
Which of the following best explains why solid-state drives outperform traditional hard drives?
A. They use rotating platters with higher RPMs
B. They utilize magnetized data storage sectors
C. They compress data automatically
D. They rely on flash memory with no moving parts
D. They rely on flash memory with no moving parts
A device driver’s main function is to:
A. Allow the operating system to communicate with hardware components
B. Manage temporary internet files
C. Encrypt sensitive files
D. Diagnose application crashes
A. Allow the operating system to communicate with hardware components
Which storage type typically offers the fastest data retrieval speed?
A. DVD
B. Magnetic tape
C. HDD
D. SSD
D. SSD
What does “cloud computing” primarily rely on?
A. A local area network (LAN)
B. User-installed storage devices
C. Peer-to-peer transfers
D. Internet-based remote servers
D. Internet-based remote servers
A phishing email can often be identified by:
A. Urgent tone and suspicious links requesting personal data
B. A secure HTTPS address
C. Grammar-free formatting
D. Encrypted attachments
A. Urgent tone and suspicious links requesting personal data
Which of these actions represents strong digital security hygiene?
A. Enabling 2FA on all logins
B. Using the same password for multiple sites
C. Saving passwords in an unencrypted document
D. Disabling updates to avoid pop-ups
A. Enabling 2FA on all logins
What is a strong password characteristic?
A. Only lowercase letters
B. Repeated characters
C. Includes personal information
D. Mix of upper/lowercase, numbers, and symbols
D. Mix of upper/lowercase, numbers, and symbols
What’s the function of a computer’s operating system?
A. It manages hardware, software, and user interaction
B. It provides only document editing tools
C. It serves as a power supply controller
D. It restricts all system updates
A. It manages hardware, software, and user interaction
What does “Ctrl + F” typically do?
A. Close the document
B. Copy selected text
C. Find text within a document
D. Format text
C. Find text within a document
Which unit measures processing speed?
A. Byte
B. Megabyte
C. Hertz
D. Gigahertz
D. Gigahertz
What is an example of an input device?
A. Monitor
B. Keyboard
C. Printer
D. Speaker
B. Keyboard
What component is essential for cooling the CPU?
A. Power supply
B. RAM module
C. Heat sink and fan
D. Motherboard
C. Heat sink and fan
Which shortcut typically performs an “undo” operation?
A. Ctrl + P
B. Ctrl + S
C. Ctrl + Z
D. Ctrl + N
C. Ctrl + Z
Which is an example of proper email etiquette in a professional setting?
A. Using informal slang
B. Leaving the subject blank
C. Sending attachments without explanation
D. Keeping messages concise and polite
D. Keeping messages concise and polite
What is the function of a hyperlink?
A. Encrypts data
B. Stores passwords
C. Connects devices
D. Links text or images to another location
D. Links text or images to another location
What is the main function of RAM in a computer system?
A. Store files long-term
B. Maintain system logs
C. Temporarily hold active data and instructions
D. Control the CPU speed
C. Temporarily hold active data and instructions

In spreadsheet software, the intersection of a row and a column is called a:
A. Range
B. Table
C. Cell
D. Formula
C. Cell
Which file format is most suitable for maintaining exact document layout across various devices?
A. DOCX
B. TXT
C. PDF
D. CSV
C. PDF
Why is data encryption important?
A. It increases data file size
B. It organizes files
C. It allows faster downloads
D. It protects information from unauthorized access
D. It protects information from unauthorized access
What feature allows users to view previous versions of a document in cloud applications?
A. Comments
B. Template mode
C. Version history
D. Format painter
C. Version history
Which option prevents others from editing a shared online document?
A. Comment mode
B. Suggestion mode
C. View-only permission
D. Read-write access
C. View-only permission
The main role of an antivirus program is to:
A. Monitor CPU temperature
B. Detect and remove malicious software
C. Optimize power usage
D. Manage cloud backups
B. Detect and remove malicious software

What is the benefit of using cloud backups?
A. They require manual updates
B. Data remains recoverable even if local hardware fails
C. They slow system performance
D. They increase file size
B. Data remains recoverable even if local hardware fails
In an email, what is the “BCC” field used for?
A. Primary recipient
B. Attachment list
C. Group chat
D. Hidden recipient copy
D. Hidden recipient copy

Which of the following is not an example of cloud service?
A. Google Drive
B. Dropbox
C. iCloud
D. BIOS
D. BIOS
What is the main purpose of an IP address?
A. To encrypt wireless networks
B. To identify users in an email system
C. To uniquely identify devices on a network
D. To store cookies
C. To uniquely identify devices on a network

What is the main purpose of a firewall?
A. To physically block internet cables
B. To monitor and filter network traffic
C. To store backup files
D. To update the OS
B. To monitor and filter network traffic
What function does a database query perform?
A. Save a file
B. Display presentation slides
C. Retrieve specific data from tables
D. Compress folders
C. Retrieve specific data from tables
Which application would be best suited for analyzing sales data trends?
A. Word processor
B. Spreadsheet
C. Presentation software
D. Database manager
B. Spreadsheet

What does a digital certificate verify?
A. File size
B. Image resolution
C. Website authenticity
D. Color settings
C. Website authenticity

In a web address, what does “https://” indicate?
A. A connection through a proxy server
B. A secure protocol with encryption
C. An unverified website
D. A local domain address
B. A secure protocol with encryption

Which of the following is not a peripheral device?
A. Scanner
B. Printer
C. Motherboard
D. Webcam
C. Motherboard
Which setting improves accessibility for visually impaired users?
A. Airplane mode
B. Task scheduler
C. Screen reader
D. Dark web filter
C. Screen reader
Which file format would best store a structured dataset?
A. PNG
B. MP3
C. CSV
C. CSV
In file management, what does “.exe” represent?
A. Compressed file
B. Executable program
C. Encrypted folder
D. Image file
B. Executable program
Which of the following tasks can be automated using a spreadsheet formula?
A. Sending an email
B. Compressing data
C. Drawing diagrams
D. Calculating totals automatically
D. Calculating totals automatically

Which key combination is used to switch between open windows in Windows OS?
A. Ctrl + W
B. Alt + Tab
C. Shift + Enter
D. F5
B. Alt + Tab

What is the most secure way to connect to a public Wi-Fi network?
A. Using open DNS
B. Disabling antivirus
C. Turning off firewall
D. Using a VPN
D. Using a VPN
Which type of malware disguises itself as legitimate software?
A. Worm
B. Trojan horse
C. Adware
D. Ransomware
B. Trojan horse

Which communication platform is considered synchronous?
A. Video conferencing
B. Email
C. Blog comments
D. Cloud storage
A. Video conferencing
Which document element provides a consistent appearance across pages?
A. Template
B. Chart
C. Comment
D. Hyperlink
A. Template
Which term describes the process of translating source code into machine language?
A. Debugging
B. Virtualization
C. Compilation
D. Fragmentation
C. Compilation
Which feature ensures that cloud-stored files remain updated across all devices?
A. Firewall settings
B. Disk cleanup
C. Version rollback
D. File synchronization
D. File synchronization
What is the function of the system BIOS?
A. Manage app permissions
B. Initialize hardware before the OS loads
C. Save user passwords
D. Encrypt drives
B. Initialize hardware before the OS loads

What is a macro used for in productivity software?
A. To delete files automatically
B. To design graphics
C. To encrypt documents
D. To automate repetitive tasks
D. To automate repetitive tasks
Which device provides the interface between a local network and the Internet?
A. Router
B. Hub
C. Switch
D. Repeater
A. Router
What happens when you clear your browser cache?
A. Bookmarks are deleted
B. Cookies are saved
C. Temporary stored data is removed
D. History becomes visible
C. Temporary stored data is removed

In presentation software, which view is best for rearranging slide order?
A. Reading view
B. Slide show view
C. Slide sorter view
D. Outline view
C. Slide sorter view
I have no spinning disks, yet I store and race, faster boots, no clatter, I win the speed chase.
What am I?
S_______
SSD / solid state drive
I hold what’s hot and what you’re doing now, power down and I’m empty — I’m the moment’s brow.
What am I?
R___
RAM
I keep the same look whether PC or phone, portable, fixed layout — when viewing I’m known.
What am I?
P____
You don’t touch my servers, you just use my space; I’m accessed by the web from any time or place.
What am I?
C______
CLOUD
Two layers of proof guard the gate you sign through something you know and something that proves it’s you.
What am I?
2___
2FA
Hit me when you mess up a move — I take it away, one keystroke can rewind the mistake of today.
What am I?
U___
UNDO
I whisper “urgent!” and ask for your keys, I’m not what I pretend — beware of my pleas.
What am I?
P_______
PHISHING
I pretend to be helpful but hide a poisonous core; I wear a friendly mask so you’ll invite me in the door.
What am I?
T_____
TROJAN / TROJAN HORSE
I stand between your network and the wide open net, I watch and filter traffic so intrusions are met. What am I?
F________
FIREWALL
I’m small, remembered, and tailored to you — sites use me to learn your view.
What am I?
C_______
COOKIE
I’m the practice of leaving behind trails of your online days;think before you post — I shape what others praise or raze.
What am I?
D________ F________
DIGITAL FOOTPRINT
I live between OS and device so they can talk,
without my little rules the hardware can’t walk.
What am I?
D_______ D_______
Device Driver/s