0% found this document useful (0 votes)
59 views4 pages

Quiz 9

The document is a quiz consisting of multiple-choice questions related to cybersecurity, computer operations, and keyboard shortcuts. It includes questions about phishing attacks, types of malware, online account protection, and the functions of firewalls and operating systems. Each question is followed by the correct answer indicated.

Uploaded by

Cicz206018 Ziad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views4 pages

Quiz 9

The document is a quiz consisting of multiple-choice questions related to cybersecurity, computer operations, and keyboard shortcuts. It includes questions about phishing attacks, types of malware, online account protection, and the functions of firewalls and operating systems. Each question is followed by the correct answer indicated.

Uploaded by

Cicz206018 Ziad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

QUIZ 9

Presented By : Ziad Mahmoud


202006018
Presented To : DR Mohamed Khalaf
16. Which of the following is an example of a phishing attack?
a) A fake email that looks like it’s from a bank asking for personal information
b) A slow internet connection
c) Installing an antivirus program
d) Deleting unused files from a computer
Answer Is ( A )
17. Which of the following is NOT a type of malware?
a) Ransomware
b) Trojan Horse
c) Firewall
d) Spyware
Answer Is ( C )
18. What is the best way to protect your online accounts?
a) Use the same password for all accounts
b) Enable two-factor authentication (2FA)
c) Write your password on a sticky note
d) Click on links in emails without checking the source
Answer Is ( B )
19. Which of the following actions can help improve cybersecurity?
a) Ignoring software updates
b) Using public Wi-Fi for online banking
c) Regularly updating passwords and using antivirus software
d) Disabling firewalls
Answer Is ( C )
20. What does a firewall do?
a) Speeds up the internet connection
b) Protects against unauthorized access to a network
c) Scans files for spelling errors
d) Increases hard drive storage
Answer Is ( B )
21. Which keyboard shortcut is used to copy text or files?
a) Ctrl + V
b) Ctrl + X
c) Ctrl + C
d) Ctrl + Z
Answer Is ( C )
22. Which shortcut is used to open the Task Manager in Windows?
a) Ctrl + Alt + Delete
b) Ctrl + Shift + Esc
c) Alt + Tab
d) Both a and b
Answer Is ( D )
23. What is the primary purpose of the 'Ctrl + Z' keyboard shortcut?
a) Paste text
b) Redo an action
c) Undo an action
d) Open a new tab
Answer Is ( C )
24 .Which function key is commonly used to refresh a web page?
a) F1
b) F5
c) F7
d) F10
Answer Is ( B )
25.What is the keyboard shortcut for saving a file?
a) Ctrl + P
b) Ctrl + S
c) Ctrl + D
d) Ctrl + A
Answer Is ( B )
26.What does VPN stand for?
a) Virtual Private Network
b) Video Processing Node
c) Verified Personal Number
d) Visual Programming Notation
Answer Is ( A )
27.Which type of network connects computers within a small area, like an office or
home?
a) LAN (Local Area Network)
b) WAN (Wide Area Network)
c) MAN (Metropolitan Area Network)
d) VPN (Virtual Private Network)
Answer Is ( A )
28. What does the acronym URL stand for?
a) Universal Resource Link
b) Uniform Resource Locator
c) Unique Reference List
d) User Reference Label
Answer Is ( B )
29. Which of the following file types is commonly used for compressed files?
a) .zip
b) .exe
c) .mp4
d) .jpg
Answer Is ( A )
30. What does an operating system (OS) do?
a) Runs application software and manages hardware resources
b) Stores only personal files
c) Increases the speed of a computer’s processor
d) Displays advertisements to users
Answer Is ( A )

You might also like