TECHNOLOGY AND BUSINESS
JOBS AND CAREER IN TECHNOLOGY
MALWARE
SPAM,PHISHING AND DATA ENCRYPTION
THE IMPACT OF TECHNOLOGY
100

What is a key advantage of technology in business? 

A) It slows down business processes
B) It increases production costs
C) It improves efficiency and productivity

C) It improves efficiency and productivity

100

Which of the following is a reason for job growth in the IT industry?

A) The decline of cloud computing
B) The rise of technologies like cybersecurity and data management
C) The decrease in mobile networking usage

B) The rise of technologies like cybersecurity and data management

100

What does the term "malware" stand for?

A) Malicious software
B) Manual software
C) Mobile software

A) Malicious software

100

What is spam commonly known as?

A) Encrypted data

B) Personal email

C) Electronic junk mail

C) Electronic junk mail

100

 What is technotrash also known as?

A) Recycled waste
B) Electronic waste (e-waste)
C) Biodegradable material

B) Electronic waste (e-waste)

200

Which of the following IT tools helps businesses make better decisions?

A) Video conferences, online surveys, and social media
B) Fax, letters, and phone calls
C) Billboards and TV commercials

A) Video conferences, online surveys, and social media

200

What is the main role of a computer support specialist?

A) Assisting users with software, hardware, and peripheral issues
B) Designing and maintaining databases
C) Creating and testing software applications

A) Assisting users with software, hardware, and peripheral issues

200

How does a computer virus spread?

A) It copies itself without user interaction

B) It does not need to attach itself to a file

C) It requires human action to spread

C) It requires human action to spread

200

 What is the main goal of phishing?

A) To send commercial advertisements
B) To trick users into providing personal and financial information
C) To store emails in a secure database

B) To trick users into providing personal and financial information

200

How can technotrash harm the environment?

A) It contains toxic materials that can pollute air, water, and soil

B) It releases oxygen into the air

C) It helps plants grow faster

A) It contains toxic materials that can pollute air, water, and soil

300

Which of the following technologies has improved business communication?

A) VoIP
B) Telegraph
C) Fax

A) VoIP

300

What is the key responsibility of a database administrator?

A) Protecting computer networks from cyber threats
B) Maintaining data integrity and ensuring secure access to information
C) Developing and testing new software programs

B) Maintaining data integrity and ensuring secure access to information

300

What is the key difference between a Trojan and a virus?

A) A Trojan can reproduce itself, while a virus cannot
B) A Trojan disguises itself as useful software, while a virus attaches itself to files
C) A Trojan spreads automatically through the network, while a virus does not

B) A Trojan disguises itself as useful software, while a virus attaches itself to files

300

How do phishing scams typically work?

A) By falsely claiming to be a legitimate organization to steal user data
B) By flooding email inboxes with advertisements
C) By encrypting user data without permission

A) By falsely claiming to be a legitimate organization to steal user data

300

What health issues are associated with excessive computer use?

A) Improved eyesight and reduced stress
B) Muscle soreness, fatigue, and computer vision syndrome
C) Faster reflexes and stronger muscles

B) Muscle soreness, fatigue, and computer vision syndrome

400

How do customer relationship management (CRM) systems help businesses?

A) They increase the production of physical goods
B) They provide a better understanding of customer behavior
C) They completely replace traditional marketing

B) They provide a better understanding of customer behavior

400

How do software developers contribute to the IT industry?

A) By designing, writing, and testing codes for new systems and software
B) By analyzing financial costs of new technologies for companies
C) By providing customer support for software-related problems

A) By designing, writing, and testing codes for new systems and software

400

How do worms affect computer performance?

A) They delete important files and crash the system
B) They create multiple copies of themselves, consuming CPU and storage space
C) They attach themselves to executable files and require user activation

B) They create multiple copies of themselves, consuming CPU and storage space

400

What is the difference between symmetric and asymmetric encryption?

A) Symmetric encryption uses one key for both encoding and decoding, while asymmetric encryption uses a public and a private key

B) Symmetric encryption uses two keys, while asymmetric encryption uses one key

C) Asymmetric encryption is only used for spam filtering

A) Symmetric encryption uses one key for both encoding and decoding, while asymmetric encryption uses a public and a private key

400

What are some ways to reduce the environmental impact of technology?

A) Buying more electronic devices to keep them out of landfills

B) Throwing old electronics in regular trash bins

C) Using energy-efficient devices and disposing of electronics properly

C) Using energy-efficient devices and disposing of electronics properly

500

What is the main advantage of online advertising over traditional methods?

A) It is more expensive but effective
B) It is more accurate in identifying target audiences
C) It is less customizable than traditional advertising

B) It is more accurate in identifying target audiences

500

What is the main difference between a web developer and a web designer?

A) A web developer focuses on programming and functionality, while a web designer focuses on aesthetics
B) A web developer creates logos, while a web designer writes code
C) A web developer only works on mobile applications, while a web designer only works on desktop websites

A) A web developer focuses on programming and functionality, while a web designer focuses on aesthetics

500

 In what ways can worms spread through networks?

A) Email attachments, file-sharing networks, and exploiting system vulnerabilities
B) Only by downloading infected software
C) Only through physical storage devices like USB drives


A) Email attachments, file-sharing networks, and exploiting system vulnerabilities




500

Why is data encryption essential in cybersecurity?

A) It allows hackers to access encrypted information easily
B) It protects sensitive data by making it unreadable without the correct key
C) It removes all spam emails from a user’s inbox

B) It protects sensitive data by making it unreadable without the correct key

500

How does prolonged exposure to screens contribute to stress and mental health issues? 

A) It improves concentration and reduces fatigue
B) It causes poor concentration, weariness, and increases the risk of depression
C) It helps people relax and improves sleep quality

B) It causes poor concentration, weariness, and increases the risk of depression