1.

Examine the various types of social engineering threats and suggest preventive measures

2.

Outline the steps involved in developing an incident response plan

3.

Critique the role of security awareness training in preventing phishing attacks

4.

Evaluate the benefits and challenges of cloud computing

5.

Analyze the impact of insider threats on data security and suggest mitigation strategies

6.

Compare network-based threats like DoS and MitM attacks, and propose appropriate control measures

7.

Discuss the legal implications of data breaches for organizations

8.

Illustrate the process of applying security patches and updates to prevent zero-day exploits

9.

Evaluate the effectiveness of firewalls and intrusion detection systems in protecting networks

10.

Define cybercrime and list various types of computer crimes with examples

11.

Explain how encryption helps in protecting data during transmission

12.

Describe the role of data governance in ensuring data security and control

13.

Identify the challenges of cloud security and propose solutions to address these challenges

14.

Examine the importance of compliance management in data control

15.

Outline the classification of security threats and provide examples for each category

16.

Assess the security mechanisms implemented by an operating system to protect data

17.

Compare different types of user interfaces provided by operating systems

18.

Describe how query optimization techniques can improve database performance

19.

Explain the concept of data caching and its benefits for query performance

20.

Discuss the functions of automation in ICT

21.

Define ICT and explain its significance in modern society

22.

Describe the difference between computer hardware and software

23.

 Explain the concept of digital literacy and its importance

24.

Identify the key milestones in the history of computers

25.

Discuss the role of the Internet in global communication

26.

Compare and contrast mainframe computers and supercomputers

27.

Analyze the impact of mobile computing on everyday life

28.

Illustrate how a CPU functions within a computer system

29.

Summarize the evolution of personal computers from the 1970s to the present

30.

Outline the primary functions of ICT in business environments

31.

Classify the different types of storage devices and their uses

32.

Critically assess the impact of ICT on globalization

33.

Explain how embedded computers are utilized in everyday devices

34.

List the main components of a computer and their functions

35.

Describe the process of information processing in ICT

36.

Examine the role of ICT in modern education and training

37.

Discuss the significance of convergence in ICT

38.

Explain the concept of interactivity in digital technologies

39.

Identify the various output devices used in computer systems

40.

Which development significantly contributed to the rise of personal computers in the 1970s and 1980s?

    • A) Vacuum tubes
    • B) Mechanical calculators
    • C) Microprocessors
    • D) Punch cards
41.

Describe the types of input devices and their purposes

42.

Explain the classification of computers based on size and purpose

43.

Analyze the technological advancements that led to the development of the Internet

44.

Evaluate the role of workstations in professional environments

45.

Which of the following best defines ICT?

    • A) The use of computers for processing data
    • B) Technologies that provide access to information through telecommunications
    • C) A collection of data or instructions that tell the computer how to work
    • D) The physical components of a computer system
46.

What is the primary function of the CPU in a computer?

    • A) To store data permanently
    • B) To execute instructions and perform calculations
    • C) To provide power to the system
    • D) To manage network connections
47.

What was the primary function of early computing devices like the abacus?

    • A) Storing data
    • B) Performing arithmetic calculations
    • C) Displaying visual information
    • D) Enabling communication
48.

Which device is considered an input device?

    • A) Monitor
    • B) Printer
    • C) Keyboard
    • D) Speaker
49.

Discuss the importance of transaction management in maintaining database integrity

50.

What does RAM stand for?

    • A) Random Access Memory
    • B) Read Access Memory
    • C) Rapid Access Module
    • D) Real-time Access Memory
51.

Which type of computer is known for handling large volumes of data and supporting multiple users?

    • A) Personal Computer
    • B) Workstation
    • C) Mainframe Computer
    • D) Embedded Computer
52.

What is the main purpose of a server?

    • A) To perform complex calculations
    • B) To provide services or resources to other computers on a network
    • C) To store and retrieve large amounts of data
    • D) To enable real-time interaction with digital content
53.

Which of the following describes the Internet?

    • A) A local network of interconnected devices
    • B) A global network of interconnected computers
    • C) A software application for data processing
    • D) A type of computer hardware
54.

Which of the following is not a function of ICT?

    • A) Communication
    • B) Automation
    • C) Manual data entry
    • D) Education and Training
55.

What is digital literacy?

    • A) The ability to read and write
    • B) The ability to use digital technologies effectively
    • C) The understanding of computer hardware
    • D) The knowledge of programming languages
56.

What is the purpose of a graphics card in a computer?

    • A) To manage network connections
    • B) To improve video performance
    • C) To store data
    • D) To provide power to the system
57.

Which component is responsible for storing data permanently?

    • A) RAM
    • B) CPU
    • C) Hard Disk Drive (HDD)
    • D) Motherboard
58.

Which classification of computers is the most powerful?

    • A) Supercomputers
    • B) Mainframe Computers
    • C) Minicomputers
    • D) Personal Computers
59.

What is an example of an embedded computer?

    • A) Desktop computer
    • B) Mainframe computer
    • C) Smartphone
    • D) Supercomputer
60.

Define data security and explain its significance in an automated environment

61.

Describe the different types of data and provide examples for each type

62.

Explain the concept of data privacy and discuss its importance in data management

63.

Describe the control measures used to mitigate malware threats

64.

Identify and analyze common security threats in an automated environment

65.

Compare the roles of data security and data control in safeguarding information systems

66.

Discuss the impact of sophisticated cyber threats on data security

67.

Illustrate the process of encryption and its role in data security

68.

Evaluate the effectiveness of different access control mechanisms

69.

Summarize the challenges associated with data protection regulations such as GDPR and CCPA

70.

Assess the security risks introduced by big data and IoT devices

71.

Which of the following best defines data security?

    • A. The process of creating backups of data
    • B. Measures taken to protect data from unauthorized access and alterations
    • C. The method of analyzing data for business insights
    • D. Procedures for physical security of hardware
72.

What is a common characteristic of phishing attacks?

    • A. Exploiting software vulnerabilities
    • B. Encrypting user data and demanding ransom
    • C. Tricking individuals into revealing personal information
    • D. Overloading networks with traffic
73.

Which technology is primarily used to convert data into an unintelligible form to unauthorized users?

    • A. Firewalls
    • B. Encryption
    • C. Antivirus software
    • D. Intrusion detection systems
74.

What is the main goal of data loss prevention (DLP) systems?

    • A. Detecting malware on endpoints
    • B. Monitoring and preventing unauthorized data transmissions
    • C. Restricting access to physical hardware
    • D. Analyzing network traffic for anomalies
75.

Which regulation focuses on the protection of personal data within the European Union?

    • A. CCPA
    • B. NIS Directive
    • C. GDPR
    • D. CFAA
76.

Which type of malware is designed to replicate itself and spread across networks?

    • A. Virus
    • B. Trojan
    • C. Worm
    • D. Spyware
77.

What is the primary function of a firewall in network security?

    • A. Scanning for malware
    • B. Encrypting data
    • C. Monitoring and controlling network traffic
    • D. Performing regular system updates
78.

Which security measure involves verifying the identity of users before granting access?

    • A. Encryption
    • B. Authentication
    • C. Data classification
    • D. Patch management
79.

What is a zero-day exploit?

    • A. Malware that activates on a specific date
    • B. An attack on a vulnerability not yet known to the vendor
    • C. A phishing attack targeting high-level executives
    • D. Unauthorized physical access to a data center
80.

Which law provides legal validity to electronic signatures in the United States?

    • A. GDPR
    • B. ECPA
    • C. ESIGN Act
    • D. CFAA
81.

What is the primary focus of cybersecurity information sharing laws?

    • A. Protecting intellectual property
    • B. Facilitating the sharing of threat information
    • C. Regulating electronic communications
    • D. Ensuring consumer rights in e-commerce
82.

Which of the following best describes insider threats?

    • A. Attacks from outside the organization
    • B. Malicious or negligent actions by individuals within the organization
    • C. Social engineering attacks targeting employees
    • D. Physical threats to hardware
83.

What is the purpose of data classification in data control?

    • A. Storing data in different locations
    • B. Categorizing data based on sensitivity and criticality
    • C. Encrypting data for security
    • D. Monitoring data access activities
84.

Which technology can protect data during its transmission over networks?

    • A. Antivirus software
    • B. Encryption
    • C. Access control
    • D. Role-based access control
85.

Which of the following is a characteristic of a Trojan?

    • A. Self-replicating malware
    • B. Malware disguised as legitimate software
    • C. Network-based attack
    • D. Social engineering threat
86.

Define a word processor and explain its primary functions

87.

Analyze the impact of parallel processing on data retrieval in large datasets

88.

Evaluate the role of device drivers in the operation of I/O devices in an operating system.

89.

Describe the purpose of a word document and list three common file formats used

90.

Explain the process of text wrapping in a word processor

91.

Illustrate how text can be formatted in a word processor using examples

92.

Compare and contrast a spreadsheet and a database in terms of their functions and uses

93.

Summarize the key components and functionalities of spreadsheet software for data analysis

94.

Discuss the role of an operating system in managing hardware resources

95.

Analyze the importance of memory management in an operating system

96.

Evaluate the effectiveness of spell checking and grammar checking tools in word processing software

97.

Summarize the key features of spreadsheet software

98.

Distinguish between DML and DDL in the context of database manipulation

99.

Describe the normalization process in database design and its significance

100.

Explain the role of indexing in data retrieval and its impact on database performance

101.

What does the term "normalization" refer to in database design?

    • A) Creating indexes
    • B) Organizing data to reduce redundancy
    • C) Deleting records
    • D) Updating data
102.

What is the main purpose of a table in a word processor?

    • A) Formatting text
    • B) Organizing and displaying data in a grid
    • C) Inserting images
    • D) Checking grammar
103.

Which of the following is NOT a function of a word processor?

    • A) Creating documents
    • B) Editing text
    • C) Compiling code
    • D) Formatting documents
104.

What is the primary purpose of a database?

    • A) Creating visual presentations
    • B) Storing and managing data
    • C) Writing and editing documents
    • D) Designing web pages
105.

In a spreadsheet, what does the SUM function do?

    • A) Finds the average of a range of cells
    • B) Adds the values of a range of cells
    • C) Counts the number of cells
    • D) Multiplies the values of a range of cells
106.

Which of the following is a characteristic of a character in a text document?

    • A) A sequence of characters
    • B) A single symbol
    • C) A paragraph
    • D) A sentence
107.

What is the role of an operating system in process management?

    • A) Managing hardware resources
    • B) Scheduling processes for execution
    • C) Formatting documents
    • D) Designing databases
108.

Which statement about text wrap is correct?

    • A) It changes the font style
    • B) It adjusts text around images or objects
    • C) It deletes text
    • D) It copies text
109.

Which of the following is an example of a spreadsheet software?

    • A) Microsoft Word
    • B) Adobe Photoshop
    • C) Microsoft Excel
    • D) AutoCAD
110.

What is a cell in a spreadsheet?

    • A) A type of database
    • B) An individual rectangular box in a grid
    • C) A command in SQL
    • D) A function in a word processor
111.

Which of the following is NOT a type of user interface?

    • A) Graphical User Interface (GUI)
    • B) Command-Line Interface (CLI)
    • C) Database Management Interface (DMI)
    • D) Voice User Interface (VUI)
112.

In SQL, what does the SELECT statement do?

    • A) Inserts new records
    • B) Deletes records
    • C) Updates records
    • D) Retrieves specific information
113.

What is the primary function of device drivers in an operating system?

    • A) Creating documents
    • B) Enabling communication between the OS and hardware devices
    • C) Formatting text
    • D) Managing network connections
114.

Which of the following describes data caching?

    • A) Storing data temporarily in memory for quick access
    • B) Creating new database tables
    • C) Writing data to disk
    • D) Encrypting data
115.

What is the main benefit of transaction management in a database?

    • A) Improving query performance
    • B) Ensuring data consistency and reliability
    • C) Formatting data
    • D) Designing user interfaces
116.

Define the term "Internet" and explain its importance in the modern workplace

117.

Describe how email functions as a communication tool in the workplace

118.

Explain the role of HTTP in accessing web resources

119.

Illustrate how a web browser functions and list three popular examples

120.

Discuss the purpose and benefits of an extranet for businesses

121.

Identify the key elements found on a typical web page

122.

Analyze the importance of proper network configuration in maintaining a secure and efficient network