- 1. Information is data that has been organized and structured to provide meaning and value. It plays a crucial role in decision-making, problem-solving, and knowledge-sharing. In today's digital world, information is abundant and easily accessible through various channels such as the internet, databases, and digital media. It can take many forms, including text, images, audio, and video. Effectively managing and utilizing information is essential for individuals, organizations, and society to stay informed, innovate, and thrive in a fast-paced and interconnected world.
What is data that is organized and processed to have meaning?
A) Communication B) Knowledge C) Wisdom D) Information
- 2. What is the term used to describe the protection of information assets from unauthorized access, use, disclosure, disruption, modification, or destruction?
A) Network security B) Data privacy C) Cybersecurity D) Information security
- 3. Which term refers to the process of encoding information in a way that only authorized parties can access it?
A) Encoding B) Decryption C) Encryption D) Decoding
- 4. What does the term 'metadata' refer to in the context of information?
A) Real-time data B) Data about data C) Structured data D) Data encryption
- 5. What type of information describes the characteristics of data?
A) Index B) Metadata C) Content D) Document
- 6. Which term refers to the process of converting data into an understandable format?
A) Data transformation B) Data extraction C) Data visualization D) Data encoding
- 7. Which of the following is a common method for storing and organizing information?
A) Presentation slide B) Database C) Spreadsheet D) Word document
- 8. What does the term 'information overload' refer to?
A) Disorganized information B) Access to limited information C) Excessive amount of information D) Lack of information
- 9. What is the term used to describe the process of combining data from multiple sources?
A) Data aggregation B) Data integration C) Data analysis D) Data consolidation
- 10. Which term refers to the practice of ensuring that information is available when needed?
A) Information availability B) Information retrieval C) Information storage D) Information security
- 11. Which term refers to the process of identifying patterns and trends in data?
A) Data analysis B) Data processing C) Data mining D) Data visualization
- 12. Which term refers to the process of verifying the accuracy and reliability of data?
A) Data mining B) Data validation C) Data cleansing D) Data integration
- 13. Which term refers to the practice of protecting sensitive information from unauthorized access?
A) Data breach B) Data security C) Data masking D) Data encryption
- 14. What is the term used to describe the process of converting data into a standard format?
A) Data transformation B) Data normalization C) Data validation D) Data aggregation
- 15. Which term refers to the practice of ensuring data is consistent and accurate across systems?
A) Data cleaning B) Data validation C) Data encryption D) Data integrity
- 16. Which type of software analyzes and interprets data to uncover patterns and insights?
A) Business intelligence (BI) software B) Word processing software C) Antivirus software D) Graphic design software
- 17. What does the abbreviation URL stand for?
A) Underground Routing Link B) User Registry Language C) Uniform Resource Locator D) United Resource Language
- 18. Which term describes the act of filtering or restricting access to certain information on the internet?
A) Censorship B) Encryption C) Decryption D) Firewall
- 19. What is the main advantage of cloud computing in terms of storing and accessing information?
A) Slow access speed B) High cost C) Scalability and flexibility D) Limited storage space
- 20. Which technology allows the transmission of data over long distances using cables or light pulses?
A) Copper wires B) Bluetooth C) Wi-Fi D) Fiber optics
- 21. What is the term for software designed to block unauthorized access while permitting authorized communications?
A) Encryption B) Malware C) Phishing D) Firewall
- 22. Which of the following is an example of a database management system (DBMS)?
A) HTML B) Python C) CSS D) MySQL
- 23. What is an IP address?
A) A password for logging into a website B) A type of computer virus C) A unique numerical label assigned to a device connected to a computer network D) An email address
- 24. What technology is used to transmit data over telephone lines?
A) Ethernet B) Modem C) Wi-Fi D) Bluetooth
- 25. What is the file format for an electronic document that can contain text, images, and hyperlinks?
A) PDF B) JPEG C) ZIP D) MP3
- 26. What does HTML stand for?
A) Hypertext Markup Language B) Hyperlink Text Messaging Language C) High-Tech Modern Link D) Home Tool Management Language
- 27. Which type of data storage device has no moving parts and provides faster data access?
A) Solid State Drive (SSD) B) CD-ROM C) Hard Disk Drive (HDD) D) Floppy Disk
- 28. What is the term used for a set of rules for exchanging electronic information?
A) Syntax B) Protocol C) Hyperlink D) Algorithm
- 29. What does the abbreviation 'LAN' stand for?
A) Long Antenna Network B) Local Area Network C) Limited Access Node D) Large Access Network
- 30. In the context of email, what does 'CC' stand for?
A) Computer Code B) Carbon Copy C) Copy Content D) Contact Coordinator
- 31. What does the acronym 'WWW' stand for?
A) World Wide Web B) Wireless Web Watch C) We Will Win D) Web Warrior Workstation
- 32. Which of the following is an example of a social media platform?
A) Microsoft Word B) Excel Spreadsheet C) Facebook D) Adobe Photoshop
- 33. What is the term for a collection of related web pages typically identified with a common domain name?
A) Website B) Forum C) Ebook D) Blog
- 34. What does the abbreviation 'VPN' stand for?
A) Visual Privacy Notification B) Voice Programming Network C) Virtual Private Network D) Very Personal Notebook
- 35. Which of the following is a popular web hosting service?
A) GoDaddy B) Netflix C) Uber D) Amazon
- 36. Which of the following is a characteristic of big data?
A) Accuracy B) Volume C) Security D) Accessibility
- 37. What is the protocol used for transmitting web pages over the internet?
A) FTP B) HTTP C) TCP D) SMTP
- 38. Which of the following is an example of unstructured data?
A) Database records B) Social media posts C) Spreadsheets D) Email messages
- 39. Which of the following is a method of authentication that requires users to provide two pieces of unique information?
A) Token authentication B) Two-factor authentication C) Single sign-on D) Biometric authentication
- 40. Which of the following organizations is responsible for defining standards for the World Wide Web?
A) ISO B) IEEE C) W3C D) IETF
|