75. What is the default transition between slides in PowerPoint?
A. Fade
B. Push
C. Wipe
D. None
76. Which of the following is NOT a common feature in presentation software?
A. Slide transitions
B. Inserting charts
C. Calculating data
D. Adding animations

Page 12 of 123
LEO SERIES 13
77. In PowerPoint, how can you insert a new slide into a presentation?
A. Right-click on a slide and select "New Slide"
B. Press Ctrl + N
C. Click on "Insert" and select "New Slide"
D. Use the "Slide Sorter" view
78. In a PowerPoint presentation, what does the "Slide Master" allow you to do?
A. Insert images into slides
B. Change the layout of all slides in the presentation
C. Add animations to slides
D. Record voice narration for slides
79. What is a 'transition' in PowerPoint?
A. The way text appears on a slide
B. The effect that occurs when you move from one slide to the next
C. The way a slide is printed
D. The font used in the slide
80. Which option in PowerPoint allows you to view a slide show from the beginning?
A. Slide Show > From Beginning
B. Home > Start Presentation
C. View > Play Presentation
D. File > Show All
81. Which of the following is an example of a digital communication tool?
A. Microsoft Word
B. Google Docs
C. Email
D. Microsoft Excel
82. Which of the following is a feature of an email?
A. Inserting multimedia files like pictures or videos
B. Editing web pages
C. Creating databases
D. Developing spreadsheets
83. What is the function of a 'Reply All' button in an email?
A. To reply to only the sender of the email
B. To reply to the sender and all other recipients of the email
C. To forward the email to a new recipient
D. To send an automatic response
84. What does 'cc' stand for in an email?
A. Close Copy
B. Carbon Copy
C. Credit Copy
D. Contact Copy
85. Which of the following is an online collaboration tool?
A. Google Docs
B. Microsoft Excel
C. Adobe Illustrator
D. Mozilla Firefox
86. Which of the following is a digital platform used for video conferencing?
A. Zoom
B. Microsoft Excel
C. WordPress
D. Google Calendar
87. What is the primary purpose of cloud storage?
A. To store files on your computer
B. To store files and data on remote servers accessible via the internet

Page 13 of 123
LEO SERIES 14
C. To print documents
D. To display web pages
88. Which of the following is an example of a cloud-based storage service?
A. Dropbox
B. Adobe Illustrator
C. Microsoft PowerPoint
D. Notepad
89. Which of the following is a benefit of using collaborative tools like Google Docs?
A. Limited access to data
B. Easy sharing and real-time collaboration
C. Cannot edit documents simultaneously
D. Reduces communication
90. Which of the following is a feature of video conferencing software like Zoom or Microsoft Teams?
A. Real-time voice and video communication
B. Offline document editing
C. No ability to share screens
D. Only allows text-based communication
91. What does "Digital Citizenship" refer to?
A. The ability to use technology without the internet
B. The practice of using technology responsibly and ethically
C. The act of accessing technology without permission
D. The design of a digital device
92. Which of the following is an example of unethical behavior online?
A. Respecting others' privacy
B. Sharing personal passwords without permission
C. Reporting fake news
D. Avoiding cyberbullying
93. What is 'cyberbullying'?
A. Sending emails to friends
B. Using the internet to harass or intimidate others
C. Watching educational videos online
D. Participating in online discussions
94. Why is it important to respect copyright laws when using digital content?
A. To avoid creating new content
B. To ensure creators receive credit for their work and avoid legal issues
C. To limit the use of digital devices
D. To avoid installing software
95. What does 'phishing' refer to in the context of digital security?
A. Legitimate email communication
B. Fraudulent attempts to obtain sensitive information by pretending to be trustworthy sources
C. Sharing data responsibly
D. Encrypting email messages
96. What is the best way to protect your privacy online?
A. By sharing your passwords with friends
B. By regularly updating privacy settings and using strong passwords
C. By avoiding using any online services
D. By sharing personal information on social media
97. What should you do if you receive a suspicious email asking for personal information?
A. Open the attachment and respond immediately
B. Ignore it and delete the email
C. Share the email with friends
D. Respond with your personal details to verify the request

Page 14 of 123
LEO SERIES 15
98. What is 'identity theft'?
A. Using your real name on social media
B. The unauthorized use of someone's personal information to commit fraud
C. Creating new online accounts
D. Sharing your data with trusted websites
99. Which of the following is an example of good cybersecurity practice?
A. Reusing the same password across different websites
B. Updating software regularly and using antivirus software
C. Clicking on all pop-up ads
D. Sharing passwords with friends for convenience
100.What should you do before downloading an app or software?
A. Skip reading the permissions
B. Check reviews and permissions to ensure it is safe and trustworthy
C. Ignore the developer information
D. Always download from unknown sources
101.What is the primary purpose of using encryption on digital data?
A. To make data easier to access
B. To protect data from unauthorized access
C. To make data available offline
D. To store data in the cloud
102.Which of the following is a common sign of a phishing attempt?
A. A professional email address from a well-known company
B. A request for personal information or login credentials
C. A subject line with a formal greeting
D. An attachment that appears to be a PDF document
103.What is a firewall used for in cybersecurity?
A. To block unwanted data from entering or leaving a network
B. To provide a backup for deleted files
C. To speed up internet connection
D. To encrypt passwords
104.Which of the following is the best practice to secure online accounts?
A. Use the same password for multiple accounts
B. Use strong, unique passwords for each account
C. Share passwords with trusted friends
D. Avoid using a password manager
105.What does the term 'two-factor authentication' mean?
A. Using a password only to access accounts
B. Verifying identity using two different methods, such as a password and a text message code
C. Using facial recognition to unlock accounts
D. Using only a fingerprint to access accounts
106.What should you do if you notice suspicious activity on your online accounts?
A. Ignore the activity and continue as normal
B. Change your password immediately and report the incident
C. Log out and avoid using the account again
D. Delete your account permanently
107.Which of the following is a type of malware?
A. Internet browsers
B. Antivirus programs
C. Computer viruses
D. Digital cameras
108.What does 'data breach' mean?
A. A situation where data is copied by authorized users
B. A situation where personal data is exposed or accessed by unauthorized individuals

Page 15 of 123
LEO SERIES 16
C. A backup of files being lost
D. The compression of data to reduce storage space
109.Which of the following is NOT a recommended action to ensure the privacy of your online data?
A. Avoid sharing personal information on unsecured websites
B. Keep your passwords confidential and use complex ones
C. Frequently change your passwords
D. Share your password with others for convenience
110.What does 'secure socket layer' (SSL) refer to?
A. A type of firewall
B. A method for encrypting data sent over the internet
C. A type of malware
D. A platform for hosting websites
111.Which of the following is a benefit of using technology in education?
A. Increased screen time leading to eye strain
B. Easier access to educational resources and learning tools
C. Constant distractions from social media
D. Increased dependence on devices
112.What is one of the risks of excessive screen time?
A. Improved focus and concentration
B. Eye strain and headaches
C. Enhanced sleep quality
D. Better communication skills
113.Which of the following is a way to protect your eyes when using a computer for long periods?
A. Keep the screen brightness at the highest setting
B. Use blue light blocking glasses or screen filters
C. Focus on the screen without taking breaks
D. Avoid blinking when reading on the screen
114.What is the '20-20-20' rule in relation to screen time?
A. Every 20 minutes, look at something 20 feet away for 20 seconds
B. Take a 20-minute break every hour
C. Spend 20 minutes of screen time on educational apps
D. Use the screen for no more than 20 minutes in a day
115.Which of the following is a healthy practice for managing technology use?
A. Limiting screen time to specific periods and taking regular breaks
B. Using digital devices at all hours of the day and night
C. Avoiding physical activity during online sessions
D. Only using devices with high screen brightness
116.What is digital addiction?
A. A positive relationship with technology
B. Excessive and compulsive use of digital devices to the detriment of daily life
C. Learning how to use technology efficiently
D. Being proficient in using technology
117.What is an example of 'tech neck'?
A. The pain from sitting too close to a screen
B. The discomfort or stiffness caused by looking down at a screen for long periods
C. The strain caused by typing too fast
D. The eye strain from high brightness
118.What is a recommended way to improve posture when using technology?
A. Slouching to reduce strain on the back
B. Sitting with your back straight and your eyes level with the screen
C. Using the device on your lap
D. Lying down while using a laptop

Page 16 of 123
LEO SERIES 17
119.How can you ensure that digital devices do not disrupt your sleep?
A. Use them right before bed
B. Reduce screen time in the hour before going to bed
C. Increase the screen brightness at night
D. Use the devices on your bed
120.Which of the following is a positive outcome of integrating technology into education?
A. Increased student engagement and access to diverse learning materials
B. Decreased interaction with teachers and peers
C. The need for constant device upgrades
D. Reduced opportunities for face-to-face learning
13. Digital Footprint
121.What is a 'digital footprint'?
A. A physical mark left by digital devices
B. The trail of data you leave behind when using the internet
C. The amount of time spent using devices
D. The storage capacity of a device
122.Which of the following can contribute to your digital footprint?
A. Photos you upload to social media
B. Emails you send
C. Websites you visit
D. All of the above
123.Why is it important to be aware of your digital footprint?
A. Because it can affect your reputation online and offline
B. Because it determines the speed of your internet connection
C. Because it is private and cannot be accessed by others
D. Because it only relates to the content you post on social media
124.Which of the following is a good practice for managing your digital footprint?
A. Sharing personal information on public forums
B. Using privacy settings to control what others can see
C. Ignoring security settings for convenience
D. Posting anything without considering the consequences
125.Which of the following is a consequence of having a negative digital footprint?
A. You may have difficulty finding job opportunities
B. You are more likely to receive online recommendations
C. Your social media posts will go viral
D. You will have unlimited access to online services
126.How can you reduce your digital footprint?
A. Delete old accounts you no longer use
B. Share every detail of your life online
C. Avoid using privacy settings
D. Avoid using the internet
127.What should you do before posting something online?
A. Think about how it may affect your reputation or others
B. Post immediately without considering consequences
C. Avoid reading the content before posting
D. Post everything, as it will be erased quickly
128.What is the best way to manage your digital identity?
A. Ignore privacy settings and share everything
B. Carefully monitor and manage your online presence
C. Use multiple fake identities online
D. Only use social media when you are offline
129.How can employers view your digital footprint?
A. They cannot access any of your online information

Page 17 of 123
LEO SERIES 18
B. They can search your name and view your social media profiles
C. They can only access your email
D. They cannot search for your online activity
130.Which of the following is a way to improve your digital reputation?
A. Share harmful or negative content online
B. Engage in responsible and respectful online behavior
C. Keep all your accounts open and unprotected
D. Post content that will upset others
131.What is the best way to ensure that children are using the internet safely?
A. Allow them to use the internet without supervision
B. Set up parental controls and monitor their online activity
C. Restrict their use of all digital devices
D. Give them access to only educational websites
132.What is the purpose of setting parental controls on devices?
A. To block the internet completely
B. To limit access to inappropriate content and monitor online activity
C. To allow unlimited access to all websites
D. To disable all apps and games
133.What should you do if you encounter inappropriate content online?
A. Ignore it and continue browsing
B. Report it to the website administrator or relevant authorities
C. Share it with friends
D. Download the content for future use
134.Which of the following is the most secure way to create a password?
A. Use personal information like your name or birthday
B. Use a simple word or phrase you can easily remember
C. Use a combination of uppercase and lowercase letters, numbers, and symbols
D. Use the same password for all your accounts
135.Which of the following is NOT a safe practice for online shopping?
A. Using a credit card on secure websites with 'https'
B. Sharing credit card details on unsecured websites
C. Checking reviews of products and sellers
D. Keeping your account login details private
136.Which of the following is an example of a secure website?
A. A website with 'http://' in the URL
B. A website with 'https://' in the URL
C. A website with no URL
D. A website with a blue background
137.How can you prevent identity theft online?
A. Share your personal information openly
B. Use strong, unique passwords and avoid public Wi-Fi networks for sensitive activities
C. Keep your personal details in a public file
D. Click on links in unsolicited emails
138.What should you do when you encounter an online scam?
A. Report the scam to the authorities and avoid responding
B. Participate to learn more
C. Share the scam with others to warn them
D. Ignore it and hope it will stop
139.What is the safest way to connect to public Wi-Fi?
A. Use a virtual private network (VPN) to secure your connection
B. Log into sensitive accounts like online banking
C. Share your Wi-Fi password with others
D. Disable your firewall to avoid connection issues

Page 18 of 123
LEO SERIES 19
140.Which of the following is a common indicator of a scam email?
A. Professional language and formatting
B. A request for urgent action, such as account verification
C. A known sender with a valid email address
D. Clear instructions to unsubscribe
141.Which of the following tools can help students organize their study materials?
A. Google Docs
B. Microsoft Word
C. Evernote
D. All of the above
142.Which of the following is an example of a cloud-based document editor?
A. Microsoft Word
B. Google Docs
C. Adobe Acrobat
D. Notepad
143.Which of the following is a benefit of using online research tools?
A. Access to a limited number of sources
B. Ability to conduct research from anywhere with an internet connection
C. No need for citations or references
D. Avoiding the need to evaluate sources for reliability
144.What is an interactive whiteboard used for?
A. To print documents
B. To store digital files
C. To display and manipulate content in a classroom setting
D. To access the internet
145.Which of the following is a feature of Google Classroom?
A. Video conferencing
B. Real-time document editing and sharing
C. Assignments and grading tools
D. All of the above
146.Which of the following is NOT an online learning platform?
A. Coursera
B. Khan Academy
C. Google Docs
D. Edmodo
147.What does the term 'e-learning' refer to?
A. Learning that takes place without the internet
B. Learning using digital resources like videos, online courses, and web-based content
C. Learning from textbooks
D. Learning in a traditional classroom without technology
148.Which tool is often used for video-based lessons and lectures?
A. Zoom
B. Google Calendar
C. Adobe Photoshop
D. Notepad
149.Which feature of Google Docs allows for real-time collaboration on documents?
A. Spell check
B. Shared editing and commenting
C. Page layout
D. Template gallery
150.Which of the following is a primary advantage of using digital tools for learning?
A. Reducing the amount of time spent learning
B. Making learning more interactive and accessible

Page 19 of 123
LEO SERIES 20
C. Limiting access to educational resources
D. Replacing teachers
151.What is the purpose of using an antivirus software?
A. To make a computer faster
B. To protect a computer from viruses and other malicious software
C. To improve the appearance of the operating system
D. To encrypt internet traffic
152.Which of the following should you do when using a public computer?
A. Avoid accessing sensitive accounts or entering personal information
B. Use the computer for online banking
C. Save passwords in the browser
D. Leave the computer unlocked after use
153.Which of the following is an example of a 'strong password'?
A. '123456'
B. 'password'
C. 'qwerty'
D. 'N5t@fr3nCh@11'
154.What is the first step you should take if you suspect your computer is infected with malware?
A. Turn off the computer and disconnect from the internet
B. Ignore it and continue working
C. Open suspicious emails to check for any updates
D. Run a virus scan after connecting to public Wi-Fi
155.What is a 'secure password manager'?
A. A software that helps you create and securely store passwords
B. A tool for managing emails
C. A website for sharing passwords
D. A service that resets your passwords
156.Which of the following actions can help prevent data theft on mobile devices?
A. Using a simple password
B. Avoiding screen locks
C. Installing apps only from trusted sources
D. Keeping your device unlocked at all times
157.What is a 'secure connection' in the context of browsing the web?
A. Using an internet connection with no encryption
B. Connecting to websites that use 'https' to encrypt data
C. Using a public Wi-Fi network without protection
D. Avoiding the use of passwords
158.Which of the following is a common method used to back up data?
A. Storing data on external hard drives
B. Printing data for offline use
C. Saving data on random websites
D. Storing files in temporary folders
159.What is 'social engineering' in the context of digital security?
A. A method of increasing online followers
B. A technique used to manipulate individuals into revealing personal information
C. A way to reduce screen time
D. A tool for creating digital content
160.What does the term 'data loss prevention' (DLP) refer to?
A. A method to prevent the storage of large files
B. Tools and processes to prevent unauthorized access or loss of sensitive data
C. The automatic deletion of unwanted files
D. Compressing files for storage

Page 20 of 123
LEO SERIES 21
161.What is the primary purpose of privacy settings on social media?
A. To make your profile private only to friends
B. To prevent others from finding your profile
C. To control who can see your posts and personal information
D. To increase the number of followers on your account
162.Which of the following is an example of inappropriate content on social media?
A. Sharing a birthday greeting
B. Posting offensive language or images
C. Updating your status with a motivational quote
D. Sharing a fun video with friends
163.What should you do if you receive a bullying message on social media?
A. Respond aggressively
B. Ignore it and continue using social media
C. Report the message to the platform and block the user
D. Share it with others to get attention
164.Which of the following is a good practice to ensure your safety on social media?
A. Share your exact location regularly with all followers
B. Post everything that happens in your life, even private details
C. Adjust your privacy settings and avoid oversharing personal details
D. Use the same password for all your social media accounts
165.What is a common sign of a fake social media account?
A. A verified checkmark next to the username
B. A profile with few friends or followers and no posts
C. Regular, professional posts
D. The account follows a large number of users with no mutual connections
166.What is 'catfishing' in the context of social media?
A. Creating fake accounts to trick others into thinking they are someone else
B. Posting photos of pets to attract followers
C. Sharing personal achievements on social media
D. Encouraging others to share fake news
167.Which of the following is a responsible use of social media?
A. Sharing only what you want others to know about your life
B. Posting private messages between you and others publicly
C. Posting personal photos and sensitive information without permission
D. Accepting friend requests from unknown people without thinking
168.What is the impact of oversharing on social media?
A. It helps you build a stronger relationship with friends
B. It can expose you to privacy risks and harm your reputation
C. It improves your social media following
D. It creates trust with all online users
169.How can you manage your online reputation?
A. Post whatever you like without considering the consequences
B. Regularly check what others are posting about you and delete inappropriate content
C. Keep your posts private and avoid engaging with anyone online
D. Ignore negative feedback and never respond
170.Which of the following should you do if someone online asks for your personal information?
A. Share your details as soon as possible
B. Ignore them and move on
C. Report the request to the platform's support team and block the person
D. Respond with your personal information to avoid conflict
171.What is 'digital citizenship'?
A. Being a responsible and ethical user of technology
B. Owning multiple digital devices

Page 21 of 123
LEO SERIES 22
C. Spending as much time online as possible
D. Using technology only for entertainment
172.Which of the following is an example of ethical use of technology?
A. Using software without paying for it
B. Downloading movies from illegal websites
C. Respecting others' privacy by not sharing their personal information without permission
D. Using someone else's account without their consent
173.What is plagiarism in the context of using digital content?
A. Using online resources to create something new
B. Copying someone else's work and presenting it as your own
C. Citing sources correctly in your work
D. Taking ideas from different sources and remixing them
174.Why is it important to respect others' intellectual property?
A. To avoid being sued
B. To promote innovation and creativity
C. To gain popularity on social media
D. To reduce the amount of online content
175.Which of the following is a consequence of unethical use of technology?
A. Legal actions and loss of privileges
B. Increased followers on social media
C. Better grades in school
D. More online engagement and feedback
176.What is an example of responsible content creation online?
A. Posting content that is respectful, factual, and does not harm others
B. Posting without considering the consequences
C. Sharing content with the intent to deceive others
D. Using someone else's work without giving credit
177.Which of the following actions is an example of unethical behavior on the internet?
A. Giving credit to original authors of online content
B. Spreading false information or rumors
C. Asking for permission before sharing someone's work
D. Using public domain content in your own projects
178.What is the purpose of citing sources when using digital resources?
A. To avoid plagiarizing
B. To reduce the time spent on research
C. To make your content more interesting
D. To increase the number of views on your post
179.Which of the following actions helps maintain an ethical online presence?
A. Posting everything without considering privacy
B. Following online trends without thinking critically
C. Engaging in respectful conversations and avoiding harmful behavior
D. Only using technology for personal entertainment
180.What should you do if you realize that you have inadvertently shared false information online?
A. Ignore it and hope no one notices
B. Delete the post and apologize for the mistake
C. Share it more widely to fix the problem
D. Defend the information without evidence
181.What is cyberbullying?
A. Bullying through digital platforms like social media, text messages, or websites
B. Harassing someone in person
C. Using technology to educate others
D. Using technology to help friends

Page 22 of 123
LEO SERIES 23
182.Which of the following is an example of cyberbullying?
A. Sending hurtful or threatening messages online
B. Sending positive and supportive messages
C. Sharing educational resources with classmates
D. Engaging in online discussions politely
183.What should you do if you are a victim of cyberbullying?
A. Ignore the bullying and do nothing
B. Report the incident to a trusted adult and block the bully
C. Respond aggressively to the bully
D. Share the incident with everyone online
184.What is the best way to help someone who is being cyberbullied?
A. Ignore the situation and avoid getting involved
B. Support the victim, report the bully, and encourage them to talk to a trusted adult
C. Join the bullying to fit in
D. Spread the bullying content to others
185.What is one of the most important steps in preventing cyberbullying?
A. Encouraging others to share hurtful content
B. Creating a supportive and respectful online environment
C. Ignoring people who are being bullied
D. Sharing personal information about others
186.What does the term 'doxxing' refer to in the context of cyberbullying?
A. Sharing someone's personal information online without their consent
B. Posting memes to entertain people
C. Encouraging others to block someone
D. Sending anonymous messages
187.What should you do if you see someone being cyberbullied online?
A. Ignore the situation and continue using the internet
B. Join the bully to make the situation worse
C. Report the incident to the platform and support the victim
D. Post negative comments about the victim
188.Which of the following is an effect of cyberbullying on victims?
A. Increased confidence and self-esteem
B. Mental health issues, including depression and anxiety
C. Improved social relationships
D. Positive effects on school performance
189.Which of the following is NOT a sign of someone being cyberbullied?
A. Becoming withdrawn or avoiding social interactions
B. Posting positive and uplifting messages online
C. Showing signs of distress or anxiety
D. Avoiding school or online activities
190.How can schools help prevent cyberbullying?
A. By ignoring the situation and allowing students to resolve it on their own
B. By teaching students about respectful online behavior and providing resources for victims
C. By restricting the use of digital devices completely
D. By punishing students who use technology
191. What is a common risk of clicking on unknown links in emails or messages?
A. It leads to new opportunities
B. It could lead to phishing attacks or malware infections
C. It improves your social media engagement
D. It helps you discover new websites
192. How can you verify the authenticity of an email or message from an unknown sender?
A. Click the link to see where it leads
B. Check for spelling or grammatical errors, and verify the sender’s address

Page 23 of 123
LEO SERIES 24
C. Reply to the sender asking for more information
D. Forward the email to all your contacts to get their opinion
193. Which of the following is a strong password practice?
A. Using your name and birthdate as a password
B. Using a long combination of letters, numbers, and symbols
C. Using the same password for all your accounts
D. Sharing your password with friends for safekeeping
194. Why is it important to log out of online accounts when using shared or public devices?
A. To avoid the website from remembering your login credentials
B. To prevent others from accessing your account without your permission
C. To make sure the device runs faster
D. To keep your account active
195. What is a good practice for handling your personal data online?
A. Share personal information with anyone online for convenience
B. Use different passwords for each of your online accounts and avoid sharing them
C. Store all your personal information in one file on your computer
D. Keep your personal data open to everyone to increase your social media presence
196. What should you do if a website asks for too much personal information that seems unnecessary?
A. Provide the information to get quick access
B. Ignore the request and close the website
C. Enter only the required information and check for legitimacy
D. Share all your details to avoid suspicion
197. What is 'phishing' in the context of online safety?
A. Sending emails with free offers to help you win prizes
B. A method of obtaining sensitive information such as passwords or credit card details by pretending to
be someone else
C. A type of social media game
D. A secure method to verify your online transactions
198. What is the best action to take if you believe you've been a victim of identity theft online?
A. Ignore it and continue using the affected services
B. Report it to the relevant authorities and change your passwords immediately
C. Share your experience with friends to alert them
D. Delete all your online accounts
199. How can a strong password be described?
A. Easy to remember, such as your pet's name
B. A combination of your first and last names
C. A random mix of uppercase letters, lowercase letters, numbers, and symbols
D. The same as your username
ANSWERS TO OBJECTIVE TEST
Question Answer Question Answer Question Answer Question Answer Question Answer
Number Number Number Number Number
1 B 41 A 81 B 121 A 161 C
2 C 42 C 82 C 122 B 162 C
3 A 43 B 83 A 123 C 163 B
4 B 44 A 84 B 124 A 164 C
5 C 45 D 85 D 125 C 165 D
6 A 46 B 86 C 126 B 166 A
7 D 47 C 87 B 127 D 167 A
8 B 48 D 88 B 128 C 168 B
9 A 49 A 89 D 129 B 169 B
10 C 50 B 90 C 130 B 170 C
11 A 51 A 91 B 131 C 171 A
12 B 52 B 92 A 132 A 172 C
13 C 53 C 93 B 133 D 173 B
14 B 54 D 94 D 134 B 174 B
15 A 55 A 95 B 135 D 175 A
Page 24 of 123
LEO SERIES 25
16 C 56 C 96 A 136 A 176 A
17 D 57 B 97 B 137 B 177 B
18 B 58 A 98 C 138 C 178 A
19 C 59 B 99 B 139 B 179 C
20 A 60 C 100 A 140 A 180 C
21 D 61 B 101 C 141 C 181 A
22 B 62 A 102 B 142 D 182 A
23 A 63 C 103 A 143 B 183 B
24 C 64 B 104 D 144 B 184 B
25 D 65 A 105 C 145 A 185 B
26 A 66 D 106 B 146 B 186 A
27 B 67 A 107 A 147 C 187 C
28 C 68 C 108 C 148 C 188 B
29 D 69 B 109 B 149 D 189 B
30 B 70 A 110 D 150 A 190 B
31 A 71 C 111 A 151 B 191 B
32 C 72 B 112 C 152 A 192 B
33 B 73 D 113 B 153 C 193 B
34 D 74 C 114 A 154 B 194 B
35 A 75 A 115 D 155 A 195 B
36 C 76 D 116 C 156 B 196 C
37 B 77 B 117 B 157 A 197 B
38 A 78 C 118 A 158 D 198 B
39 C 79 A 119 D 159 C 199 C
40 D 80 B 120 B 160 A

Strand 2: Internet and Communication Technologies


1. What does the term "Internet" refer to?
A. A device for sending messages
B. A worldwide network of computers that are connected to share information
C. A software application used for browsing websites
D. A computer virus that spreads through networks
2. Which of the following is an example of a search engine?
A. Facebook
B. Google
C. Instagram
D. YouTube
3. Which of the following is NOT an Internet service?
A. Email
B. Cloud storage
C. Printer
D. Web browsing
4. What is the main purpose of a web browser?
A. To send emails
B. To store files
C. To display web pages
D. To write documents
5. Which of the following is an example of an instant messaging application?
A. Microsoft Word
B. WhatsApp
C. Excel
D. Google Docs
6. What does URL stand for?
A. Uniform Resource Locator
B. Universal Resource Locator

Page 25 of 123
LEO SERIES 26
C. United Resource Locator
D. Universal Return Locator
7. Which of the following is a type of email account provider?
A. Facebook
B. Gmail
C. YouTube
D. Instagram
8. What is the term used for protecting a computer or network from malicious software?
A. Data recovery
B. Internet browsing
C. Antivirus software
D. File sharing
9. Which of the following is considered a form of digital communication?
A. Telephone call
B. Email
C. Face-to-face conversation
D. Letter writing
10. What is a "social media platform"?
A. A website that allows people to connect and share content online
B. A hardware device used for communication
C. A type of computer virus
D. A software used for creating documents
11. Which of the following is a popular video conferencing tool?
A. WhatsApp
B. Zoom
C. Snapchat
D. Instagram
12. What does "cloud computing" refer to?
A. Storing and accessing data over the internet instead of on a computer’s hard drive
B. A type of computer virus
C. A program for editing photos
D. A way of storing documents offline
13. What is a "digital footprint"?
A. A printout of all the documents you have created
B. A record of your activities on the internet
C. A type of computer virus
D. A way to measure computer speed
14. What is the purpose of a firewall?
A. To block internet access to all websites
B. To protect a computer from unauthorized access over the internet
C. To clean up the computer’s hard drive
D. To increase internet speed
15. Which of the following is a secure internet connection?
A. HTTP
B. HTTPS
C. FTP
D. UDP
16. What does the "@" symbol in an email address represent?
A. A space in the email address
B. A separator between the username and domain
C. A type of encryption
D. A special character used in social media

Page 26 of 123
LEO SERIES 27
17. Which of the following best describes "phishing"?
A. A method of securing passwords
B. Sending fraudulent emails to obtain personal information
C. A way of speeding up internet browsing
D. A type of software for video editing
18. Which of the following is a consequence of sharing too much personal information online?
A. Increased privacy
B. Identity theft
C. Faster internet speed
D. More accurate search results
19. What is the purpose of a "VPN" (Virtual Private Network)?
A. To browse the internet faster
B. To protect your online privacy by encrypting your internet connection
C. To send emails securely
D. To manage social media accounts
20. What is an online platform used for creating and sharing videos?
A. WhatsApp
B. TikTok
C. WordPress
D. Excel
21. Which of the following is an example of a file sharing service?
A. Dropbox
B. Adobe Acrobat
C. VLC Media Player
D. Excel
22. Which of the following helps prevent malware from accessing your computer?
A. Antivirus software
B. Word processor
C. File compression
D. Email service
23. What does the term "streaming" refer to?
A. Downloading a file for offline use
B. Playing audio or video content over the internet without downloading it
C. Uploading files to cloud storage
D. A type of email service
24. What is the main benefit of using social media?
A. To connect with friends and share content
B. To create and edit documents
C. To store large files
D. To play video games
25. What does "Wi-Fi" stand for?
A. Wireless Internet Function
B. Wireless Fidelity
C. Web Internet Frequency
D. World Internet Flow
26. What is the primary function of a modem in an internet connection?
A. To store files
B. To transmit data to and from the internet
C. To increase internet speed
D. To protect the network from malware
27. Which of the following is a web application used for creating and managing documents online?
A. Google Docs
B. VLC Media Player

Page 27 of 123
LEO SERIES 28
C. Adobe Photoshop
D. Windows Media Player
28. Which of the following is a form of cyberbullying?
A. Sending encouraging messages
B. Sharing videos of positive events
C. Posting harmful comments or threats online
D. Writing positive blog posts
29. Which of the following is a feature of the "Incognito Mode" in web browsers?
A. It blocks pop-up ads
B. It encrypts your internet connection
C. It prevents browsing history from being saved
D. It increases browsing speed
30. Which of the following is NOT a type of communication on the internet?
A. Instant messaging
B. Video conferencing
C. File downloading
D. Email
31. What is the main purpose of a "search engine optimization" (SEO) strategy?
A. To improve website visibility in search engine results
B. To create and edit photos
C. To create a website’s layout
D. To increase internet speed
32. Which of the following is a commonly used video streaming service?
A. Microsoft Office
B. YouTube
C. Google Chrome
D. WordPress
33. Which of the following is a method of authenticating a user’s identity online?
A. Two-factor authentication
B. Data compression
C. Video streaming
D. File sharing
34. What does the term "cookies" refer to in internet browsing?
A. A type of malware
B. Small files that store browsing information
C. A security measure for websites
D. A type of browser
35. What is the purpose of a "browser cache"?
A. To store files temporarily to improve browsing speed
B. To store passwords
C. To download files faster
D. To prevent websites from being accessed
36. What is a URL shortener used for?
A. To send large files via email
B. To change a URL into a shorter format
C. To increase the security of a URL
D. To convert text into URLs
37. What is a "wiki"?
A. A form of social media
B. A website that allows users to collaboratively edit content
C. A type of computer virus
D. A file storage system

Page 28 of 123
LEO SERIES 29
38. Which of the following is an example of a cloud storage service?
A. Google Drive
B. Microsoft Word
C. Spotify
D. Skype
39. Which of the following is NOT a form of internet communication?
A. Email
B. Face-to-face conversation
C. Video call
D. Instant messaging
40. What is the primary role of an internet service provider (ISP)?
A. To provide computer hardware
B. To offer internet access to customers
C. To create websites
D. To send emails
41. What is the primary purpose of an email attachment?
A. To send a text message
B. To send files along with the email
C. To store email settings
D. To send video files only
42. What does "phishing" mean in the context of internet security?
A. A method to back up data
B. The process of sending fake emails to steal personal information
C. The act of creating a new website
D. A technique for downloading software
43. What type of network allows computers to connect over long distances, like between cities or countries?
A. LAN (Local Area Network)
B. PAN (Personal Area Network)
C. MAN (Metropolitan Area Network)
D. WAN (Wide Area Network)
44. Which of the following is a commonly used method to protect your online identity?
A. Public Wi-Fi
B. Strong password and two-factor authentication
C. Automatic login
D. Using the same password for all accounts
45. Which of the following is an example of a secure website address?
A. ftp://www.example.com
B. http://www.example.com
C. https://www.example.com
D. www.example.com
46. What is an online identity management service?
A. A service used to back up files
B. A tool for designing websites
C. A platform to manage multiple online accounts and logins
D. A program for editing videos
47. What does the term "online shopping" refer to?
A. Purchasing items in physical stores
B. Buying goods and services through the internet
C. Browsing websites for entertainment
D. Communicating with friends over the internet
48. Which of the following is a popular search engine?
A. YouTube
B. Google

Page 29 of 123
LEO SERIES 30
C. Facebook
D. Instagram
49. What is the primary purpose of a search engine?
A. To send emails
B. To store files
C. To help users find information online
D. To block harmful websites
50. What is the main function of a web server?
A. To host websites and deliver content to users' browsers
B. To create and edit images
C. To manage email accounts
D. To play videos
51. What is "bandwidth" in the context of the internet?
A. The speed of a computer’s processor
B. The amount of data that can be transferred over a network in a given time
C. The size of a hard drive
D. The amount of storage on a website
52. What does "HTTP" stand for?
A. Hyper Text Transfer Protocol
B. High Transmission Text Protocol
C. Hyper Transmission Time Protocol
D. Hyper Text Telecommunication Protocol
53. What is the function of a DNS (Domain Name System)?
A. To store files on the internet
B. To convert human-readable website names into IP addresses
C. To edit website content
D. To secure email messages
54. What is "video conferencing"?
A. Sending messages through video clips
B. A meeting that takes place over the internet using video and audio
C. Watching movies online
D. Editing videos with others
55. What is the role of a web host?
A. To create websites
B. To store website files and make them accessible online
C. To provide security for websites
D. To send emails
56. Which of the following is an example of a social networking platform?
A. Twitter
B. Microsoft Office
C. Windows Explorer
D. Adobe Photoshop
57. What does "HTTPs" signify in a website address?
A. The site is not secure
B. The site uses an encrypted connection for security
C. The site is under maintenance
D. The site is hosted in another country
58. Which of the following is a commonly used cloud storage provider?
A. Microsoft PowerPoint
B. Dropbox
C. Adobe Photoshop
D. Microsoft Word

Page 30 of 123
LEO SERIES 31
59. What is a "download" in the context of the internet?
A. The process of uploading a file to the internet
B. A file you view without saving
C. The process of transferring a file from the internet to your device
D. A file you create on your computer
60. Which of the following is an example of a peer-to-peer (P2P) network?
A. A network where devices share resources directly with each other
B. A centralized network where all data is stored on one server
C. A type of social media platform
D. A cloud storage service
61. What does "malware" stand for?
A. Malicious software that harms or disrupts devices and networks
B. A type of computer hardware
C. A secure online communication tool
D. A backup storage device
62. What is a "pop-up" window?
A. A small window that opens automatically on a website, usually for ads or information
B. A tool for editing documents
C. A type of email notification
D. A type of software update
63. Which of the following is a characteristic of a strong password?
A. It is easy to remember
B. It contains personal information like a name or birthdate
C. It is a mix of letters, numbers, and symbols
D. It is the same as your username
64. What is the main function of a router?
A. To send and receive emails
B. To store files on the network
C. To connect different networks and direct data traffic
D. To manage website security
65. What does "e-commerce" refer to?
A. Editing websites
B. Selling goods and services online
C. Managing email accounts
D. Creating social media posts
66. What does "web 2.0" refer to?
A. The first version of the World Wide Web
B. The ability to create and interact with content on the internet
C. A new type of email service
D. A web hosting service
67. Which of the following is an example of a collaborative tool?
A. Google Docs
B. Windows Media Player
C. Adobe Illustrator
D. Microsoft Excel
68. What is the term for a "public network" like the internet?
A. LAN (Local Area Network)
B. WAN (Wide Area Network)
C. VPN (Virtual Private Network)
D. PAN (Personal Area Network)
69. What does "streaming" allow users to do?
A. Watch content on demand over the internet without downloading it
B. Download content to watch later

Page 31 of 123
LEO SERIES 32
C. Share files over a network
D. Encrypt content for secure viewing
70. What is the purpose of the "Reply All" function in email?
A. To delete an email
B. To send a response to everyone included in the original message
C. To forward the message to another person
D. To add an attachment to an email
71. What does a "social media influencer" do?
A. Designs websites
B. Promotes products or services through social media platforms
C. Writes software for websites
D. Helps people to create passwords
72. What is the primary advantage of using online collaboration tools?
A. They help with editing photos
B. They allow people to work together on documents in real-time
C. They help to speed up internet connections
D. They create and manage social media accounts
73. What is "Bluetooth" primarily used for?
A. Wireless communication between devices over short distances
B. Storing files on cloud services
C. Sending emails to devices
D. Browsing websites
74. What is the function of an IP address?
A. To track a user's online activity
B. To provide a unique address for each device on the internet or a network
C. To store web browser history
D. To compress files for faster downloading
75. What does the "Share" button on most social media platforms do?
A. Allows you to download content
B. Allows you to share content with your followers or friends
C. Allows you to log out of the platform
D. Allows you to edit your profile
76. What is the primary purpose of the "incognito" or "private browsing" mode in web browsers?
A. To save browsing history
B. To hide browsing activity from other users on the same device
C. To automatically delete cookies from websites
D. To block all advertisements
77. What is the role of an internet service provider (ISP)?
A. To provide the hardware for your computer
B. To offer access to the internet
C. To create websites
D. To design mobile apps
78. What is an example of a VoIP (Voice over Internet Protocol) service?
A. Gmail
B. Skype
C. Facebook
D. Google Docs
79. What does "cookies" refer to in the context of web browsing?
A. A type of website
B. Small pieces of data stored by websites on a user's device
C. A way to store video content
D. A kind of secure password

Page 32 of 123
LEO SERIES 33
80. What is the meaning of "malicious code"?
A. Code written to improve website performance
B. Code written to harm or exploit devices and networks
C. Code used to back up data
D. Code that manages the user interface
81. Which of the following is an example of an online payment system?
A. PayPal
B. Microsoft Word
C. Google Drive
D. Internet Explorer
82. What is "cloud computing"?
A. Storing data on physical devices only
B. Using remote servers on the internet to store, manage, and process data
C. A type of email encryption
D. A tool for designing websites
83. What is the purpose of a "firewall" in internet security?
A. To create backup copies of data
B. To monitor and control incoming and outgoing network traffic based on security rules
C. To store passwords securely
D. To host websites
84. What does the term "URL" stand for?
A. Uniform Resource Locator
B. Universal Reference Language
C. User Request Link
D. Uniform Retrieval Location
85. Which of the following describes a "blog"?
A. A place to share photos and videos only
B. A personal website or web page used for sharing opinions or information regularly
C. A type of online store
D. A tool for encrypting emails
86. What does "uploading" a file mean?
A. Downloading a file from the internet
B. Sending a file from your device to the internet or a cloud service
C. Viewing a file on your computer
D. Printing a file
87. Which of the following is a key feature of social media platforms?
A. Providing email services
B. Allowing users to create, share, and interact with content
C. Encrypting messages for privacy
D. Hosting large business networks
88. What does "Wi-Fi" refer to?
A. A type of computer virus
B. A wireless networking technology for connecting devices to the internet
C. A device used for downloading files
D. A software for email management
89. What is the meaning of "spam" in the context of email?
A. Unsolicited and usually irrelevant or inappropriate messages sent over the internet
B. Encrypted messages sent securely
C. Regularly scheduled emails from a known source
D. Files attached to emails
90. What does "social engineering" mean in cybersecurity?
A. Using encryption to protect data
B. Manipulating people into revealing confidential information through deception

Page 33 of 123
LEO SERIES 34
C. The process of setting up firewalls
D. Encrypting passwords for protection
91. Which of the following is an example of a search engine optimization (SEO) technique?
A. Using paid advertisements on social media
B. Writing code for websites
C. Using keywords to increase a website's visibility in search results
D. Storing data on cloud services
92. What is the purpose of a VPN (Virtual Private Network)?
A. To increase internet speed
B. To protect the privacy and security of internet traffic by masking your IP address
C. To host a website
D. To create and edit documents
93. What is "data encryption"?
A. The process of compressing data to save space
B. The process of converting data into a secure format to prevent unauthorized access
C. The process of sharing data over the internet
D. The process of deleting data permanently
94. What is the main function of a "browser"?
A. To store email messages
B. To provide a secure connection to the internet
C. To allow users to navigate websites and access content on the web
D. To edit images
95. What does "HTTPS" stand for?
A. Hyper Transfer Protocol Secure
B. Hyper Text Transfer Protocol Secure
C. Hyper Textual Secure Protocol
D. High Transfer Protocol Secure
96. What is a "domain name"?
A. A password used to log into a website
B. A unique address used to access websites on the internet
C. A network that connects devices
D. A type of social media account
97. Which of the following is an example of a wireless communication protocol?
A. USB
B. Wi-Fi
C. Ethernet
D. HDMI
98. What does "cloud storage" allow users to do?
A. Store data on local devices
B. Backup data to an external hard drive
C. Store data remotely on servers that can be accessed via the internet
D. Encrypt files for privacy
99. What is a "social media platform"?
A. A type of email service
B. A website or app used for social networking and sharing content
C. A program for editing video files
D. A search engine
100. What is the primary function of a "web browser"?
A. To create websites
B. To allow users to access websites on the internet
C. To encrypt online communication
D. To store files securely

Page 34 of 123
LEO SERIES 35
101. What does "streaming" refer to?
A. Storing media files on a device
B. Watching or listening to media content in real-time without downloading it
C. Editing video content online
D. Sending media files to another device
102. What is the term used to describe harmful software such as viruses and worms?
A. Spam
B. Malware
C. Cookies
D. Pop-ups
103. Which of the following best describes a "search engine"?
A. A tool that encrypts data on websites
B. A program that allows you to create websites
C. A tool that helps users find websites or information on the internet
D. A tool that backs up your data
104. What does "cloud-based storage" mean?
A. Storing data on external hard drives
B. Storing data remotely on servers accessible over the internet
C. Storing data only on a local device
D. Storing data on social media platforms
105. Which of the following is a web browser used to access websites on the internet?
A. Microsoft Word
B. Google Chrome
C. Excel
D. Adobe Reader
106. What is "two-factor authentication"?
A. A method of verifying a user's identity with two separate methods
B. A way to create stronger passwords
C. A method of encrypting messages
D. A way to hide online activity
107. What is the main function of a "web proxy"?
A. To store data securely on the web
B. To provide internet access by acting as an intermediary between a user and a website
C. To host websites on the internet
D. To create websites
108. What does "URL" stand for?
A. Uniform Resource Locator
B. Unified Reference Locator
C. Universal Resource Locator
D. Uniform Retrieval Link
109. Which of the following is an example of a communication app?
A. Zoom
B. Google Chrome
C. Adobe Photoshop
D. Microsoft Excel
110. What is a "domain name"?
A. A unique address used to identify a website on the internet
B. The name of a web browser
C. A storage device for backing up data
D. A secure file transfer tool
111. What is a "web cookie"?
A. A small piece of data stored by a website on your device
B. A software that blocks advertisements

Page 35 of 123
LEO SERIES 36
C. A feature that allows video streaming
D. A device used for data encryption
112. What does the term "phishing" refer to in the context of online security?
A. A way of tracking a user’s browsing activity
B. A method of stealing personal information through fake emails or websites
C. A tool to create secure passwords
D. A type of virus used to attack devices
113. What is a "peer-to-peer" (P2P) network?
A. A network where all devices are connected to a central server
B. A network where users connect directly with each other to share resources
C. A wireless network used for streaming content
D. A cloud-based storage network
114. Which of the following is the purpose of "cookies" on a website?
A. To improve website speed
B. To store information about the user's browsing activity
C. To allow users to watch videos online
D. To encrypt website data
115. What is the main benefit of using "cloud computing"?
A. It provides free internet access
B. It allows users to store and access data online from anywhere
C. It speeds up internet connections
D. It creates websites for users
116. What is the primary purpose of a "firewall" in network security?
A. To protect a network by monitoring incoming and outgoing traffic
B. To create backups of all network files
C. To design websites
D. To improve the internet speed of a network
117. What is a "social media platform"?
A. A service used to share video games
B. A tool to create websites
C. A platform where users can create profiles, connect with others, and share content
D. A service used to host emails
118. What does "HTTPS" indicate about a website?
A. The site is under construction
B. The site is using an encrypted connection for secure data transmission
C. The site does not accept any personal information
D. The site is not accessible
119. Which of the following is a method to ensure secure online payments?
A. Using a credit card with no limit
B. Using a strong password and secure payment gateway
C. Clicking on pop-up advertisements
D. Sharing credit card details via email
120. What is a "web server"?
A. A device used to access websites
B. A machine that stores data on the internet
C. A program that encrypts website data
D. A device used to create content for websites
121. What does "social engineering" mean in the context of online security?
A. Creating websites
B. Using manipulation to trick people into giving away confidential information
C. Encrypting passwords
D. Writing code for websites

Page 36 of 123
LEO SERIES 37
122. Which of the following is a feature of a "web browser"?
A. It stores passwords securely
B. It allows users to visit websites and access online content
C. It manages email accounts
D. It encrypts online communication
123. What is the primary function of "email encryption"?
A. To make emails appear in different languages
B. To convert email messages into a secure format that only the recipient can read
C. To delete emails automatically
D. To store emails in the cloud
124. What is a "digital footprint"?
A. A collection of all the devices used by a person
B. A record of a person’s online activity and presence
C. A tool for monitoring email messages
D. A software used to delete data
125. What is the difference between "uploading" and "downloading" data?
A. Uploading means transferring data from the internet to a device, while downloading means
transferring data from a device to the internet
B. Uploading means transferring data from a device to the internet, while downloading means
transferring data from the internet to a device
C. Both terms mean the same thing
D. Uploading refers to viewing files online, while downloading refers to creating files
126. What does "data compression" refer to?
A. Deleting unnecessary files
B. Converting data into a format that reduces its size for easier storage or transmission
C. Encrypting data for security
D. Converting data into a readable format
127. What is the primary function of a "modem"?
A. To connect a computer to the internet via a telephone line
B. To store files on the internet
C. To manage email accounts
D. To improve the speed of web browsers
128. What is "video conferencing"?
A. Watching videos over the internet
B. Communicating with others through a video and audio link over the internet
C. Editing videos online
D. Sharing video files between devices
129. What does "social media" allow users to do?
A. Browse websites anonymously
B. Store files online
C. Create profiles, share content, and interact with others online
D. Encrypt online communication
130. What is an "IP address"?
A. A unique identifier assigned to each device connected to a network
B. A secure code used for encryption
C. A tool for creating websites
D. A type of social media profile
141. Which of the following is an example of a "search engine"?
A. Google
B. Skype
C. Microsoft Office
D. WhatsApp

Page 37 of 123
LEO SERIES 38
142. What is the primary purpose of "two-factor authentication"?
A. To encrypt messages
B. To verify a user's identity with two different methods
C. To create strong passwords
D. To store personal information securely
143. What is "cloud computing"?
A. Storing data on physical devices only
B. Using remote servers over the internet to store and manage data
C. A tool for designing websites
D. A method for deleting files permanently
144. What is a "web cookie" used for?
A. To enhance website functionality by storing user data
B. To track and store browsing activity
C. To protect websites from attacks
D. To improve the speed of websites
145. What is a "social media platform"?
A. A platform that hosts personal emails
B. A tool for creating websites
C. A platform for sharing content and connecting with others online
D. A cloud service for storing data
146. What is "spam" in the context of emails?
A. Legitimate marketing emails
B. Unsolicited and often irrelevant or malicious emails
C. Emails that are encrypted for privacy
D. Emails from family members
147. Which of the following is an example of a "cloud storage" service?
A. Google Drive
B. Adobe Photoshop
C. Microsoft Word
D. Zoom
148. What does "HTTPS" stand for in website security?
A. Hyper Text Transfer Protocol Secure
B. Hyper Transfer Protocol Secure
C. High Transfer Protocol Security
D. Hyper Textual Security Protocol
149. What is the primary purpose of an "antivirus" program?
A. To protect devices from malware and viruses
B. To manage email accounts
C. To store files securely
D. To improve internet speed
150. What does "malware" refer to?
A. Software designed to harm or exploit a computer or network
B. A type of internet browser
C. Software used for website design
D. A program for file management
151. Which of the following is an example of an online communication tool?
A. WhatsApp
B. Adobe Illustrator
C. Excel
D. Microsoft Word
152. What is the role of a "web browser"?
A. To create websites
B. To access and view websites on the internet

Page 38 of 123
LEO SERIES 39
C. To store encrypted files
D. To improve device performance
153. What does "URL" stand for?
A. Unified Resource Locator
B. Uniform Resource Locator
C. Universal Retrieval Locator
D. User Resource Locator
154. What is a "domain name" in the context of the internet?
A. The name of a computer or device
B. The unique address of a website on the internet
C. A tool for creating websites
D. A type of security system
155. What is "cloud-based storage"?
A. A device for encrypting data
B. Storing data remotely on servers accessible via the internet
C. A tool for creating websites
D. A program for creating email accounts
156. What is the primary benefit of using "social media"?
A. To store personal documents
B. To connect with people and share content online
C. To monitor network security
D. To create websites
157. What is the role of "firewalls" in online security?
A. To block malicious websites and restrict unauthorized access
B. To speed up internet connections
C. To store private data securely
D. To monitor website traffic
158. What does "data encryption" do?
A. It converts data into a secure format to prevent unauthorized access
B. It reduces the size of files for faster transmission
C. It stores files in the cloud
D. It compresses data to save storage space
159. Which of the following is an example of a "search engine"?
A. Google
B. YouTube
C. Twitter
D. Facebook
160. What does "Wi-Fi" allow users to do?
A. Browse the internet without cables by connecting to a wireless network
B. Create websites
C. Monitor network traffic
D. Encrypt data
161. What does "social engineering" refer to in online security?
A. Using psychological manipulation to trick individuals into divulging confidential information
B. Encrypting online data
C. Creating websites
D. A method of backing up data
162. What is the purpose of an "internet service provider" (ISP)?
A. To provide internet access to users
B. To store files on the internet
C. To host websites
D. To create software

Page 39 of 123
LEO SERIES 40
163. What does "streaming" mean?
A. Storing videos on a device
B. Watching or listening to media content in real-time without downloading it
C. Uploading videos to the internet
D. Compressing video files for sharing
164. Which of the following is a common method for protecting online privacy?
A. Using weak passwords
B. Enabling two-factor authentication
C. Sharing personal information online
D. Disabling all software updates
165. What is the purpose of "two-factor authentication"?
A. To allow users to create stronger passwords
B. To verify a user’s identity by using two different methods
C. To improve website design
D. To delete online activity
166. What is "phishing"?
A. A form of identity theft using fake websites or emails to steal personal information
B. The process of compressing data
C. A method of securing network traffic
D. A way of deleting cookies
167. What is the main difference between "HTTP" and "HTTPS"?
A. HTTP encrypts data while HTTPS does not
B. HTTPS encrypts data to secure communication between the server and the client
C. HTTP is used for websites, while HTTPS is used for email
D. There is no difference
168. Which of the following is an example of "peer-to-peer" (P2P) communication?
A. Skype
B. Microsoft Word
C. Google Drive
D. Dropbox
169. What is "malware"?
A. Software used to block advertisements
B. Software designed to damage or disrupt devices or networks
C. Software that stores files on the internet
D. Software for creating websites
170. What is the role of a "web proxy"?
A. To store files securely online
B. To act as an intermediary between a user and a website
C. To increase internet speed
D. To encrypt data
171. What does "URL" stand for?
A. Uniform Resource Locator
B. Universal Resource Locator
C. User Referral Locator
D. Uniform Retrieval Locator
172. What is the function of "cloud storage"?
A. To store data remotely and access it from anywhere
B. To delete files securely
C. To back up data on physical devices
D. To encrypt data
173. What is an example of a "cloud-based service"?
A. Google Drive
B. Microsoft Excel

Page 40 of 123
LEO SERIES 41
C. Skype
D. Photoshop
174. What is the main purpose of using a "VPN" (Virtual Private Network)?
A. To access websites more quickly
B. To protect the privacy and security of online activity
C. To watch videos without interruption
D. To create websites securely
175. What does "spam" refer to in email communication?
A. Unsolicited and irrelevant emails often used for advertising or fraud
B. Official business communications
C. Emails that are encrypted for security
D. Personal messages from friends
176. What does "social media" allow users to do?
A. Create social profiles and interact with other users
B. Encrypt private data
C. Build websites
D. Host email accounts
177. What is an example of "online shopping"?
A. Amazon
B. Skype
C. Dropbox
D. Microsoft Excel
178. What is the meaning of "cloud computing"?
A. The process of installing software on physical servers
B. Using remote servers to store and process data over the internet
C. The storage of personal information on social media
D. Storing data only on external drives
179. What is the purpose of a "firewall"?
A. To protect a network by blocking unauthorized access
B. To speed up internet browsing
C. To store passwords securely
D. To monitor email activity
180. What does "email encryption" do?
A. Compresses email content
B. Protects the content of an email by converting it into a secure format
C. Deletes email messages automatically
D. Sends email without attachments
181. What is the function of an "IP address"?
A. To identify a device on a network
B. To send and receive emails
C. To encrypt internet traffic
D. To monitor internet speed
182. What does "bandwidth" refer to in internet communication?
A. The amount of data transmitted per second over a network
B. The physical location of an internet service provider
C. The speed at which websites load
D. The type of internet connection
183. What is "file sharing"?
A. Storing files on a personal computer
B. Distributing files over the internet to multiple users
C. Compressing files to reduce their size
D. Deleting files from the cloud

Page 41 of 123
LEO SERIES 42
184. What is "peer-to-peer" (P2P) file sharing?
A. Transmitting files between devices without a server
B. Storing files in a remote cloud
C. Sharing files with friends through email
D. Compressing files for storage
185. Which of the following is an example of a "video conferencing" tool?
A. Zoom
B. Instagram
C. Microsoft Excel
D. Adobe Acrobat
186. What is "phishing" in the context of online security?
A. Tricking users into providing sensitive information through fraudulent emails or websites
B. Protecting passwords using encryption
C. A method of storing data on remote servers
D. A tool for compressing files
187. Which of the following is a benefit of using "cloud storage"?
A. It provides remote access to data from any location
B. It requires physical storage devices
C. It makes files inaccessible
D. It prevents file sharing
188. What is a "search engine"?
A. A tool for finding information on the internet
B. A software used to create websites
C. A program for editing images
D. A method for encrypting data
189. What is the purpose of "data backup"?
A. To copy and store data in case of data loss
B. To compress files for storage
C. To share data over the internet
D. To create a new email account
190. What does "cyberbullying" involve?
A. Using the internet to harass or harm others
B. Using encrypted messages
C. Sharing files securely
D. Protecting privacy online
191. What is the primary use of a "web application"?
A. To access and interact with data via the internet
B. To create desktop applications
C. To protect against cyber threats
D. To store files on local devices
192. What is the role of an "SSL certificate" on a website?
A. To establish a secure connection between a website and a user's browser
B. To store data on a server
C. To increase the website's loading speed
D. To provide a domain name for the website
193. What is "internet censorship"?
A. The control or restriction of content available on the internet
B. Encrypting internet data
C. Blocking internet access to specific websites
D. Protecting user privacy online
194. What does "cookie tracking" do on websites?
A. Tracks user behavior and preferences to improve website experience
B. Deletes browsing history automatically

Page 42 of 123
LEO SERIES 43
C. Encrypts passwords and other sensitive data
D. Compresses files for faster download
195. Which of the following is an example of a "search engine"?
A. Yahoo
B. Facebook
C. Instagram
D. Skype
196. What is the function of an "email client"?
A. To send, receive, and manage email messages
B. To store files on a server
C. To create social media posts
D. To secure internet connections
197. What does "HTTPS" stand for?
A. HyperText Transfer Protocol Secure
B. High Transfer Protocol Security
C. Hyper Transfer Protocol Secure
D. HyperTextual Secure Protocol
198. What is "social networking"?
A. A platform for creating and maintaining online personal relationships
B. Encrypting social media messages
C. Storing personal information online
D. A method for securing internet traffic
199. What is the primary purpose of "data encryption"?
A. To secure information by converting it into a format that is unreadable without the proper decryption
key
B. To compress files for storage
C. To send data over the internet
D. To monitor website activity
200. What does "Wi-Fi" stand for?
A. Wireless Fidelity
B. Wide Fidelity
C. Wireless Fiber
D. Wide Fiber
ANSWERS TO OBJECTIVE TEST

1 C 21 B 41 A
2 B 22 A 42 C
3 B 23 D 43 C
4 B 24 A 44 B
5 C 25 C 45 B
6 B 26 A 46 B
7 A 27 B 47 A
8 B 28 C 48 A
9 C 29 A 49 B
10 A 30 B 50 B
11 C 31 B 51 C
12 C 32 A 52 A
13 D 33 C 53 A
14 C 34 D 54 C
15 A 35 A 55 B
16 B 36 C 56 B
17 C 37 C 57 B
18 B 38 B 58 B

Page 43 of 123
LEO SERIES 44
19 A 39 A 59 B
20 B 40 C 60 B
61 C 81 C 101 A
62 B 82 B 102 B
63 A 83 D 103 C
64 D 84 A 104 B
65 B 85 C 105 A
66 A 86 B 106 A
67 A 87 D 107 C
68 A 88 A 108 B
69 B 89 C 109 B
70 B 90 A 110 C
71 C 91 B 111 C
72 A 92 B 112 A
73 C 93 A 113 B
74 D 94 C 114 C
75 A 95 B 115 D
76 C 96 A 116 A
77 B 97 B 117 B
78 A 98 D 118 C
79 B 99 B 119 C
80 C 100 C 120 D
81 C 121 A 141 B
82 B 122 B 142 B
83 D 123 A 143 B
84 A 124 C 144 B
85 C 125 A 145 C
86 B 126 B 146 B
87 D 127 D 147 A
88 A 128 C 148 B
89 C 129 A 149 A
90 A 130 B 150 B
91 B 131 C 151 A
92 B 132 A 152 B
93 A 133 A 153 B
94 C 134 C 154 B
95 B 135 A 155 B
96 A 136 B 156 B
97 B 137 B 157 A
98 D 138 A 158 A
99 B 139 A 159 A
100 C 140 C 160 A
161 B 162 A 163 B
164 B 165 B 166 A
167 B 168 A 169 B
170 B 171 A 172 B
173 A 174 B 175 A
176 B 177 A 178 B
179 A 180 B 181 A
182 A 183 B 184 A
185 A 186 A 187 A
188 A 189 A 190 A
191 A 192 A 193 A
Page 44 of 123
LEO SERIES 45
194 A 195 A 196 A
197 A 198 A 199 A
200 A
Strand 3: Programming and Problem Solving - Questions
1. What is the first step in solving a problem using a computer?
A. Writing code
B. Defining the problem
C. Debugging the code
D. Testing the solution
2. What does an algorithm represent?
A. A programming language
B. A set of instructions for solving a problem
C. A hardware component
D. A type of software
3. Which of the following is the primary programming language for building web pages?
A. Python
B. JavaScript
C. HTML
D. C++
4. What is a loop in programming?
A. A type of function
B. A way of repeating a block of code
C. A data structure
D. A syntax error
5. Which of these is an example of a conditional statement in programming?
A. if
B. loop
C. array
D. function
6. What does "debugging" refer to in programming?
A. Writing code
B. Testing software
C. Fixing errors in the code
D. Compiling the program
7. What is a variable in programming?
A. A fixed value
B. A data type
C. A placeholder for data
D. A function
8. Which of the following is an example of a high-level programming language?
A. Assembly
B. Machine code
C. Python
D. Binary
9. What does the term "syntax" refer to in programming?
A. The logic of the code
B. The structure of the programming language
C. The speed of the program
D. The type of variables used
10. Which of the following operations does the “if” statement perform?
A. Repeats a block of code
B. Executes code based on a condition

Page 45 of 123
LEO SERIES 46
C. Assigns a value to a variable
D. Terminates the program
11. What is a flowchart used for in programming?
A. To design the user interface
B. To visualize the structure of the code
C. To outline the logic of a program
D. To compile the program
12. What is the purpose of the “while” loop in programming?
A. To execute a block of code once
B. To execute a block of code repeatedly until a condition is false
C. To call a function
D. To check for syntax errors
13. What is an array in programming?
A. A single data element
B. A collection of similar data elements
C. A function
D. A data structure used to store integers
14. Which of the following is not a programming language?
A. Python
B. Java
C. HTML
D. HTTP
15. What is an algorithm?
A. A graphical representation of code
B. A type of data structure
C. A set of steps for solving a problem
D. A mathematical operation
16. What is the purpose of a "for" loop in programming?
A. To repeat a set of instructions a specific number of times
B. To execute code based on a condition
C. To create functions
D. To define variables
17. What does a "function" do in a program?
A. It stores data
B. It repeats instructions
C. It defines a block of code to perform a specific task
D. It checks for errors
18. Which of these is a correct example of a loop structure?
A. if-else
B. for
C. return
D. variable
19. What is a “break” statement used for in programming?
A. To terminate the entire program
B. To exit a loop early
C. To define a function
D. To declare a variable
20. Which of the following statements is true about programming languages?
A. All programming languages are the same
B. Every programming language has its own syntax and rules
C. Programming languages cannot be used to build websites
D. Only high-level languages are useful for programming

Page 46 of 123
LEO SERIES 47
21. What is the purpose of an “if-else” condition in programming?
A. To repeat code until a condition is met
B. To define a function
C. To execute code based on a condition
D. To store data
22. Which of the following is not a data type in programming?
A. Integer
B. String
C. Float
D. Loop
23. What is a "compiler" in programming?
A. A tool that executes a program
B. A tool that converts high-level code to machine code
C. A tool for writing algorithms
D. A tool for storing variables
24. What is a "runtime error" in programming?
A. An error that occurs when compiling the code
B. An error that occurs during the execution of a program
C. An error caused by invalid syntax
D. An error caused by incorrect variable declarations
25. Which of the following is an example of object-oriented programming?
A. Python
B. Assembly
C. C++
D. HTML
26. What does the term “iteration” mean in programming?
A. A type of data structure
B. A way of repeating code multiple times
C. A process for debugging code
D. A way of optimizing performance
27. What is the difference between a function and a method in programming?
A. A method is a special function in object-oriented programming
B. A function returns a value, while a method does not
C. A method is used only in web development
D. There is no difference
28. What is a pseudocode?
A. A programming language
B. A way of writing algorithms using natural language
C. A syntax error
D. A data structure
29. What does “declaration” of a variable mean in programming?
A. Defining a variable's type and name
B. Assigning a value to a variable
C. Storing a variable in memory
D. Calling a function
30. What is the function of a “switch” statement in programming?
A. To compare multiple conditions and execute corresponding blocks of code
B. To assign values to variables
C. To repeat a block of code
D. To exit from a loop
31. What is the difference between a "while loop" and a "for loop"?
A. "For loop" runs a set number of times, while "while loop" runs indefinitely
B. "While loop" runs a set number of times, while "for loop" runs indefinitely

Page 47 of 123
LEO SERIES 48
C. "For loop" is used for repeating code based on a condition
D. "While loop" is used when the number of iterations is known
32. What does "encapsulation" mean in object-oriented programming?
A. Hiding the internal state and only exposing relevant data and functions
B. Storing data in memory
C. Writing efficient algorithms
D. Using recursion to solve problems
33. What is recursion in programming?
A. A function calling itself
B. A loop structure
C. A method for sorting data
D. A way to handle errors
34. Which of the following is the correct way to start a comment in Python?
A. #
B. //
C. /*
D. !
35. What is a “tuple” in programming?
A. An unordered collection of elements
B. An ordered, immutable collection of elements
C. A type of loop
D. A temporary storage location
36. What is the purpose of the “continue” statement in programming?
A. To skip the current iteration of a loop and proceed to the next iteration
B. To exit the loop immediately
C. To define a function
D. To return a value from a function
37. Which of these is an example of a simple problem-solving technique in programming?
A. Debugging
B. Algorithm design
C. Data storage
D. Variable declaration
38. What is a “method” in programming?
A. A function that belongs to a class in object-oriented programming
B. A type of data structure
C. A loop structure
D. A variable
39. What does a “class” represent in object-oriented programming?
A. A function
B. A blueprint for creating objects
C. A way to declare variables
D. A type of error
40. What is the first step when creating a program?
A. Writing the code
B. Testing the program
C. Defining the problem
D. Debugging the code
41. What is a "data structure" in programming?
A. A way to store and organize data efficiently
B. A function to manipulate data
C. A loop to repeat code
D. A type of algorithm

Page 48 of 123
LEO SERIES 49
42. What does the term “variable assignment” refer to in programming?
A. Storing data in a file
B. Giving a variable a value
C. Defining the structure of a program
D. Writing a function
43. What is an example of a looping structure?
A. Function
B. If statement
C. For loop
D. Class
44. What is the importance of problem decomposition in programming?
A. To break down complex problems into smaller, more manageable parts
B. To create reusable functions
C. To optimize code
D. To handle errors
45. Which of the following would most likely be used in a for loop?
A. A fixed number of iterations
B. A condition that evaluates to true
C. A function call
D. An input from the user
46. What is an exception in programming?
A. An unexpected event or error that disrupts the normal flow of execution
B. A function call
C. A type of data
D. A loop structure
47. What does "iteration" mean in the context of loops?
A. A single execution of a loop
B. A way to define a variable
C. A way to create a method
D. A technique for handling exceptions
48. What does the term "parameter" refer to in programming?
A. A variable that holds data for a function
B. A block of code
C. A way to store data
D. A data structure
49. Which of the following is an example of a basic data type?
A. Integer
B. List
C. Dictionary
D. Class
50. What does “return” do in a function?
A. It assigns a value to a variable
B. It terminates the function and returns a result to the calling code
C. It starts a loop
D. It defines a new variable
51. What is an index in the context of an array?
A. The value stored at a particular position in the array
B. The length of the array
C. The position of an element in the array
D. A function used to retrieve data from the array
52. What is the purpose of the “try” and “except” block in Python?
A. To handle exceptions or errors in the program
B. To repeat a block of code

Page 49 of 123
LEO SERIES 50
C. To define functions
D. To test the program
53. Which of the following is a logical operator?
A. ==
B. +
C. &&
D. =
54. What is the output of the expression 3 + 2 * 5?
A. 25
B. 13
C. 16
D. 10
55. What is a “binary search” algorithm used for?
A. To find a specific item in a sorted list
B. To sort a list of elements
C. To calculate the average of a list
D. To store data in a list
56. What does the “else” part of an “if-else” condition do?
A. It executes when the condition is true
B. It executes when the condition is false
C. It exits the program
D. It defines a variable
57. What is a stack in programming?
A. A data structure where the last element added is the first one to be removed
B. A collection of similar elements
C. A type of loop
D. A method of sorting data
58. Which of the following defines a “bug” in a program?
A. A tool for debugging code
B. A mistake or error in the code
C. A function in the program
D. A type of data
59. What is the result of a program when there is a syntax error?
A. The program runs but produces incorrect results
B. The program crashes or does not run
C. The program executes successfully
D. The program is debugged automatically
60. What does an "IDE" stand for in programming?
A. Integrated Design Environment
B. Integrated Development Environment
C. Instructional Data Environment
D. Information Data Environment
61. What is the purpose of a "return statement" in a function?
A. To call a function
B. To return a value from the function to the calling code
C. To end the program
D. To declare a variable
62. What is a "list" in Python?
A. A mutable, ordered collection of elements
B. A collection of unique elements
C. A data structure for storing key-value pairs
D. A loop structure

Page 50 of 123
LEO SERIES 51
63. Which of the following is an example of a boolean expression?
A. 2 + 2
B. if x > 5
C. "Hello World"
D. x = 10
64. What does a “break” statement do in a loop?
A. Skips to the next iteration
B. Exits the loop entirely
C. Defines a function
D. Creates a condition
65. What does the term “syntax error” refer to?
A. A logical mistake in the program
B. A runtime error
C. An error due to incorrect code formatting or structure
D. An error in the algorithm
66. What is an example of a recursive function?
A. A function that calls itself
B. A function that takes an array as input
C. A function that returns a value
D. A function that prints output
67. What is the purpose of an "if-else" statement?
A. To repeat a block of code
B. To compare values and execute code based on conditions
C. To create a loop
D. To define a class
68. What is the main difference between a "while loop" and a "for loop"?
A. A for loop repeats indefinitely, while a while loop has a fixed number of iterations
B. A while loop repeats indefinitely, while a for loop repeats a fixed number of times
C. A for loop is used only for numeric values
D. A while loop is faster than a for loop
69. Which of the following is used to handle exceptions in Python?
A. Try and except
B. If and else
C. For loop
D. While loop
70. What is the output of the following code: print(2 + 3 * 4)?
A. 14
B. 20
C. 18
D. 10
71. What is a function in programming?
A. A block of code that performs a specific task
B. A way to store data
C. A loop structure
D. A data type
72. What is the purpose of a "class" in object-oriented programming?
A. To define a function
B. To create reusable templates for objects
C. To store data
D. To define a variable
73. Which of these is a valid Python function definition?
A. function myFunction()
B. def myFunction():

Page 51 of 123
LEO SERIES 52
C. def myFunction{}
D. function myFunction{}
74. Which of the following is used to define a function in Python?
A. function
B. def
C. func
D. funcdef
75. What does "object-oriented programming" focus on?
A. Organizing code into objects and classes
B. Storing data in arrays
C. Writing low-level code
D. Performing mathematical operations
76. What is the first step in creating an algorithm?
A. Debugging
B. Identifying the problem to solve
C. Writing the code
D. Testing the solution
77. What is an example of an "if statement" in Python?
A. if x == 10:
B. while x == 10:
C. for x in range(10):
D. function x():
78. What is a method in object-oriented programming?
A. A function that is associated with an object
B. A type of loop
C. A block of code that repeats
D. A way to store data
79. What does "inheritance" mean in object-oriented programming?
A. The ability of a class to inherit properties and methods from another class
B. A way of handling errors
C. A way to store data
D. The process of compiling code
80. Which of the following statements is true about a "for loop"?
A. It repeats a block of code a fixed number of times
B. It repeats indefinitely
C. It calls functions
D. It defines variables
81. What is an "array" in programming?
A. A collection of elements that are all of the same data type
B. A function that performs a task
C. A loop structure
D. A mathematical operation
82. What is the purpose of "modulus" in programming?
A. To divide two numbers
B. To find the remainder after division
C. To multiply two numbers
D. To subtract two numbers
83. What does the term "logical operators" refer to in programming?
A. Operators that perform arithmetic calculations
B. Operators that test relationships between values
C. Operators used in loops
D. Operators used to assign values

Page 52 of 123
LEO SERIES 53
84. Which of these is not a data structure?
A. Array
B. Function
C. List
D. Stack
85. What is a “string” in programming?
A. A sequence of characters
B. A data structure
C. A loop structure
D. A function
86. What is the purpose of a “while loop”?
A. To repeat a block of code while a condition is true
B. To store data
C. To define a class
D. To compare two values
87. Which of the following is an example of a comparison operator?
A. +
B. =
C. ==
D. *
88. What is the purpose of "indexing" in an array?
A. To define the type of elements
B. To retrieve or modify elements at a specific position
C. To repeat code
D. To define a function
89. What is a "debugger" used for in programming?
A. To store data
B. To detect and fix errors in code
C. To create algorithms
D. To define variables
90. What is an example of a "logical error" in programming?
A. A function that does not return a value
B. A program that runs without producing the expected result
C. A syntax error in the code
D. A runtime error
91. Which of these is a valid loop structure in Python?
A. for
B. if-else
C. def
D. return
92. What is the role of an IDE (Integrated Development Environment)?
A. To write, test, and debug code in a single interface
B. To compile code
C. To store data
D. To define variables
93. What is a key benefit of using functions in programming?
A. They store data
B. They allow code to be reused
C. They sort data
D. They repeat loops
94. What does the term "parameter" mean in the context of a function?
A. A variable used inside the function to accept input
B. A function that returns a value

Page 53 of 123
LEO SERIES 54
C. A way to store data
D. A method used in a class
95. What is a "comment" in programming used for?
A. To declare a variable
B. To provide explanations about the code for readability
C. To store data
D. To define a loop
96. What is an example of a recursive function?
A. A function that calls itself
B. A function that takes multiple arguments
C. A function that repeats a block of code
D. A function that returns an error
97. What does the term "inheritance" mean in object-oriented programming?
A. A way to reuse code by inheriting properties and methods from a parent class
B. A method to store data
C. A way to handle errors
D. A way to define variables
98. What is the difference between a "while loop" and a "for loop"?
A. A while loop repeats indefinitely, while a for loop repeats a fixed number of times
B. A for loop repeats indefinitely, while a while loop repeats a set number of times
C. A for loop is only used with numbers
D. A while loop executes only once
99. What is the purpose of an "else" statement in an if-else block?
A. To execute when the condition is true
B. To execute when the condition is false
C. To repeat the code
D. To terminate the program
100. What is an example of a "function"?
A. def myFunction():
B. if x == 10:
C. for x in range(10):
D. class MyClass:
101. What is the correct way to define a variable in Python?
A. var x = 10
B. x := 10
C. int x = 10
D. x = 10
102. Which operator is used to calculate the remainder of a division?
A. /
B. %
C. *
D. //
103. Which of the following is an example of a conditional statement in Python?
A. if x > 10:
B. for i in range(10):
C. while x != 0:
D. def myFunction():
104. What is the term for a function that calls itself?
A. Recursive function
B. Iterative function
C. Looping function
D. Anonymous function

Page 54 of 123
LEO SERIES 55
105. What is the purpose of a "while loop"?
A. To iterate over a collection of items
B. To repeat a block of code as long as a condition is true
C. To call a function
D. To define a class
106. What is the main purpose of an algorithm?
A. To store data
B. To break down a problem into steps for solving it
C. To define a class
D. To display output
107. In programming, what is a “string”?
A. A list of integers
B. A sequence of characters
C. A loop structure
D. A type of operator
108. What is the purpose of the “continue” statement in a loop?
A. To exit the loop
B. To skip the current iteration and continue with the next one
C. To define a function
D. To check a condition
109. What is a "list" in Python?
A. A set of key-value pairs
B. A data structure used for storing multiple items in a single variable
C. A way to handle exceptions
D. A way to define a function
110. What is the result of 10 // 3 in Python?
A. 3.0
B. 3
C. 3.33
D. 10
111. How do you define a dictionary in Python?
A. dict = []
B. dict = {}
C. dict = ()
D. dict = <>
112. What is a class in object-oriented programming?
A. A function that defines a block of code
B. A blueprint for creating objects
C. A way to perform calculations
D. A collection of values
113. Which keyword is used to define a function in Python?
A. function
B. def
C. fun
D. func
114. What is an example of a "for loop" in Python?
A. for x in range(10):
B. while x == 10:
C. if x > 10:
D. def myFunction():
115. What does the “elif” statement do in an if-else block?
A. Checks for an additional condition
B. Loops through a collection of items

Page 55 of 123
LEO SERIES 56
C. Defines a new function
D. Exits the program
116. What does “break” do in a loop?
A. Skips the current iteration
B. Exits the loop entirely
C. Stops the program
D. Continues to the next block of code
117. What is the output of print(2 + 3 * 4)?
A. 14
B. 20
C. 18
D. 10
118. What is an example of an "infinite loop"?
A. while True:
B. for i in range(10):
C. while x < 10:
D. for x in range(0, 10, 2):
119. Which of these is an example of a nested loop?
A. for x in range(10): for y in range(10):
B. for x in range(10):
C. while x < 10:
D. if x > 10:
120. What does the “else” clause do in an if-else statement?
A. Executes code when the condition is false
B. Executes code when the condition is true
C. Ends the program
D. Creates an infinite loop
121. What is the output of the code print(2 * 3 + 5)?
A. 11
B. 21
C. 15
D. 10
122. What is the difference between a "list" and a "tuple" in Python?
A. A list is immutable, while a tuple is mutable
B. A list is mutable, while a tuple is immutable
C. A list stores key-value pairs, while a tuple stores values only
D. There is no difference
123. Which of these is an example of a "comparison operator"?
A. ==
B. =
C. &
D. ++
124. What is the purpose of the “append()” method in Python?
A. To add an element to the end of a list
B. To remove an element from a list
C. To sort a list
D. To replace an element in a list
125. What is a "tuple" in Python?
A. A mutable collection of values
B. A type of operator
C. An immutable collection of values
D. A function

Page 56 of 123
LEO SERIES 57
126. Which operator is used to compare two values for equality in Python?
A. ==
B. =
C. ===
D. !=
127. What is the purpose of a "for loop"?
A. To iterate over a range of values or a collection of items
B. To check a condition
C. To define a class
D. To store a collection of items
128. What is the result of 5 * 2 - 4?
A. 10
B. 6
C. 4
D. 12
129. What is an example of an “exception”?
A. A “ZeroDivisionError” when dividing by zero
B. A syntax error
C. A logical error in a program
D. A memory allocation error
130. What does the term "recursion" mean in programming?
A. A function that repeats a block of code
B. A function that calls itself
C. A method to find prime numbers
D. A type of loop
131. What is the purpose of the “break” statement in a loop?
A. To skip to the next iteration
B. To exit the loop completely
C. To execute code when a condition is true
D. To define a variable
132. Which of these is an example of a function in Python?
A. def myFunction():
B. for x in range(10):
C. while x > 5:
D. class MyClass:
133. What is the correct syntax for a comment in Python?
A. // This is a comment
B. # This is a comment
C. /* This is a comment */
D. comment: This is a comment
134. What is the purpose of the "input()" function in Python?
A. To print a message to the console
B. To receive input from the user
C. To create a variable
D. To define a function
135. What is an example of a “logical operator” in Python?
A. and
B. +
C. =
D. //
136. What is the purpose of “elif” in an if-else block?
A. To execute an additional condition if the previous ones are false
B. To end the loop

Page 57 of 123
LEO SERIES 58
C. To store values
D. To create a function
137. What is the result of 10 / 3 in Python?
A. 3.33
B. 3
C. 10
D. 3.0
138. What is the purpose of “continue” in a loop?
A. To exit the loop
B. To skip the current iteration and continue with the next
C. To call a function
D. To define a class
139. What is the main characteristic of a “list” in Python?
A. It can only contain numbers
B. It is immutable
C. It is mutable and ordered
D. It is a key-value pair collection
140. What is an example of a "nested loop"?
A. for i in range(3): for j in range(3):
B. for i in range(3):
C. while i < 3:
D. if i == 3:
141. What is the output of the following Python code?
x = [1, 2, 3]
x.append(4)
print(x)
A. [1, 2, 3]
B. [1, 2, 3, 4]
C. [4, 1, 2, 3]
D. Error
142. What is the purpose of the “pass” statement in Python?
A. To exit a loop
B. To define a class
C. To mark a place where code will be written later
D. To return a value
143. Which of the following is used to define a function in Python?
A. func
B. function
C. def
D. method
144. What is the output of the following code?
x = 10
y = 20
print(x == y)
A. True
B. False
C. Error
D. None
145. What is the result of 4 ** 2 in Python?
A. 8
B. 16
C. 4
D. 2

Page 58 of 123
LEO SERIES 59
146. Which of these data types is immutable in Python?
A. List
B. Dictionary
C. Tuple
D. Set
147. What does the "range()" function do in Python?
A. Returns a list of values
B. Generates a sequence of numbers
C. Creates a new function
D. Defines a class
148. How do you create a set in Python?
A. set = []
B. set = {}
C. set = ()
D. set = set()
149. What does the is operator do in Python?
A. Checks if two variables have the same value
B. Checks if two variables are the same object in memory
C. Assigns a value to a variable
D. Checks if a variable is of a specific data type
150. What is the correct syntax for a "for loop" in Python?
A. for i in range(0, 10):
B. for i = 0 to 10:
C. for i in 10:
D. for (i=0; i<10; i++):
151. What is the output of the following Python code?
x = [1, 2, 3]
x.remove(2)
print(x)
A. [1, 2, 3]
B. [1, 3]
C. [2, 3]
D. Error
152. Which of the following is used to terminate a loop in Python?
A. break
B. continue
C. exit
D. stop
153. What does the del statement do in Python?
A. Deletes an element from a list
B. Deletes a variable
C. Deletes a function
D. All of the above
154. What is the output of the following code?
x = [1, 2, 3]
x.insert(1, 4)
print(x)
A. [1, 4, 2, 3]
B. [4, 1, 2, 3]
C. [1, 2, 3, 4]
D. Error
155. What is the purpose of the else statement in a loop in Python?
A. Executes code when the loop completes normally (not by a break)

Page 59 of 123
LEO SERIES 60
B. Skips the current iteration of the loop
C. Ends the program
D. Defines a new function
156. How do you check if a value exists in a list in Python?
A. if x in list:
B. if list.contains(x):
C. if x.exists(list):
D. if list.has(x):
157. What is the purpose of the try and except blocks in Python?
A. To define a function
B. To handle errors and exceptions
C. To create loops
D. To declare variables
158. What is the output of len("Hello") in Python?
A. 5
B. 6
C. 4
D. 0
159. What is the result of the following expression: 3 + 4 * 2?
A. 14
B. 11
C. 7
D. 10
160. Which of the following is a valid list in Python?
A. [1, "hello", 3.14]
B. (1, "hello", 3.14)
C. {1, "hello", 3.14}
D. [1; "hello"; 3.14]
161. What is the purpose of the in operator in Python?
A. Checks if a value exists in a list, string, or other iterable
B. Compares two variables for equality
C. Defines a new function
D. Assigns a value to a variable
162. How do you define a method in Python?
A. method myMethod():
B. def myMethod():
C. function myMethod():
D. create myMethod():
163. Which of the following is the correct way to check the length of a string in Python?
A. length("Hello")
B. len("Hello")
C. string.length("Hello")
D. "Hello".size()
164. What is the result of 3 ** 2 in Python?
A. 9
B. 6
C. 8
D. 2
165. Which of the following is a valid Python variable name?
A. 1variable
B. variable_name
C. variable name
D. @variable

Page 60 of 123
LEO SERIES 61
166. What is the output of the following code?
x = 10
y=5
print(x / y)
A. 2.0
B. 2
C. 15
D. 5
167. What is the correct way to start a comment in Python?
A. //
B. #
C. /*
D. <!--
168. What is the purpose of the return statement in a function?
A. To exit a loop
B. To call a function
C. To return a value from a function
D. To print a message
169. What is the result of 10 % 3 in Python?
A. 3
B. 1
C. 2
D. 0
170. How do you define a variable in Python?
A. var x = 10
B. x := 10
C. x = 10
D. 10 = x
171. What is the purpose of a function in programming?
A. To store data
B. To perform a specific task when called
C. To define a class
D. To print output
172. What is the result of list("hello") in Python?
A. ['h', 'e', 'l', 'l', 'o']
B. "hello"
C. ['hello']
D. Error
173. How do you concatenate two strings in Python?
A. string1 + string2
B. string1.append(string2)
C. string1.add(string2)
D. string1.merge(string2)
174. Which of these is the correct way to handle exceptions in Python?
A. try: except:
B. catch:
C. error:
D. handle:
175. What does the range() function return in Python?
A. A list of numbers
B. A string
C. A tuple
D. A sequence of numbers

Page 61 of 123
LEO SERIES 62
176. What is the purpose of the elif statement?
A. To check multiple conditions in an if-else block
B. To create a loop
C. To declare a variable
D. To exit a function
177. What is the result of 2 + 3 * 4 in Python?
A. 14
B. 20
C. 10
D. 5
178. What is the purpose of the input() function?
A. To display output
B. To receive input from the user
C. To declare a variable
D. To perform a mathematical operation
179. What will be the output of the following code?
x = [1, 2, 3]
x.pop(0)
print(x)
A. [1, 2, 3]
B. [2, 3]
C. [1, 3]
D. Error
180. Which of the following is a valid Python tuple?
A. [1, 2, 3]
B. (1, 2, 3)
C. {1, 2, 3}
D. 1, 2, 3
181. What will be the output of the following Python code?
x = "Python"
print(x[2:])
A. "Py"
B. "tho"
C. "thon"
D. "P"
182. What is the output of the following Python code?
x = [5, 10, 15]
x[1] = 20
print(x)
A. [5, 10, 15]
B. [5, 20, 15]
C. [20, 10, 15]
D. [5, 10, 20]
183. Which of the following is the correct way to define a dictionary in Python?
A. dict = {}
B. dict = []
C. dict = ()
D. dict = //
184. How do you access the value associated with a key in a Python dictionary?
A. dict(key)
B. dict[key]
C. dict.key()
D. dict.key

Page 62 of 123
LEO SERIES 63
185. What is the result of True + 1 in Python?
A. 1
B. 2
C. Error
D. True
186. How would you define a class in Python?
A. class MyClass():
B. def MyClass():
C. function MyClass():
D. new MyClass():
187. What will the following code print?
x=7
y=3
print(x // y)
A. 2.33
B. 2
C. 3
D. 21
188. What is the purpose of the continue statement in a loop?
A. To exit the loop
B. To skip the current iteration and move to the next one
C. To stop the program
D. To call a function
189. What will be the output of this code?
x = {1, 2, 3, 4}
x.add(5)
print(x)
A. {1, 2, 3, 4}
B. {1, 2, 3, 4, 5}
C. [1, 2, 3, 4, 5]
D. Error
190. Which of the following statements about Python functions is correct?
A. A function must always return a value
B. A function can return multiple values
C. Functions cannot have parameters
D. A function cannot call another function
191. How can you define a default parameter value in Python?
A. def function(parameter=10):
B. def function(parameter:10):
C. def function(parameter[10]):
D. def function(parameter?=10):
192. What is the output of the following code?
x=4
x=x+1
print(x)
A. 4
B. 5
C. 6
D. 1
193. What is the function of the random module in Python?
A. To generate random numbers
B. To define a list

Page 63 of 123
LEO SERIES 64
C. To create loops
D. To handle exceptions
194. Which of the following is the correct syntax for an "if" statement in Python?
A. if condition:
B. if (condition)
C. if {condition}
D. if condition then:
195. What is the output of the following code?
x = 10
if x > 5:
print("Greater")
else:
print("Smaller")
A. Greater
B. Smaller
C. Error
D. None
196. Which of the following is an example of a Python iterable?
A. List
B. Dictionary
C. String
D. All of the above
197. What is the purpose of the join() method in Python?
A. To add elements to a list
B. To combine elements of an iterable into a string
C. To remove elements from a list
D. To reverse a string
198. How would you represent an empty dictionary in Python?
A. {}
B. []
C. ()
D. null
199. What will be the output of the following Python code?
x = "hello"
y = x.upper()
print(y)
A. hello
B. HELLO
C. Hello
D. Error
200. What is the output of the following Python code?
x = [1, 2, 3, 4]
y = x.pop()
print(y)
A. [1, 2, 3]
B. 1
C. 4
D. Error
ANSWERS TO OBJECTIVE TEST
Question Answer Question Answer Question Answer Question Answer Question Answer
No. No. No. No. No.
1 C 2 C 3 B 4 D 5 B
6 B 7 C 8 C 9 D 10 C
11 B 12 C 13 A 14 D 15 B

Page 64 of 123
LEO SERIES 65
16 A 17 A 18 B 19 C 20 D
21 B 22 A 23 D 24 B 25 A
26 D 27 C 28 B 29 A 30 C
31 B 32 C 33 B 34 A 35 D
36 C 37 A 38 D 39 C 40 B
41 C 42 A 43 D 44 C 45 B
46 D 47 C 48 B 49 A 50 B
51 C 52 A 53 D 54 C 55 A
56 C 57 B 58 A 59 D 60 B
61 C 62 A 63 D 64 C 65 B
66 D 67 A 68 C 69 B 70 A
71 B 72 C 73 A 74 D 75 B
76 C 77 A 78 D 79 B 80 A
81 C 82 D 83 A 84 B 85 C
86 A 87 B 88 D 89 C 90 B
91 D 92 A 93 C 94 B 95 D
96 C 97 B 98 A 99 D 100 C
101 B 102 C 103 A 104 D 105 B
106 C 107 A 108 D 109 B 110 A
111 C 112 D 113 B 114 A 115 C
116 D 117 B 118 A 119 C 120 B
121 A 122 C 123 B 124 D 125 C
126 A 127 B 128 C 129 D 130 A
131 B 132 D 133 C 134 A 135 B
136 A 137 D 138 C 139 B 140 A
141 D 142 C 143 B 144 A 145 D
146 C 147 B 148 A 149 D 150 B
151 A 152 C 153 D 154 B 155 A
156 B 157 C 158 D 159 A 160 C
161 B 162 A 163 D 164 B 165 A
166 C 167 B 168 D 169 A 170 B
171 D 172 A 173 C 174 B 175 A
176 C 177 B 178 A 179 D 180 B
181 C 182 B 183 A 184 B 185 B
186 A 187 B 188 B 189 B 190 B
191 A 192 B 193 A 194 A 195 A
196 D 197 B 198 A 199 B 200 C

Strand 4: Information Management and Presentation


1. What does the term 'data' refer to in computing?
A. A list of instructions
B. Raw facts and figures
C. A program or application
D. A stored file
2. Which of the following is an example of unstructured data?
A. A spreadsheet
B. A text document
C. A database table
D. A log file
3. Which of the following best describes the process of data collection?
A. Gathering information from sources
B. Analyzing the data
C. Presenting the data to the public
D. Storing the data in a database
4. What is a database?
A. A device used to store files
B. A system for organizing, storing, and managing data
C. A type of cloud storage
Page 65 of 123
LEO SERIES 66
D. A word processing software
5. Which of the following is used to organize data in a database?
A. Tables
B. Pages
C. Cells
D. Rows
6. Which of the following is NOT a type of database management system?
A. SQL
B. Oracle
C. Microsoft Excel
D. MySQL
7. What does "DBMS" stand for?
A. Database Management System
B. Data Bus Management System
C. Distributed Base System
D. Data Binary Management System
8. Which of the following is a feature of a relational database?
A. Data is stored in tables with rows and columns
B. Data is stored in hierarchical files
C. Data is stored in folders and directories
D. Data is stored in text documents
9. Which command is used to retrieve data from a SQL database?
A. SELECT
B. INSERT
C. DELETE
D. UPDATE
10. What does the acronym 'CSV' stand for in relation to file formats?
A. Computer Script Variables
B. Comma Separated Values
C. Column Spreadsheet View
D. Common Source Variable
11. Which of the following file extensions is associated with a Microsoft Excel spreadsheet?
A. .docx
B. .xlsx
C. .pptx
D. .txt
12. In Microsoft Excel, what is the function of a formula?
A. To change the format of a cell
B. To calculate and return a result
C. To sort data
D. To display data
13. Which of the following is a correct formula for calculating the sum of numbers in cells A1 to A5 in
Excel?
A. =SUM(A1:A5)
B. =ADD(A1:A5)
C. =TOTAL(A1:A5)
D. =CALCULATE(A1:A5)
14. What is the correct extension for a Microsoft Word document?
A. .html
B. .docx
C. .xlsx
D. .pptx
15. In Excel, what function would you use to find the average of a range of cells?

Page 66 of 123
LEO SERIES 67
A. =SUM()
B. =AVERAGE()
C. =MAX()
D. =MIN()
16. What type of software is Microsoft PowerPoint?
A. Word processing software
B. Spreadsheet software
C. Presentation software
D. Database software
17. Which of the following is used to create a presentation in Microsoft PowerPoint?
A. Text boxes only
B. Slides
C. Cells
D. Tables
18. In PowerPoint, what is the purpose of the "Slide Sorter" view?
A. To add transitions to slides
B. To arrange the order of slides
C. To create a new slide
D. To print the slides
19. What does the term 'data visualization' refer to?
A. Storing data in a database
B. Displaying data using graphs and charts
C. Encrypting data for security
D. Compressing data for storage
20. What is the main purpose of using charts in presentations?
A. To add text to slides
B. To summarize and display data visually
C. To animate slides
D. To create complex tables
21. What is a common format used for storing images in a presentation?
A. .mp4
B. .jpg
C. .pdf
D. .exe
22. Which of the following is an example of a graphical element used in presentations?
A. Table
B. Image
C. Chart
D. All of the above
23. In Excel, what is a "cell" defined as?
A. A column
B. A row
C. The intersection of a row and column
D. A type of data
24. What is the use of conditional formatting in Excel?
A. To apply colors to a worksheet
B. To apply styles based on specific conditions
C. To hide certain data
D. To protect the data
25. Which of the following is a primary function of a spreadsheet program?
A. Writing and editing text
B. Organizing and analyzing data
C. Storing multimedia files

Page 67 of 123
LEO SERIES 68
D. Creating animations
26. In Excel, what is the default file extension when saving a workbook?
A. .xls
B. .xlsx
C. .docx
D. .pptx
27. What is the main purpose of "data cleaning" in data management?
A. To collect new data
B. To remove or correct errors in data
C. To store data securely
D. To visualize data
28. Which of the following is NOT an example of a data visualization tool?
A. Microsoft Excel
B. Google Sheets
C. Adobe Photoshop
D. Tableau
29. What does the "VLOOKUP" function in Excel do?
A. Creates a list of unique values
B. Finds a value in a row and returns a corresponding value from another column
C. Calculates the sum of a range of cells
D. Counts the number of cells in a range
30. In Excel, which function is used to calculate the number of cells that meet a specific condition?
A. =COUNTA()
B. =SUM()
C. =COUNTIF()
D. =IF()
31. What is the primary purpose of a "pivot table" in Excel?
A. To display data in a graphical format
B. To filter and summarize data
C. To create new data entries
D. To calculate the sum of data
32. What type of chart would be most suitable for comparing the sales performance of different products?
A. Line chart
B. Bar chart
C. Pie chart
D. Histogram
33. Which of the following is the correct syntax to calculate the total of cells A1 to A10 in Excel?
A. =SUM(A1:A10)
B. =ADD(A1:A10)
C. =TOTAL(A1:A10)
D. =PLUS(A1:A10)
34. What is the term for arranging data in an orderly fashion, typically alphabetically or numerically?
A. Sorting
B. Filtering
C. Merging
D. Grouping
35. What type of data is best stored in a table format?
A. Text documents
B. Numerical data
C. Multimedia files
D. Raw data that needs to be organized
36. Which of the following would be considered a "text-based" data type in Excel?
A. Number

Page 68 of 123
LEO SERIES 69
B. Date
C. Boolean
D. String
37. What is a "cell reference" in Excel?
A. The address of a cell in the form of a column letter and row number
B. The value stored in a cell
C. The name given to a cell
D. The formula used in a cell
38. What does the "SUMIF" function in Excel do?
A. Adds all the values in a range
B. Adds the values in a range based on a given condition
C. Adds all unique values in a range
D. Adds only positive values in a range
39. What does the "LEFT" function in Excel do?
A. Extracts a given number of characters from the right side of a string
B. Extracts a given number of characters from the left side of a string
C. Converts text to uppercase
D. Removes extra spaces from a string
40. What is the function of the "Freeze Panes" feature in Excel?
A. To secure the data in a cell
B. To freeze the rows or columns while scrolling
C. To highlight a specific cell
D. To merge multiple cells
41. In PowerPoint, which of the following is used to enhance the visual appeal of a presentation?
A. Animations
B. Textboxes
C. Tables
D. Footnotes
42. What is the default slide layout in PowerPoint?
A. Title Slide
B. Blank Slide
C. Title and Content
D. Two Content
43. Which of the following PowerPoint views is used to edit the content of a single slide?
A. Slide Sorter
B. Notes Page
C. Slide Show
D. Normal
44. Which of the following can be inserted in a PowerPoint slide?
A. Video
B. Sound
C. Image
D. All of the above
45. What is the purpose of using a "transition" in PowerPoint?
A. To change the layout of a slide
B. To apply effects when moving from one slide to another
C. To add animations to the text
D. To create hyperlinks within a slide
46. What feature in PowerPoint allows you to add dynamic effects to individual elements on a slide?
A. Slide transition
B. Animation
C. Background theme
D. Slide sorter

Page 69 of 123
LEO SERIES 70
47. What is the function of the "Design" tab in PowerPoint?
A. To create and organize slides
B. To customize the appearance of the slides
C. To add animations and transitions
D. To insert multimedia files
48. What does the "Slide Show" feature in PowerPoint allow you to do?
A. View the presentation as a slideshow
B. Add new slides to the presentation
C. Insert multimedia elements into the presentation
D. Rearrange the order of slides
49. Which of the following is a way to improve the readability of a presentation?
A. Using too many fonts
B. Using a dark background with light text
C. Using large amounts of text on each slide
D. Using small font sizes
50. Which of the following can be inserted into a PowerPoint slide to add interactivity?
A. Hyperlinks
B. Images
C. Video clips
D. All of the above
51. Which of the following is used to remove duplicate values in Excel?
A. Remove Duplicates Tool
B. Clear Content Tool
C. Hide Duplicates Tool
D. Filter Tool
52. In PowerPoint, what is the purpose of the "Slide Master" feature?
A. To create new slides
B. To design the overall look of slides
C. To insert images into slides
D. To add animations to slides
53. Which of the following tools is used to check spelling in Microsoft Excel?
A. Spell Checker
B. Grammar Check
C. Proofing
D. Word Count
54. What does the "HYPERLINK" function do in Excel?
A. It links cells to each other
B. It allows you to link to a web page or another document
C. It merges cells
D. It provides data validation for cells
55. In Excel, how would you display data in a pie chart format?
A. Select the data and choose the Pie Chart option from the Insert tab
B. Use the VLOOKUP function
C. Use the SUMIF function
D. Use the IFERROR function
56. What is a "Bar Chart" used for in data presentation?
A. Displaying time trends
B. Showing proportions
C. Comparing data across categories
D. Showing frequency distribution
57. What is the default view in Microsoft PowerPoint?
A. Slide Sorter View
B. Notes Page View

Page 70 of 123
LEO SERIES 71
C. Normal View
D. Reading View
58. What is a "cell range" in Excel?
A. A single cell
B. A row of cells
C. A group of cells selected together
D. A row of columns
59. How can you add a hyperlink to a PowerPoint slide?
A. Insert > Hyperlink
B. Slide Show > Hyperlink
C. Design > Hyperlink
D. Animations > Hyperlink
60. In Excel, what would the function =COUNTIF(A1:A10,">5") do?
A. Count the cells with values greater than 5 in the range A1:A10
B. Count the cells with values less than 5 in the range A1:A10
C. Sum the values greater than 5 in the range A1:A10
D. Count the total number of cells in the range A1:A10
61. In PowerPoint, what is the function of "Presenter View"?
A. To add animations to slides
B. To view speaker notes while presenting
C. To create transitions between slides
D. To share the presentation with others
62. What is the best file format for saving a PowerPoint presentation for sharing online?
A. .jpg
B. .pptx
C. .pdf
D. .exe
63. Which of the following can be used to apply the same format to multiple cells in Excel?
A. Format Painter
B. Merge Cells
C. Freeze Panes
D. Data Validation
64. In Excel, how do you change the background color of a cell?
A. Right-click the cell and select 'Format Cells'
B. Use the 'Insert' menu
C. Select 'Home' and use the fill color tool
D. Select 'Data' and apply the background tool
65. What is the function of the "Insert" tab in PowerPoint?
A. To adjust the timing of slides
B. To add multimedia elements to the slides
C. To format the text on slides
D. To apply transitions to slides
66. What is an example of a multimedia element you can add to a PowerPoint presentation?
A. Images
B. Videos
C. Audio files
D. All of the above
67. Which of the following is an example of a "metadata" in Excel?
A. The file name of a workbook
B. The formulas in a cell
C. The data entered into a cell
D. The chart in the workbook
68. What is the purpose of "cell protection" in Excel?

Page 71 of 123
LEO SERIES 72
A. To change the font style
B. To prevent accidental changes to data
C. To highlight specific cells
D. To merge cells
69. Which of the following is NOT a valid function in Excel?
A. =COUNT()
B. =SUMIF()
C. =ADD()
D. =AVERAGE()
70. In PowerPoint, what type of content can be added using the "Text Box" tool?
A. Images
B. Text
C. Videos
D. Charts
71. Which of the following is a valid data type in Microsoft Excel?
A. Boolean
B. Integer
C. Date
D. All of the above
72. In Excel, what does the "Filter" tool do?
A. Sorts the data alphabetically
B. Hides certain data based on specific conditions
C. Calculates the sum of data
D. Merges cells
73. What is a primary benefit of using conditional formatting in Excel?
A. To automatically delete data
B. To apply specific formatting to data based on criteria
C. To create hyperlinks
D. To merge cells
74. What is the "Sum" function used for in Excel?
A. To calculate the average of a range of cells
B. To find the maximum value in a range of cells
C. To add up all the values in a range of cells
D. To count the number of cells with data
75. In Excel, what would the formula =AVERAGE(B1:B5) do?
A. Add up the values in B1 to B5
B. Count the number of cells in B1 to B5
C. Return the highest value in B1 to B5
D. Calculate the average of the values in B1 to B5
76. Which of the following is NOT a valid type of PowerPoint transition?
A. Fade
B. Wipe
C. Zoom
D. Rotate
77. In Excel, what does the "COUNT" function do?
A. Counts the number of empty cells in a range
B. Counts the number of cells that contain numeric data in a range
C. Counts the total number of cells in a range
D. Counts the number of text-based cells in a range
78. In PowerPoint, what is the purpose of using the "Animation Pane"?
A. To apply transitions between slides
B. To add and control the animations applied to elements within a slide
C. To add multimedia files

Page 72 of 123
LEO SERIES 73
D. To view speaker notes
79. Which of the following is the most suitable chart for displaying the market share of companies in a
specific industry?
A. Pie chart
B. Line chart
C. Bar chart
D. Histogram
80. What is the default font in Microsoft PowerPoint?
A. Calibri
B. Arial
C. Times New Roman
D. Verdana
81. In PowerPoint, which of the following can be used to apply a professional design template to all slides in
the presentation?
A. Slide Master
B. Animation
C. Slide Sorter
D. Notes Page
82. In Excel, what would the function =MIN(A1:A10) do?
A. Find the highest value in the range A1:A10
B. Count the number of cells in the range A1:A10
C. Calculate the average of the range A1:A10
D. Find the lowest value in the range A1:A10
83. In PowerPoint, what is the purpose of the "Notes Pane"?
A. To display notes for each slide for the presenter
B. To view the entire presentation
C. To view slide transitions
D. To add new slides
84. What type of data would you store in a relational database?
A. Images
B. Customer information
C. Videos
D. All of the above
85. What is the purpose of "data validation" in Excel?
A. To allow only specific types of data to be entered into a cell
B. To merge cells
C. To add images to cells
D. To calculate totals
86. Which of the following is a valid Excel formula for calculating the total of cells A1 through A5?
A. =SUM(A1, A2, A3, A4, A5)
B. =ADD(A1:A5)
C. =TOTAL(A1:A5)
D. =SUM(A1:A5)
87. In PowerPoint, which of the following actions can you perform in the "Slide Show" tab?
A. Reorder slides
B. Set the timing for automatic slide transitions
C. Add animations to the slides
D. Insert tables and images
88. In Excel, which chart type would be best for comparing sales performance over multiple years?
A. Pie chart
B. Line chart
C. Column chart
D. Radar chart

Page 73 of 123
LEO SERIES 74
89. What is the best method for organizing data in Excel for future use?
A. Using tables and named ranges
B. Storing data in a text file
C. Using pictures
D. Merging cells
90. In Excel, what is a "function"?
A. A pre-defined formula
B. A group of cells
C. A graphic element
D. A formatting tool
91. In Excel, what is the purpose of the "VLOOKUP" function?
A. To find the average of a range
B. To look up a value in a table
C. To filter data based on specific criteria
D. To merge multiple cells
92. What is the default slide size in PowerPoint?
A. A4
B. 4:3
C. 16:9
D. 11x8.5
93. In PowerPoint, what does the "Slide Sorter" view allow you to do?
A. Add text to slides
B. Rearrange slides and view thumbnails
C. Set slide timings
D. Change slide layout
94. Which of the following is NOT a feature of a PowerPoint slide?
A. Title
B. Content
C. Page numbers
D. Slide transitions
95. In Excel, what is the purpose of the "CONCATENATE" function?
A. To add multiple cells together
B. To combine text from multiple cells into one
C. To remove duplicates from a data range
D. To calculate the average of a range
96. In Excel, how do you create a drop-down list in a cell?
A. Use the "Data Validation" tool
B. Use the "VLOOKUP" function
C. Use the "Sort" tool
D. Use the "Insert" menu
97. Which of the following is used to display hierarchical relationships in Excel?
A. Pie Chart
B. SmartArt
C. Scatter Plot
D. Histogram
98. What does the "Format Cells" option in Excel allow you to do?
A. Insert new cells
B. Change the appearance of cell content
C. Sort data
D. Filter data
99. What is the correct function for calculating the number of cells in a range that contain numbers in Excel?
A. =COUNT()
B. =COUNTA()

Page 74 of 123
LEO SERIES 75
C. =COUNTIF()
D. =COUNTBLANK()
100. In PowerPoint, what does the "Animation Pane" allow you to do?
A. Add new slides to the presentation
B. Adjust the timing and order of animations
C. Apply themes to slides
D. Insert pictures and videos
101. What is the "SUMIF" function used for in Excel?
A. To sum values in a range based on a condition
B. To find the average of a range based on a condition
C. To check for errors in a range
D. To count the number of non-blank cells
102. In Excel, which of the following functions is used to calculate the average of a set of values?
A. =SUM()
B. =AVERAGE()
C. =MAX()
D. =MIN()
103. Which of the following is NOT a type of chart available in PowerPoint?
A. Column Chart
B. Line Chart
C. Radar Chart
D. Waterfall Chart
104. In Excel, what is the use of the "IF" function?
A. To perform logical tests and return values based on the condition
B. To add values in a range
C. To calculate the sum of a range
D. To find the largest value in a range
105. What is the purpose of using templates in PowerPoint?
A. To design custom transitions
B. To apply a predefined design to slides
C. To add animation to text
D. To add multimedia elements to slides
106. What is the correct function for finding the highest value in a range in Excel?
A. =MAX()
B. =MIN()
C. =AVERAGE()
D. =COUNT()
107. In Excel, which of the following functions can be used to count the number of cells that contain text?
A. =COUNTIF()
B. =COUNTA()
C. =COUNTBLANK()
D. =COUNT()
108. In PowerPoint, what is the "Design Ideas" feature used for?
A. To change the design of a single slide
B. To apply slide transitions
C. To suggest design layouts for slides
D. To insert shapes and images
109. How would you change the layout of a slide in PowerPoint?
A. Select the "Design" tab and choose a layout
B. Use the "Home" tab and select a new layout
C. Use the "Insert" tab and select a layout
D. Click "Slide Master" to change the layout
110. What is the purpose of the "Data Validation" tool in Excel?

Page 75 of 123
LEO SERIES 76
A. To restrict the type of data entered into a cell
B. To validate the accuracy of the data
C. To format cells in a specific way
D. To filter out specific data
111. In PowerPoint, which of the following can you use to add a new slide to the presentation?
A. Insert > New Slide
B. Home > New Slide
C. Design > New Slide
D. View > New Slide
112. In Excel, what is the result of using the "NOW()" function?
A. It returns the current date
B. It returns the current time
C. It returns the current date and time
D. It returns the date 30 days from today
113. In PowerPoint, what does the "Slide Transition" feature allow you to do?
A. Add effects to elements within a slide
B. Set the timing for automatic slide changes
C. Change the background of a slide
D. Add multimedia content to slides
114. What does the "COUNTIF" function do in Excel?
A. Counts the number of cells in a range that meet a condition
B. Counts the total number of non-empty cells
C. Finds the average of a range
D. Sums the values of a range
115. Which feature in Excel allows you to automatically fill cells with data based on a pattern?
A. AutoFill
B. Copy-Paste
C. Flash Fill
D. Data Validation
116. What is the default page orientation in PowerPoint?
A. Portrait
B. Landscape
C. Square
D. Custom
117. In Excel, which tool is used to combine multiple rows or columns into one?
A. Merge Cells
B. Insert Rows
C. Split Cells
D. Wrap Text
118. In PowerPoint, what is the "Slide Show" tab used for?
A. To add new slides
B. To set the presentation options and play the presentation
C. To insert charts and graphs
D. To create animations
119. What is the function of the "SUM" function in Excel?
A. To count the number of cells in a range
B. To calculate the average of a range
C. To add up values in a range
D. To find the maximum value in a range
120. In PowerPoint, which of the following is used to create animations for slide elements?
A. Animations Pane
B. Transition Pane
C. Format Pane

Page 76 of 123
LEO SERIES 77
D. Slide Layout Pane
121. What is the "Text Box" tool used for in PowerPoint?
A. To add video content
B. To add text content to a slide
C. To add pictures to slides
D. To create charts
122. Which of the following is an example of conditional formatting in Excel?
A. Changing the font color based on cell value
B. Merging cells
C. Sorting data in alphabetical order
D. Creating a pie chart
123. How would you add a comment to a cell in Excel?
A. Right-click the cell and select "Insert Comment"
B. Use the "Insert" tab to add comments
C. Use the "Home" tab to add comments
D. Use the "Data" tab to insert comments
124. In PowerPoint, which of the following is the main function of the "Notes Pane"?
A. To view the full presentation
B. To add detailed notes for the presenter
C. To insert multimedia content
D. To apply transitions to slides
125. In Excel, what does the "AutoSum" function do?
A. Automatically calculates the sum of a range of numbers
B. Automatically sorts data
C. Automatically creates a pie chart
D. Automatically formats a table
126. In Excel, which of the following functions calculates the total number of cells in a range?
A. =COUNT()
B. =COUNTA()
C. =COUNTBLANK()
D. =COUNTO()
127. In PowerPoint, how can you add a hyperlink to a slide?
A. Insert > Hyperlink
B. Design > Hyperlink
C. View > Hyperlink
D. Slide > Hyperlink
128. In Excel, how do you freeze the top row of a spreadsheet?
A. View > Freeze Panes > Freeze Top Row
B. Data > Freeze Panes > Freeze Top Row
C. Home > Freeze Panes > Freeze Top Row
D. Review > Freeze Panes > Freeze Top Row
129. In PowerPoint, which feature is used to create a chart in a slide?
A. Insert > Chart
B. Home > Chart
C. Design > Chart
D. View > Chart
130. In Excel, which of the following is a text formatting option?
A. Bold
B. Filter
C. Freeze Panes
D. Sort
131. How can you resize a picture in PowerPoint?
A. Right-click on the picture and select "Resize"

Page 77 of 123
LEO SERIES 78
B. Drag the corner handles of the picture
C. Use the "Home" tab to resize
D. Use the "Insert" tab to resize
132. What is the function of the "COUNT" function in Excel?
A. Counts the number of cells in a range that contain numbers
B. Counts the number of non-empty cells
C. Finds the highest value in a range
D. Adds the values in a range
133. In PowerPoint, which of the following is used to apply a consistent design throughout the presentation?
A. Slide Master
B. Slide Layout
C. Slide Show
D. Design Ideas
134. In Excel, which function is used to find the number of characters in a cell?
A. =LEN()
B. =COUNT()
C. =SUM()
D. =SEARCH()
135. Which of the following is used to create a bulleted list in PowerPoint?
A. Home > Bullets
B. Design > Bullets
C. Insert > Bullets
D. Slide Show > Bullets
136. What is the purpose of the "SUMPRODUCT" function in Excel?
A. Multiplies corresponding elements in given arrays and returns the sum
B. Adds the numbers in a range
C. Subtracts values in a range
D. Counts the number of non-empty cells
137. In Excel, how would you change the background color of a cell?
A. Use the "Fill Color" tool in the "Home" tab
B. Use the "Data Validation" tool
C. Use the "Merge Cells" tool
D. Use the "Format Cells" option in the "Insert" tab
138. In PowerPoint, what is the purpose of the "Master Slide"?
A. To apply a design layout to individual slides
B. To create a background that appears on all slides
C. To add sound effects to the slides
D. To arrange the slides in order
139. Which of the following is the correct function for finding the smallest value in a range in Excel?
A. =MAX()
B. =MIN()
C. =AVERAGE()
D. =COUNT()
140. In PowerPoint, which of the following allows you to rehearse timings for your presentation?
A. Slide Show > Rehearse Timings
B. Home > Rehearse Timings
C. Insert > Rehearse Timings
D. View > Rehearse Timings
141. What does the "Find and Replace" feature in Excel do?
A. Finds specific text or numbers in the spreadsheet and replaces them with new content
B. Finds the sum of values in a range
C. Replaces the formatting of a range
D. Replaces old charts with new charts

Page 78 of 123
LEO SERIES 79
142. What is the function of "Slide Layouts" in PowerPoint?
A. To add content to slides
B. To change the overall design of the presentation
C. To organize and position elements on slides
D. To add transitions between slides
143. In Excel, which of the following tools is used to organize data in ascending or descending order?
A. Sort
B. Filter
C. Freeze Panes
D. Merge Cells
144. How do you add a table to a slide in PowerPoint?
A. Insert > Table
B. Design > Table
C. Slide Show > Table
D. Home > Table
145. What is the function of the "AutoFilter" tool in Excel?
A. To filter data based on specific criteria
B. To format cells based on their content
C. To sum a range of cells
D. To create a new chart
146. How would you add a new row to a table in Excel?
A. Right-click the row and select "Insert"
B. Use the "Insert" menu
C. Use the "Data" tab
D. Use the "Home" tab
147. Which of the following file extensions is used for PowerPoint presentations?
A. .xls
B. .ppt
C. .docx
D. .txt
148. In Excel, how do you insert a new worksheet?
A. Click the "+" button at the bottom of the screen
B. Use the "Insert" tab
C. Right-click a worksheet tab and select "Insert"
D. Use the "View" tab
149. What is the purpose of the "Transpose" function in Excel?
A. To switch the rows and columns of data
B. To calculate the average of a range
C. To sort data in alphabetical order
D. To apply conditional formatting
150. What does the "Remove Duplicates" function do in Excel?
A. Deletes duplicate rows in a range of data
B. Removes blank cells from a range
C. Counts the number of unique items
D. Replaces values in a range
151. In PowerPoint, which of the following is used to add an image to a slide?
A. Insert > Image
B. Home > Image
C. Design > Image
D. Insert > Picture
152. In Excel, how can you automatically calculate the sum of a range of numbers?
A. Use the AutoSum button
B. Type "=SUM()" manually

Page 79 of 123
LEO SERIES 80
C. Use the Calculate tool
D. Use the "Formulas" tab
153. What is the primary purpose of a "Chart" in Excel?
A. To display data in a graphical format
B. To sort data in ascending or descending order
C. To add colors to cells
D. To create pivot tables
154. In PowerPoint, how can you apply a transition effect between slides?
A. Transitions > Apply Transition
B. Design > Transitions
C. Insert > Transition
D. View > Transition
155. Which of the following is the function to calculate the average of a range in Excel?
A. =MAX()
B. =AVERAGE()
C. =SUM()
D. =COUNT()
156. In Excel, how do you display gridlines on a worksheet?
A. View > Show > Gridlines
B. Format > Gridlines
C. Data > Gridlines
D. Insert > Gridlines
157. In PowerPoint, which of the following is used to insert a table into a slide?
A. Insert > Table
B. Design > Table
C. Home > Table
D. View > Table
158. Which of the following file formats can Excel save a spreadsheet as?
A. .xlsx, .csv, .pdf
B. .ppt, .docx, .txt
C. .jpg, .png, .gif
D. .html, .rtf, .xml
159. How would you change the orientation of a slide in PowerPoint?
A. Design > Slide Orientation
B. View > Slide Orientation
C. Insert > Slide Orientation
D. Home > Slide Orientation
160. In Excel, which function is used to find the largest number in a range?
A. =MIN()
B. =AVERAGE()
C. =MAX()
D. =COUNT()
161. What feature in Excel allows you to analyze data in different ways by arranging it in rows and
columns?
A. Pivot Table
B. Filter
C. Conditional Formatting
D. Sort
162. In PowerPoint, how can you add a video to a slide?
A. Insert > Video
B. Design > Video
C. Slide Show > Video
D. Insert > Media > Video

Page 80 of 123
LEO SERIES 81
163. In Excel, which of the following is used to combine data from multiple cells into one cell?
A. CONCATENATE function
B. SUM function
C. AVERAGE function
D. VLOOKUP function
164. What is the purpose of using "Slide Layouts" in PowerPoint?
A. To change the design of the slide
B. To apply a predefined structure to a slide
C. To add animations to the slide
D. To insert text into a slide
165. In Excel, which function allows you to search for a value in a table and return a corresponding value?
A. VLOOKUP()
B. COUNTIF()
C. SUMIF()
D. INDEX()
166. What does the "Merge & Center" option in Excel do?
A. Merges selected cells and centers the content
B. Merges cells without centering content
C. Merges cells with a border
D. Centers text in the current cell
167. In PowerPoint, which of the following allows you to change the background of a slide?
A. Design > Background Styles
B. Insert > Background
C. Home > Background
D. Slide Show > Background
168. How do you change the font style of text in PowerPoint?
A. Home > Font
B. Design > Font
C. View > Font
D. Slide Show > Font
169. In Excel, how do you format numbers as currency?
A. Use the "Currency" format in the "Number" tab
B. Use the "Text" format
C. Use the "General" format
D. Use the "Date" format
170. How do you delete a slide in PowerPoint?
A. Select the slide and press "Delete"
B. Right-click on the slide and select "Remove"
C. Home > Remove Slide
D. View > Delete Slide
171. What does the "Freeze Panes" option in Excel do?
A. Locks rows or columns to remain visible while scrolling
B. Freezes the data in a cell
C. Creates a new worksheet
D. Changes the color of the panes
172. In PowerPoint, how can you apply a design theme to the entire presentation?
A. Design > Themes
B. Home > Themes
C. View > Themes
D. Slide Show > Themes
173. What is the function of the "Conditional Formatting" tool in Excel?
A. To change the appearance of a cell based on its content
B. To sort data in a range

Page 81 of 123
LEO SERIES 82
C. To filter data in a range
D. To create a new chart
174. Which of the following is used to check for spelling and grammar errors in PowerPoint?
A. Review > Spelling
B. Insert > Spelling
C. Home > Spelling
D. View > Spelling
175. How can you add a hyperlink to a slide in PowerPoint?
A. Insert > Link
B. Design > Hyperlink
C. Home > Hyperlink
D. Insert > Hyperlink
176. In Excel, which of the following tools allows you to sort data alphabetically?
A. Sort
B. Filter
C. Freeze Panes
D. Group
177. In PowerPoint, which of the following features allows you to add animation to an element?
A. Animations > Add Animation
B. Slide Show > Add Animation
C. Home > Add Animation
D. Insert > Add Animation
178. In Excel, which tool would you use to highlight duplicate values in a range of cells?
A. Conditional Formatting > Highlight Cells Rules > Duplicate Values
B. Data > Highlight Duplicates
C. Home > Find Duplicates
D. Review > Highlight Duplicates
179. In PowerPoint, how would you add a transition effect between slides?
A. Transitions > Select Transition
B. Home > Select Transition
C. View > Transitions
D. Insert > Transition
180. In Excel, how can you protect a worksheet from unauthorized editing?
A. Use the "Protect Sheet" option
B. Use the "Hide" function
C. Use the "Lock" function
D. Use the "Save As" function
181. In PowerPoint, how do you add notes to a slide?
A. View > Notes Page
B. Insert > Notes
C. Slide Show > Notes
D. Home > Notes
182. In Excel, which of the following allows you to split text into different columns?
A. Text to Columns
B. Merge Cells
C. Group Cells
D. Align Text
183. In PowerPoint, what is the function of the "Slide Show" tab?
A. To start and control the presentation
B. To add and edit slides
C. To apply design themes
D. To insert text and objects
184. What is the function of the "Fill Handle" in Excel?

Page 82 of 123
LEO SERIES 83
A. To copy the contents of a cell to adjacent cells
B. To calculate a sum of numbers
C. To format text in a cell
D. To create a chart
185. In PowerPoint, how can you insert a new slide?
A. Home > New Slide
B. Insert > New Slide
C. Slide Show > New Slide
D. View > New Slide
186. Which of the following can you use in Excel to remove all the formatting from a cell?
A. Clear Formats
B. Delete Content
C. Clear All
D. Remove Borders
187. In PowerPoint, which of the following is used to add an audio clip to a slide?
A. Insert > Audio
B. Insert > Media > Audio
C. Slide Show > Audio
D. Design > Audio
188. In Excel, how would you display a cell’s content in a different color based
on its value?
A. Use Conditional Formatting
B. Use a Custom Format
C. Use the Format Painter
D. Use the Text Color tool
189. In PowerPoint, what does the "Animation Pane" allow you to do?
A. Manage and customize the animations applied to objects on a slide
B. Add new animations
C. Edit slide layouts
D. Insert new slides
190. In Excel, which of the following functions is used to find the square root of a number?
A. =SQRT()
B. =POWER()
C. =EXP()
D. =ROOT()
191. In PowerPoint, what is the function of the "Presenter View"?
A. Allows you to see the current slide and notes while presenting
B. Displays a list of slides in the presentation
C. Shows the slide in full-screen mode
D. Changes the background of the presentation
192. In Excel, how can you add a comment to a cell?
A. Right-click the cell and select "Insert Comment"
B. Use the "Insert" menu
C. Use the "Review" tab
D. Use the "Home" tab
193. What is the purpose of "Page Setup" in PowerPoint?
A. To adjust slide size and orientation
B. To apply design themes
C. To organize slide content
D. To animate the slides
194. How do you make a chart title dynamic in Excel?
A. By linking it to a cell that changes
B. By using the "Format" tab

Page 83 of 123
LEO SERIES 84
C. By using the "Insert" tab
D. By entering the title manually
195. In PowerPoint, which of the following is used to add a hyperlink to an external website?
A. Insert > Link
B. Design > Link
C. Home > Hyperlink
D. Slide Show > Hyperlink
196. In Excel, how can you highlight cells with specific text using Conditional Formatting?
A. Home > Conditional Formatting > Text that Contains
B. Review > Conditional Formatting > Text that Contains
C. Data > Conditional Formatting > Text that Contains
D. View > Conditional Formatting > Text
197. What is the default file format for saving PowerPoint presentations?
A. .pptx
B. .pdf
C. .docx
D. .txt
198. In Excel, how would you print only the selected range of cells?
A. Select the range > File > Print > Print Selection
B. File > Print > Print Entire Workbook
C. File > Print > Print Current Sheet
D. File > Print > Print All Sheets
199. What does the "Protect Workbook" option in Excel do?
A. Prevents others from making changes to the workbook
B. Creates a backup copy of the workbook
C. Saves the workbook as a PDF
D. Prevents printing of the workbook
200. In PowerPoint, how do you change the order of slides?
A. Slide Sorter > Drag to reorder
B. Design > Order Slides
C. View > Change Order
D. Insert > Move Slide
ANSWERS TO OBJECTIVE TEST
Question Answer Question Answer Question Answer Question Answer Question Answer
1 C 2 A 3 B 4 A 5 A
6 C 7 A 8 B 9 D 10 C
11 D 12 A 13 A 14 C 15 B
16 A 17 C 18 A 19 D 20 B
21 C 22 B 23 D 24 A 25 A
26 C 27 B 28 D 29 A 30 A
31 C 32 D 33 A 34 B 35 A
36 A 37 C 38 B 39 A 40 A
41 D 42 B 43 C 44 A 45 B
46 C 47 D 48 A 49 A 50 C
51 A 52 B 53 C 54 D 55 B
56 A 57 C 58 D 59 B 60 A
61 C 62 A 63 D 64 A 65 C
66 A 67 B 68 C 69 A 70 D
71 B 72 A 73 C 74 A 75 D
76 C 77 A 78 B 79 C 80 A
81 C 82 A 83 D 84 C 85 A
86 B 87 A 88 C 89 A 90 B
91 A 92 D 93 B 94 A 95 C
96 A 97 C 98 B 99 D 100 A
101 B 102 C 103 D 104 A 105 B
106 A 107 C 108 B 109 D 110 A

Page 84 of 123
LEO SERIES 85
111 C 112 A 113 B 114 C 115 D
116 B 117 A 118 D 119 B 120 A
121 A 122 C 123 D 124 A 125 B
126 C 127 A 128 B 129 C 130 A
131 D 132 B 133 A 134 C 135 A
136 C 137 A 138 D 139 B 140 A
141 C 142 B 143 A 144 C 145 D
146 A 147 B 148 C 149 D 150 B
151 A 152 B 153 A 154 C 155 D
156 A 157 C 158 B 159 D 160 C
161 A 162 D 163 B 164 C 165 A
166 C 167 D 168 A 169 B 170 A
171 B 172 C 173 A 174 D 175 A
176 C 177 A 178 B 179 D 180 A
181 B 182 A 183 C 184 D 185 A
186 C 187 D 188 B 189 A 190 D
191 B 192 A 193 D 194 A 195 C
196 B 197 A 198 D 199 A 200 A

Strand 5: Digital Citizenship and Ethics:


1. What is digital citizenship?
A. Using digital tools responsibly
B. Creating digital content
C. Watching online videos
D. Playing online games
2. Which of the following is a part of online safety?
A. Clicking on pop-up ads
B. Using strong passwords
C. Sharing personal information freely
D. Ignoring cyberbullying
3. What does it mean to have a positive digital footprint?
A. Posting anything without thinking
B. Being cautious about what you share online
C. Hiding your online identity
D. Avoiding using the internet
4. Cyberbullying is:
A. A type of online gaming
B. Using the internet to harm or harass someone
C. Sending emails to friends
D. Writing online reviews
5. What should you do if you encounter cyberbullying?
A. Ignore it and move on
B. Respond with a negative comment
C. Tell a trusted adult or report it
D. Share it on social media
6. Which of the following is an example of intellectual property?
A. A picture you found on the internet
B. A blog post you wrote yourself
C. A friend's personal email
D. A viral meme
7. What is plagiarism?
A. Using someone else’s work without permission
B. Writing your own research paper
C. Citing your sources correctly
D. Downloading files legally

Page 85 of 123
LEO SERIES 86
8. What is the purpose of online privacy settings?
A. To make your information available to everyone
B. To protect your personal information from others
C. To allow strangers to contact you
D. To increase your online followers
9. Which of these is a form of responsible internet use?
A. Sharing your passwords with others
B. Respecting others' opinions online
C. Posting personal details publicly
D. Visiting inappropriate websites
10. What is a strong password?
A. A combination of your name and birthdate
B. A simple word you can easily remember
C. A mix of letters, numbers, and special characters
D. A short word with no numbers
11. What does the term “digital literacy” refer to?
A. Being able to read and write in English
B. Knowing how to use digital devices effectively
C. Having a computer at home
D. Understanding how to use social media
12. What is a potential risk of sharing too much personal information online?
A. Making new friends
B. Being targeted by cybercriminals
C. Increasing online visibility
D. Gaining followers quickly
13. What is netiquette?
A. The rules of online behavior
B. A type of online video game
C. An online shopping platform
D. A social media platform
14. What does it mean to be a responsible online consumer?
A. Sharing your financial information freely
B. Researching before making online purchases
C. Clicking on all online ads
D. Copying others' work and passing it as your own
15. What is the role of a password manager?
A. To help you remember your passwords
B. To change your passwords regularly
C. To protect you from cyberbullying
D. To store pictures and videos securely
16. Why should you be cautious about downloading files from the internet?
A. Some files may contain viruses or malware
B. They may take up too much space on your device
C. They may not be compatible with your device
D. They may be fun to use
17. What is a digital footprint?
A. The total amount of data stored on your device
B. The trail of data you leave behind when using the internet
C. The number of websites you visit each day
D. The battery usage on your device
18. Which of the following is an example of ethical online behavior?
A. Respecting others' privacy online
B. Posting offensive content

Page 86 of 123
LEO SERIES 87
C. Using someone else's account without permission
D. Sharing your friend's password
19. What should you do if you receive a suspicious email?
A. Open the email and click the links
B. Reply to the sender
C. Delete the email and report it
D. Share the email with friends
20. What is the purpose of parental control software?
A. To track your internet usage
B. To block access to harmful content for children
C. To speed up your internet connection
D. To allow unrestricted access to all websites
21. Which of the following is the best way to protect your privacy online?
A. Share personal information only with friends
B. Avoid using strong passwords
C. Use privacy settings on social media
D. Post your location on social media
22. What is the importance of digital ethics?
A. To increase social media followers
B. To ensure that online activities are respectful and lawful
C. To help improve your digital skills
D. To promote online gaming
23. What does the term “cyberbullying” refer to?
A. Using the internet for research
B. Online harassment or bullying
C. Sharing useful information online
D. Writing a positive review online
24. What is the first step in responding to cyberbullying?
A. Retaliate with harsh words
B. Share the content with everyone
C. Save the evidence and report it
D. Delete the account of the person bullying
25. What is digital consent?
A. Agreeing to share personal data with websites
B. Permission to access someone’s personal information online
C. Receiving explicit permission before using someone’s online content
D. Agreeing to follow someone on social media
26. What is the key principle of responsible digital citizenship?
A. Protecting your own rights but ignoring others
B. Respecting others’ rights and behaving ethically online
C. Copying content from other sources freely
D. Spending excessive time online without considering others
27. What should you do if you accidentally share something private online?
A. Leave it and move on
B. Apologize and delete it immediately
C. Share more private details to cover up
D. Tell everyone about the mistake
28. Why is it important to cite sources when using information from the internet?
A. To avoid plagiarism
B. To make your work longer
C. To confuse your audience
D. To avoid reading books
29. What does online privacy refer to?

Page 87 of 123
LEO SERIES 88
A. The ability to hide your online activities from everyone
B. Protecting personal data and information on the internet
C. Sharing all your personal details online
D. Posting photos without any restrictions
30. Which of the following is an example of responsible internet use?
A. Posting inappropriate pictures
B. Sharing rumors without checking facts
C. Using copyrighted material without permission
D. Respecting others’ opinions in online discussions
31. What is phishing?
A. A type of online game
B. A method used to trick people into revealing sensitive information
C. A way to increase online followers
D. A safe way to exchange information online
32. Why is it important to avoid oversharing on social media?
A. To protect your personal information
B. To increase the number of likes
C. To get more friends
D. To promote your brand
33. What should you do if you receive an email asking for personal information?
A. Respond with your information immediately
B. Ignore it and report it to the authorities
C. Click on the link and follow the instructions
D. Share it with your friends
34. What does the term "ethical hacking" refer to?
A. Hacking for malicious purposes
B. Hacking to test the security of systems with permission
C. Creating computer viruses
D. Hacking into social media accounts
35. What should you do if you encounter offensive content online?
A. Share it with others
B. Report it and block the user if necessary
C. Ignore it and move on
D. Engage in a heated discussion
36. Which of the following is a way to protect your digital identity?
A. Using the same password for all accounts
B. Sharing your password with friends
C. Using two-factor authentication
D. Posting your birthdate and address online
37. What is online reputation management?
A. Sharing everything you do on social media
B. Managing how your online presence is perceived by others
C. Avoiding the use of social media altogether
D. Increasing the number of followers on social media
38. What is the most responsible action when you see someone being cyberbullied?
A. Ignore the situation
B. Share the bullying incident online
C. Report the incident to the appropriate authorities
D. Retaliate against the bully
39. Why is it important to maintain strong online security practices?
A. To make browsing faster
B. To protect your personal data from cyber threats

Page 88 of 123
LEO SERIES 89
C. To improve your social media followers
D. To make your computer run faster
40. Which of the following is considered an ethical use of online content?
A. Copying and pasting articles without permission
B. Giving credit to the author when using online content
C. Downloading music without paying for it
D. Uploading videos without the creator’s consent
41. What is the most ethical action to take when using someone else's work online?
A. Use the work without crediting the creator
B. Ask for permission and give proper credit
C. Download it and keep it for personal use only
D. Post it as your own work
42. What does “digital etiquette” refer to?
A. The rules of good behavior when online
B. The use of emojis in communication
C. Creating digital content
D. Managing online advertising
43. How can you protect your privacy on social media?
A. Share all your personal details with everyone
B. Regularly update your privacy settings
C. Use a fake name on social media
D. Post everything about your daily routine
44. What is the purpose of two-factor authentication?
A. To make it easier to remember passwords
B. To add an extra layer of security to your accounts
C. To share your account information with others
D. To block unwanted online ads
45. What should you do if someone sends you a mean message online?
A. Respond with a more hurtful message
B. Tell an adult or report the behavior
C. Ignore it and hope it stops
D. Forward the message to others
46. Why is it important to respect copyright laws online?
A. To avoid legal consequences
B. To get more likes on your content
C. To improve your online reputation
D. To create your own content
47. What is an example of unethical behavior online?
A. Respecting others’ online content
B. Sharing someone else’s personal information without permission
C. Giving credit when using someone’s work
D. Protecting your online privacy
48. What is a key concept of digital citizenship?
A. Downloading as much as you can from the internet
B. Engaging responsibly and ethically in digital spaces
C. Playing games online all day
D. Sharing everything about your life online
49. What is the main goal of internet safety education?
A. To encourage sharing personal data online
B. To promote safe, responsible, and ethical behavior on the internet
C. To teach how to hack accounts
D. To build websites
50. What does the “right to be forgotten” mean in digital ethics?

Page 89 of 123
LEO SERIES 90
A. Your data can be erased from the internet upon request
B. You can access someone’s private information without their consent
C. Your identity can be changed online
D. You can delete other people's online posts
51. What should you do if you find an online video that is offensive to others?
A. Report it to the platform hosting the video
B. Share it with your followers
C. Ignore it and move on
D. Leave a hateful comment on the video
52. How can you promote a positive online environment?
A. Participate in cyberbullying
B. Share respectful and kind comments
C. Post harmful content
D. Avoid engaging with others
53. What is the best way to handle sensitive personal information online?
A. Share it with anyone who asks
B. Keep it private and only share it with trusted sources
C. Post it on social media
D. Use it to create online profiles
54. What does the term "cybersecurity" refer to?
A. A type of online game
B. Protecting computers, networks, and data from cyberattacks
C. Creating online content
D. Browsing the internet without safety
55. What is a privacy policy on websites?
A. A statement outlining how a website collects and uses personal data
B. A set of rules for using the website
C. Instructions on how to download content
D. A list of online games available on the website
56. What is the main objective of anti-cyberbullying programs?
A. To encourage people to be more aggressive online
B. To stop the harmful effects of cyberbullying and educate users
C. To promote online advertisements
D. To monitor online traffic
57. What should you do if you notice your social media account has been hacked?
A. Ignore it and hope it fixes itself
B. Change your passwords and report the incident
C. Share your account information with others
D. Delete your account permanently
58. How can you avoid being scammed online?
A. Share your credit card details with untrusted websites
B. Only shop from trusted and secure websites
C. Use the same password for all accounts
D. Ignore warning messages from websites
59. What is the ethical way to use images found on the internet?
A. Use them without crediting the creator
B. Ask for permission or use images with the appropriate license
C. Download them without thinking about ownership
D. Edit the image and claim it as your own
60. Why is it important to keep your software and devices updated?
A. To increase battery life
B. To ensure the latest security measures are in place

Page 90 of 123
LEO SERIES 91
C. To get more online friends
D. To make your device faster
61. Which of the following is an example of responsible online behavior?
A. Spreading rumors online
B. Sharing helpful and respectful content
C. Sharing private information without permission
D. Using strong language in discussions
62. What is the purpose of an online reputation?
A. To improve your chances of going viral
B. To control how others perceive you on the internet
C. To collect as many followers as possible
D. To get as many likes on your posts as possible
63. What is one of the dangers of sharing too much personal information on social media?
A. It can help you become famous
B. It can lead to identity theft or fraud
C. It can improve your online reputation
D. It can help you connect with new friends
64. Which of the following is an example of ethical use of technology?
A. Hacking a website to obtain private information
B. Copying homework from the internet without citation
C. Using technology to communicate with others respectfully
D. Using someone else’s digital artwork as your own
65. How can you protect your digital footprint?
A. By being careful about the information you share online
B. By deleting all your online accounts
C. By sharing everything on social media
D. By using a fake name for your accounts
66. What is the best way to handle an online disagreement?
A. Engage in a heated argument
B. Respectfully express your opinion and avoid insults
C. Ignore the situation entirely
D. Block the other person immediately
67. What does the term “digital footprint” mean?
A. The traces of your online activities
B. The security of your online accounts
C. The devices you use to connect to the internet
D. The software you use for browsing the internet
68. What is the significance of a strong password?
A. It makes your account easier to hack
B. It helps protect your account from unauthorized access
C. It allows you to share your account freely
D. It ensures you never forget your password
69. Why is it important to be careful about the images and videos you share online?
A. They may be used without your permission
B. They could end up on websites you don’t control
C. They could be misused by others
D. All of the above
70. What is the correct action when you receive a suspicious email?
A. Open it and click on the links
B. Reply with your personal information
C. Mark it as spam and delete it
D. Share the email with all your contacts
71. What is an important factor in preventing online scams?

Page 91 of 123
LEO SERIES 92
A. Clicking on every advertisement
B. Being cautious when giving out personal details
C. Using the same password across all accounts
D. Downloading files from unknown sources
72. Which of the following is a digital citizenship responsibility?
A. Engaging in cyberbullying
B. Ignoring the privacy settings on your social media
C. Sharing and creating content that benefits others
D. Copying and pasting other people’s work
73. What should you do if you notice someone is being bullied online?
A. Ignore it and keep browsing
B. Report the bullying to a trusted adult or platform
C. Join in on the bullying
D. Share the incident with others to make it worse
74. What does the term “fake news” refer to?
A. News that is accurate but controversial
B. Stories or information that is deliberately misleading or false
C. News that spreads quickly online
D. Popular news topics that everyone talks about
75. What is one way to protect your personal information while shopping online?
A. Share your credit card details with every website
B. Shop only on trusted and secure websites with HTTPS
C. Use the same password for all online accounts
D. Ignore the privacy policies of online stores
76. What is the first step in protecting your online privacy?
A. Share all your personal details on social media
B. Use complex passwords and change them regularly
C. Disable privacy settings on your accounts
D. Trust any website that asks for your information
77. What is a consequence of oversharing on social media?
A. You may connect with more people
B. You may increase your popularity
C. Your personal information could be exposed to a wider audience
D. Your privacy will be fully protected
78. Why is it important to regularly check the security settings of your online accounts?
A. To ensure your accounts are not being hacked
B. To change your privacy settings and restrict access to personal information
C. To make your accounts less accessible to others
D. To increase the number of friends or followers
79. What does it mean to have “digital etiquette”?
A. The ability to use all devices and programs
B. Practicing respectful and responsible behavior while communicating online
C. Posting anything you want without consequences
D. Downloading as much content as possible
80. What is the best way to maintain online privacy?
A. Share your passwords with everyone you know
B. Set strong passwords and limit what you share on social media
C. Never use any privacy settings
D. Post your personal details regularly
81. What is one of the risks associated with sharing too much personal information online?
A. You can receive more advertisements
B. It can lead to identity theft

Page 92 of 123
LEO SERIES 93
C. It can help you make new friends
D. It will not have any consequences
82. What is the ethical action when using digital content created by someone else?
A. Copy it and say it’s yours
B. Give credit to the creator and follow copyright rules
C. Change the name and use it
D. Share it without attribution
83. What is a major disadvantage of participating in online forums without thinking about privacy?
A. You can make new connections
B. Your personal information can be exposed or stolen
C. You can engage in meaningful conversations
D. You can increase your followers
84. What is a key practice of ethical digital citizenship?
A. Using others' content without permission
B. Engaging in respectful communication and following laws
C. Ignoring others' privacy
D. Sharing personal information publicly
85. What should you do if you find sensitive information about someone online?
A. Share it with everyone
B. Respect their privacy and do not share it without permission
C. Use the information to cause harm
D. Delete it from the internet immediately
86. What is one of the best ways to prevent identity theft online?
A. Share your personal information freely on social media
B. Use strong, unique passwords and enable two-factor authentication
C. Save your passwords in an unprotected document
D. Share your credit card details with untrusted websites
87. How can you ensure that your online behavior aligns with digital ethics?
A. By respecting others’ opinions and rights in digital spaces
B. By ignoring any online rules or guidelines
C. By posting private information about others
D. By engaging in harmful and abusive language
88. What should you do if you encounter an inappropriate or offensive post online?
A. Ignore it and move on
B. Engage in arguments or insults
C. Report the post to the relevant platform or authority
D. Share the post to your followers
89. Which of the following best represents the concept of "netiquette"?
A. A set of guidelines for responsible online behavior
B. A way to hack into other people’s accounts
C. A platform for spreading false information
D. A method for downloading content illegally
90. What is one key responsibility of a digital citizen?
A. To always share all personal data with others
B. To be respectful and considerate while communicating online
C. To create fake profiles to deceive others
D. To spread rumors or false information
91. What is the purpose of encryption in protecting your online communications?
A. To make your data easily accessible to others
B. To protect your data by converting it into unreadable text
C. To delete your online history
D. To hide your online identity from others
92. What does the term “phishing” refer to in the context of internet security?

Page 93 of 123
LEO SERIES 94
A. A type of online scam designed to steal personal information
B. A new social media platform
C. A type of online game
D. A strategy for marketing
93. What is a good rule to follow when posting images or videos online?
A. Post everything without considering the potential consequences
B. Be aware of the impact of your content on others and ensure it is appropriate
C. Use filters and edit all your posts before sharing
D. Only post images of others without asking for permission
94. Which of the following best describes the principle of "digital privacy"?
A. Keeping all your personal data public for everyone to access
B. Using passwords and encryption to protect your online data
C. Sharing all your data with unknown people online
D. Posting as much personal information as possible
95. What is the most effective way to avoid online scams and fraud?
A. Provide your personal and financial details to any website that asks for them
B. Only trust well-known websites and verify their security measures
C. Click on any link sent via email or social media
D. Share your bank account details with everyone online
96. What should you do if you suspect that someone is impersonating you online?
A. Ignore the situation and hope it resolves itself
B. Report the impersonation to the platform and take steps to recover your account
C. Engage with the impersonator and try to reason with them
D. Share the impersonated profile with others
97. What is one way to practice digital ethics when creating online content?
A. Plagiarize or copy content without attribution
B. Give credit to the creators of any material you use
C. Post other people’s private content without their consent
D. Use offensive language in your posts
98. What should you do if you receive an unsolicited email asking for your personal information?
A. Ignore the email and delete it
B. Respond with your personal information
C. Click on the link provided in the email
D. Forward the email to your friends
99. What is one of the key principles of digital citizenship?
A. To ignore online etiquette
B. To respect others and engage in ethical behavior online
C. To copy and redistribute online content without permission
D. To spread hate and negativity in digital spaces
100. Why is it important to regularly review the privacy settings on your social media accounts?
A. To make sure you share everything publicly
B. To restrict who can see your information and protect your privacy
C. To gain more followers
D. To share all your personal data with advertisers
101. What should you do if you encounter a website that asks for excessive personal information?
A. Share your information immediately
B. Exit the website and report it if necessary
C. Trust the website and continue using it
D. Share your information with friends on social media
102. How does digital etiquette differ from traditional etiquette?
A. Digital etiquette only applies to online gaming
B. Digital etiquette focuses on respectful behavior in digital spaces

Page 94 of 123
LEO SERIES 95
C. Digital etiquette is not important
D. There is no difference
103. Which of the following is an example of online harassment?
A. Respectfully disagreeing with someone online
B. Posting harmful comments or threatening behavior towards someone
C. Sharing positive and helpful advice online
D. Liking someone’s post
104. What is one way to promote a positive digital environment?
A. Share negative content to get more attention
B. Post content that adds value to the community and engages respectfully
C. Engage in online fights
D. Avoid posting altogether
105. How can you help someone who is being cyberbullied online?
A. Ignore the situation
B. Support the victim and report the bullying to the appropriate authorities
C. Join the bullying to make it worse
D. Ignore the victim’s request for help
106. What is a key component of maintaining a strong digital presence?
A. Regularly posting controversial content
B. Posting content that is respectful and aligns with your values
C. Sharing everything about your personal life
D. Copying others’ content
107. What is an example of respecting intellectual property online?
A. Using someone else’s work without credit
B. Giving credit to the creator of the content you use
C. Ignoring copyright laws
D. Downloading content for free without permission
108. Why is it important to be cautious when using free Wi-Fi networks?
A. They are faster than paid networks
B. They may not be secure, leading to the risk of data theft
C. They are completely safe to use without precautions
D. They are generally free from hacking attempts
109. What does it mean to "opt-out" of a digital service?
A. You choose to leave or unsubscribe from the service
B. You increase your data usage
C. You subscribe to the service for a fee
D. You share your data with the service provider
110. What is a safe practice when using public computers or networks?
A. Use your personal passwords without worry
B. Always log out of your accounts when finished
C. Share your password with the next user
D. Leave your personal files on the computer
111.What should you do if a friend shares an inappropriate or harmful post online?
A. Ignore the post and continue browsing
B. Encourage the friend to remove the post and remind them of the potential consequences
C. Share the post with more people
D. Report the post without informing the friend
112.Which of the following is an example of responsible digital behavior?
A. Respecting the opinions and rights of others online
B. Sharing personal information about others without their consent
C. Engaging in online arguments and insults
D. Posting misleading information to gain followers
113.How can you make sure your personal information is secure while online shopping?

Page 95 of 123
LEO SERIES 96
A. Use weak passwords for faster transactions
B. Avoid using public Wi-Fi when making financial transactions
C. Share your bank details openly on the website
D. Ignore website security alerts and warnings
114.What is the role of digital ethics in education?
A. Encouraging students to copy assignments from the internet
B. Promoting academic integrity and respectful online behavior
C. Allowing students to plagiarize their research papers
D. Ignoring the impact of online content in the classroom
115. What should you do if you find content online that violates your digital rights?
A. Ignore it and continue browsing
B. Contact the website’s administrator or the relevant authorities to report the violation
C. Share the content with your followers
D. Post a comment on the content that could escalate the situation
116.How can you protect your digital footprint?
A. Regularly update your privacy settings and limit what you share online
B. Post everything about your personal life online
C. Ignore privacy settings altogether
D. Share all your passwords publicly
117.Why is it important to have consent before sharing someone’s personal content online?
A. To avoid legal and ethical issues and respect the privacy of others
B. To gain more followers
C. To post content without permission
D. To spread content widely without concern
118.How does respecting online copyright laws affect the digital community?
A. It ensures creators’ intellectual property is protected and encourages fair use
B. It encourages people to steal others’ work
C. It discourages creativity and sharing
D. It has no effect on the digital community
119.What is one way to practice responsible behavior on social media?
A. Engage in harmful or hurtful comments
B. Share everything, regardless of the impact on others
C. Post content that is respectful and mindful of the feelings of others
D. Use the platform to spread misinformation
120.Which of the following is an example of a secure online transaction?
A. Using a website without HTTPS encryption to purchase a product
B. Entering your credit card information on a secure, verified website
C. Sending credit card information over unencrypted email
D. Using public Wi-Fi to complete financial transactions
121.How can you demonstrate respect for digital property when using someone else’s work online?
A. Credit the original creator and seek permission where required
B. Copy the content without any attribution
C. Alter the work and present it as your own
D. Use someone else’s work for free without asking
122.What should you do if you receive an offensive or inappropriate message online?
A. Ignore it and continue chatting
B. Respond with equally offensive messages
C. Block the sender and report the message to the platform
D. Share the message with your friends
123.Why is it important to think critically before sharing news or information online?
A. To ensure that you are not spreading false or misleading information
B. To gain more followers

Page 96 of 123
LEO SERIES 97
C. To spread rumors and gossip
D. To make your opinions heard, regardless of accuracy
124.What is an example of ethical digital content creation?
A. Using someone else’s image without permission
B. Giving proper credit to sources and respecting copyright laws
C. Plagiarizing content and claiming it as your own
D. Sharing content without understanding its origin
125.What should you do before using content found online for a school project?
A. Assume it’s free to use
B. Check the copyright and attribution requirements
C. Ignore the rules and use it anyway
D. Change the author’s name and present it as your own
126.Which of the following best describes the term "digital well-being"?
A. Ignoring the effects of excessive screen time
B. Taking care of your physical and mental health while using digital devices
C. Spending as much time online as possible
D. Using technology only for entertainment purposes
127.How can you help foster a positive digital environment in your community?
A. By respecting others, reporting harmful content, and supporting good practices
B. By ignoring harmful behavior and focusing on your own content
C. By spreading negativity and creating arguments online
D. By posting content to get attention, regardless of its impact
128.Why is it important to verify information before sharing it on social media?
A. To ensure that you are not contributing to the spread of false information
B. To avoid following the crowd
C. To ensure that your post gets more likes
D. To share your opinion on controversial topics
129.What is one of the consequences of engaging in online bullying or harassment?
A. It improves your reputation online
B. It can cause harm to the victim and result in legal consequences
C. It encourages others to follow your lead
D. It has no impact on the online community
130.What should you do if you come across a misleading advertisement online?
A. Share the ad to others without checking its validity
B. Ignore the ad and continue browsing
C. Report the ad to the platform and warn others
D. Engage with the ad and click on it
131.How can you practice respect for others’ privacy online?
A. Share other people’s private messages and photos without permission
B. Only share information that is freely available online
C. Keep personal conversations and content confidential unless otherwise agreed
D. Post private details about others on social media
132. What should you do if you notice that your personal information has been compromised online?
A. Do nothing and hope it doesn’t affect you
B. Immediately change your passwords and notify the relevant authorities or platforms
C. Share the information with others to warn them
D. Ignore the issue and continue using the same accounts
133. What is one key principle of digital literacy?
A. The ability to understand and responsibly use technology for communication and learning
B. The skill to only use technology for entertainment
C. The ability to avoid learning about technology
D. The skill to hack into systems
134. How can you avoid becoming a victim of online scams?

Page 97 of 123
LEO SERIES 98
A. Trust all emails and messages you receive
B. Use strong passwords, verify sources, and avoid sharing personal information with unknown
parties
C. Click on links in unsolicited emails
D. Share your passwords with everyone online
135. How should you handle online content that violates the rights of others?
A. Ignore it and move on
B. Share it as much as possible
C. Report it to the appropriate platform or legal authorities
D. Engage in the dispute and create a public argument
136. What does it mean to be a responsible digital citizen? A. To respect the rights and privacy of
others while using digital technologies
B. To ignore the impact of your online behavior
C. To use the internet for personal gain at all times
D. To disregard digital rules and safety guidelines
137. What is a key responsibility when interacting with others online? A. To act with kindness,
respect, and empathy
B. To ignore others and focus on your own content
C. To criticize others for their opinions
D. To share sensitive information without consent
138. How can digital rights be protected? A. By respecting the privacy and intellectual property of
others
B. By ignoring digital laws and guidelines
C. By sharing personal information freely without concern
D. By using technology to harm others
139. What is one way to prevent identity theft online? A. Use complex passwords and avoid
sharing personal details on insecure websites
B. Share your personal information on social media
C. Use the same password for all online accounts
D. Trust unknown websites with your financial information
140. What is the digital divide? A. The gap between those who have access to modern technology
and those who do not
B. The difference between digital and physical content
C. The rise of new technologies in society
D. The process of hacking into digital systems
141. Which of the following is a consequence of not respecting others' digital privacy? A.
Violating trust and causing harm to the individual
B. Gaining popularity online
C. Helping build a larger network of friends
D. Improving your online security
142. Why should you think critically about what you share online? A. To avoid sharing false or
harmful information that could damage your reputation and others’
B. To increase your online followers
C. To post controversial content and spark debates
D. To gain attention without concern for accuracy
143. How can you ensure that your online actions align with ethical standards? A. By thinking
about the consequences of your actions and respecting others
B. By ignoring others and focusing on your personal agenda
C. By using the internet to spread misinformation
D. By evading digital laws and guidelines
144. What should you do before accepting a friend request from someone you don't know? A.
Check their profile to see if it’s safe to accept the request
B. Accept all friend requests without hesitation

Page 98 of 123
LEO SERIES 99
C. Immediately share your personal information with them
D. Ignore any requests from people you don’t know
145. What should you do if you notice online content that is harmful or offensive? A. Ignore the
content and keep browsing
B. Engage with it and leave negative comments
C. Report the content to the platform or authorities
D. Share the content with your followers
146. What is one example of protecting your digital identity? A. Keeping your passwords secure
and not sharing them with others
B. Using your real name for every online interaction
C. Giving your personal details to anyone who asks online
D. Ignoring all privacy settings and leaving your information public
147. Why is online harassment or cyberbullying harmful? A. It can damage a person’s mental and
emotional well-being
B. It helps people get noticed online
C. It strengthens online communities
D. It encourages others to participate in harmful behavior
148. How can social media be used responsibly? A. By using it to promote kindness, share
accurate information, and respect others’ privacy
B. By posting harmful and offensive comments
C. By ignoring others’ rights and sharing private content
D. By engaging in arguments and spreading negativity
149. What is the best way to protect your online reputation? A. Share content that is positive,
accurate, and respectful of others
B. Post content without thinking about its impact
C. Ignore privacy settings and post freely
D. Engage in arguments online to get attention
150. Why is it important to acknowledge sources when sharing digital content? A. To avoid
plagiarism and give credit to the original creators
B. To make your content seem more important
C. To claim ownership of someone else’s work
D. To increase the number of followers on your profile
151. How can you avoid spreading false information online? A. Verify the facts from credible
sources before sharing content
B. Share everything without questioning its authenticity
C. Only rely on unverified sources for information
D. Spread content to gain more attention
152. What is the significance of online privacy settings? A. They allow you to control what
personal information you share with others
B. They make it harder to connect with new people online
C. They only apply to social media platforms
D. They have no impact on your online security
153. What does it mean to be a responsible online consumer? A. To make informed decisions,
respect online businesses, and protect your personal data
B. To purchase items impulsively without verifying the source
C. To share personal information with all online sellers
D. To ignore reviews and trust all online transactions
154. What is one of the dangers of oversharing personal information on social media? A. It can
make you vulnerable to identity theft and online scams
B. It can help you gain more followers quickly
C. It increases your online influence
D. It allows you to connect with more people easily

Page 99 of 123
LEO SERIES 100
155. What is the main purpose of digital literacy in today’s world? A. To equip individuals with
the skills needed to effectively use technology and the internet
B. To avoid using any digital tools
C. To limit access to technology
D. To ensure only a select few use digital technologies
156. What is one way to ensure that you are acting ethically when creating online content? A.
Give credit to others’ work and follow copyright laws
B. Use others’ content without permission
C. Plagiarize and present it as your own work
D. Ignore others’ intellectual property rights
157. What is an appropriate response if you come across someone engaging in cyberbullying? A.
Report the behavior to the appropriate authorities or platform moderators
B. Encourage others to join in the bullying
C. Ignore it and avoid getting involved
D. Engage in the bullying to defend the victim
158. Why should you be cautious about what you post online? A. Because online content can
remain public forever and affect your reputation
B. Because it will increase your popularity
C. Because it will boost your social media following
D. Because it’s easy to delete everything later
159. What is the digital responsibility of parents when it comes to their children’s online behavior?
A. To monitor and guide their children’s use of digital tools and content
B. To let children use technology without supervision
C. To allow children to use technology without restrictions
D. To encourage children to ignore online safety
160. How can you ensure that you are practicing good online etiquette? A. By treating others with
respect, using proper language, and avoiding offensive content
B. By ignoring the rules and behaving however you want
C. By only posting about yourself
D. By ignoring the impact of your online behavior
161. What is one way to protect your children from inappropriate online content? A. Use parental
controls and monitor their online activity
B. Allow children to access any content they want without supervision
C. Teach children to use technology without any restrictions
D. Disable all security software to improve internet speed
162. How can you report inappropriate content online? A. By using the "Report" feature on the
platform or website
B. By sharing the content with others
C. By ignoring the content and continuing to browse
D. By downloading the content to store for later
163. What should you do if you accidentally share incorrect information online? A. Correct the
mistake and provide accurate information
B. Leave the post as it is and ignore the error
C. Delete the post and hope no one notices
D. Defend the incorrect information and argue with others
164. Why is it important to be aware of the digital footprint you leave behind? A. Because it can
affect your reputation and opportunities in the future
B. Because it helps you gain more followers
C. Because it has no impact on your future
D. Because it allows you to control all online content
165. Which of the following is an example of good digital citizenship? A. Using social media to
promote positivity and support others
B. Engaging in harmful behavior like trolling or spreading negativity

Page 100 of 123


LEO SERIES 101
C. Sharing personal details without consent
D. Ignoring others’ opinions and posting disrespectful content
166. What should you do if you receive a message from someone you don’t know asking for
personal information? A. Do not share any information and report the message to the platform
B. Respond immediately and share your personal details
C. Ignore the message and do nothing
D. Share the message with all your friends
167. What is the role of digital ethics in online communities? A. To promote responsible behavior
and ensure the well-being of all members
B. To allow members to engage in any behavior, regardless of its impact
C. To ignore ethical guidelines and focus on personal interests
D. To encourage harmful actions and content
168. What is an example of an ethical dilemma in digital environments? A. Deciding whether to
share someone’s personal content without permission
B. Choosing whether to ignore an online argument
C. Deciding to follow someone’s social media account
D. Choosing to watch a viral video without commenting
169. Why should you use strong, unique passwords for your online accounts? A. To protect your
personal information and reduce the risk of hacking
B. To make it easier to remember your passwords
C. To share your account access with others
D. To increase the chances of forgetting your passwords
170. How can you protect your digital reputation? A. By carefully considering what you post and
sharing positive content
B. By posting controversial or offensive content to get attention
C. By ignoring privacy settings on all your social media accounts
D. By sharing every detail of your life online
171. Why is it important to respect others’ digital property? A. To ensure that creators’ rights are
respected and intellectual property laws are followed
B. To share others' content for personal gain
C. To take credit for someone else’s work
D. To ignore digital copyright laws
172. What is an appropriate way to respond if someone disagrees with your online post? A.
Respond with respect and consider the other person’s perspective
B. Immediately argue and insult the person
C. Ignore their comments and delete the post
D. Report the person for disagreeing with you
173. What can happen if you post inappropriate or offensive content online? A. It can damage
your reputation and harm others
B. It will increase your followers and popularity
C. It will be ignored by everyone
D. It will automatically be deleted by the platform
174. What is digital inclusion? A. Ensuring that all individuals, regardless of background, have
access to digital technologies
B. Limiting access to technology to a select few
C. Encouraging the use of only specific types of technology
D. Blocking certain people from using the internet
175. How can you avoid online scams? A. Be cautious of suspicious emails or websites that ask
for personal information
B. Share your personal information freely online
C. Click on all links in unsolicited emails
D. Ignore warnings about potential online threats

Page 101 of 123


LEO SERIES 102
176. What is the impact of spreading fake news or misinformation online? A. It can cause
confusion, harm, and damage to individuals or groups
B. It helps to spread awareness and truth
C. It is harmless and won’t affect anyone
D. It encourages healthy discussions and debates
177. Why is it essential to update your online privacy settings regularly? A. To ensure your
personal information is protected and controlled
B. To make your information accessible to everyone
C. To share your details with as many people as possible
D. To prevent your online presence from being noticed
178. How can you make your online activities more secure? A. Use secure websites, enable two-
factor authentication, and avoid sharing passwords
B. Share your passwords with others to help them
C. Ignore security warnings and access any website
D. Disable security software to improve device speed
179. What should you do if you experience cyberbullying? A. Report it to the appropriate
authorities and block the person responsible
B. Engage in the bullying to defend yourself
C. Ignore it and let the situation worsen
D. Spread the bullying to others
180. How can you contribute to creating a positive online environment? A. By sharing helpful,
respectful, and supportive content
B. By spreading negativity and offensive content
C. By ignoring others’ feelings and opinions
D. By engaging in online arguments
181. What is one way to help prevent digital addiction? A. Set boundaries for screen time and take
regular breaks
B. Use digital devices for excessive hours without taking breaks
C. Ignore the negative effects of excessive screen time
D. Keep devices on at all times and avoid social interactions
182. What does it mean to be mindful of your digital impact? A. Considering how your actions
and content affect others online
B. Ignoring the impact of your actions on others
C. Sharing as much personal information as possible
D. Posting content without thinking about the consequences
183. Why is it important to read the terms and conditions of online services? A. To understand the
rights and responsibilities you have when using the service
B. To quickly accept the terms and start using the service
C. To ignore any policies that seem inconvenient
D. To avoid reading them and skip to the next step
184. What is one potential risk of oversharing on social media? A. Exposure to identity theft or
online predators
B. Gaining more friends and followers
C. Increasing your popularity online
D. Getting more likes and comments
185. Why should you check your online privacy settings regularly? A. To ensure that your
personal information is secure and only visible to those you trust
B. To make sure everyone can access your information
C. To disable all security features
D. To share all your data with any website
186. What is the best way to handle an online argument? A. Remain calm, respectful, and avoid
escalating the situation
B. Insult the other person and continue the argument

Page 102 of 123


LEO SERIES 103
C. Ignore the other person completely
D. Start another argument with someone else
187. How can you protect yourself from cyberstalking? A. Set strong privacy settings, avoid
sharing personal information, and block suspicious users
B. Share all your details with anyone who asks online
C. Ignore privacy settings and keep your information public
D. Engage with the stalker and provide them with your personal details
188. What is the role of empathy in online interactions? A. To understand others' perspectives and
communicate respectfully
B. To ignore others' feelings and only focus on your own needs
C. To spread negative emotions and harm others
D. To use online platforms for personal gain without caring about others
189. What is the digital footprint? A. The trail of data you leave behind when using the internet
B. The number of devices you use daily
C. The number of friends you have on social media
D. The speed of your internet connection
190. How can you protect your children from harmful online content? A. Use parental controls
and limit access to age-appropriate websites
B. Let children browse the internet freely without restrictions
C. Allow them to view all types of content without supervision
D. Disable any privacy settings on their accounts
191. Why should you avoid clicking on suspicious links or attachments? A. They may contain
malware or phishing attempts to steal your information
B. They might lead to new websites that are interesting
C. They can increase your internet speed
D. They will help you get discounts on online products
192. What is one way to handle digital conflict responsibly? A. Address the situation calmly, with
respect, and seek a solution
B. Ignore the issue and hope it resolves itself
C. Escalate the conflict by insulting others
D. Block everyone involved and avoid the situation
193. How does digital inclusion benefit society? A. It ensures that everyone, regardless of
background, has access to digital tools and opportunities
B. It limits access to technology to only a few
C. It focuses on advanced technology only for a select group
D. It promotes the idea that only the wealthy should have access to technology
194. What does “netiquette” refer to? A. The set of rules and guidelines for respectful and
responsible behavior online
B. A new type of internet device
C. A form of online gaming etiquette
D. The speed of internet connections
195. What is the role of digital ethics in content creation? A. To ensure creators respect others'
work and follow ethical guidelines
B. To promote unethical behavior and disregard others’ rights
C. To plagiarize and present others’ work as your own
D. To create content with the sole intention of gaining popularity
196. What should you do if you receive an unsolicited email asking for personal information? A.
Do not respond and report the email as phishing
B. Reply immediately and provide your details
C. Ignore it and continue with your activities
D. Forward it to your friends
197. Why is it important to support others in online communities? A. To build a positive,
respectful, and collaborative environment

Page 103 of 123


LEO SERIES 104
B. To ignore others’ contributions and focus on your own content
C. To criticize others openly without reason
D. To discourage interaction and participation
198. How can you avoid falling victim to online scams? A. Be cautious of offers that seem too
good to be true and verify the legitimacy of websites
B. Trust every unsolicited email or message
C. Ignore warnings from security software
D. Click on every link in unknown emails
199. What is the role of digital security in protecting your personal information? A. It helps
safeguard your data and prevent unauthorized access
B. It has no impact on your privacy
C. It is only relevant to large corporations
D. It encourages hackers to target your information
200. What should you do if you encounter hate speech online? A. Report it to the platform and
avoid engaging with the content
B. Share it with others to spread awareness
C. Engage in the hate speech and argue with the person
D. Ignore it and continue browsing
ANSWERS TO OBJECTIVE TEST

Strand 6: Emerging Technologies - Questions


1. What is artificial intelligence (AI)?
A. A type of cloud storage
B. A form of manual computation
C. Machines mimicking human intelligence
D. A method of internet connection
2. What is the primary function of virtual reality (VR)?
A. To store data
B. To create immersive simulated environments
C. To enhance internet speeds
D. To write computer programs
3. Which technology is used to record transactions in cryptocurrency?
A. Blockchain
B. Wi-Fi
C. Virtual Reality
D. Cloud Storage
4. What is the Internet of Things (IoT)?
A. Devices connected via the internet to collect and exchange data
B. A type of search engine
C. A new internet browser
D. Manual tools used for computations
5. What is the goal of machine learning?
A. Programming robots to walk
B. Enabling computers to learn and improve without explicit programming
C. Increasing the size of computer memory
D. Building databases for research purposes
6. What is augmented reality (AR)?
A. A tool for designing computer software
B. A technology that overlays virtual objects in the real world

Page 104 of 123


LEO SERIES 105
C. A method of internet security
D. A system for cloud storage
7. Which of the following is an example of a wearable technology?
A. Smartphone
B. Smartwatch
C. Desktop computer
D. Virtual reality headset
8. What is a drone commonly used for in modern technology?
A. Sending emails
B. Aerial photography and delivery services
C. Making video calls
D. Processing financial transactions
9. Which emerging technology is related to genetic modification?
A. Robotics
B. CRISPR
C. IoT
D. Cloud computing
10. What does "3D printing" refer to?
A. Printing 3-dimensional designs on paper
B. Creating physical objects layer by layer from digital designs
C. Designing virtual objects in VR
D. Printing secure documents
11. Which technology aims to mimic human decision-making?
A. Augmented reality
B. Artificial intelligence
C. Internet of Things
D. Cloud storage
12. Which of these technologies helps autonomous vehicles navigate?
A. Machine learning
B. Blockchain
C. Augmented reality
D. Wi-Fi
13. Which device is an example of a smart home appliance?
A. Microwave oven
B. Smart thermostat
C. Gas stove
D. Electric heater
14. What does the term "cloud computing" refer to?
A. Weather prediction systems
B. Storage and access of data over the internet
C. Manual calculation methods
D. Computer programming
15. What is the purpose of blockchain technology?
A. To store files in the cloud
B. To securely record and verify digital transactions
C. To speed up internet connectivity
D. To create 3D graphics
16. Which of these technologies enhances remote collaboration?
A. Virtual reality
B. Blockchain
C. CRISPR
D. IoT

Page 105 of 123


LEO SERIES 106
17. Which emerging technology is crucial for personalized medicine?
A. Blockchain
B. Machine learning
C. Drones
D. Augmented reality
18. Which of the following best describes a "robot"?
A. A device used for internet access
B. A programmable machine capable of carrying out tasks
C. A technology for editing genes
D. A wearable computer
19. What is the significance of autonomous vehicles?
A. They use IoT to operate homes remotely
B. They drive without human intervention using advanced technology
C. They are vehicles powered by blockchain
D. They provide internet to remote areas
20. Which of these technologies is related to immersive gaming?
A. Blockchain
B. Virtual reality
C. Cloud storage
D. IoT

21. What is the role of quantum computing?


A. Simplifying basic arithmetic
B. Solving complex computations at incredible speeds
C. Connecting devices in a smart home
D. Enhancing video graphics
22. Which of these is a feature of smart agriculture technologies?
A. Manual crop planting
B. IoT-enabled devices monitoring soil and crop conditions
C. Human-powered irrigation
D. Virtual meetings for farmers
23. What is the primary purpose of chatbots?
A. Organizing online documents
B. Automating customer interactions using AI
C. Enhancing internet speeds
D. Controlling smart devices remotely
24. Which technology involves creating detailed models of organs for surgery planning?
A. Augmented reality
B. 3D printing
C. Blockchain
D. Quantum computing
25. What is the primary use of facial recognition technology?
A. Recording financial transactions
B. Identifying and verifying individuals using biometric data
C. Designing 3D graphics
D. Navigating virtual environments
26. What is an example of AI in education?
A. Robots teaching in classrooms
B. Personalized learning platforms powered by AI algorithms
C. Students using calculators
D. Cloud storage for school data
27. What makes autonomous drones unique?
A. They require human pilots to operate

Page 106 of 123


LEO SERIES 107
B. They can fly and complete tasks without human input
C. They are used only in military applications
D. They rely solely on augmented reality
28. Which of the following best defines a "smart city"?
A. A city with many schools
B. A city using advanced technologies like IoT for efficient management
C. A city with autonomous drones delivering packages
D. A city focused on agriculture
29. What is the goal of wearable health technology?
A. To replace traditional hospitals
B. To monitor and improve personal health through devices like fitness trackers
C. To connect smart home devices
D. To enhance mobile gaming
30. Which of the following technologies is a key driver of autonomous vehicles?
A. Blockchain
B. Machine learning
C. Cloud computing
D. Augmented reality
31. What is the significance of 5G technology?
A. It enables faster internet speeds and real-time connectivity
B. It enhances the quality of 3D printing
C. It is used for navigating vehicles
D. It supports manual crop monitoring
32. What is an example of augmented reality in healthcare?
A. Diagnosing diseases through data analysis
B. Training surgeons using AR to simulate surgeries
C. Storing patient data on cloud servers
D. Organizing virtual meetings for doctors
33. What is the main purpose of blockchain in supply chain management?
A. Recording and tracking product information securely and transparently
B. Monitoring financial budgets for companies
C. Generating 3D models for products
D. Simulating supply chain models
34. Which of these technologies can help predict natural disasters?
A. Blockchain
B. Quantum computing
C. AI-driven analytics
D. Virtual reality
35. What is a major challenge of IoT technology?
A. Lack of connectivity
B. Privacy and security concerns due to interconnected devices
C. Difficulty in programming
D. High internet speeds
36. What is the significance of edge computing in IoT?
A. It slows down data processing
B. It processes data close to the source for faster and more efficient performance
C. It supports manual device management
D. It prevents connectivity to the internet
37. What does AI-based "speech recognition" enable?
A. Typing documents faster
B. Converting spoken words into text or commands for digital systems
C. Improving email performance
D. Creating virtual reality games

Page 107 of 123


LEO SERIES 108
38. What is the purpose of a digital twin?
A. To create a virtual replica of a physical object or system
B. To enhance cloud computing efficiency
C. To replace manual data entry
D. To monitor the internet of things
39. Which of these is an example of collaborative robots (cobots)?
A. Robots working independently in factories
B. Robots designed to assist and collaborate with humans in tasks
C. Robots storing data in the cloud
D. Robots delivering online packages
40. Which of the following is a risk associated with emerging technologies?
A. Enhanced productivity
B. Data privacy issues and ethical concerns
C. Increased efficiency in supply chains
D. Faster internet speeds

41. What is the primary function of smart grids in energy systems?


A. Enhancing video streaming quality
B. Distributing electricity efficiently with real-time monitoring and control
C. Replacing manual electricity meters
D. Storing energy in blockchain
42. What does "robotics" primarily involve?
A. Building and programming automated machines to perform specific tasks
B. Enhancing cloud-based services
C. Connecting devices to the internet
D. Monitoring natural disasters
43. Which of these best describes the function of biometric authentication?
A. Using passwords to log into devices
B. Identifying users based on physical characteristics like fingerprints
C. Creating augmented reality simulations
D. Programming AI models
44. What is a potential application of quantum computing in healthcare?
A. Managing electronic medical records
B. Modeling and solving complex biological problems, such as protein folding
C. Designing augmented reality headsets
D. Analyzing weather data
45. Which of the following best explains cloud robotics?
A. Robots operating entirely offline
B. Robots relying on cloud computing for processing and data storage
C. Robots designed to enhance agriculture
D. Robots used only in education
46. What is a major advantage of additive manufacturing (3D printing)?
A. Speeding up internet connections
B. Reducing material waste by creating objects layer by layer
C. Enhancing video game graphics
D. Automating supply chain processes
47. Which of the following technologies can be used to enhance data privacy?
A. Blockchain
B. Virtual reality
C. IoT
D. 5G technology
48. What is an example of a renewable energy technology supported by emerging tech?
A. Wind turbines connected to IoT sensors for monitoring performance

Page 108 of 123


LEO SERIES 109
B. Gas-powered generators
C. Manual water pumps
D. Fossil fuel-powered systems
49. What is a limitation of virtual reality?
A. It improves real-world navigation
B. High costs and technical complexity
C. It replaces machine learning
D. It reduces 3D modeling efficiency
50. What does the term "big data" refer to?
A. Small datasets used in research
B. Extremely large datasets that require advanced tools for analysis and processing
C. Large cloud servers used for gaming
D. Data stored in personal devices

51. What is the main purpose of AI-powered personal assistants like Siri and Alexa?
A. To store data securely
B. To provide voice-activated assistance for tasks and information retrieval
C. To enhance gaming experiences
D. To develop mobile apps
52. What is the role of blockchain in cryptocurrency?
A. Storing personal information
B. Securing and recording digital transactions transparently
C. Designing digital marketing strategies
D. Automating agricultural processes
53. Which of these is an example of predictive analytics?
A. Recommending movies on a streaming platform based on viewing history
B. Building autonomous robots
C. Designing 3D-printed models
D. Enhancing video conferencing systems
54. What is an exoskeleton in robotics used for?
A. Increasing the capacity of IoT networks
B. Assisting humans with enhanced strength and mobility in physical tasks
C. Improving smart home connectivity
D. Automating drone operations
55. Which of the following best explains virtual reality (VR)?
A. It replaces computers with holograms
B. It immerses users in a computer-generated environment using headsets and sensors
C. It speeds up data processing in the cloud
D. It improves biometric recognition
56. How does machine learning differ from traditional programming?
A. It uses pre-defined instructions only
B. It learns patterns from data to improve decision-making without explicit programming
C. It solely focuses on database management
D. It is restricted to financial systems
57. What is the purpose of drones in disaster response?
A. Enhancing smart home devices
B. Delivering supplies and surveying affected areas quickly and efficiently
C. Reducing internet lag in rural areas
D. Monitoring school attendance
58. What is a significant feature of smart home devices?
A. They work without internet connectivity
B. They enable automated and remote control of appliances via IoT

Page 109 of 123


LEO SERIES 110
C. They store data in local servers only
D. They are designed for educational institutions
59. What does "cyber-physical systems" refer to?
A. Systems where physical processes are monitored and controlled using computing and networking
B. Manual control of physical devices
C. Enhancing digital marketing tools
D. Designing virtual gaming systems
60. What is a potential risk of 5G technology?
A. Limited connectivity speeds
B. Security vulnerabilities due to its broad network scope
C. Inefficiency in rural areas
D. Reduced capability for smart devices
61. Which of these is a significant application of AI in agriculture?
A. Manual crop planting
B. Using drones for soil analysis and automated irrigation systems
C. Removing AI-powered sensors
D. Monitoring weather manually
62. What makes autonomous robots unique?
A. They depend entirely on human commands
B. They perform tasks without continuous human intervention
C. They work only in factories
D. They require cloud computing for all tasks
63. What is a challenge faced by facial recognition technology?
A. Improved accuracy over time
B. Ethical concerns and potential misuse
C. Limited application in security systems
D. Reduced biometric data analysis
64. What is the role of AI in fraud detection?
A. Enhancing marketing campaigns
B. Analyzing large datasets to identify unusual patterns in transactions
C. Improving the design of IoT systems
D. Organizing files on cloud servers
65. What is the significance of a hologram in communication?
A. It enhances traditional text messaging
B. It creates three-dimensional visual representations for interactive communication
C. It supports only audio communication
D. It simplifies financial transactions
66. Which of the following is an application of robotics in healthcare?
A. Manual surgery
B. Automated robotic-assisted surgeries for precision and minimal invasiveness
C. Cloud data management
D. Improving smart cities
67. How does quantum cryptography enhance security?
A. By using complex passwords for encryption
B. By enabling unbreakable encryption based on quantum mechanics principles
C. By securing physical data centers
D. By automating security systems
68. Which of the following is a concern with AI-powered decision-making?
A. Enhancing efficiency
B. Bias and lack of transparency in algorithms
C. Improving user interfaces
D. Enhancing 3D printing

Page 110 of 123


LEO SERIES 111
69. What is the purpose of digital health wearables?
A. To replace traditional hospitals
B. To monitor personal health metrics and provide real-time feedback
C. To control smart home devices
D. To reduce internet speeds
70. What is the function of IoT in environmental conservation?
A. Automating office workflows
B. Monitoring natural resources and wildlife through connected sensors
C. Enhancing augmented reality tools
D. Recording digital payments

71. What does "edge computing" primarily focus on?


A. Centralizing data in large cloud servers
B. Processing data closer to the source of its generation to reduce latency
C. Enhancing video game graphics
D. Creating AI algorithms
72. Which of these is a common feature of a smart city?
A. Manual streetlights
B. Connected infrastructure like smart traffic systems and waste management
C. Local-only water pumping systems
D. Non-digital emergency response
73. What is one role of augmented reality (AR) in education?
A. Replacing textbooks
B. Enhancing learning experiences by overlaying digital objects on the real world
C. Slowing down classroom activities
D. Preventing digital innovation in schools
74. What is the Internet of Things (IoT)?
A. Connecting devices to the internet for data sharing and automation
B. Managing social media campaigns
C. Programming robots
D. Designing websites
75. How does 3D bioprinting benefit the medical field?
A. By building computer models
B. By creating artificial organs and tissues for transplantation and research
C. By replacing X-rays in diagnosis
D. By improving health records
76. What is the primary goal of autonomous vehicles?
A. To reduce internet traffic
B. To transport passengers and goods with minimal or no human input
C. To automate household tasks
D. To monitor highway construction
77. What is a key challenge of blockchain technology?
A. Lack of transparency
B. High energy consumption in certain implementations
C. Inability to record transactions
D. Reduced network speed
78. Which industry commonly uses drones for delivery purposes?
A. Healthcare
B. Retail and logistics
C. Entertainment
D. Education
79. What is the main objective of wearable health tech?
A. Enhancing internet connectivity

Page 111 of 123


LEO SERIES 112
B. Monitoring and improving users' physical well-being in real-time
C. Automating medical reports
D. Preventing the use of other digital tools
80. What is the function of natural language processing (NLP) in AI?
A. Managing emails
B. Enabling machines to understand, interpret, and generate human language
C. Designing 3D animations
D. Automating drones

Would you like me to continue with the next set of questions up to 200?

Strand 6: Emerging Technologies - Questions (continued)

81. What is the role of digital twins in manufacturing?


A. Creating physical copies of data
B. Simulating real-world processes in a virtual environment for optimization and monitoring
C. Enhancing manual quality checks
D. Managing robotics programming
82. Which of these best describes the function of a chatbot?
A. A software program designed to simulate human conversation and provide support
B. A device for creating visual presentations
C. An AI model that improves satellite imagery
D. A gaming application for virtual environments
83. What is an important feature of wearable fitness trackers?
A. Playing games
B. Tracking physical activities like steps and heart rate
C. Improving social media feeds
D. Enhancing virtual reality games
84. What is the purpose of a neural network in AI?
A. Managing cloud storage
B. Mimicking the structure and function of the human brain to recognize patterns and solve problems
C. Enhancing video quality
D. Developing IoT devices
85. Which of these is a potential risk of IoT devices?
A. Increased energy efficiency
B. Vulnerability to hacking due to interconnected networks
C. Improved automation processes
D. Limited application in agriculture
86. What is a defining feature of blockchain technology?
A. Centralized data management
B. A decentralized ledger that records transactions securely and transparently
C. Cloud-based transaction processing
D. Restricted data-sharing capabilities
87. What is the role of deep learning in AI?
A. Enhancing online shopping platforms
B. Using large neural networks to analyze complex patterns and make predictions
C. Simplifying robotics design
D. Managing natural resources
88. What makes autonomous drones useful in disaster response?
A. They require constant human intervention
B. They provide real-time surveillance and aid delivery in inaccessible areas

Page 112 of 123


LEO SERIES 113
C. They are restricted to entertainment purposes
D. They reduce the need for telecommunications
89. Which of these is a key advantage of virtual assistants like Google Assistant?
A. Reducing internet speed
B. Automating voice-based tasks like reminders and searches
C. Increasing video quality
D. Monitoring health conditions
90. What is an example of AI's application in transportation?
A. Manual vehicle control
B. Optimizing traffic flow through intelligent transportation systems
C. Managing flight bookings manually
D. Designing clothing materials
91. How do collaborative robots (cobots) differ from traditional robots?
A. Cobots work independently in isolated spaces
B. Cobots are designed to work alongside humans in shared environments
C. Cobots have no AI integration
D. Cobots are only used in schools
92. What is the purpose of edge AI?
A. Running AI algorithms directly on local devices without relying on cloud processing
B. Storing data in a single server
C. Improving classroom management systems
D. Reducing the scope of robotics
93. What is a significant application of AR in retail?
A. Managing physical store inventory
B. Allowing customers to try on products virtually before purchasing
C. Simplifying checkout processes
D. Enhancing non-digital advertisements
94. Which of the following is a use of predictive maintenance in industrial settings?
A. Reacting to machine breakdowns only after they occur
B. Using sensors and data analytics to predict and prevent equipment failures
C. Reducing cloud computing reliance
D. Improving drone design
95. What is the role of AI in healthcare diagnosis?
A. Replacing doctors entirely
B. Assisting in early detection of diseases using pattern recognition
C. Limiting hospital data sharing
D. Automating fitness programs
96. Which of the following is an example of a biometric authentication method?
A. Email and password login
B. Facial recognition to unlock devices
C. Entering a numerical PIN
D. Using a USB stick
97. What is the primary function of quantum computing in cryptography?
A. Creating slower encryption algorithms
B. Solving encryption challenges faster using quantum mechanics principles
C. Limiting secure transactions
D. Automating supply chain management
98. How does IoT improve energy efficiency?
A. By disconnecting devices from networks
B. By enabling smart devices to optimize energy consumption based on usage patterns
C. By relying solely on manual adjustments
D. By reducing renewable energy use

Page 113 of 123


LEO SERIES 114
99. What is an example of AI's role in fraud prevention?
A. Enhancing marketing designs
B. Detecting unusual transaction patterns in financial systems
C. Storing passwords securely
D. Optimizing user interfaces
100. Which of the following technologies enables real-time translation in global communication?
A. Blockchain
B. Natural language processing (NLP)
C. IoT devices
D. Augmented reality

101. What is the primary focus of smart agriculture?


A. Using manual farming techniques
B. Leveraging IoT devices and AI to optimize farming processes
C. Reducing technology use in rural areas
D. Automating animal care systems
102. Which of the following is an application of robotics in healthcare?
A. Automating text messages
B. Assisting in surgeries and physical therapy
C. Replacing medical professionals completely
D. Managing hospital billing
103. What is the key feature of AI-powered recommendation systems?
A. Automating social media creation
B. Suggesting personalized content or products based on user behavior
C. Limiting online shopping options
D. Replacing customer service agents
104. How does machine learning contribute to autonomous driving?
A. By designing vehicle exteriors
B. By analyzing vast amounts of data to improve decision-making and navigation
C. By limiting driver assistance
D. By automating roadside construction
105. What is the purpose of wearable health sensors?
A. Measuring internet speeds
B. Monitoring body metrics like heart rate and oxygen levels in real-time
C. Creating medical reports manually
D. Enhancing sports performance
106. Which of these describes the role of augmented reality (AR) in tourism?
A. Reducing the need for maps
B. Providing virtual tours and enhancing visitor experiences
C. Limiting interactive guides
D. Managing transportation systems
107. What is the main advantage of cloud computing for businesses?
A. Increasing local storage requirements
B. Providing scalable, cost-efficient access to computing resources
C. Limiting network bandwidth
D. Managing physical inventory
108. What is one key application of blockchain in the financial sector?
A. Slowing down transaction speeds
B. Ensuring secure and transparent financial transactions through decentralized ledgers
C. Replacing traditional banks entirely
D. Automating credit score calculation
109. How do 5G networks enhance emerging technologies?
A. By increasing video buffering times

Page 114 of 123


LEO SERIES 115
B. By providing faster, more reliable connectivity for devices and systems
C. By limiting IoT applications
D. By reducing smart city development
110. What is the purpose of virtual reality (VR) in training simulations?
A. Automating e-learning modules
B. Providing immersive, hands-on experiences for better skill development
C. Reducing the need for internet in training
D. Simplifying exam systems
111. Which of these is an example of a wearable IoT device?
A. A wireless router
B. A smartwatch with fitness tracking
C. A manual thermometer
D. A traditional radio
112. What is the potential risk associated with using AI in decision-making?
A. Automating repetitive tasks
B. Introducing bias due to improper training data
C. Enhancing human oversight
D. Speeding up processes
113. What is the role of drones in environmental monitoring?
A. Reducing data accuracy
B. Capturing aerial data for research on deforestation, pollution, and wildlife
C. Automating commercial aircraft maintenance
D. Designing climate models
114. How does IoT improve home automation?
A. By limiting device connectivity
B. By allowing remote control and automation of appliances and systems
C. By replacing home security entirely
D. By disconnecting older devices
115. Which of the following is a key characteristic of big data analytics?
A. Processing small datasets
B. Analyzing large volumes of diverse data to uncover trends and insights
C. Reducing digital storage
D. Limiting machine learning applications
116. What is the purpose of collaborative AI in teamwork?
A. Preventing group productivity
B. Facilitating better collaboration through tools like shared workspaces and task automation
C. Reducing digital communication
D. Simplifying video conferencing
117. What is the function of a digital assistant in smart homes?
A. Automating manual gardening tasks
B. Controlling devices and managing daily tasks through voice commands
C. Replacing Wi-Fi routers
D. Creating virtual maps
118. What is the significance of a decentralized network in blockchain?
A. Centralizing decision-making processes
B. Ensuring security and transparency through distributed control
C. Slowing down computing speeds
D. Reducing global data access
119. How does AI contribute to predictive analytics?
A. By making random predictions without data
B. By analyzing past trends to forecast future outcomes
C. By limiting real-time processing
D. By disconnecting from data systems

Page 115 of 123


LEO SERIES 116
120. What is an example of AR's use in construction?
A. Limiting architectural designs
B. Visualizing blueprints and structures in 3D during planning stages
C. Slowing down material procurement
D. Replacing traditional engineering software

121. What is the role of smart grids in energy management?


A. Distributing energy manually
B. Monitoring and optimizing energy distribution using IoT and AI
C. Reducing renewable energy adoption
D. Simplifying home billing
122. What is a significant application of AI in education?
A. Replacing teachers entirely
B. Providing personalized learning experiences and automating administrative tasks
C. Limiting classroom collaboration
D. Removing online learning tools
123. How does blockchain support supply chain management?
A. Creating multiple physical databases
B. Enhancing transparency and traceability of goods through decentralized records
C. Slowing down logistics
D. Limiting transportation analytics
124. Which of these is an example of autonomous robotics in agriculture?
A. Manual irrigation control
B. Drones planting seeds and spraying fertilizers
C. Replacing weather monitoring systems
D. Improving traditional storage systems
125. What is an essential function of AI in fraud detection?
A. Automating financial marketing campaigns
B. Identifying unusual patterns in transactions to prevent fraud
C. Slowing down customer support systems
D. Removing transaction monitoring
126. How does edge computing benefit IoT devices?
A. By reducing device connectivity
B. By processing data locally to reduce latency and bandwidth usage
C. By limiting sensor performance
D. By centralizing all processing tasks
127. What is a notable application of AR in healthcare?
A. Limiting access to patient information
B. Providing augmented visuals for surgical procedures and medical training
C. Replacing traditional diagnostic tools
D. Reducing interactive learning
128. How do renewable energy technologies like solar panels benefit the environment?
A. By increasing carbon emissions
B. By reducing reliance on fossil fuels and lowering greenhouse gas emissions
C. By limiting energy access
D. By slowing down industrial productivity
129. What is the primary use of chatbots in customer service?
A. Automating voice-based interactions
B. Answering customer inquiries and solving problems efficiently
C. Limiting user engagement
D. Replacing mobile apps
130. Which of these technologies can be used for remote surgeries?
A. Drones

Page 116 of 123


LEO SERIES 117
B. Robotics combined with real-time communication technologies
C. Virtual reality headsets only
D. Cloud storage services
131. How does AI support natural disaster prediction?
A. By eliminating environmental data
B. By analyzing environmental data to predict disasters like earthquakes and hurricanes
C. By reducing monitoring networks
D. By increasing data storage limits
132. What is a defining characteristic of a smart city?
A. High manual dependency
B. Integration of IoT, AI, and data analytics for efficient urban management
C. Eliminating digital communication systems
D. Enhancing rural development
133. How does facial recognition technology work?
A. By storing textual data
B. By analyzing and matching facial features in real-time
C. By reducing camera functionality
D. By automating fingerprint scanners
134. What is the role of 3D printing in manufacturing?
A. Slowing down product development
B. Creating physical objects layer by layer from digital designs
C. Reducing industrial customization
D. Limiting prototyping capabilities
135. Which of these is an example of AI in entertainment?
A. Replacing online music platforms
B. Recommending personalized movies and songs based on user preferences
C. Limiting game development
D. Automating video conferencing
136. What is the role of voice recognition in digital assistants?
A. Identifying data patterns manually
B. Interpreting spoken commands to perform tasks
C. Reducing accessibility in apps
D. Enhancing text editing systems
137. How does blockchain prevent tampering with data?
A. By limiting access to nodes
B. By storing records in a secure, immutable decentralized ledger
C. By centralizing all transactions
D. By disconnecting physical systems
138. What is a common use of AI in healthcare research?
A. Slowing down genetic analysis
B. Analyzing medical data to identify trends and develop treatments
C. Limiting pharmaceutical testing
D. Automating hospital cleaning
139. What is the function of smart thermostats in home automation?
A. Managing home finances
B. Adjusting indoor temperatures automatically based on user preferences and schedules
C. Replacing traditional air conditioners
D. Limiting energy conservation
140. Which of these is a feature of self-driving cars?
A. Reducing AI integration
B. Using sensors and AI to navigate without human intervention
C. Replacing manual steering systems only
D. Slowing down traffic systems

Page 117 of 123


LEO SERIES 118
141. What is the benefit of using AI in predictive maintenance?
A. Reducing the need for maintenance tracking
B. Identifying potential equipment failures before they occur
C. Limiting operational efficiency
D. Replacing manual tools
142. How does IoT enable smart healthcare systems?
A. By creating offline medical tools
B. By enabling real-time health monitoring and device connectivity
C. By reducing patient engagement
D. By replacing hospital networks
143. What is the significance of renewable energy storage systems like batteries?
A. Limiting solar panel efficiency
B. Storing surplus energy for later use and increasing energy reliability
C. Reducing energy conservation
D. Replacing electrical grids
144. Which of the following technologies enhances immersive experiences in gaming?
A. IoT sensors
B. Virtual Reality (VR) headsets
C. Blockchain systems
D. Cloud computing tools
145. What is the purpose of AI chatbots in education?
A. Replacing traditional teaching
B. Assisting students with personalized learning and answering questions
C. Reducing engagement in online classes
D. Limiting research tools
146. How do drones support disaster relief efforts?
A. Delivering slow manual services
B. Providing aerial surveys, delivering supplies, and aiding rescue operations
C. Limiting access to disaster zones
D. Replacing telecommunication networks
147. What is a major application of AI in the retail industry?
A. Slowing customer checkout
B. Providing personalized product recommendations and optimizing inventory
C. Reducing e-commerce options
D. Limiting data analytics
148. What is the significance of biometric authentication in digital security?
A. Storing textual passwords
B. Using unique physical characteristics for secure access
C. Limiting encryption systems
D. Enhancing data breaches
149. How does AI improve content moderation on social media platforms?
A. Slowing user-generated content reviews
B. Identifying and removing inappropriate content efficiently
C. Replacing user accounts
D. Limiting post visibility
150. What is the role of IoT in agriculture?
A. Disconnecting sensors from soil monitoring
B. Enabling smart irrigation, soil analysis, and crop health monitoring
C. Reducing automation in farming practices
D. Limiting drone applications
151. How does blockchain enhance cybersecurity?
A. By automating firewalls
B. By providing a tamper-proof and decentralized system for data storage

Page 118 of 123


LEO SERIES 119
C. By eliminating encryption systems
D. By slowing down network access
152. What is an application of wearable technology in fitness?
A. Slowing exercise routines
B. Tracking physical activity and health metrics in real-time
C. Limiting user interaction with fitness apps
D. Replacing gym equipment
153. How does 5G technology benefit autonomous systems?
A. Slowing device response times
B. Enabling faster communication and improving real-time decision-making
C. Disconnecting smart devices
D. Reducing network coverage
154. What is the role of AI in personalized marketing?
A. Replacing customer databases
B. Delivering tailored advertisements and offers based on user behavior
C. Slowing market trends
D. Enhancing anonymous browsing
155. How does cloud computing support collaborative projects?
A. By limiting shared access to files
B. By allowing teams to store and access data simultaneously from any location
C. By reducing productivity tools
D. By disconnecting real-time synchronization
156. Which of the following technologies uses a distributed ledger?
A. Blockchain
B. Virtual reality
C. IoT sensors
D. Smart grids
157. What is a common use of big data in healthcare?
A. Reducing patient history analysis
B. Analyzing vast amounts of data to improve diagnosis and treatment plans
C. Slowing down drug discovery
D. Enhancing manual reporting
158. How does AI assist in cybersecurity?
A. Slowing the detection of threats
B. Identifying vulnerabilities and detecting malicious activities in real-time
C. Disconnecting firewalls from networks
D. Limiting user authentication
159. What is the function of AI in weather forecasting?
A. Eliminating climate research
B. Analyzing patterns to predict weather conditions accurately
C. Limiting satellite imaging
D. Slowing down meteorological updates
160. How do smart grids integrate renewable energy sources?
A. Slowing renewable energy adoption
B. Managing energy distribution and incorporating solar and wind power effectively
C. Replacing traditional power plants
D. Limiting energy conservation

161. What is the main function of AI in autonomous vehicles?


A. Slowing down vehicle speeds
B. Processing data from sensors to navigate and make decisions without human input
C. Limiting vehicle range
D. Removing GPS systems

Page 119 of 123


LEO SERIES 120
162. How do smart homes improve energy efficiency?
A. By reducing access to digital devices
B. By automatically adjusting lighting, temperature, and appliances based on usage patterns
C. By eliminating electricity consumption
D. By slowing down home automation systems
163. What is the purpose of drones in environmental monitoring?
A. Providing manual ground surveys
B. Collecting data from hard-to-reach areas and monitoring environmental changes
C. Reducing real-time data collection
D. Limiting remote sensing technology
164. How does blockchain contribute to financial security?
A. By removing encryption protocols
B. By providing transparent and secure transaction records
C. By slowing down financial transactions
D. By eliminating physical banking systems
165. How does AI assist in predictive analytics for business?
A. By automating marketing campaigns only
B. By analyzing historical data to forecast trends and business outcomes
C. By limiting data collection
D. By slowing down decision-making processes
166. What is the main advantage of cloud storage over traditional physical storage?
A. Reducing accessibility
B. Providing remote, scalable storage that can be accessed from anywhere
C. Limiting file sharing capabilities
D. Enhancing physical hardware use
167. Which of these technologies improves customer experience in retail?
A. Limited data analytics
B. AI-powered chatbots and personalized recommendations
C. Reducing product variety
D. Eliminating online sales
168. What is a potential risk of widespread facial recognition technology?
A. Enhancing data privacy
B. Eroding personal privacy and the potential for misuse in surveillance
C. Automating government regulations
D. Reducing security system capabilities
169. How does AI-powered voice recognition improve accessibility?
A. By eliminating physical interactions
B. By allowing individuals with disabilities to interact with devices and services through speech
C. By limiting speech-to-text functionalities
D. By slowing down device processing
170. What is the role of the Internet of Things (IoT) in smart healthcare?
A. Limiting access to health data
B. Monitoring patient health data in real-time through connected devices
C. Replacing hospitals entirely
D. Reducing medical research
171. What is an application of augmented reality (AR) in tourism?
A. Reducing site visits
B. Enhancing tourist experiences by providing digital information and immersive navigation
C. Limiting engagement with travel apps
D. Replacing guidebooks
172. Which technology is most commonly associated with cryptocurrency?
A. Virtual reality
B. Blockchain

Page 120 of 123


LEO SERIES 121
C. Cloud computing
D. Artificial Intelligence
173. What is a key feature of smart transportation systems?
A. Limiting vehicle data collection
B. Using sensors and AI to improve traffic flow and reduce congestion
C. Slowing down traffic updates
D. Eliminating public transport services
174. How do wearables contribute to fitness tracking?
A. By reducing heart rate monitoring capabilities
B. By tracking physical activity, heart rate, and sleep patterns in real-time
C. By limiting the number of fitness apps
D. By reducing health data analysis
175. What is the impact of AI on job automation?
A. Reducing AI capabilities
B. Replacing manual tasks with automated systems, leading to increased productivity
C. Eliminating job opportunities completely
D. Reducing industrial growth
176. How does AI contribute to personalized advertising?
A. By using outdated data
B. By analyzing user behavior to target specific ads based on interests and past interactions
C. By reducing data analysis
D. By increasing irrelevant advertising
177. How do smart cities leverage data to enhance urban living?
A. By limiting citizen participation
B. By collecting data from IoT devices to optimize traffic, waste management, and public services
C. By increasing traffic congestion
D. By disconnecting communication networks
178. What is a potential application of nanotechnology in medicine?
A. Slowing down drug delivery systems
B. Delivering targeted drugs to specific cells with precision
C. Limiting genetic research
D. Reducing hospital equipment use
179. How do AI-powered recommendation systems work?
A. By analyzing historical data to suggest products or services to users
B. By eliminating user preferences
C. By decreasing online purchases
D. By limiting customer options
180. What is the main purpose of using blockchain in voting systems?
A. By eliminating all voting records
B. By providing a secure and transparent platform for online voting
C. By increasing voter fraud
D. By reducing election accessibility
181. How does AI improve decision-making in healthcare?
A. By reducing data collection in hospitals
B. By analyzing medical data to assist doctors in making faster and more accurate diagnoses
C. By eliminating patient monitoring
D. By slowing down hospital administration
182. What is a significant advantage of cloud computing for businesses?
A. Increased need for physical hardware
B. Providing scalable resources and remote access to services
C. Limiting access to company data
D. Reducing internet connectivity

Page 121 of 123


LEO SERIES 122
183. How does facial recognition technology contribute to security?
A. By slowing down access control systems
B. By verifying identities in real-time for access to secure areas or devices
C. By eliminating fingerprint authentication
D. By decreasing privacy laws
184. How do digital twins support manufacturing industries?
A. By slowing down production
B. By creating virtual replicas of physical assets for monitoring, optimization, and maintenance
C. By eliminating product designs
D. By reducing real-time monitoring capabilities
185. What is the purpose of 3D printing in medicine?
A. Creating physical prototypes of drugs
B. Printing personalized medical implants and prosthetics
C. Limiting surgery preparation
D. Reducing healthcare costs
186. How do smart devices communicate with each other in a smart home?
A. By using analog signals
B. By using wireless technologies like Wi-Fi, Bluetooth, or Zigbee
C. By limiting digital communication
D. By connecting only to wired networks
187. How do smartwatches improve personal health monitoring?
A. By restricting heart rate tracking
B. By tracking fitness, sleep patterns, and providing health insights in real-time
C. By eliminating mobile phone functionalities
D. By reducing user interaction
188. What is a key advantage of the Internet of Things (IoT) in agriculture?
A. Slowing down data collection
B. Monitoring soil health, irrigation systems, and livestock to optimize farming practices
C. Reducing sensor applications
D. Limiting crop production
189. What is the function of AI in customer service automation?
A. Reducing response time
B. Providing quick responses to frequently asked questions and assisting with basic tasks
C. Slowing down customer interactions
D. Limiting live chat options
190. What is the role of big data in disaster management?
A. Reducing environmental monitoring
B. Analyzing large datasets to predict, mitigate, and manage disaster impacts
C. Limiting relief efforts
D. Slowing down emergency services
191. How does cloud computing enhance collaboration in the workplace?
A. By limiting file sharing
B. By enabling teams to work on the same document in real-time from different locations
C. By reducing internet accessibility
D. By increasing manual file transfers
192. What is the significance of AI in improving retail customer experience?
A. Reducing inventory systems
B. Personalizing shopping experiences and assisting with product recommendations
C. Slowing down delivery systems
D. Limiting customer data usage
193. How does 5G technology improve connectivity for IoT devices?
A. By reducing internet speeds
B. By providing faster data transmission and lower latency for IoT networks

Page 122 of 123


LEO SERIES 123
C. By limiting device interactions
D. By increasing data congestion
194. What is a potential ethical concern with AI surveillance systems?
A. Reducing public safety
B. Eroding privacy rights and enabling widespread surveillance without consent
C. Limiting law enforcement capabilities
D. Enhancing transparency
195. How does blockchain contribute to data integrity in financial transactions?
A. By providing decentralized, secure, and transparent transaction records
B. By increasing data manipulation
C. By slowing down transactions
D. By reducing regulatory transparency
196. What is the impact of AI on healthcare diagnostic tools?
A. Reducing diagnostic accuracy
B. Assisting doctors by analyzing medical data to make more accurate and timely diagnoses
C. Limiting patient engagement
D. Replacing medical staff
197. What is a major application of augmented reality (AR) in retail?
A. Reducing product availability
B. Allowing customers to visualize products in their homes before purchasing
C. Slowing down sales interactions
D. Eliminating online shopping platforms
198. What is the benefit of 3D printing in education?
A. Reducing access to learning resources
B. Enabling the creation of educational models, prototypes, and hands-on learning experiences
C. Slowing down learning processes
D. Limiting interaction with technology

199. How does AI support decision-making in business?


A. Reducing data analysis
B. By analyzing large datasets to provide insights that help businesses make informed decisions
C. Slowing down operational tasks
D. Eliminating business strategies
200. What is the purpose of AI in finance?
A. Limiting investment strategies
B. Analyzing financial trends, detecting fraud, and providing investment recommendations
C. Reducing banking operations
D. Replacing human financial advisors

Page 123 of 123

You might also like