1.

Discuss the function of the Central Processing Unit (CPU) in a computer system.

2.

Explain how Random Access Memory (RAM) affects the performance of a computer.

3.

What is the primary function of an intrusion detection system (IDS)?

    • A) To prevent unauthorized access
    • B) To monitor and alert on suspicious activities
    • C) To manage network traffic
    • D) To encrypt data
4.

Describe the role of the motherboard in a computer’s architecture.

5.

Compare and contrast Hard Disk Drives (HDDs) and Solid State Drives (SSDs) in terms of speed and storage.

6.

Illustrate the process of data input and output in a computer system with examples.

7.

Identify and list the key components of a computer’s cooling system.

8.

Discuss the advantages and disadvantages of integrated versus dedicated graphics processing units (GPUs).

9.

Which component of a computer is known as the "brain" of the system?

    • A) Hard Drive
    • B) Central Processing Unit (CPU)
    • C) Random Access Memory (RAM)
    • D) Motherboard


10.

Analyze the function of the Network Interface Card (NIC) in network communication.

11.

Summarize the differences between analog and digital computers.

12.

Differentiate between general-purpose and special-purpose computers with examples.

13.

Outline the steps involved in booting up a computer system.

14.

Explain how a computer’s power supply unit (PSU) converts electrical power for use by internal components.

15.

Describe the role of firmware stored in Read-Only Memory (ROM).

16.

Discuss the importance of data storage and management in modern computer systems.

17.

Evaluate the impact of computer hardware advancements on software performance.

18.

What is the primary function of Random Access Memory (RAM)?

    • A) Long-term data storage
    • B) Temporary data storage for active processes
    • C) Power supply regulation
    • D) Network communication


19.

Which type of storage device uses flash memory?

    • A) Hard Disk Drive (HDD)
    • B) Optical Drive
    • C) Solid State Drive (SSD)
    • D) Tape Drive


20.
    • Answer: CWhat does a Network Interface Card (NIC) do?
    • A) Connects the computer to a network
    • B) Manages power distribution
    • C) Processes graphical data
    • D) Controls system cooling


21.

Which of the following is NOT a function of the motherboard?

    • A) Connecting hardware components
    • B) Executing instructions from software
    • C) Storing data permanently
    • D) Providing expansion slots for additional hardware


22.

What is the main advantage of a Solid State Drive (SSD) over a Hard Disk Drive (HDD)?

    • A) Lower power consumption
    • B) Higher storage capacity
    • C) Faster data access speeds
    • D) Lower cost


23.

Describe the key differences between a firewall and an intrusion detection system (IDS) in network security.

24.

Which type of computer is specifically designed to handle large-scale data processing tasks?

    • A) Personal Computer
    • B) Supercomputer
    • C) Minicomputer
    • D) Microcontroller


25.

What type of device is an example of an output device?

    • A) Keyboard
    • B) Scanner
    • C) Printer
    • D) Mouse


26.

Which component of a computer is responsible for cooling internal components?

    • A) Power Supply Unit (PSU)
    • B) Heat Sink
    • C) Network Interface Card (NIC)
    • D) Storage Drive


27.

What is the function of the BIOS (Basic Input/Output System) stored in ROM?

    • A) Manage network connections
    • B) Load and initialize the operating system
    • C) Process graphical data
    • D) Provide temporary data storage


28.

Define the term “data encryption” and explain its importance in protecting sensitive information.

29.

Which of the following is NOT a method to protect against Denial of Service (DoS) attacks?

    • A) Rate limiting
    • B) Network segmentation
    • C) Data encryption
    • D) Traffic filtering
30.

Explain how multi-factor authentication (MFA) enhances access control and prevents unauthorized access.

31.

Identify and describe three types of malware and their potential impact on computer systems.

32.

Discuss the importance of regular software updates and patch management in maintaining software security.

33.

Outline the steps involved in creating a data backup and recovery plan.

34.

Assess the effectiveness of physical security measures, such as surveillance and secure access controls, in protecting computer hardware.

35.

What type of software is designed to detect and remove malicious programs?

    • A) Firewall
    • B) Antivirus
    • C) VPN
    • D) IDS
36.

Analyze the role of threat intelligence in identifying and mitigating cyber threats.

37.

Compare and contrast data encryption methods for data in transit and data at rest.

38.

Develop a strategy for securing a network from Denial of Service (DoS) attacks.

39.

Evaluate the impact of user behavior on data security and suggest measures to mitigate associated risks.

40.

Formulate a response plan for handling a security incident involving compromised personal data.

41.

Illustrate the process of vulnerability scanning and its role in identifying potential security weaknesses.

42.

Design a secure access control system for a corporate network, detailing how to implement role-based access controls.

43.

Create a list of best practices for protecting against social engineering attacks in the workplace.

44.

Which of the following is a primary purpose of encryption?

    • A) To increase data processing speed
    • B) To protect data from unauthorized access
    • C) To reduce data storage costs
    • D) To simplify software installation
45.

What does a firewall do?

    • A) Encrypts data for secure communication
    • B) Monitors and blocks unauthorized network traffic
    • C) Scans files for malware
    • D) Manages user access rights
46.

Which security measure is used to verify user identity through multiple factors?

    • A) Single sign-on
    • B) Multi-factor authentication
    • C) Encryption
    • D) Intrusion detection system
47.

Which type of malware encrypts files and demands payment for decryption?

    • A) Virus
    • B) Worm
    • C) Ransomware
    • D) Spyware
48.

What is the purpose of a vulnerability scan?

    • A) To detect unauthorized access attempts
    • B) To identify and assess security weaknesses
    • C) To encrypt data in transit
    • D) To manage user permissions
49.

Which of the following is a best practice for data backup?

    • A) Backup data only when a system fails
    • B) Store backups in a secure, off-site location
    • C) Use the same storage medium for backups
    • D) Only backup data that is critical
50.

What is the role of threat intelligence in cybersecurity?

    • A) To provide real-time encryption services
    • B) To offer information on potential security threats and vulnerabilities
    • C) To monitor employee internet usage
    • D) To manage user authentication processes
51.

Define the role of an operating system in managing computer hardware resources.

52.

Explain how word processing software can enhance document creation and editing.

53.

Describe the process of creating and managing spreadsheets for financial analysis.

54.

Illustrate the key features of database management systems that support data integrity and security.

55.

Analyze how spreadsheets can be used to generate financial reports and forecasts.

56.

Compare the functionalities of word processing and spreadsheet software in handling data.

57.

Discuss the impact of database indexing on data retrieval performance.

58.

Which of the following is a primary function of an operating system?

    • A) Data Encryption
    • B) Data Analysis
    • C) Resource Management
    • D) Document Creation
59.

Demonstrate how conditional formatting in spreadsheets can improve data analysis.

60.

Evaluate the advantages of using a relational database system over a flat-file database.

61.

Summarize the methods for ensuring data security in database management systems.

62.

Describe how macros in spreadsheets can automate repetitive tasks.

63.

Explain the importance of data validation in maintaining data accuracy in spreadsheets.

64.

Illustrate how access control in databases can protect sensitive information.

65.

Evaluate the role of cloud-based word processing applications in collaborative work environments.

66.

Discuss the use of query languages in databases for data manipulation and retrieval.

67.

What is the purpose of using formulas in spreadsheets?

    • A) To create charts and graphs
    • B) To automate data entry
    • C) To perform calculations and data analysis
    • D) To format text and paragraphs
68.

Which feature in word processing software allows you to track changes made to a document?

    • A) Spell Checker
    • B) Track Changes
    • C) Page Layout
    • D) Grammar Checker
69.

What does a pivot table in a spreadsheet help you do?

    • A) Create charts and graphs
    • B) Summarize and analyze large datasets
    • C) Automate repetitive tasks
    • D) Format text and cells
70.

Which of the following is an example of a database management system (DBMS)?

    • A) Microsoft Excel
    • B) Microsoft Word
    • C) Oracle Database
    • D) Google Docs
71.

Which of the following functions in a spreadsheet would you use to filter specific data?

    • A) Sort
    • B) Pivot Table
    • C) Filter
    • D) Format
72.

What is the role of indexing in a database?

    • A) To manage user permissions
    • B) To improve data retrieval speed
    • C) To format data for reports
    • D) To automate data entry
73.

Which feature in word processing software is used to create a document template?

    • A) Styles
    • B) Templates
    • C) Headers and Footers
    • D) Page Setup
74.

Which of the following is a benefit of using cloud-based spreadsheet applications?

    • A) Enhanced data encryption
    • B) Real-time collaboration
    • C) Advanced text formatting
    • D) Improved offline access
75.

What is the primary purpose of data validation in spreadsheets?

    • A) To format cells for printing
    • B) To ensure data accuracy and consistency
    • C) To create complex formulas
    • D) To generate graphs and charts
76.

Discuss the role of e-mail in workplace communication.

77.

Explain how internet access can enhance productivity in a professional environment.

78.

Compare and contrast the uses of e-mail and instant messaging in workplace communication.

79.

escribe the steps involved in sending an e-mail from composing to delivery.

80.

Illustrate the process of setting up a professional e-mail account.

81.

Discuss the advantages of using e-mail over traditional mail in a business setting.

82.

Analyze the impact of e-mail overload on employee productivity.

83.

Demonstrate how to properly manage e-mail folders and organize messages.

84.

Which e-mail protocol allows e-mails to be downloaded and stored locally on a device?

    • A) IMAP
    • B) SMTP
    • C) POP3
    • D) HTTP
85.

Summarize the security risks associated with using e-mail in the workplace.

86.

Identify the common protocols used for sending and receiving e-mails.

87.

Evaluate the effectiveness of using e-mail for team collaboration versus other communication tools.

88.

List and describe at least three common features of professional e-mail clients.

89.

Which of the following is NOT a typical feature of professional e-mail clients?

    • A) Calendar integration
    • B) E-mail filtering
    • C) Video conferencing
    • D) Task management
90.

Assess the role of encryption in securing e-mail communications.

91.

Explain the differences between POP3 and IMAP protocols in e-mail retrieval.

92.

Create a set of best practices for professional e-mail etiquette.

93.

Which of the following protocols is used primarily for sending e-mails?

    • A) POP3
    • B) IMAP
    • C) SMTP
    • D) FTP
94.

What is the primary advantage of using e-mail over traditional mail in a workplace setting?

    • A) Lower cost
    • B) Instant delivery
    • C) Enhanced security
    • D) Physical documentation
95.

Which feature allows users to organize their e-mails into different categories or folders?

    • A) Spam filter
    • B) Drafts
    • C) Labels
    • D) Outbox
96.

What does IMAP stand for in the context of e-mail protocols?

    • A) Internet Message Access Protocol
    • B) Internet Mail Application Protocol
    • C) Internet Management Access Protocol
    • D) Instant Messaging Access Protocol
97.

What is the purpose of encryption in e-mail communication?

    • A) To increase the speed of transmission
    • B) To prevent unauthorized access to the message content
    • C) To reduce the size of e-mail attachments
    • D) To ensure delivery to the recipient's inbox
98.

Which of the following is a common risk associated with e-mail use in the workplace?

    • A) Overloading the server
    • B) Phishing attacks
    • C) Increased physical mail
    • D) Inability to access the internet
99.

Which protocol is commonly used for retrieving e-mail messages from a mail server?

    • A) SMTP
    • B) HTTP
    • C) FTP
    • D) POP3
100.

What is the main purpose of an e-mail's "Subject" line?

    • A) To specify the sender’s address
    • B) To summarize the content of the e-mail
    • C) To list the recipients
    • D) To attach files to the e-mail