What is a key advantage of technology in business?
A) It slows down business processes
B) It increases production costs
C) It improves efficiency and productivity
C) It improves efficiency and productivity
Which of the following is a reason for job growth in the IT industry?
A) The decline of cloud computing
B) The rise of technologies like cybersecurity and data management
C) The decrease in mobile networking usage
B) The rise of technologies like cybersecurity and data management
What does the term "malware" stand for?
A) Malicious software
B) Manual software
C) Mobile software
A) Malicious software
What is spam commonly known as?
A) Encrypted data
B) Personal email
C) Electronic junk mail
C) Electronic junk mail
What is technotrash also known as?
A) Recycled waste
B) Electronic waste (e-waste)
C) Biodegradable material
B) Electronic waste (e-waste)
Which of the following IT tools helps businesses make better decisions?
A) Video conferences, online surveys, and social media
B) Fax, letters, and phone calls
C) Billboards and TV commercials
A) Video conferences, online surveys, and social media
What is the main role of a computer support specialist?
A) Assisting users with software, hardware, and peripheral issues
B) Designing and maintaining databases
C) Creating and testing software applications
A) Assisting users with software, hardware, and peripheral issues
How does a computer virus spread?
A) It copies itself without user interaction
B) It does not need to attach itself to a file
C) It requires human action to spread
C) It requires human action to spread
What is the main goal of phishing?
A) To send commercial advertisements
B) To trick users into providing personal and financial information
C) To store emails in a secure database
B) To trick users into providing personal and financial information
How can technotrash harm the environment?
A) It contains toxic materials that can pollute air, water, and soil
B) It releases oxygen into the air
C) It helps plants grow faster
A) It contains toxic materials that can pollute air, water, and soil
Which of the following technologies has improved business communication?
A) VoIP
B) Telegraph
C) Fax
A) VoIP
What is the key responsibility of a database administrator?
A) Protecting computer networks from cyber threats
B) Maintaining data integrity and ensuring secure access to information
C) Developing and testing new software programs
B) Maintaining data integrity and ensuring secure access to information
What is the key difference between a Trojan and a virus?
A) A Trojan can reproduce itself, while a virus cannot
B) A Trojan disguises itself as useful software, while a virus attaches itself to files
C) A Trojan spreads automatically through the network, while a virus does not
B) A Trojan disguises itself as useful software, while a virus attaches itself to files
How do phishing scams typically work?
A) By falsely claiming to be a legitimate organization to steal user data
B) By flooding email inboxes with advertisements
C) By encrypting user data without permission
A) By falsely claiming to be a legitimate organization to steal user data
What health issues are associated with excessive computer use?
A) Improved eyesight and reduced stress
B) Muscle soreness, fatigue, and computer vision syndrome
C) Faster reflexes and stronger muscles
B) Muscle soreness, fatigue, and computer vision syndrome
How do customer relationship management (CRM) systems help businesses?
A) They increase the production of physical goods
B) They provide a better understanding of customer behavior
C) They completely replace traditional marketing
B) They provide a better understanding of customer behavior
How do software developers contribute to the IT industry?
A) By designing, writing, and testing codes for new systems and software
B) By analyzing financial costs of new technologies for companies
C) By providing customer support for software-related problems
A) By designing, writing, and testing codes for new systems and software
How do worms affect computer performance?
A) They delete important files and crash the system
B) They create multiple copies of themselves, consuming CPU and storage space
C) They attach themselves to executable files and require user activation
B) They create multiple copies of themselves, consuming CPU and storage space
What is the difference between symmetric and asymmetric encryption?
A) Symmetric encryption uses one key for both encoding and decoding, while asymmetric encryption uses a public and a private key
B) Symmetric encryption uses two keys, while asymmetric encryption uses one key
C) Asymmetric encryption is only used for spam filtering
A) Symmetric encryption uses one key for both encoding and decoding, while asymmetric encryption uses a public and a private key
What are some ways to reduce the environmental impact of technology?
A) Buying more electronic devices to keep them out of landfills
B) Throwing old electronics in regular trash bins
C) Using energy-efficient devices and disposing of electronics properly
C) Using energy-efficient devices and disposing of electronics properly
What is the main advantage of online advertising over traditional methods?
A) It is more expensive but effective
B) It is more accurate in identifying target audiences
C) It is less customizable than traditional advertising
B) It is more accurate in identifying target audiences
What is the main difference between a web developer and a web designer?
A) A web developer focuses on programming and functionality, while a web designer focuses on aesthetics
B) A web developer creates logos, while a web designer writes code
C) A web developer only works on mobile applications, while a web designer only works on desktop websites
A) A web developer focuses on programming and functionality, while a web designer focuses on aesthetics
In what ways can worms spread through networks?
A) Email attachments, file-sharing networks, and exploiting system vulnerabilities
B) Only by downloading infected software
C) Only through physical storage devices like USB drives
A) Email attachments, file-sharing networks, and exploiting system vulnerabilities
Why is data encryption essential in cybersecurity?
A) It allows hackers to access encrypted information easily
B) It protects sensitive data by making it unreadable without the correct key
C) It removes all spam emails from a user’s inbox
B) It protects sensitive data by making it unreadable without the correct key
How does prolonged exposure to screens contribute to stress and mental health issues?
A) It improves concentration and reduces fatigue
B) It causes poor concentration, weariness, and increases the risk of depression
C) It helps people relax and improves sleep quality
B) It causes poor concentration, weariness, and increases the risk of depression