- 1. Information is data that has been organized and structured to provide meaning and value. It plays a crucial role in decision-making, problem-solving, and knowledge-sharing. In today's digital world, information is abundant and easily accessible through various channels such as the internet, databases, and digital media. It can take many forms, including text, images, audio, and video. Effectively managing and utilizing information is essential for individuals, organizations, and society to stay informed, innovate, and thrive in a fast-paced and interconnected world.
What is data that is organized and processed to have meaning?
A) Knowledge B) Wisdom C) Information D) Communication
- 2. What is the term used to describe the protection of information assets from unauthorized access, use, disclosure, disruption, modification, or destruction?
A) Information security B) Cybersecurity C) Network security D) Data privacy
- 3. Which term refers to the process of encoding information in a way that only authorized parties can access it?
A) Decryption B) Decoding C) Encryption D) Encoding
- 4. What does the term 'metadata' refer to in the context of information?
A) Data encryption B) Structured data C) Data about data D) Real-time data
- 5. What type of information describes the characteristics of data?
A) Content B) Metadata C) Document D) Index
- 6. Which term refers to the process of converting data into an understandable format?
A) Data transformation B) Data encoding C) Data extraction D) Data visualization
- 7. Which of the following is a common method for storing and organizing information?
A) Database B) Word document C) Spreadsheet D) Presentation slide
- 8. What does the term 'information overload' refer to?
A) Access to limited information B) Disorganized information C) Lack of information D) Excessive amount of information
- 9. What is the term used to describe the process of combining data from multiple sources?
A) Data analysis B) Data integration C) Data aggregation D) Data consolidation
- 10. Which term refers to the practice of ensuring that information is available when needed?
A) Information storage B) Information availability C) Information security D) Information retrieval
- 11. Which term refers to the process of identifying patterns and trends in data?
A) Data mining B) Data visualization C) Data analysis D) Data processing
- 12. Which term refers to the process of verifying the accuracy and reliability of data?
A) Data integration B) Data mining C) Data cleansing D) Data validation
- 13. Which term refers to the practice of protecting sensitive information from unauthorized access?
A) Data security B) Data breach C) Data encryption D) Data masking
- 14. What is the term used to describe the process of converting data into a standard format?
A) Data transformation B) Data aggregation C) Data normalization D) Data validation
- 15. Which term refers to the practice of ensuring data is consistent and accurate across systems?
A) Data validation B) Data integrity C) Data cleaning D) Data encryption
- 16. Which type of software analyzes and interprets data to uncover patterns and insights?
A) Word processing software B) Antivirus software C) Business intelligence (BI) software D) Graphic design software
- 17. What does the abbreviation URL stand for?
A) Underground Routing Link B) Uniform Resource Locator C) User Registry Language D) United Resource Language
- 18. Which term describes the act of filtering or restricting access to certain information on the internet?
A) Firewall B) Censorship C) Encryption D) Decryption
- 19. What is the main advantage of cloud computing in terms of storing and accessing information?
A) High cost B) Scalability and flexibility C) Limited storage space D) Slow access speed
- 20. Which technology allows the transmission of data over long distances using cables or light pulses?
A) Bluetooth B) Wi-Fi C) Fiber optics D) Copper wires
- 21. What is the term for software designed to block unauthorized access while permitting authorized communications?
A) Malware B) Encryption C) Phishing D) Firewall
- 22. Which of the following is an example of a database management system (DBMS)?
A) MySQL B) Python C) HTML D) CSS
- 23. What is an IP address?
A) A type of computer virus B) An email address C) A password for logging into a website D) A unique numerical label assigned to a device connected to a computer network
- 24. What technology is used to transmit data over telephone lines?
A) Bluetooth B) Ethernet C) Modem D) Wi-Fi
- 25. What is the file format for an electronic document that can contain text, images, and hyperlinks?
A) MP3 B) JPEG C) ZIP D) PDF
- 26. What does HTML stand for?
A) High-Tech Modern Link B) Hyperlink Text Messaging Language C) Hypertext Markup Language D) Home Tool Management Language
- 27. Which type of data storage device has no moving parts and provides faster data access?
A) Solid State Drive (SSD) B) CD-ROM C) Floppy Disk D) Hard Disk Drive (HDD)
- 28. What is the term used for a set of rules for exchanging electronic information?
A) Protocol B) Syntax C) Hyperlink D) Algorithm
- 29. What does the abbreviation 'LAN' stand for?
A) Long Antenna Network B) Local Area Network C) Limited Access Node D) Large Access Network
- 30. In the context of email, what does 'CC' stand for?
A) Carbon Copy B) Contact Coordinator C) Copy Content D) Computer Code
- 31. What does the acronym 'WWW' stand for?
A) Wireless Web Watch B) World Wide Web C) Web Warrior Workstation D) We Will Win
- 32. Which of the following is an example of a social media platform?
A) Adobe Photoshop B) Excel Spreadsheet C) Facebook D) Microsoft Word
- 33. What is the term for a collection of related web pages typically identified with a common domain name?
A) Ebook B) Blog C) Forum D) Website
- 34. What does the abbreviation 'VPN' stand for?
A) Virtual Private Network B) Visual Privacy Notification C) Very Personal Notebook D) Voice Programming Network
- 35. Which of the following is a popular web hosting service?
A) Amazon B) Netflix C) GoDaddy D) Uber
- 36. Which of the following is a characteristic of big data?
A) Security B) Volume C) Accuracy D) Accessibility
- 37. What is the protocol used for transmitting web pages over the internet?
A) TCP B) SMTP C) HTTP D) FTP
- 38. Which of the following is an example of unstructured data?
A) Email messages B) Database records C) Spreadsheets D) Social media posts
- 39. Which of the following is a method of authentication that requires users to provide two pieces of unique information?
A) Biometric authentication B) Two-factor authentication C) Token authentication D) Single sign-on
- 40. Which of the following organizations is responsible for defining standards for the World Wide Web?
A) IEEE B) W3C C) IETF D) ISO
|