- 1. Information is data that has been organized and structured to provide meaning and value. It plays a crucial role in decision-making, problem-solving, and knowledge-sharing. In today's digital world, information is abundant and easily accessible through various channels such as the internet, databases, and digital media. It can take many forms, including text, images, audio, and video. Effectively managing and utilizing information is essential for individuals, organizations, and society to stay informed, innovate, and thrive in a fast-paced and interconnected world.
What is data that is organized and processed to have meaning?
A) Communication B) Wisdom C) Information D) Knowledge
- 2. What is the term used to describe the protection of information assets from unauthorized access, use, disclosure, disruption, modification, or destruction?
A) Cybersecurity B) Data privacy C) Information security D) Network security
- 3. Which term refers to the process of encoding information in a way that only authorized parties can access it?
A) Decryption B) Encoding C) Encryption D) Decoding
- 4. What does the term 'metadata' refer to in the context of information?
A) Structured data B) Data about data C) Data encryption D) Real-time data
- 5. What type of information describes the characteristics of data?
A) Index B) Content C) Document D) Metadata
- 6. Which term refers to the process of converting data into an understandable format?
A) Data extraction B) Data transformation C) Data visualization D) Data encoding
- 7. Which of the following is a common method for storing and organizing information?
A) Spreadsheet B) Database C) Presentation slide D) Word document
- 8. What does the term 'information overload' refer to?
A) Excessive amount of information B) Disorganized information C) Access to limited information D) Lack of information
- 9. What is the term used to describe the process of combining data from multiple sources?
A) Data integration B) Data analysis C) Data aggregation D) Data consolidation
- 10. Which term refers to the practice of ensuring that information is available when needed?
A) Information security B) Information retrieval C) Information availability D) Information storage
- 11. Which term refers to the process of identifying patterns and trends in data?
A) Data processing B) Data analysis C) Data visualization D) Data mining
- 12. Which term refers to the process of verifying the accuracy and reliability of data?
A) Data validation B) Data integration C) Data cleansing D) Data mining
- 13. Which term refers to the practice of protecting sensitive information from unauthorized access?
A) Data breach B) Data masking C) Data encryption D) Data security
- 14. What is the term used to describe the process of converting data into a standard format?
A) Data transformation B) Data normalization C) Data validation D) Data aggregation
- 15. Which term refers to the practice of ensuring data is consistent and accurate across systems?
A) Data validation B) Data cleaning C) Data integrity D) Data encryption
- 16. Which type of software analyzes and interprets data to uncover patterns and insights?
A) Graphic design software B) Antivirus software C) Business intelligence (BI) software D) Word processing software
- 17. What does the abbreviation URL stand for?
A) United Resource Language B) Underground Routing Link C) Uniform Resource Locator D) User Registry Language
- 18. Which term describes the act of filtering or restricting access to certain information on the internet?
A) Firewall B) Decryption C) Encryption D) Censorship
- 19. What is the main advantage of cloud computing in terms of storing and accessing information?
A) Limited storage space B) Scalability and flexibility C) High cost D) Slow access speed
- 20. Which technology allows the transmission of data over long distances using cables or light pulses?
A) Copper wires B) Wi-Fi C) Bluetooth D) Fiber optics
- 21. What is the term for software designed to block unauthorized access while permitting authorized communications?
A) Firewall B) Encryption C) Malware D) Phishing
- 22. Which of the following is an example of a database management system (DBMS)?
A) CSS B) MySQL C) HTML D) Python
- 23. What is an IP address?
A) A password for logging into a website B) An email address C) A unique numerical label assigned to a device connected to a computer network D) A type of computer virus
- 24. What technology is used to transmit data over telephone lines?
A) Bluetooth B) Ethernet C) Modem D) Wi-Fi
- 25. What is the file format for an electronic document that can contain text, images, and hyperlinks?
A) ZIP B) JPEG C) PDF D) MP3
- 26. What does HTML stand for?
A) Hyperlink Text Messaging Language B) Home Tool Management Language C) Hypertext Markup Language D) High-Tech Modern Link
- 27. Which type of data storage device has no moving parts and provides faster data access?
A) Floppy Disk B) Hard Disk Drive (HDD) C) CD-ROM D) Solid State Drive (SSD)
- 28. What is the term used for a set of rules for exchanging electronic information?
A) Hyperlink B) Protocol C) Syntax D) Algorithm
- 29. What does the abbreviation 'LAN' stand for?
A) Large Access Network B) Limited Access Node C) Local Area Network D) Long Antenna Network
- 30. In the context of email, what does 'CC' stand for?
A) Carbon Copy B) Computer Code C) Copy Content D) Contact Coordinator
- 31. What does the acronym 'WWW' stand for?
A) We Will Win B) World Wide Web C) Web Warrior Workstation D) Wireless Web Watch
- 32. Which of the following is an example of a social media platform?
A) Facebook B) Adobe Photoshop C) Excel Spreadsheet D) Microsoft Word
- 33. What is the term for a collection of related web pages typically identified with a common domain name?
A) Blog B) Forum C) Website D) Ebook
- 34. What does the abbreviation 'VPN' stand for?
A) Voice Programming Network B) Very Personal Notebook C) Virtual Private Network D) Visual Privacy Notification
- 35. Which of the following is a popular web hosting service?
A) GoDaddy B) Amazon C) Netflix D) Uber
- 36. Which of the following is a characteristic of big data?
A) Accessibility B) Volume C) Security D) Accuracy
- 37. What is the protocol used for transmitting web pages over the internet?
A) TCP B) SMTP C) FTP D) HTTP
- 38. Which of the following is an example of unstructured data?
A) Database records B) Email messages C) Social media posts D) Spreadsheets
- 39. Which of the following is a method of authentication that requires users to provide two pieces of unique information?
A) Token authentication B) Two-factor authentication C) Single sign-on D) Biometric authentication
- 40. Which of the following organizations is responsible for defining standards for the World Wide Web?
A) ISO B) IEEE C) W3C D) IETF
|