1.

Evaluate the effectiveness of firewalls and intrusion detection systems in protecting networks.

2.

Define cybercrime and list various types of computer crimes with examples.

3.

Explain how encryption helps in protecting data during transmission.

4.

Describe the role of data governance in ensuring data security and control.

5.

Identify the challenges of cloud security and propose solutions to address these challenges.

6.

Examine the importance of compliance management in data control.

7.

Outline the classification of security threats and provide examples for each category.

8.

Discuss the importance of transaction management in maintaining database integrity.

9.

Analyze the impact of parallel processing on data retrieval in large datasets.

10.

Evaluate the role of device drivers in the operation of I/O devices in an operating system.

11.

Summarize the key components and functionalities of spreadsheet software for data analysis.

12.

Evaluate the effectiveness of firewalls and intrusion detection systems in protecting networks.

13.

Define cybercrime and list various types of computer crimes with examples.

14.

Explain how encryption helps in protecting data during transmission.

15.

Describe the role of data governance in ensuring data security and control.

16.

Identify the challenges of cloud security and propose solutions to address these challenges.

17.

Examine the importance of compliance management in data control.

18.

Outline the classification of security threats and provide examples for each category.

19.

Discuss the importance of transaction management in maintaining database integrity.

20.

Analyze the impact of parallel processing on data retrieval in large datasets.

21.

Evaluate the role of device drivers in the operation of I/O devices in an operating system.

22.

Summarize the key components and functionalities of spreadsheet software for data analysis.

23.

Explain the concept of data caching and its benefits for query performance.

24.

Explain the concept of data caching and its benefits for query performance.

25.

What is digital literacy?

    • A) The ability to read and write
    • B) The ability to use digital technologies effectively
    • C) The understanding of computer hardware
    • D) The knowledge of programming languages
26.

Define ICT and explain its significance in modern society.

27.

Describe the difference between computer hardware and software.

28.

Illustrate the process of applying security patches and updates to prevent zero-day exploits.

29.

Explain the concept of digital literacy and its importance.

30.

Identify the key milestones in the history of computers.

31.

Discuss the role of the Internet in global communication.

32.

Compare and contrast mainframe computers and supercomputers.

33.

Analyze the impact of mobile computing on everyday life.

34.

Evaluate the benefits and challenges of cloud computing.

35.

Which development significantly contributed to the rise of personal computers in the 1970s and 1980s?

    • A) Vacuum tubes
    • B) Mechanical calculators
    • C) Microprocessors
    • D) Punch cards
36.

Illustrate how a CPU functions within a computer system.

37.

Summarize the evolution of personal computers from the 1970s to the present.

38.

Outline the primary functions of ICT in business environments

39.

Classify the different types of storage devices and their uses.

40.

Critically assess the impact of ICT on globalization.

41.

Explain how embedded computers are utilized in everyday devices.

42.

List the main components of a computer and their functions.

43.

Describe the process of information processing in ICT.

44.

Examine the role of ICT in modern education and training.

45.

Discuss the significance of convergence in ICT.

46.

Explain the concept of interactivity in digital technologies.

47.

Identify the various output devices used in computer systems.

48.

Discuss the functions of automation in ICT.

49.

What is the purpose of a graphics card in a computer?

    • A) To manage network connections
    • B) To improve video performance
    • C) To store data
    • D) To provide power to the system
50.

Describe the types of input devices and their purposes.

51.

Explain the classification of computers based on size and purpose.

52.

Analyze the technological advancements that led to the development of the Internet.

53.

Evaluate the role of workstations in professional environments.

54.

Which of the following best defines ICT?

    • A) The use of computers for processing data
    • B) Technologies that provide access to information through telecommunications
    • C) A collection of data or instructions that tell the computer how to work
    • D) The physical components of a computer system
55.

What is the primary function of the CPU in a computer?

    • A) To store data permanently
    • B) To execute instructions and perform calculations
    • C) To provide power to the system
    • D) To manage network connections
56.

Analyze the impact of insider threats on data security and suggest mitigation strategies.

57.

Compare network-based threats like DoS and MitM attacks, and propose appropriate control measures.

58.

Discuss the legal implications of data breaches for organizations.

59.

Which device is considered an input device?

    • A) Monitor
    • B) Printer
    • C) Keyboard
    • D) Speaker
60.

What does RAM stand for?

    • A) Random Access Memory
    • B) Read Access Memory
    • C) Rapid Access Module
    • D) Real-time Access Memory
61.

Which type of computer is known for handling large volumes of data and supporting multiple users?

    • A) Personal Computer
    • B) Workstation
    • C) Mainframe Computer
    • D) Embedded Computer
62.

What is the main purpose of a server?

    • A) To perform complex calculations
    • B) To provide services or resources to other computers on a network
    • C) To store and retrieve large amounts of data
    • D) To enable real-time interaction with digital content
63.

Which of the following is not a function of ICT?

    • A) Communication
    • B) Automation
    • C) Manual data entry
    • D) Education and Training
64.

Which component is responsible for storing data permanently?

    • A) RAM
    • B) CPU
    • C) Hard Disk Drive (HDD)
    • D) Motherboard
65.

Which classification of computers is the most powerful?

    • A) Supercomputers
    • B) Mainframe Computers
    • C) Minicomputers
    • D) Personal Computers
66.

What was the primary function of early computing devices like the abacus?

    • A) Storing data
    • B) Performing arithmetic calculations
    • C) Displaying visual information
    • D) Enabling communication
67.

Which of the following describes the Internet?

    • A) A local network of interconnected devices
    • B) A global network of interconnected computers
    • C) A software application for data processing
    • D) A type of computer hardware
68.

What is an example of an embedded computer?

    • A) Desktop computer
    • B) Mainframe computer
    • C) Smartphone
    • D) Supercomputer
69.

Define data security and explain its significance in an automated environment.

70.

Describe the different types of data and provide examples for each type.

71.

Explain the concept of data privacy and discuss its importance in data management.

72.

Identify and analyze common security threats in an automated environment.

73.

Compare the roles of data security and data control in safeguarding information systems.

74.

Discuss the impact of sophisticated cyber threats on data security.

75.

Illustrate the process of encryption and its role in data security.

76.

Evaluate the effectiveness of different access control mechanisms.

77.

Summarize the challenges associated with data protection regulations such as GDPR and CCPA.

78.

Assess the security risks introduced by big data and IoT devices.

79.

Describe the control measures used to mitigate malware threats.

80.

Examine the various types of social engineering threats and suggest preventive measures.

81.

Outline the steps involved in developing an incident response plan.

82.

Critique the role of security awareness training in preventing phishing attacks.

83.

Which of the following best defines data security?

    • A. The process of creating backups of data
    • B. Measures taken to protect data from unauthorized access and alterations
    • C. The method of analyzing data for business insights
    • D. Procedures for physical security of hardware
84.

What is a common characteristic of phishing attacks?

    • A. Exploiting software vulnerabilities
    • B. Encrypting user data and demanding ransom
    • C. Tricking individuals into revealing personal information
    • D. Overloading networks with traffic
85.

Which technology is primarily used to convert data into an unintelligible form to unauthorized users?

    • A. Firewalls
    • B. Encryption
    • C. Antivirus software
    • D. Intrusion detection systems
86.

What is the main goal of data loss prevention (DLP) systems?

    • A. Detecting malware on endpoints
    • B. Monitoring and preventing unauthorized data transmissions
    • C. Restricting access to physical hardware
    • D. Analyzing network traffic for anomalies
87.

Which regulation focuses on the protection of personal data within the European Union?

    • A. CCPA
    • B. NIS Directive
    • C. GDPR
    • D. CFAA
88.

What is the primary focus of cybersecurity information sharing laws?

    • A. Protecting intellectual property
    • B. Facilitating the sharing of threat information
    • C. Regulating electronic communications
    • D. Ensuring consumer rights in e-commerce
89.

Which type of malware is designed to replicate itself and spread across networks?

    • A. Virus
    • B. Trojan
    • C. Worm
    • D. Spyware
90.

What is the primary function of a firewall in network security?

    • A. Scanning for malware
    • B. Encrypting data
    • C. Monitoring and controlling network traffic
    • D. Performing regular system updates
91.

Which security measure involves verifying the identity of users before granting access?

    • A. Encryption
    • B. Authentication
    • C. Data classification
    • D. Patch management
92.

What is a zero-day exploit?

    • A. Malware that activates on a specific date
    • B. An attack on a vulnerability not yet known to the vendor
    • C. A phishing attack targeting high-level executives
    • D. Unauthorized physical access to a data center
93.

Which law provides legal validity to electronic signatures in the United States?

    • A. GDPR
    • B. ECPA
    • C. ESIGN Act
    • D. CFAA
94.

Which of the following best describes insider threats?

    • A. Attacks from outside the organization
    • B. Malicious or negligent actions by individuals within the organization
    • C. Social engineering attacks targeting employees
    • D. Physical threats to hardware
95.

What is the purpose of data classification in data control?

    • A. Storing data in different locations
    • B. Categorizing data based on sensitivity and criticality
    • C. Encrypting data for security
    • D. Monitoring data access activities
96.

Which technology can protect data during its transmission over networks?

    • A. Antivirus software
    • B. Encryption
    • C. Access control
    • D. Role-based access control
97.

Which of the following is a characteristic of a Trojan?

    • A. Self-replicating malware
    • B. Malware disguised as legitimate software
    • C. Network-based attack
    • D. Social engineering threat
98.

Define a word processor and explain its primary functions.

99.

Assess the security mechanisms implemented by an operating system to protect data.

100.

Compare different types of user interfaces provided by operating systems.

101.

Describe the purpose of a word document and list three common file formats used.

102.

Explain the process of text wrapping in a word processor.

103.

Illustrate how text can be formatted in a word processor using examples.

104.

Compare and contrast a spreadsheet and a database in terms of their functions and uses.

105.

Describe how query optimization techniques can improve database performance.

106.

Discuss the role of an operating system in managing hardware resources.

107.

Analyze the importance of memory management in an operating system.

108.

Evaluate the effectiveness of spell checking and grammar checking tools in word processing software.

109.

Summarize the key features of spreadsheet software.

110.

Distinguish between DML and DDL in the context of database manipulation.

111.

Describe the normalization process in database design and its significance.

112.

Explain the role of indexing in data retrieval and its impact on database performance.

113.

Which of the following is NOT a function of a word processor?

    • A) Creating documents
    • B) Editing text
    • C) Compiling code
    • D) Formatting documents
114.

What is the primary purpose of a database?

    • A) Creating visual presentations
    • B) Storing and managing data
    • C) Writing and editing documents
    • D) Designing web pages
115.

In a spreadsheet, what does the SUM function do?

    • A) Finds the average of a range of cells
    • B) Adds the values of a range of cells
    • C) Counts the number of cells
    • D) Multiplies the values of a range of cells
116.

Which of the following is a characteristic of a character in a text document?

    • A) A sequence of characters
    • B) A single symbol
    • C) A paragraph
    • D) A sentence
117.

What is the role of an operating system in process management?

    • A) Managing hardware resources
    • B) Scheduling processes for execution
    • C) Formatting documents
    • D) Designing databases
118.

Which statement about text wrap is correct?

    • A) It changes the font style
    • B) It adjusts text around images or objects
    • C) It deletes text
    • D) It copies text
119.

What does the term "normalization" refer to in database design?

    • A) Creating indexes
    • B) Organizing data to reduce redundancy
    • C) Deleting records
    • D) Updating data
120.

What is the main purpose of a table in a word processor?

    • A) Formatting text
    • B) Organizing and displaying data in a grid
    • C) Inserting images
    • D) Checking grammar
121.

Which of the following is an example of a spreadsheet software?

    • A) Microsoft Word
    • B) Adobe Photoshop
    • C) Microsoft Excel
    • D) AutoCAD
122.

What is a cell in a spreadsheet?

    • A) A type of database
    • B) An individual rectangular box in a grid
    • C) A command in SQL
    • D) A function in a word processor
123.

Which of the following is NOT a type of user interface?

    • A) Graphical User Interface (GUI)
    • B) Command-Line Interface (CLI)
    • C) Database Management Interface (DMI)
    • D) Voice User Interface (VUI)
124.

In SQL, what does the SELECT statement do?

    • A) Inserts new records
    • B) Deletes records
    • C) Updates records
    • D) Retrieves specific information
125.

What is the primary function of device drivers in an operating system?

    • A) Creating documents
    • B) Enabling communication between the OS and hardware devices
    • C) Formatting text
    • D) Managing network connections
126.

Which of the following describes data caching?

    • A) Storing data temporarily in memory for quick access
    • B) Creating new database tables
    • C) Writing data to disk
    • D) Encrypting data
127.

What is the main benefit of transaction management in a database?

    • A) Improving query performance
    • B) Ensuring data consistency and reliability
    • C) Formatting data
    • D) Designing user interfaces
128.

Define the term "Internet" and explain its importance in the modern workplace.

129.

Describe how email functions as a communication tool in the workplace.

130.

Explain the role of HTTP in accessing web resources.

131.

What is digital literacy?

    • A) The ability to read and write
    • B) The ability to use digital technologies effectively
    • C) The understanding of computer hardware
    • D) The knowledge of programming languages
132.

Illustrate how a web browser functions and list three popular examples.

133.

Discuss the purpose and benefits of an extranet for businesses.

134.

Define ICT and explain its significance in modern society.

135.

Describe the difference between computer hardware and software.

136.

Illustrate the process of applying security patches and updates to prevent zero-day exploits.

137.

Explain the concept of digital literacy and its importance.

138.

Identify the key milestones in the history of computers.

139.

Discuss the role of the Internet in global communication.

140.

Compare and contrast mainframe computers and supercomputers.

141.

Analyze the impact of mobile computing on everyday life.

142.

Evaluate the benefits and challenges of cloud computing.

143.

Which development significantly contributed to the rise of personal computers in the 1970s and 1980s?

    • A) Vacuum tubes
    • B) Mechanical calculators
    • C) Microprocessors
    • D) Punch cards
144.

Illustrate how a CPU functions within a computer system.

145.

Summarize the evolution of personal computers from the 1970s to the present.

146.

Outline the primary functions of ICT in business environments

147.

Classify the different types of storage devices and their uses.

148.

Critically assess the impact of ICT on globalization.

149.

Explain how embedded computers are utilized in everyday devices.

150.

List the main components of a computer and their functions.

151.

Describe the process of information processing in ICT.

152.

Examine the role of ICT in modern education and training.

153.

Discuss the significance of convergence in ICT.

154.

Explain the concept of interactivity in digital technologies.

155.

Identify the various output devices used in computer systems.

156.

Discuss the functions of automation in ICT.

157.

What is the purpose of a graphics card in a computer?

    • A) To manage network connections
    • B) To improve video performance
    • C) To store data
    • D) To provide power to the system
158.

Describe the types of input devices and their purposes.

159.

Explain the classification of computers based on size and purpose.

160.

Analyze the technological advancements that led to the development of the Internet.

161.

Evaluate the role of workstations in professional environments.

162.

Which of the following best defines ICT?

    • A) The use of computers for processing data
    • B) Technologies that provide access to information through telecommunications
    • C) A collection of data or instructions that tell the computer how to work
    • D) The physical components of a computer system
163.

What is the primary function of the CPU in a computer?

    • A) To store data permanently
    • B) To execute instructions and perform calculations
    • C) To provide power to the system
    • D) To manage network connections
164.

Analyze the impact of insider threats on data security and suggest mitigation strategies.

165.

Compare network-based threats like DoS and MitM attacks, and propose appropriate control measures.

166.

Discuss the legal implications of data breaches for organizations.

167.

Which device is considered an input device?

    • A) Monitor
    • B) Printer
    • C) Keyboard
    • D) Speaker
168.

What does RAM stand for?

    • A) Random Access Memory
    • B) Read Access Memory
    • C) Rapid Access Module
    • D) Real-time Access Memory
169.

Which type of computer is known for handling large volumes of data and supporting multiple users?

    • A) Personal Computer
    • B) Workstation
    • C) Mainframe Computer
    • D) Embedded Computer
170.

What is the main purpose of a server?

    • A) To perform complex calculations
    • B) To provide services or resources to other computers on a network
    • C) To store and retrieve large amounts of data
    • D) To enable real-time interaction with digital content
171.

Which of the following is not a function of ICT?

    • A) Communication
    • B) Automation
    • C) Manual data entry
    • D) Education and Training
172.

Which component is responsible for storing data permanently?

    • A) RAM
    • B) CPU
    • C) Hard Disk Drive (HDD)
    • D) Motherboard
173.

Which classification of computers is the most powerful?

    • A) Supercomputers
    • B) Mainframe Computers
    • C) Minicomputers
    • D) Personal Computers
174.

What was the primary function of early computing devices like the abacus?

    • A) Storing data
    • B) Performing arithmetic calculations
    • C) Displaying visual information
    • D) Enabling communication
175.

Which of the following describes the Internet?

    • A) A local network of interconnected devices
    • B) A global network of interconnected computers
    • C) A software application for data processing
    • D) A type of computer hardware
176.

What is an example of an embedded computer?

    • A) Desktop computer
    • B) Mainframe computer
    • C) Smartphone
    • D) Supercomputer
177.

Define data security and explain its significance in an automated environment.

178.

Describe the different types of data and provide examples for each type.

179.

Explain the concept of data privacy and discuss its importance in data management.

180.

Identify and analyze common security threats in an automated environment.

181.

Compare the roles of data security and data control in safeguarding information systems.

182.

Discuss the impact of sophisticated cyber threats on data security.

183.

Illustrate the process of encryption and its role in data security.

184.

Evaluate the effectiveness of different access control mechanisms.

185.

Summarize the challenges associated with data protection regulations such as GDPR and CCPA.

186.

Assess the security risks introduced by big data and IoT devices.

187.

Describe the control measures used to mitigate malware threats.

188.

Examine the various types of social engineering threats and suggest preventive measures.

189.

Outline the steps involved in developing an incident response plan.

190.

Critique the role of security awareness training in preventing phishing attacks.

191.

Which of the following best defines data security?

    • A. The process of creating backups of data
    • B. Measures taken to protect data from unauthorized access and alterations
    • C. The method of analyzing data for business insights
    • D. Procedures for physical security of hardware
192.

What is a common characteristic of phishing attacks?

    • A. Exploiting software vulnerabilities
    • B. Encrypting user data and demanding ransom
    • C. Tricking individuals into revealing personal information
    • D. Overloading networks with traffic
193.

Which technology is primarily used to convert data into an unintelligible form to unauthorized users?

    • A. Firewalls
    • B. Encryption
    • C. Antivirus software
    • D. Intrusion detection systems
194.

What is the main goal of data loss prevention (DLP) systems?

    • A. Detecting malware on endpoints
    • B. Monitoring and preventing unauthorized data transmissions
    • C. Restricting access to physical hardware
    • D. Analyzing network traffic for anomalies
195.

Which regulation focuses on the protection of personal data within the European Union?

    • A. CCPA
    • B. NIS Directive
    • C. GDPR
    • D. CFAA
196.

What is the primary focus of cybersecurity information sharing laws?

    • A. Protecting intellectual property
    • B. Facilitating the sharing of threat information
    • C. Regulating electronic communications
    • D. Ensuring consumer rights in e-commerce
197.

Which type of malware is designed to replicate itself and spread across networks?

    • A. Virus
    • B. Trojan
    • C. Worm
    • D. Spyware
198.

What is the primary function of a firewall in network security?

    • A. Scanning for malware
    • B. Encrypting data
    • C. Monitoring and controlling network traffic
    • D. Performing regular system updates
199.

Which security measure involves verifying the identity of users before granting access?

    • A. Encryption
    • B. Authentication
    • C. Data classification
    • D. Patch management
200.

What is a zero-day exploit?

    • A. Malware that activates on a specific date
    • B. An attack on a vulnerability not yet known to the vendor
    • C. A phishing attack targeting high-level executives
    • D. Unauthorized physical access to a data center
201.

Which law provides legal validity to electronic signatures in the United States?

    • A. GDPR
    • B. ECPA
    • C. ESIGN Act
    • D. CFAA
202.

Which of the following best describes insider threats?

    • A. Attacks from outside the organization
    • B. Malicious or negligent actions by individuals within the organization
    • C. Social engineering attacks targeting employees
    • D. Physical threats to hardware
203.

What is the purpose of data classification in data control?

    • A. Storing data in different locations
    • B. Categorizing data based on sensitivity and criticality
    • C. Encrypting data for security
    • D. Monitoring data access activities
204.

Which technology can protect data during its transmission over networks?

    • A. Antivirus software
    • B. Encryption
    • C. Access control
    • D. Role-based access control
205.

Which of the following is a characteristic of a Trojan?

    • A. Self-replicating malware
    • B. Malware disguised as legitimate software
    • C. Network-based attack
    • D. Social engineering threat
206.

Define a word processor and explain its primary functions.

207.

Assess the security mechanisms implemented by an operating system to protect data.

208.

Compare different types of user interfaces provided by operating systems.

209.

Describe the purpose of a word document and list three common file formats used.

210.

Explain the process of text wrapping in a word processor.

211.

Illustrate how text can be formatted in a word processor using examples.

212.

Compare and contrast a spreadsheet and a database in terms of their functions and uses.

213.

Describe how query optimization techniques can improve database performance.

214.

Discuss the role of an operating system in managing hardware resources.

215.

Analyze the importance of memory management in an operating system.

216.

Evaluate the effectiveness of spell checking and grammar checking tools in word processing software.

217.

Summarize the key features of spreadsheet software.

218.

Distinguish between DML and DDL in the context of database manipulation.

219.

Describe the normalization process in database design and its significance.

220.

Explain the role of indexing in data retrieval and its impact on database performance.

221.

Which of the following is NOT a function of a word processor?

    • A) Creating documents
    • B) Editing text
    • C) Compiling code
    • D) Formatting documents
222.

What is the primary purpose of a database?

    • A) Creating visual presentations
    • B) Storing and managing data
    • C) Writing and editing documents
    • D) Designing web pages
223.

In a spreadsheet, what does the SUM function do?

    • A) Finds the average of a range of cells
    • B) Adds the values of a range of cells
    • C) Counts the number of cells
    • D) Multiplies the values of a range of cells
224.

Which of the following is a characteristic of a character in a text document?

    • A) A sequence of characters
    • B) A single symbol
    • C) A paragraph
    • D) A sentence
225.

What is the role of an operating system in process management?

    • A) Managing hardware resources
    • B) Scheduling processes for execution
    • C) Formatting documents
    • D) Designing databases
226.

Which statement about text wrap is correct?

    • A) It changes the font style
    • B) It adjusts text around images or objects
    • C) It deletes text
    • D) It copies text
227.

What does the term "normalization" refer to in database design?

    • A) Creating indexes
    • B) Organizing data to reduce redundancy
    • C) Deleting records
    • D) Updating data
228.

What is the main purpose of a table in a word processor?

    • A) Formatting text
    • B) Organizing and displaying data in a grid
    • C) Inserting images
    • D) Checking grammar
229.

Which of the following is an example of a spreadsheet software?

    • A) Microsoft Word
    • B) Adobe Photoshop
    • C) Microsoft Excel
    • D) AutoCAD
230.

What is a cell in a spreadsheet?

    • A) A type of database
    • B) An individual rectangular box in a grid
    • C) A command in SQL
    • D) A function in a word processor
231.

Which of the following is NOT a type of user interface?

    • A) Graphical User Interface (GUI)
    • B) Command-Line Interface (CLI)
    • C) Database Management Interface (DMI)
    • D) Voice User Interface (VUI)
232.

In SQL, what does the SELECT statement do?

    • A) Inserts new records
    • B) Deletes records
    • C) Updates records
    • D) Retrieves specific information
233.

What is the primary function of device drivers in an operating system?

    • A) Creating documents
    • B) Enabling communication between the OS and hardware devices
    • C) Formatting text
    • D) Managing network connections
234.

Which of the following describes data caching?

    • A) Storing data temporarily in memory for quick access
    • B) Creating new database tables
    • C) Writing data to disk
    • D) Encrypting data
235.

What is the main benefit of transaction management in a database?

    • A) Improving query performance
    • B) Ensuring data consistency and reliability
    • C) Formatting data
    • D) Designing user interfaces
236.

Define the term "Internet" and explain its importance in the modern workplace.

237.

Describe how email functions as a communication tool in the workplace.

238.

Explain the role of HTTP in accessing web resources.

239.

Illustrate how a web browser functions and list three popular examples.

240.

Discuss the purpose and benefits of an extranet for businesses.