1
2
3
4
5
6
7
8
9
10
11
12
100

Which of the following best explains why solid-state drives outperform traditional hard drives?

A. They use rotating platters with higher RPMs

B. They utilize magnetized data storage sectors

C. They compress data automatically

D. They rely on flash memory with no moving parts

D. They rely on flash memory with no moving parts

100

A device driver’s main function is to:

A. Allow the operating system to communicate with hardware components

B. Manage temporary internet files

C. Encrypt sensitive files

D. Diagnose application crashes

A. Allow the operating system to communicate with hardware components

100

Which storage type typically offers the fastest data retrieval speed?

A. DVD

B. Magnetic tape

C. HDD

D. SSD

D. SSD

100

What does “cloud computing” primarily rely on?

A. A local area network (LAN)

B. User-installed storage devices

C. Peer-to-peer transfers

D. Internet-based remote servers

D. Internet-based remote servers

100

A phishing email can often be identified by:

A. Urgent tone and suspicious links requesting personal data

B. A secure HTTPS address

C. Grammar-free formatting

D. Encrypted attachments

A. Urgent tone and suspicious links requesting personal data

100

Which of these actions represents strong digital security hygiene?

A. Enabling 2FA on all logins

B. Using the same password for multiple sites

C. Saving passwords in an unencrypted document

D. Disabling updates to avoid pop-ups

A. Enabling 2FA on all logins

100

What is a strong password characteristic?

A. Only lowercase letters

B. Repeated characters

C. Includes personal information

D. Mix of upper/lowercase, numbers, and symbols

D. Mix of upper/lowercase, numbers, and symbols

100

What’s the function of a computer’s operating system?

A. It manages hardware, software, and user interaction

B. It provides only document editing tools

C. It serves as a power supply controller

D. It restricts all system updates

A. It manages hardware, software, and user interaction

100

What does “Ctrl + F” typically do?

A. Close the document

B. Copy selected text

C. Find text within a document

D. Format text

C. Find text within a document

100

Which unit measures processing speed?

A. Byte

B. Megabyte

C. Hertz

D. Gigahertz

D. Gigahertz

100

What is an example of an input device?

A. Monitor

B. Keyboard

C. Printer

D. Speaker

B. Keyboard

100

What component is essential for cooling the CPU?

A. Power supply

B. RAM module

C. Heat sink and fan

D. Motherboard

C. Heat sink and fan

200

Which shortcut typically performs an “undo” operation?

A. Ctrl + P

B. Ctrl + S

C. Ctrl + Z

D. Ctrl + N

C. Ctrl + Z

200

Which is an example of proper email etiquette in a professional setting?

A. Using informal slang

B. Leaving the subject blank

C. Sending attachments without explanation

D. Keeping messages concise and polite

D. Keeping messages concise and polite

200

What is the function of a hyperlink?

A. Encrypts data

B. Stores passwords

C. Connects devices

D. Links text or images to another location

D. Links text or images to another location

200

What is the main function of RAM in a computer system?

A. Store files long-term

B. Maintain system logs

C. Temporarily hold active data and instructions

D. Control the CPU speed

C. Temporarily hold active data and instructions

200

In spreadsheet software, the intersection of a row and a column is called a:

A. Range

B. Table

C. Cell

D. Formula

C. Cell

200

Which file format is most suitable for maintaining exact document layout across various devices?

A. DOCX

B. TXT

C. PDF

D. CSV

C. PDF

200

Why is data encryption important?

A. It increases data file size

B. It organizes files

C. It allows faster downloads

D. It protects information from unauthorized access

D. It protects information from unauthorized access

200

What feature allows users to view previous versions of a document in cloud applications?

A. Comments

B. Template mode

C. Version history

D. Format painter

C. Version history

200

Which option prevents others from editing a shared online document?

A. Comment mode

B. Suggestion mode

C. View-only permission

D. Read-write access

C. View-only permission

200

The main role of an antivirus program is to:

A. Monitor CPU temperature

B. Detect and remove malicious software

C. Optimize power usage

D. Manage cloud backups

B. Detect and remove malicious software

200

What is the benefit of using cloud backups?

A. They require manual updates

B. Data remains recoverable even if local hardware fails

C. They slow system performance

D. They increase file size

B. Data remains recoverable even if local hardware fails

200

In an email, what is the “BCC” field used for?

A. Primary recipient

B. Attachment list

C. Group chat

D. Hidden recipient copy

D. Hidden recipient copy

300

Which of the following is not an example of cloud service?

A. Google Drive

B. Dropbox

C. iCloud

D. BIOS 

D. BIOS

300

What is the main purpose of an IP address?

A. To encrypt wireless networks

B. To identify users in an email system

C. To uniquely identify devices on a network

D. To store cookies

C. To uniquely identify devices on a network

300

What is the main purpose of a firewall?

A. To physically block internet cables

B. To monitor and filter network traffic

C. To store backup files

D. To update the OS

B. To monitor and filter network traffic

300

What function does a database query perform?

A. Save a file

B. Display presentation slides

C. Retrieve specific data from tables

D. Compress folders

C. Retrieve specific data from tables

300

Which application would be best suited for analyzing sales data trends?

A. Word processor

B. Spreadsheet

C. Presentation software

D. Database manager

B. Spreadsheet

300

What does a digital certificate verify?

A. File size

B. Image resolution

C. Website authenticity

D. Color settings

C. Website authenticity

300

In a web address, what does “https://” indicate?

A. A connection through a proxy server

B. A secure protocol with encryption

C. An unverified website

D. A local domain address

B. A secure protocol with encryption

300

Which of the following is not a peripheral device?

A. Scanner

B. Printer

C. Motherboard

D. Webcam

C. Motherboard

300

Which setting improves accessibility for visually impaired users?

A. Airplane mode

B. Task scheduler

C. Screen reader

D. Dark web filter

C. Screen reader

300

Which file format would best store a structured dataset?

A. PNG

B. MP3

C. CSV


C. CSV

300

In file management, what does “.exe” represent?

A. Compressed file

B. Executable program

C. Encrypted folder

D. Image file

B. Executable program

300

Which of the following tasks can be automated using a spreadsheet formula?

A. Sending an email

B. Compressing data

C. Drawing diagrams

D. Calculating totals automatically

D. Calculating totals automatically

400

Which key combination is used to switch between open windows in Windows OS?

A. Ctrl + W

B. Alt + Tab

C. Shift + Enter

D. F5

B. Alt + Tab

400

What is the most secure way to connect to a public Wi-Fi network?

A. Using open DNS

B. Disabling antivirus

C. Turning off firewall

D. Using a VPN

D. Using a VPN

400

Which type of malware disguises itself as legitimate software?

A. Worm

B. Trojan horse

C. Adware

D. Ransomware

B. Trojan horse

400

Which communication platform is considered synchronous?

A. Video conferencing

B. Email

C. Blog comments

D. Cloud storage

A. Video conferencing

400

Which document element provides a consistent appearance across pages?

A. Template

B. Chart

C. Comment

D. Hyperlink

A. Template

400

Which term describes the process of translating source code into machine language?

A. Debugging

B. Virtualization

C. Compilation

D. Fragmentation

C. Compilation

400

Which feature ensures that cloud-stored files remain updated across all devices?

A. Firewall settings

B. Disk cleanup

C. Version rollback

D. File synchronization

D. File synchronization

400

What is the function of the system BIOS?

A. Manage app permissions

B. Initialize hardware before the OS loads

C. Save user passwords

D. Encrypt drives

B. Initialize hardware before the OS loads

400

What is a macro used for in productivity software?

A. To delete files automatically

B. To design graphics

C. To encrypt documents

D. To automate repetitive tasks

D. To automate repetitive tasks

400

Which device provides the interface between a local network and the Internet?

A. Router

B. Hub

C. Switch

D. Repeater

A. Router

400

What happens when you clear your browser cache?

A. Bookmarks are deleted

B. Cookies are saved

C. Temporary stored data is removed

D. History becomes visible

C. Temporary stored data is removed

400

In presentation software, which view is best for rearranging slide order?

A. Reading view

B. Slide show view

C. Slide sorter view

D. Outline view

C. Slide sorter view

500

I have no spinning disks, yet I store and race, faster boots, no clatter, I win the speed chase.

What am I?

S_______

SSD / solid state drive

500

I hold what’s hot and what you’re doing now, power down and I’m empty — I’m the moment’s brow.

What am I?

R___

RAM

500

I keep the same look whether PC or phone, portable, fixed layout — when viewing I’m known.

What am I?

P____

PDF

500

You don’t touch my servers, you just use my space; I’m accessed by the web from any time or place.

What am I?

C______

CLOUD

500

Two layers of proof guard the gate you sign through something you know and something that proves it’s you.

What am I?

2___

2FA

500

Hit me when you mess up a move — I take it away, one keystroke can rewind the mistake of today.

What am I?

U___

UNDO

500

I whisper “urgent!” and ask for your keys, I’m not what I pretend — beware of my pleas.

What am I?

P_______

PHISHING

500

I pretend to be helpful but hide a poisonous core; I wear a friendly mask so you’ll invite me in the door.

What am I?

T_____

TROJAN / TROJAN HORSE

500

I stand between your network and the wide open net, I watch and filter traffic so intrusions are met. What am I?

F________

FIREWALL

500

I’m small, remembered, and tailored to you — sites use me to learn your view.

What am I?

C_______

COOKIE

500

I’m the practice of leaving behind trails of your online days;think before you post — I shape what others praise or raze.

What am I?

D________ F________

DIGITAL FOOTPRINT


500

I live between OS and device so they can talk,

without my little rules the hardware can’t walk.

What am I?


D_______ D_______

Device Driver/s