computer MCQs
9th • Chapter 11
50 Questions TextBook
1
Which of the following is NOT a key factor to consider when selecting hardware and software?
2
What does 'Cyber Hygiene' refer to, according to the text?
B
Regularly updating antivirus softwareD
Organizing your desktop icons 3
A strong password is characterized by a mix of letters, numbers, and what else?
4
What does 2FA add to your accounts for better security?
B
An extra layer of security 5
According to the text, harmful software from unknown links is known as what?
6
What is it called when you share too many personal details like your home address online?
7
Which type of Wi-Fi network is considered less secure for sensitive transactions like online banking?
8
Phishing emails are a common form of what?
9
What is a recommended method for backing up important data?
A
Saving it on the desktopB
Using a cloud storage service like DropboxC
Emailing it to yourself 10
On Facebook, privacy settings allow you to control who can see your what?
11
What legal framework consists of rules set by the government to protect personal information?
12
The principles of data ethics include transparency, accountability, and what else?
13
What ethical principle requires getting a person's agreement before gathering their information?
14
Which principle suggests that you should only collect the data you absolutely need?
15
What gives creators legal control over their original works such as music, books, and movies?
16
What are symbols, names, or slogans used by companies to distinguish their products called?
17
What type of intellectual property protects new inventions or processes?
18
What is the term for the illegal copying, distribution, or use of software?
19
When you buy software, what are you actually buying?
B
The copyright to the software 20
For credible online research, the text suggests checking multiple sources to do what?
A
Find the cheapest priceB
Confirm the accuracy of informationD
Increase search engine ranking 21
Websites with which domain extension are mentioned as often being more reliable sources?
22
Using a private or incognito browsing mode helps in what way?
A
It speeds up your internetC
It doesn't save your browsing history 23
What is a potential sign of internet addiction?
A
Using the internet for homeworkB
Neglecting homework to scroll social media for hoursC
Learning a new skill onlineD
Checking emails once a day 24
What is a suggested strategy to prevent internet addiction?
B
Setting time limits on internet useC
Following more accountsD
Turning on all notifications 25
Taking a 5-minute break every hour while studying online is a strategy for what?
26
What is the term for using the internet to harm or harass others?
27
If you see someone being bullied online, what does the text suggest you should do?
C
Offer support to the victimD
Confront the bully aggressively 28
Computing technology has created new job opportunities in fields like software development and what?
29
Online platforms like Amazon and Daraz have transformed which aspect of society?
30
What is a major risk associated with the benefits of social networking?
31
The trade-off 'Privacy vs. Usability' means that making a system more secure can sometimes make it what?
32
What is defined as the physical parts of a computer, like the monitor and CPU?
33
Outdated antivirus software can make it easier for whom to steal your information?
34
The concept of 2FA became widespread with the rise of what in the 2000s?
35
How often does Microsoft release major updates for Windows, according to the 'Tidbits' section?
36
Cloud services like Google Drive allow you to store and what else online?
37
The ethical principle of 'informed consent' was emphasized in the 2004 what?
A
Bioethics Commission Report 38
Unauthorized access to personal information can lead to serious problems like fraud or what?
39
In the context of data ethics, what does accountability mean?
A
Blaming others for data breachesB
Taking responsibility if something goes wrongD
Ignoring user complaints 40
The largest data breach mentioned in the text affected which company in 2013?
41
Downloading movies without paying for them is a violation of what law?
42
Treating others online as you want to be treated is referred to as the what?
43
What should you do if you receive an email from an unknown sender asking for personal information?
B
Provide the informationC
Click on the links to investigateD
Ignore or delete the email 44
To ensure data security, one should use strong, unique passwords and enable what?
D
Two-factor authentication 45
Spreading false information or 'fake news' is a risk associated with what?
46
The first computer mouse, invented in 1964, was a wooden box with how many buttons?
47
Setting your social media account to 'private' on Instagram means only who can view your content?
B
Your friends of friendsD
The platform's employees 48
What is an example of a good practice for respectful online interactions?
A
Avoiding arguments and spreading rumorsB
Engaging in every debateC
Using sarcasm frequentlyD
Sharing unverified news 49
The text states that using someone else's work without permission is what?
50
What does technology like email and video calls enable?