Internet
Web
Emails
Social Media
Malware
100

What is a worldwide network of computers that allows users to access other computers, data, and information? 

A) Intranet 

B) Internet

B) Internet

100

What is the written code used in creating Web pages? A) HTML B) HTTP

A) HTML

100

What is the common abbreviation for "electronic mail"? A) SMS 

B) Email

B) Email

100

What online platforms allow people to build social networks and connect with others who share similar interests? 

A) Search Engines 

B) Social Media

B) Social Media

100

What is the general term for malicious software designed to disrupt computer operations or gain unauthorized access? 

A) Firmware B) Malware

B) Malware

200

Which military computer network, established in 1969, was a precursor to the internet? 

A) ARPANET 

B) NSFNET

A) ARPANET

200

Which part of a web browser typically displays the web page's URL? 

A) Address Bar 

B) Toolbar

A) Address Bar

200

Which email field is used to specify the main recipient's address? 

A) CC 

B) To

B) To

200

Which of the following is a significant risk associated with using social media, involving harm caused by online harassment? 

A) Information sharing 

B) Cyberbullying

B) Cyberbullying

200

Which type of malware is characterized by its ability to replicate itself and spread to other computers without requiring user intervention or attaching to other programs? 

A) Trojan Horse B) Worm

B) Worm

300

Which internet connection type uses a modem and a telephone line, preventing phone use during connection? 

A) Broadband 

B) Dial-up

B) Dial-up
300

In a web browser, what button is used to go back to the previously viewed page? 

A) Forward Button 

B) Back Button

B) Back Button
300

Unwanted, unsolicited digital communication, especially email, sent in bulk, is known as: 

A) Spam 

B) Phishing

A) Spam

300

Stealing your personal information (name, birthday, credit card) to pretend to be you is called: 

A) Online Fraud B) Identity Theft

B) Identity Theft

300

A program that pretends to be a useful application, tricking users into installing it, and then secretly creating a "backdoor" for unauthorized access is a: 

A) Spyware B) Trojan Horse

B) Trojan Horse

400

What is currently known as the fastest broadband internet connection type? 

Fiber Internet

400

What is the unique and complete address of a webpage, such as https://www.example.com? 

URL

400

This is the common term for electronic mail, allowing the sending of messages across the Internet.

Email

400

This refers to people who illegally break into computer systems, often referred to as digital burglars or thieves.

Crackers

400

This type of malware attaches itself to programs or files and can spread when you share those infected items.

Computer Virus


500

What type of business provides people with access to the internet and typically charges a fee for the connection? 

Internet Service Provider

500

A software that lets a user display and interact with documents and resources in the Web is called a? 

Web Browser

500

This is where the user will enter the full message of email.

Body

500

This refers to people using computers/internet to trick you, steal money, or information.

Digital Thieves

500

This type of online fraud involves tricking you into giving sensitive information (like passwords or bank details) through fake emails or websites.

Phishing