1.

Define ICT and explain its significance in modern society.

2.

Describe the difference between computer hardware and software.

3.

Evaluate the effectiveness of firewalls and intrusion detection systems in protecting networks.

4.

Explain the concept of digital literacy and its importance.

5.

Identify the key milestones in the history of computers.

6.

Discuss the role of the Internet in global communication.

7.

Compare and contrast mainframe computers and supercomputers.

8.

Analyze the impact of mobile computing on everyday life.

9.

Evaluate the benefits and challenges of cloud computing.

10.

Define cybercrime and list various types of computer crimes with examples.

11.

Explain how encryption helps in protecting data during transmission.

12.

Illustrate how a CPU functions within a computer system.

13.

Summarize the evolution of personal computers from the 1970s to the present.

14.

Outline the primary functions of ICT in business environments.

15.

Classify the different types of storage devices and their uses.

16.

Critically assess the impact of ICT on globalization.

17.

Explain how embedded computers are utilized in everyday devices.

18.

List the main components of a computer and their functions.

19.

Describe the process of information processing in ICT.

20.

Examine the role of ICT in modern education and training.

21.

Discuss the significance of convergence in ICT.

22.

Explain the concept of interactivity in digital technologies.

23.

Identify the various output devices used in computer systems.

24.

Discuss the functions of automation in ICT.

25.

Describe the role of data governance in ensuring data security and control.

26.

Identify the challenges of cloud security and propose solutions to address these challenges.

27.

Describe the types of input devices and their purposes.

28.

Explain the classification of computers based on size and purpose.

29.

Analyze the technological advancements that led to the development of the Internet.

30.

Evaluate the role of workstations in professional environments.

31.

Which of the following best defines ICT?

    • A) The use of computers for processing data
    • B) Technologies that provide access to information through telecommunications
    • C) A collection of data or instructions that tell the computer how to work
    • D) The physical components of a computer system
32.

What is the primary function of the CPU in a computer?

    • A) To store data permanently
    • B) To execute instructions and perform calculations
    • C) To provide power to the system
    • D) To manage network connections
33.

Which device is considered an input device?

    • A) Monitor
    • B) Printer
    • C) Keyboard
    • D) Speaker
34.

Examine the importance of compliance management in data control.

35.

What does RAM stand for?

    • A) Random Access Memory
    • B) Read Access Memory
    • C) Rapid Access Module
    • D) Real-time Access Memory
36.

Which type of computer is known for handling large volumes of data and supporting multiple users?

    • A) Personal Computer
    • B) Workstation
    • C) Mainframe Computer
    • D) Embedded Computer
37.

What is the main purpose of a server?

    • A) To perform complex calculations
    • B) To provide services or resources to other computers on a network
    • C) To store and retrieve large amounts of data
    • D) To enable real-time interaction with digital content
38.

Which of the following is not a function of ICT?

    • A) Communication
    • B) Automation
    • C) Manual data entry
    • D) Education and Training
39.

What is digital literacy?

    • A) The ability to read and write
    • B) The ability to use digital technologies effectively
    • C) The understanding of computer hardware
    • D) The knowledge of programming languages
40.

Outline the classification of security threats and provide examples for each category.

41.

Evaluate the role of device drivers in the operation of I/O devices in an operating system.

42.

Which component is responsible for storing data permanently?

    • A) RAM
    • B) CPU
    • C) Hard Disk Drive (HDD)
    • D) Motherboard
43.

Which classification of computers is the most powerful?

    • A) Supercomputers
    • B) Mainframe Computers
    • C) Minicomputers
    • D) Personal Computers
44.

What was the primary function of early computing devices like the abacus?

    • A) Storing data
    • B) Performing arithmetic calculations
    • C) Displaying visual information
    • D) Enabling communication
45.

Which of the following describes the Internet?

    • A) A local network of interconnected devices
    • B) A global network of interconnected computers
    • C) A software application for data processing
    • D) A type of computer hardware
46.

Which of the following best defines data security?

    • A. The process of creating backups of data
    • B. Measures taken to protect data from unauthorized access and alterations
    • C. The method of analyzing data for business insights
    • D. Procedures for physical security of hardware
47.

What is an example of an embedded computer?

    • A) Desktop computer
    • B) Mainframe computer
    • C) Smartphone
    • D) Supercomputer
48.

Which development significantly contributed to the rise of personal computers in the 1970s and 1980s?

    • A) Vacuum tubes
    • B) Mechanical calculators
    • C) Microprocessors
    • D) Punch cards
49.

What is the purpose of a graphics card in a computer?

    • A) To manage network connections
    • B) To improve video performance
    • C) To store data
    • D) To provide power to the system
50.

Define data security and explain its significance in an automated environment.

51.

Describe the different types of data and provide examples for each type.

52.

Explain the concept of data privacy and discuss its importance in data management.

53.

Identify and analyze common security threats in an automated environment.

54.

Compare the roles of data security and data control in safeguarding information systems.

55.

Discuss the impact of sophisticated cyber threats on data security.

56.

What is a common characteristic of phishing attacks?

    • A. Exploiting software vulnerabilities
    • B. Encrypting user data and demanding ransom
    • C. Tricking individuals into revealing personal information
    • D. Overloading networks with traffic
57.

Summarize the key components and functionalities of spreadsheet software for data analysis.

58.

Illustrate the process of encryption and its role in data security.

59.

Evaluate the effectiveness of different access control mechanisms.

60.

Summarize the challenges associated with data protection regulations such as GDPR and CCPA.

61.

Assess the security risks introduced by big data and IoT devices.

62.

Describe the control measures used to mitigate malware threats.

63.

Examine the various types of social engineering threats and suggest preventive measures.

64.

Outline the steps involved in developing an incident response plan.

65.

Critique the role of security awareness training in preventing phishing attacks.

66.

Analyze the impact of insider threats on data security and suggest mitigation strategies.

67.

Compare network-based threats like DoS and MitM attacks, and propose appropriate control measures.

68.

Discuss the legal implications of data breaches for organizations.

69.

Illustrate the process of applying security patches and updates to prevent zero-day exploits.

70.

Which technology is primarily used to convert data into an unintelligible form to unauthorized users?

    • A. Firewalls
    • B. Encryption
    • C. Antivirus software
    • D. Intrusion detection systems
71.

What is the main goal of data loss prevention (DLP) systems?

    • A. Detecting malware on endpoints
    • B. Monitoring and preventing unauthorized data transmissions
    • C. Restricting access to physical hardware
    • D. Analyzing network traffic for anomalies
72.

Which regulation focuses on the protection of personal data within the European Union?

    • A. CCPA
    • B. NIS Directive
    • C. GDPR
    • D. CFAA
73.

Which type of malware is designed to replicate itself and spread across networks?

    • A. Virus
    • B. Trojan
    • C. Worm
    • D. Spyware
74.

What is the primary function of a firewall in network security?

    • A. Scanning for malware
    • B. Encrypting data
    • C. Monitoring and controlling network traffic
    • D. Performing regular system updates
75.

Which security measure involves verifying the identity of users before granting access?

    • A. Encryption
    • B. Authentication
    • C. Data classification
    • D. Patch management
76.

What is a zero-day exploit?

    • A. Malware that activates on a specific date
    • B. An attack on a vulnerability not yet known to the vendor
    • C. A phishing attack targeting high-level executives
    • D. Unauthorized physical access to a data center
77.

Which law provides legal validity to electronic signatures in the United States?

    • A. GDPR
    • B. ECPA
    • C. ESIGN Act
    • D. CFAA
78.

What is the primary focus of cybersecurity information sharing laws?

    • A. Protecting intellectual property
    • B. Facilitating the sharing of threat information
    • C. Regulating electronic communications
    • D. Ensuring consumer rights in e-commerce
79.

Which of the following best describes insider threats?

    • A. Attacks from outside the organization
    • B. Malicious or negligent actions by individuals within the organization
    • C. Social engineering attacks targeting employees
    • D. Physical threats to hardware
80.

What is the purpose of data classification in data control?

    • A. Storing data in different locations
    • B. Categorizing data based on sensitivity and criticality
    • C. Encrypting data for security
    • D. Monitoring data access activities
81.

Which technology can protect data during its transmission over networks?

    • A. Antivirus software
    • B. Encryption
    • C. Access control
    • D. Role-based access control
82.

Which of the following is a characteristic of a Trojan?

    • A. Self-replicating malware
    • B. Malware disguised as legitimate software
    • C. Network-based attack
    • D. Social engineering threat
83.

Define a word processor and explain its primary functions.

84.

Describe the purpose of a word document and list three common file formats used.

85.

Discuss the importance of transaction management in maintaining database integrity.

86.

Analyze the impact of parallel processing on data retrieval in large datasets.

87.

Explain the process of text wrapping in a word processor.

88.

Illustrate how text can be formatted in a word processor using examples.

89.

Compare and contrast a spreadsheet and a database in terms of their functions and uses.

90.

Discuss the role of an operating system in managing hardware resources.

91.

Analyze the importance of memory management in an operating system.

92.

Evaluate the effectiveness of spell checking and grammar checking tools in word processing software.

93.

Summarize the key features of spreadsheet software.

94.

Distinguish between DML and DDL in the context of database manipulation.

95.

Describe the normalization process in database design and its significance.

96.

Explain the role of indexing in data retrieval and its impact on database performance.

97.

Assess the security mechanisms implemented by an operating system to protect data.

98.

Compare different types of user interfaces provided by operating systems.

99.

Describe how query optimization techniques can improve database performance.

100.

Explain the concept of data caching and its benefits for query performance.

101.

Which of the following is NOT a function of a word processor?

    • A) Creating documents
    • B) Editing text
    • C) Compiling code
    • D) Formatting documents
102.

What is the primary purpose of a database?

    • A) Creating visual presentations
    • B) Storing and managing data
    • C) Writing and editing documents
    • D) Designing web pages
103.

In a spreadsheet, what does the SUM function do?

    • A) Finds the average of a range of cells
    • B) Adds the values of a range of cells
    • C) Counts the number of cells
    • D) Multiplies the values of a range of cells
104.

Which of the following is a characteristic of a character in a text document?

    • A) A sequence of characters
    • B) A single symbol
    • C) A paragraph
    • D) A sentence
105.

What is the role of an operating system in process management?

    • A) Managing hardware resources
    • B) Scheduling processes for execution
    • C) Formatting documents
    • D) Designing databases
106.

Which statement about text wrap is correct?

    • A) It changes the font style
    • B) It adjusts text around images or objects
    • C) It deletes text
    • D) It copies text
107.

What does the term "normalization" refer to in database design?

    • A) Creating indexes
    • B) Organizing data to reduce redundancy
    • C) Deleting records
    • D) Updating data
108.

What is the main purpose of a table in a word processor?

    • A) Formatting text
    • B) Organizing and displaying data in a grid
    • C) Inserting images
    • D) Checking grammar
109.

Which of the following is an example of a spreadsheet software?

    • A) Microsoft Word
    • B) Adobe Photoshop
    • C) Microsoft Excel
    • D) AutoCAD
110.

What is a cell in a spreadsheet?

    • A) A type of database
    • B) An individual rectangular box in a grid
    • C) A command in SQL
    • D) A function in a word processor
111.

Which of the following is NOT a type of user interface?

    • A) Graphical User Interface (GUI)
    • B) Command-Line Interface (CLI)
    • C) Database Management Interface (DMI)
    • D) Voice User Interface (VUI)
112.

In SQL, what does the SELECT statement do?

    • A) Inserts new records
    • B) Deletes records
    • C) Updates records
    • D) Retrieves specific information
113.

What is the primary function of device drivers in an operating system?

    • A) Creating documents
    • B) Enabling communication between the OS and hardware devices
    • C) Formatting text
    • D) Managing network connections
114.

Which of the following describes data caching?

    • A) Storing data temporarily in memory for quick access
    • B) Creating new database tables
    • C) Writing data to disk
    • D) Encrypting data
115.

What is the main benefit of transaction management in a database?

    • A) Improving query performance
    • B) Ensuring data consistency and reliability
    • C) Formatting data
    • D) Designing user interfaces
116.

Define the term "Internet" and explain its importance in the modern workplace.

117.

Describe how email functions as a communication tool in the workplace.

118.

Explain the role of HTTP in accessing web resources.

119.

Illustrate how a web browser functions and list three popular examples.

120.

Discuss the purpose and benefits of an extranet for businesses.