Which of the following is a modal verb?
a) Can
b) Have
c) Walk
Which of the following is a relational database?
a) MySQL
b) MongoDB
c) Redis
What does AI stand for?
a) Artificial Intelligence
b) Automated Integration
c) Advanced Inference
What does "phishing" refer to?
a) Fraudulent attempts to obtain sensitive information
b) A type of firewall
c) Secure email encryption
Which language is primarily used for structuring web content?
a) HTML
b) CSS
c) JavaScript
What is the passive form of "She writes a letter"?
a) A letter was written by her.
b) A letter is written by her.
c) A letter writes her.
Which of the following statements about primary keys is TRUE?
a) A table can have multiple primary keys.
b) A primary key uniquely identifies each record in a table.
c) A primary key can have duplicate values.
What type of AI model is used for language translation?
a) Convolutional Neural Networks (CNNs)
b) Recurrent Neural Networks (RNNs)
c) Decision Trees
What does HTTPS encrypt?
a) Only passwords
b) The entire communication between client and server
c) Only credit card information
What is the purpose of CSS?
a) To structure content
b) To style and format web pages
c) To store user data
Which sentence is an example of a zero conditional?
a) If you heat water, it boils.
b) If I study, I will pass the test.
c) If I were rich, I would travel the world.
Which SQL command is used to retrieve data?
a) DELETE
b) UPDATE
c) SELECT
What is Machine Learning?
a) A programming language
b) A field of AI that allows systems to learn from data
c) A type of database management
Which attack exploits the human factor rather than technical vulnerabilities?
a) SQL Injection
b) Man-in-the-Middle Attack
c) Social Engineering
Which of the following is NOT a JavaScript framework?
a) Angular
b) React
c) Django
Which of the following sentences correctly uses Present Perfect?
a) She has seen that movie twice.
b) She is seeing that movie twice.
c) She saw that movie twice.
What is an index in a database used for?
a) To store backup copies of data
b) To speed up search queries
c) To delete duplicate records
What is a "black box" problem in AI?
a) AI models that have no user interface
b) AI models that are difficult to interpret
c) AI models that only use unstructured data
What is the primary function of a firewall?
a) Encrypt sensitive data
b) Prevent unauthorized network access
c) Detect and remove malware
Which design principle ensures that websites work across all devices?
a) Adaptive design
b) Responsive design
c) Grid layout
Which sentence correctly uses "must" as a modal verb?
a) You must to study for the exam.
b) You must study for the exam.
c) You must studies for the exam.
Which normalization form removes partial dependencies?
a) First Normal Form (1NF)
b) Second Normal Form (2NF)
c) Third Normal Form (3NF)
Which AI algorithm is best suited for anomaly detection in cybersecurity?
a) K-Means Clustering
b) Random Forest
c) Naïve Bayes
What does "2FA" stand for in cybersecurity?
a) Two-Factor Authentication
b) Two-File Access
c) Transferable Firewall Application
Which protocol is commonly used for secure website authentication?
a) FTP
b) OAuth
c) HTTP