computer MCQs

9th • Chapter 11

50 Questions TextBook
1

Which of the following is NOT a key factor to consider when selecting hardware and software?

A
Safety
B
Efficiency
C
Popularity
D
Compatibility
2

What does 'Cyber Hygiene' refer to, according to the text?

A
Cleaning your keyboard
B
Regularly updating antivirus software
C
Deleting old files
D
Organizing your desktop icons
3

A strong password is characterized by a mix of letters, numbers, and what else?

A
Emojis
B
Special characters
C
Spaces only
D
Capital letters only
4

What does 2FA add to your accounts for better security?

A
A longer password
B
An extra layer of security
C
Faster login speed
D
A profile picture
5

According to the text, harmful software from unknown links is known as what?

A
Adware
B
Spyware
C
Malware
D
Firmware
6

What is it called when you share too many personal details like your home address online?

A
Networking
B
Oversharing
C
Collaborating
D
Broadcasting
7

Which type of Wi-Fi network is considered less secure for sensitive transactions like online banking?

A
Private home Wi-Fi
B
Office network
C
Public Wi-Fi
D
School network
8

Phishing emails are a common form of what?

A
Online marketing
B
Social networking
C
Online scam
D
Cloud computing
9

What is a recommended method for backing up important data?

A
Saving it on the desktop
B
Using a cloud storage service like Dropbox
C
Emailing it to yourself
D
Printing it out
10

On Facebook, privacy settings allow you to control who can see your what?

A
Posts
B
Friend recommendations
C
Advertisements
D
News feed
11

What legal framework consists of rules set by the government to protect personal information?

A
Data ethics
B
Terms of Service
C
Privacy laws
D
User agreements
12

The principles of data ethics include transparency, accountability, and what else?

A
Profitability
B
Respect for privacy
C
Data quantity
D
Speed of collection
13

What ethical principle requires getting a person's agreement before gathering their information?

A
Accountability
B
Data Minimization
C
Informed Consent
D
Data Security
14

Which principle suggests that you should only collect the data you absolutely need?

A
Data Security
B
Informed Consent
C
Transparency
D
Data Minimization
15

What gives creators legal control over their original works such as music, books, and movies?

A
Patent
B
Trademark
C
Copyright
D
License
16

What are symbols, names, or slogans used by companies to distinguish their products called?

A
Patents
B
Copyrights
C
Trademarks
D
Designs
17

What type of intellectual property protects new inventions or processes?

A
Copyright
B
Trademark
C
Trade Secret
D
Patent
18

What is the term for the illegal copying, distribution, or use of software?

A
Software licensing
B
Software piracy
C
Software development
D
Software maintenance
19

When you buy software, what are you actually buying?

A
The software itself
B
The copyright to the software
C
A license to use it
D
The source code
20

For credible online research, the text suggests checking multiple sources to do what?

A
Find the cheapest price
B
Confirm the accuracy of information
C
Get different opinions
D
Increase search engine ranking
21

Websites with which domain extension are mentioned as often being more reliable sources?

A
.com
B
.org
C
.net
D
.edu
22

Using a private or incognito browsing mode helps in what way?

A
It speeds up your internet
B
It blocks all ads
C
It doesn't save your browsing history
D
It encrypts all data
23

What is a potential sign of internet addiction?

A
Using the internet for homework
B
Neglecting homework to scroll social media for hours
C
Learning a new skill online
D
Checking emails once a day
24

What is a suggested strategy to prevent internet addiction?

A
Using multiple devices
B
Setting time limits on internet use
C
Following more accounts
D
Turning on all notifications
25

Taking a 5-minute break every hour while studying online is a strategy for what?

A
Faster learning
B
Digital well-being
C
Saving battery
D
Improving typing speed
26

What is the term for using the internet to harm or harass others?

A
Trolling
B
Cyberbullying
C
Spamming
D
Phishing
27

If you see someone being bullied online, what does the text suggest you should do?

A
Ignore it
B
Join in the bullying
C
Offer support to the victim
D
Confront the bully aggressively
28

Computing technology has created new job opportunities in fields like software development and what?

A
Agriculture
B
Manufacturing
C
Digital marketing
D
Construction
29

Online platforms like Amazon and Daraz have transformed which aspect of society?

A
Global Trade
B
Local Politics
C
Public Health
D
Education Systems
30

What is a major risk associated with the benefits of social networking?

A
Losing friends
B
Misinformation
C
Slow internet
D
High data cost
31

The trade-off 'Privacy vs. Usability' means that making a system more secure can sometimes make it what?

A
Faster to use
B
Less expensive
C
Less convenient to use
D
More popular
32

What is defined as the physical parts of a computer, like the monitor and CPU?

A
Software
B
Firmware
C
Hardware
D
Operating System
33

Outdated antivirus software can make it easier for whom to steal your information?

A
Your friends
B
The government
C
Viruses or hackers
D
Software developers
34

The concept of 2FA became widespread with the rise of what in the 2000s?

A
Online gaming
B
Online accounts
C
Digital cameras
D
MP3 players
35

How often does Microsoft release major updates for Windows, according to the 'Tidbits' section?

A
Every month
B
Every year
C
Every three months
D
Every six months
36

Cloud services like Google Drive allow you to store and what else online?

A
Create hardware
B
Share files
C
Build websites
D
Repair computers
37

The ethical principle of 'informed consent' was emphasized in the 2004 what?

A
Bioethics Commission Report
B
Tech Giants Summit
C
Global Internet Treaty
D
Digital Rights Charter
38

Unauthorized access to personal information can lead to serious problems like fraud or what?

A
A slower computer
B
Identity theft
C
Software updates
D
More advertisements
39

In the context of data ethics, what does accountability mean?

A
Blaming others for data breaches
B
Taking responsibility if something goes wrong
C
Counting all the data
D
Ignoring user complaints
40

The largest data breach mentioned in the text affected which company in 2013?

A
Google
B
Facebook
C
Microsoft
D
Yahoo
41

Downloading movies without paying for them is a violation of what law?

A
Patent law
B
Trademark law
C
Privacy law
D
Copyright law
42

Treating others online as you want to be treated is referred to as the what?

A
Silver Rule
B
Netiquette Protocol
C
Golden Rule
D
Cyber Law
43

What should you do if you receive an email from an unknown sender asking for personal information?

A
Forward it to friends
B
Provide the information
C
Click on the links to investigate
D
Ignore or delete the email
44

To ensure data security, one should use strong, unique passwords and enable what?

A
Auto-fill
B
Guest accounts
C
Public access
D
Two-factor authentication
45

Spreading false information or 'fake news' is a risk associated with what?

A
Online banking
B
Cloud storage
C
Social media
D
Email
46

The first computer mouse, invented in 1964, was a wooden box with how many buttons?

A
Three
B
Two
C
One
D
Four
47

Setting your social media account to 'private' on Instagram means only who can view your content?

A
Everyone
B
Your friends of friends
C
Approved followers
D
The platform's employees
48

What is an example of a good practice for respectful online interactions?

A
Avoiding arguments and spreading rumors
B
Engaging in every debate
C
Using sarcasm frequently
D
Sharing unverified news
49

The text states that using someone else's work without permission is what?

A
A good way to learn
B
Unethical
C
A common practice
D
Smart
50

What does technology like email and video calls enable?

A
Instant communication
B
Cultural isolation
C
Job reduction
D
Data loss