0% found this document useful (0 votes)
15 views3 pages

ICT SUmmit Quizz Bee Questions

The document contains a series of questions and answers related to Information and Communication Technology (ICT), covering easy, average, difficult, and clincher questions. Topics include web browsers, network attacks, operating systems, cryptographic techniques, database models, cloud computing, and malware. Each question is followed by the correct answer, providing a comprehensive overview of key ICT concepts.

Uploaded by

Elbert Natal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views3 pages

ICT SUmmit Quizz Bee Questions

The document contains a series of questions and answers related to Information and Communication Technology (ICT), covering easy, average, difficult, and clincher questions. Topics include web browsers, network attacks, operating systems, cryptographic techniques, database models, cloud computing, and malware. Each question is followed by the correct answer, providing a comprehensive overview of key ICT concepts.

Uploaded by

Elbert Natal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Republic of the Philippines

Department of Education
Region IV MIMAROPA
Schools Division of Oriental Mindoro
FRANCISCO “KIKO” MANLISES – CALINGAG HIGH SCHOOL
Calingag, Pinamalayan, Oriental Mindoro

Easy Questions

1. What does ICT stand for?


A) Information Communication Technology
B) International Computer Technology
C) Innovative Computer Tools
D) Internet Communication Tools

Answer: A) Information Communication Technology

1. Which of the following is an example of a web browser?


A) Microsoft Word
B) Google Chrome
C) Adobe Photoshop
D) Adobe Acrobat

Answer: B) Google Chrome

1. What is the primary function of a keyboard?


A) To display images
B) To print documents
C) To input data
D) To connect to the internet

Answer: C) To input data

Average Questions

1. What is the term for a network attack that involves sending excessive amounts of data to a website or
server?
A) Phishing
B) Malware
C) Denial of Service (DoS)
D) Virus

Answer: C) Denial of Service (DoS)

1. Which of the following operating systems is open-source?


A) Windows
B) macOS
C) Linux
D) iOS

Answer: C) Linux

1. What is the purpose of a firewall in computer security?


A) To block incoming emails
B) To filter outgoing traffic
C) To protect against malware
D) To block unauthorized access

Answer: D) To block unauthorized access

Difficult Questions

1. What is the term for a cryptographic technique that uses a pair of keys, one public and one private, to
secure data transmission?
A) Symmetric encryption
B) Asymmetric encryption
C) Hashing
D) Digital signature

Answer: B) Asymmetric encryption

1. Which of the following database models is based on entities and relationships?


A) Relational model
B) Object-oriented model
C) Entity-relationship model
D) Hierarchical model

Answer: C) Entity-relationship model

1. What is the term for a type of cloud computing that provides scalable infrastructure and resources over
the internet?
A) IaaS (Infrastructure as a Service)
B) PaaS (Platform as a Service)
C) SaaS (Software as a Service)
D) DaaS (Desktop as a Service)

Answer: A) IaaS (Infrastructure as a Service)

Clincher Questions

1. What is the term for a type of malware that encrypts files and demands payment in exchange for
decryption?
A) Ransomware
B) Trojan
C) Virus
D) Worm

Answer: A) Ransomware

1. Which of the following protocols is used for secure email communication?


A) HTTP
B) FTP
C) SMTP
D) S/MIME

Answer: D) S/MIME

1. What is the term for a network topology that connects devices in a circular configuration?
A) Bus topology
B) Star topology
C) Ring topology
D) Mesh topology

Answer: C) Ring topology

1. Which of the following cloud computing providers offers a free tier with limited resources?
A) Amazon Web Services (AWS)
B) Microsoft Azure
C) Google Cloud Platform (GCP)
D) All of the above

Answer: D) All of the above (Note: Each provider has its own free tier offerings and limitations.)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy