1
2
3
4
5
100

Explain how the Internet connects computers globally and what is the role of servers and clients?

The Internet links computers worldwide in a network where clients request data and servers store and send that data.

100

How does digital currency differ from money stored in a bank account?

Digital currency exists only electronically and often runs without central control, unlike bank money which is regulated by institutions.

100

What’s the difference between a virus and a worm in computer systems?

A virus needs user action to spread; a worm can self-replicate and spread automatically.

100

 What is data storage?

The process of saving digital information so it can be retrieved and used later.

100

What is an input device? Give one example

A device that sends data to a computer, like a keyboard or mouse.

200

What’s the difference between a domain name and an IP address?

A domain name is a readable web address like google.com, while an IP address is the numeric identifier of a device on the network

200

What is a wallet in cryptocurrency, and what does it store?

A crypto wallet stores the user’s public and private keys needed to access, send, and receive digital currency

200

Explain why multi-factor authentication increases account security

It requires two or more verification methods, making it harder for hackers to gain access with just a password.

200

What’s the difference between primary and secondary storage?

Primary storage (RAM) is temporary and fast, while secondary storage (like SSDs or hard drives) is permanent and slower.

200

What is an output device? Give one example.

A device that displays or produces computer data, like a monitor or printer

300

Why might a website load slowly even if your Internet speed is fast?

Possible reasons include server overload, large image or video files, too many ads or scripts, or poor website design.

300

How does a blockchain ensure that no one can spend the same cryptocurrency twice (known as the “double-spending problem”)?

Each transaction is verified by multiple nodes and recorded permanently in a public ledger; once confirmed, previous transactions can’t be changed or reused.

300

How do cyberattacks exploit weaknesses in human behavior as well as in technology?

Attackers use phishing, fake websites, or emotional manipulation to trick users into giving access — targeting psychology instead of software flaws.

300

How does optical storage work, and give one example.

It uses lasers to read and write data on discs like CDs, DVDs, or Blu-ray discs.

300

Explain how a touchscreen can act as both an input and output device.

It displays images (output) and detects touch commands (input), allowing direct interaction with the screen.

400

What is DNS and how does it make browsing the web easier?

DNS (Domain Name System) converts domain names into IP addresses so users can access sites without memorizing numbers.

400

How does cryptography maintain trust in digital currency systems, and what might happen if encryption algorithms were ever broken?

Cryptography secures transactions by verifying identities and ensuring data integrity through digital signatures and hashing. If encryption were broken, hackers could forge transactions, create fake coins, or compromise entire blockchains, destroying trust in the system.

400

Compare symmetric and asymmetric encryption and explain when each is typically used.

Symmetric encryption uses one shared key for both encryption and decryption (fast, used for internal data). Asymmetric uses a public and private key pair (slower but secure, used for online communication).

400

Compare magnetic, optical, and solid-state storage in terms of how they store data and their advantages.

Magnetic uses spinning disks and magnets (large capacity, cheaper), optical uses lasers (good for media storage), and solid-state uses flash memory (fast and durable, but expensive).

400

How do scanners and sensors differ in how they collect data?

Scanners capture flat images or documents, while sensors detect physical changes like temperature, motion, or light levels and convert them into data.

500

How do web browsers use caching, cookies, and scripts to load web pages efficiently and what are the potential privacy or performance issues?

Browsers store cached data to load pages faster, use cookies to track sessions, and run scripts for interactivity. However, this can slow performance, expose user data, or allow third-party tracking

500

Describe two major economic or environmental criticisms of cryptocurrency and suggest one possible solution for each.

High energy use (solution: shift to Proof of Stake or renewable energy) and price volatility (solution: stablecoins or regulation). Both affect sustainability and trust in digital currencies.

500

Describe how cybersecurity experts use penetration testing and firewalls together to protect networks, and why both are needed.

Penetration testing simulates attacks to find weaknesses, while firewalls block unauthorized access. Both are necessary because one identifies vulnerabilities, and the other defends against them in real time.

500

Explain how cloud storage works and discuss one major benefit and one major risk

Cloud storage saves data on remote servers accessed via the Internet. Benefit: accessible from anywhere. Risk: relies on internet connection and may expose data to privacy breaches.

500

Describe how 3D printers and virtual reality headsets represent advanced output devices, and explain the technology behind one of them.

3D printers output physical objects using layer-by-layer additive manufacturing; VR headsets output immersive visuals using motion sensors and stereoscopic displays to simulate reality.