1.

Evaluate the benefits and challenges of cloud computing

2.

Analyze the impact of insider threats on data security and suggest mitigation strategies

3.

Compare network-based threats like DoS and MitM attacks, and propose appropriate control measures

4.

Discuss the legal implications of data breaches for organizations

5.

Illustrate the process of applying security patches and updates to prevent zero-day exploits

6.

Evaluate the effectiveness of firewalls and intrusion detection systems in protecting networks

7.

Define cybercrime and list various types of computer crimes with examples

8.

Explain how encryption helps in protecting data during transmission

9.

Describe the role of data governance in ensuring data security and control

10.

Identify the challenges of cloud security and propose solutions to address these challenges

11.

Examine the importance of compliance management in data control

12.

Outline the classification of security threats and provide examples for each category

13.

Assess the security mechanisms implemented by an operating system to protect data

14.

Compare different types of user interfaces provided by operating systems

15.

Describe how query optimization techniques can improve database performance

16.

Explain the concept of data caching and its benefits for query performance

17.

Define ICT and explain its significance in modern society

18.

Describe the difference between computer hardware and software

19.

 Explain the concept of digital literacy and its importance

20.

Identify the key milestones in the history of computers

21.

Discuss the role of the Internet in global communication

22.

Compare and contrast mainframe computers and supercomputers

23.

Analyze the impact of mobile computing on everyday life

24.

Illustrate how a CPU functions within a computer system

25.

Summarize the evolution of personal computers from the 1970s to the present

26.

Outline the primary functions of ICT in business environments

27.

Classify the different types of storage devices and their uses

28.

Critically assess the impact of ICT on globalization

29.

Explain how embedded computers are utilized in everyday devices

30.

List the main components of a computer and their functions

31.

Describe the process of information processing in ICT

32.

Examine the role of ICT in modern education and training

33.

Discuss the significance of convergence in ICT

34.

Explain the concept of interactivity in digital technologies

35.

Identify the various output devices used in computer systems

36.

Discuss the functions of automation in ICT

37.

Which development significantly contributed to the rise of personal computers in the 1970s and 1980s?

    • A) Vacuum tubes
    • B) Mechanical calculators
    • C) Microprocessors
    • D) Punch cards
38.

Describe the types of input devices and their purposes

39.

Explain the classification of computers based on size and purpose

40.

Analyze the technological advancements that led to the development of the Internet

41.

Evaluate the role of workstations in professional environments

42.

Which of the following best defines ICT?

    • A) The use of computers for processing data
    • B) Technologies that provide access to information through telecommunications
    • C) A collection of data or instructions that tell the computer how to work
    • D) The physical components of a computer system
43.

What is the primary function of the CPU in a computer?

    • A) To store data permanently
    • B) To execute instructions and perform calculations
    • C) To provide power to the system
    • D) To manage network connections
44.

Which device is considered an input device?

    • A) Monitor
    • B) Printer
    • C) Keyboard
    • D) Speaker
45.

Discuss the importance of transaction management in maintaining database integrity

46.

What does RAM stand for?

    • A) Random Access Memory
    • B) Read Access Memory
    • C) Rapid Access Module
    • D) Real-time Access Memory
47.

Which type of computer is known for handling large volumes of data and supporting multiple users?

    • A) Personal Computer
    • B) Workstation
    • C) Mainframe Computer
    • D) Embedded Computer
48.

What is the main purpose of a server?

    • A) To perform complex calculations
    • B) To provide services or resources to other computers on a network
    • C) To store and retrieve large amounts of data
    • D) To enable real-time interaction with digital content
49.

Which of the following is not a function of ICT?

    • A) Communication
    • B) Automation
    • C) Manual data entry
    • D) Education and Training
50.

What is digital literacy?

    • A) The ability to read and write
    • B) The ability to use digital technologies effectively
    • C) The understanding of computer hardware
    • D) The knowledge of programming languages
51.

What is the purpose of a graphics card in a computer?

    • A) To manage network connections
    • B) To improve video performance
    • C) To store data
    • D) To provide power to the system
52.

Which component is responsible for storing data permanently?

    • A) RAM
    • B) CPU
    • C) Hard Disk Drive (HDD)
    • D) Motherboard
53.

Which classification of computers is the most powerful?

    • A) Supercomputers
    • B) Mainframe Computers
    • C) Minicomputers
    • D) Personal Computers
54.

What was the primary function of early computing devices like the abacus?

    • A) Storing data
    • B) Performing arithmetic calculations
    • C) Displaying visual information
    • D) Enabling communication
55.

Which of the following describes the Internet?

    • A) A local network of interconnected devices
    • B) A global network of interconnected computers
    • C) A software application for data processing
    • D) A type of computer hardware
56.

What is an example of an embedded computer?

    • A) Desktop computer
    • B) Mainframe computer
    • C) Smartphone
    • D) Supercomputer
57.

Define data security and explain its significance in an automated environment

58.

Describe the different types of data and provide examples for each type

59.

Explain the concept of data privacy and discuss its importance in data management

60.

Identify and analyze common security threats in an automated environment

61.

Compare the roles of data security and data control in safeguarding information systems

62.

Discuss the impact of sophisticated cyber threats on data security

63.

Illustrate the process of encryption and its role in data security

64.

Evaluate the effectiveness of different access control mechanisms

65.

Summarize the challenges associated with data protection regulations such as GDPR and CCPA

66.

Assess the security risks introduced by big data and IoT devices

67.

Describe the control measures used to mitigate malware threats

68.

Examine the various types of social engineering threats and suggest preventive measures

69.

Outline the steps involved in developing an incident response plan

70.

Critique the role of security awareness training in preventing phishing attacks

71.

Which of the following best defines data security?

    • A. The process of creating backups of data
    • B. Measures taken to protect data from unauthorized access and alterations
    • C. The method of analyzing data for business insights
    • D. Procedures for physical security of hardware
72.

What is a common characteristic of phishing attacks?

    • A. Exploiting software vulnerabilities
    • B. Encrypting user data and demanding ransom
    • C. Tricking individuals into revealing personal information
    • D. Overloading networks with traffic
73.

Which technology is primarily used to convert data into an unintelligible form to unauthorized users?

    • A. Firewalls
    • B. Encryption
    • C. Antivirus software
    • D. Intrusion detection systems
74.

What is the main goal of data loss prevention (DLP) systems?

    • A. Detecting malware on endpoints
    • B. Monitoring and preventing unauthorized data transmissions
    • C. Restricting access to physical hardware
    • D. Analyzing network traffic for anomalies
75.

Which regulation focuses on the protection of personal data within the European Union?

    • A. CCPA
    • B. NIS Directive
    • C. GDPR
    • D. CFAA
76.

Which type of malware is designed to replicate itself and spread across networks?

    • A. Virus
    • B. Trojan
    • C. Worm
    • D. Spyware
77.

What is the primary function of a firewall in network security?

    • A. Scanning for malware
    • B. Encrypting data
    • C. Monitoring and controlling network traffic
    • D. Performing regular system updates
78.

Which security measure involves verifying the identity of users before granting access?

    • A. Encryption
    • B. Authentication
    • C. Data classification
    • D. Patch management
79.

What is a zero-day exploit?

    • A. Malware that activates on a specific date
    • B. An attack on a vulnerability not yet known to the vendor
    • C. A phishing attack targeting high-level executives
    • D. Unauthorized physical access to a data center
80.

Which law provides legal validity to electronic signatures in the United States?

    • A. GDPR
    • B. ECPA
    • C. ESIGN Act
    • D. CFAA
81.

What is the primary focus of cybersecurity information sharing laws?

    • A. Protecting intellectual property
    • B. Facilitating the sharing of threat information
    • C. Regulating electronic communications
    • D. Ensuring consumer rights in e-commerce
82.

Which of the following best describes insider threats?

    • A. Attacks from outside the organization
    • B. Malicious or negligent actions by individuals within the organization
    • C. Social engineering attacks targeting employees
    • D. Physical threats to hardware
83.

What is the purpose of data classification in data control?

    • A. Storing data in different locations
    • B. Categorizing data based on sensitivity and criticality
    • C. Encrypting data for security
    • D. Monitoring data access activities
84.

Which technology can protect data during its transmission over networks?

    • A. Antivirus software
    • B. Encryption
    • C. Access control
    • D. Role-based access control
85.

Which of the following is a characteristic of a Trojan?

    • A. Self-replicating malware
    • B. Malware disguised as legitimate software
    • C. Network-based attack
    • D. Social engineering threat
86.

Define a word processor and explain its primary functions

87.

Analyze the impact of parallel processing on data retrieval in large datasets

88.

Evaluate the role of device drivers in the operation of I/O devices in an operating system.

89.

Describe the purpose of a word document and list three common file formats used

90.

Explain the process of text wrapping in a word processor

91.

Illustrate how text can be formatted in a word processor using examples

92.

Compare and contrast a spreadsheet and a database in terms of their functions and uses

93.

Summarize the key components and functionalities of spreadsheet software for data analysis

94.

Discuss the role of an operating system in managing hardware resources

95.

Analyze the importance of memory management in an operating system

96.

Evaluate the effectiveness of spell checking and grammar checking tools in word processing software

97.

Summarize the key features of spreadsheet software

98.

Distinguish between DML and DDL in the context of database manipulation

99.

Describe the normalization process in database design and its significance

100.

Explain the role of indexing in data retrieval and its impact on database performance

101.

Which of the following is NOT a function of a word processor?

    • A) Creating documents
    • B) Editing text
    • C) Compiling code
    • D) Formatting documents
102.

What is the primary purpose of a database?

    • A) Creating visual presentations
    • B) Storing and managing data
    • C) Writing and editing documents
    • D) Designing web pages
103.

In a spreadsheet, what does the SUM function do?

    • A) Finds the average of a range of cells
    • B) Adds the values of a range of cells
    • C) Counts the number of cells
    • D) Multiplies the values of a range of cells
104.

Which of the following is a characteristic of a character in a text document?

    • A) A sequence of characters
    • B) A single symbol
    • C) A paragraph
    • D) A sentence
105.

What is the role of an operating system in process management?

    • A) Managing hardware resources
    • B) Scheduling processes for execution
    • C) Formatting documents
    • D) Designing databases
106.

Which statement about text wrap is correct?

    • A) It changes the font style
    • B) It adjusts text around images or objects
    • C) It deletes text
    • D) It copies text
107.

What does the term "normalization" refer to in database design?

    • A) Creating indexes
    • B) Organizing data to reduce redundancy
    • C) Deleting records
    • D) Updating data
108.

What is the main purpose of a table in a word processor?

    • A) Formatting text
    • B) Organizing and displaying data in a grid
    • C) Inserting images
    • D) Checking grammar
109.

Which of the following is an example of a spreadsheet software?

    • A) Microsoft Word
    • B) Adobe Photoshop
    • C) Microsoft Excel
    • D) AutoCAD
110.

What is a cell in a spreadsheet?

    • A) A type of database
    • B) An individual rectangular box in a grid
    • C) A command in SQL
    • D) A function in a word processor
111.

Which of the following is NOT a type of user interface?

    • A) Graphical User Interface (GUI)
    • B) Command-Line Interface (CLI)
    • C) Database Management Interface (DMI)
    • D) Voice User Interface (VUI)
112.

In SQL, what does the SELECT statement do?

    • A) Inserts new records
    • B) Deletes records
    • C) Updates records
    • D) Retrieves specific information
113.

What is the primary function of device drivers in an operating system?

    • A) Creating documents
    • B) Enabling communication between the OS and hardware devices
    • C) Formatting text
    • D) Managing network connections
114.

Which of the following describes data caching?

    • A) Storing data temporarily in memory for quick access
    • B) Creating new database tables
    • C) Writing data to disk
    • D) Encrypting data
115.

What is the main benefit of transaction management in a database?

    • A) Improving query performance
    • B) Ensuring data consistency and reliability
    • C) Formatting data
    • D) Designing user interfaces
116.

Define the term "Internet" and explain its importance in the modern workplace

117.

Describe how email functions as a communication tool in the workplace

118.

Explain the role of HTTP in accessing web resources

119.

Illustrate how a web browser functions and list three popular examples

120.

Discuss the purpose and benefits of an extranet for businesses

121.

Identify the key elements found on a typical web page

122.

Analyze the importance of proper network configuration in maintaining a secure and efficient network