0% found this document useful (0 votes)
22 views4 pages

Ambagan Quiz

The document is a multiple-choice test covering various topics related to Information and Communication Technology (ICT). It includes questions about computer components, social media, web technologies, operating systems, and cybersecurity. Each question provides four answer options, testing knowledge on key ICT concepts and terminology.

Uploaded by

rensberanoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

Ambagan Quiz

The document is a multiple-choice test covering various topics related to Information and Communication Technology (ICT). It includes questions about computer components, social media, web technologies, operating systems, and cybersecurity. Each question provides four answer options, testing knowledge on key ICT concepts and terminology.

Uploaded by

rensberanoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Multiple Choice Test:

1. What does ICT stand for?


a) Information and Computer Technology
b) Information and Communication Technology
c) Internet and Communication Technology
d) Integrated Communication Techniques

2. Which of the following is NOT a component of a computer system?


a) Monitor
b) Keyboard
c) Scanner
d) Speaker

3. What is the purpose of the CPU in a computer?


a) To store information permanently
b) To execute instructions and process data
c) To provide internet connectivity
d) To display images and videos

4. Which of the following is an example of a social media site?


a) Google Docs
b) Instagram
c) Microsoft Word
d) Windows Media Player

5. What is the key characteristic of Web 2.0?


a) Static web pages
b) User interactivity and dynamic content
c) Text-based browsing
d) Only accessible through dial-up internet

6. What is the main function of a web browser?


a) To create web pages
b) To store large amounts of data
c) To access and display websites
d) To connect to a local printer

7. Which of the following is an example of cloud storage?


a) USB Flash Drive
b) Google Drive
c) External Hard Drive
d) DVD

8. What is the term for software that allows users to rent applications instead of purchasing them?
a) Open-source software
b) Software as a Service (SaaS)
c) Freeware
d) Shareware

9. What is the primary function of an operating system?


a) To protect the computer from viruses
b) To manage hardware and software resources
c) To create documents
d) To provide internet access

10. Which key on the keyboard is used to delete characters to the left of the cursor?
a) Delete key
b) Backspace key
c) Enter key
d) Escape key

11. What is the purpose of a firewall in computer security?


a) To physically protect the computer from damage
b) To block unauthorized access to a network
c) To increase the speed of the internet connection
d) To remove computer viruses

12. Which of the following is an example of an input device?


a) Printer
b) Monitor
c) Mouse
d) Speaker

13. What does URL stand for?


a) Universal Resource Locator
b) Unified Remote Link
c) User Registration List
d) Unique Reference Label

14. What type of memory is volatile and loses data when the power is turned off?
a) ROM
b) RAM
c) Hard Drive
d) Flash Memory

15. Which of the following is NOT an example of social networking sites?


a) Facebook
b) Twitter
c) Instagram
d) Excel

16. What does HTTP stand for?


a) Hyperlink Text Transfer Protocol
b) Hypertext Transfer Protocol
c) High Technology Transfer Process
d) Home Transmission Text Protocol

17. Which of the following is an example of an output device?


a) Scanner
b) Webcam
c) Printer
d) Keyboard

18. What does the acronym CPU stand for?


a) Central Processing Unit
b) Computer Processing Utility
c) Centralized Peripheral Unit
d) Core Programming Unit

19. What is an advantage of cloud computing?


a) Requires expensive hardware
b) Data can be accessed from anywhere with internet access
c) Works only on a single device
d) Increases electricity consumption

20. Which social media platform is best known for sharing short text updates?
a) Facebook
b) Twitter
c) Instagram
d) LinkedIn

21. What is phishing?


a) A type of online scam to steal personal information
b) A method of securing a network connection
c) A programming language
d) A cloud storage service

22. What does the term “mass participation” in Web 2.0 refer to?
a) Limited access to websites
b) Many users creating and sharing content
c) Restricted content for select users
d) Only large organizations using the web

23. Which of the following is NOT an advantage of ICT?


a) Faster communication
b) Access to information
c) Increased privacy
d) Enhanced collaboration

24. What is an example of assistive technology?


a) Bluetooth speakers
b) Screen readers for visually impaired users
c) Wireless routers
d) Video streaming services

25. Which of the following is an example of bookmarking sites?


a) Pinterest
b) YouTube
c) Zoom
d) Skype

26. What is the primary difference between Web 1.0 and Web 2.0?
a) Web 1.0 is interactive, while Web 2.0 is static
b) Web 1.0 consists of static pages, while Web 2.0 is dynamic and interactive
c) Web 1.0 supports only text, while Web 2.0 supports images
d) Web 1.0 is free, while Web 2.0 requires payment

27. Which mobile operating system is open-source and widely used in smartphones?
a) iOS
b) Android
c) Windows Mobile
d) Blackberry OS

28. What is a key function of blogs and forums in ICT?


a) Selling products online
b) Providing a platform for users to share opinions and discussions
c) Sending private messages
d) Watching live videos

29. Which of the following devices is used to capture video and transmit it over the internet?
a) Printer
b) Webcam
c) Scanner
d) External Hard Drive

30. What is the main risk associated with using public Wi-Fi networks?
a) They are always slow
b) They may allow unauthorized users to access your data
c) They do not require a password
d) They prevent virus infections

You might also like