Tech Vocabulary
1
2
3
4
100

What is a digital footprint?

Your password history

Your activity history online

A type of software

A virus on your computer

Your activity history online

100

“Cyber security” is about…

A. Improving internet speed
B. Designing websites
C. Protecting systems and data from digital attacks
D. Storing files in the cloud

Protecting systems and data from digital attacks ✅

100

A “tech-savvy” person is someone who…

A. Works in IT
B. Knows a lot about using technology
C. Avoids social media
D. Invents new devices

Knows a lot about using technology ✅

100

What does “cloud storage” allow you to do?

A. Make your internet faster
B. Protect your screen
C. Store files on remote servers accessed via the internet
D. Fix broken hardware

Store files on remote servers accessed via the internet ✅

100

What does “lag” mean in technology?

A. A broken screen
B. A device overheating
C. A loud computer fan
D. A delay in response time during digital activity 

A delay in response time during digital activity ✅

200

A "data breach" happens when

Data is deleted by mistake

A system updates automatically

Private information is accessed illegally

Wi- fi stops working

Private information is accessed illegally

200

“Misinformation” is…

A. Very detailed information
B. Information that is false or misleading
C. Government secrets
D. Online advertisements

Information that is false or misleading ✅

200

“Information overload” happens when…

A. Your device has no memory
B. You receive too much information to process effectively
C. The internet stops working
D. You forget your password

You receive too much information to process effectively ✅

200

What is “artificial intelligence (AI)”?

A. A type of computer virus
B. Machines designed to think and learn like humans
C. A social media platform
D. Human knowledge stored online

Machines designed to think and learn like humans ✅

200

What is a “firewall”?

A. A type of virus
B. A social media filter
C. A program that blocks unauthorized access to a network
D. A device that cools your computer

A program that blocks unauthorized access to a network ✅

300

What does "Algorithm" do?

Protects your computer from viruses

Stores photos online

Follows rules to solve a problem or make decisions

Deletes old files

Follows rules to solve a problem or make decisions

300

“Screen time” describes…

A. The brightness of your screen
B. Time spent using digital devices
C. Watching movies at the cinema
D. Fixing a broken screen

Time spent using digital devices ✅

300

“Facial recognition” technology is used to…

A. Improve photo quality
B. Identify a person by analyzing their face
C. Create avatars
D. Scan fingerprints

Identify a person by analyzing their face ✅

300

“Phishing” is when someone…

A. Improves website design
B. Installs new software
C. Downloads music illegally
D. Tries to trick you into giving personal information online 

Tries to trick you into giving personal information online ✅

300

“Streaming” means…

A. Watching or listening to content online without downloading it fully
B. Downloading files permanently
C. Playing offline games
D. Sending emails

Watching or listening to content online without downloading it fully ✅

400

“Surveillance” means…

A. Protecting personal data
B. Watching or monitoring people’s activities
C. Fixing technical problems
D. Creating new apps

Watching or monitoring people’s activities

400

“Online privacy” means…

A. Having a private social media account
B. Controlling who can see and use your personal data online
C. Deleting old emails
D. Using the internet at night

Controlling who can see and use your personal data online ✅

400

“Device dependency” means…

A. Owning many devices
B. Feeling unable to function without digital devices
C. Charging devices too often
D. Sharing devices with others

Feeling unable to function without digital devices ✅

400

What is “two-factor authentication”?

A. Sharing your password with someone
B. An extra security step to verify your identity
C. Logging into two accounts at once
D. Using two passwords

 An extra security step to verify your identity ✅

400

What does “user-friendly” describe?

A. Cheap technology
B. Technology that is easy to use
C. Very advanced software
D. Devices with many buttons

Technology that is easy to use ✅

500

“Automation” refers to…

A. People working from home
B. Machines doing tasks instead of humans
C. Learning to use new software
D. Communicating online

Machines doing tasks instead of humans ✅

500

Virtual Reality (VR) allows users to…

A. Chat with robots
B. Enter a computer-generated 3D environment
C. Store large files
D. Improve Wi-Fi connection

Enter a computer-generated 3D environment ✅

500

Which situation is an example of a privacy risk?

A. Updating your phone
B. Using strong passwords
C. Posting your home address publicly online
D. Turning off notifications

Posting your home address publicly online ✅

500

A “software update” usually aims to…

A. Remove all apps
B. Delete user data
C. Make the device heavier
D. Improve performance and fix security issues 

Improve performance and fix security issues ✅

500

What is “digital addiction”?

A. Studying computer science
B. Being unable to control excessive use of digital devices
C. Enjoying technology
D. Needing new devices often

Being unable to control excessive use of digital devices ✅

M
e
n
u