0% found this document useful (0 votes)
46 views52 pages

CSE100 - CIS101 C1-4 Short Question Bank

The document contains multiple-choice and true/false questions related to data representation and computer functionality. It covers fundamental concepts such as data units, memory types, computer components, and their functions. The questions also address the historical context of computing and the principles of digital data storage and processing.

Uploaded by

bubblesparkle45
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views52 pages

CSE100 - CIS101 C1-4 Short Question Bank

The document contains multiple-choice and true/false questions related to data representation and computer functionality. It covers fundamental concepts such as data units, memory types, computer components, and their functions. The questions also address the historical context of computing and the principles of digital data storage and processing.

Uploaded by

bubblesparkle45
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Lecture 1

Data Representation
Multiple-Choice Questions (MCQs)

1. What is the smallest unit of data in a computer?

○ a) Byte

○ b) Bit

○ c) Kilobyte

○ d) Megabyte

○ Answer: b) Bit

○ Explanation: A bit is the smallest unit of data in a computer, representing either 0


or 1.

2. How many bits are in a byte?

○ a) 4

○ b) 8

○ c) 16

○ d) 32

○ Answer: b) 8

○ Explanation: A byte consists of 8 bits.

3. How many unique patterns can be created with 3 bits?

○ a) 4

1
○ b) 8

○ c) 16

○ d) 32

○ Answer: b) 8

○ Explanation: With 3 bits, 2^3 = 8 unique patterns can be formed.

4. Which number system do computers primarily use?

○ a) Decimal

○ b) Binary

○ c) Hexadecimal

○ d) Octal

○ Answer: b) Binary

○ Explanation: Computers use the binary system, which represents data using only
0s and 1s.

5. What is the value of the binary number 1011 in decimal?

○ a) 11

○ b) 13

○ c) 15

○ d) 9

○ Answer: a) 11

○ Explanation: The binary number 1011 equals 11 in decimal (18 + 04 + 12 + 11 =


11).

6. In the hexadecimal system, what does the letter 'A' represent?

2
○ a) 9

○ b) 10

○ c) 11

○ d) 12

○ Answer: b) 10

○ Explanation: In hexadecimal, 'A' represents the decimal number 10.

7. Which of the following is true about a kilobyte?

○ a) It contains 1000 bytes

○ b) It contains 1024 bytes

○ c) It contains 500 bytes

○ d) It contains 2048 bytes

○ Answer: b) It contains 1024 bytes

○ Explanation: A kilobyte is equivalent to 1024 bytes.

8. Which system uses base 16?

○ a) Decimal

○ b) Binary

○ c) Hexadecimal

○ d) Octal

○ Answer: c) Hexadecimal

○ Explanation: The hexadecimal system is a base-16 system using digits 0-9 and
letters A-F.

3
9. What is the denary equivalent of the binary number 1101?

○ a) 13

○ b) 12

○ c) 14

○ d) 15

○ Answer: a) 13

○ Explanation: The binary number 1101 equals 13 in decimal (18 + 14 + 02 + 11 =


13).

10. Which of the following is a characteristic of the ASCII system?

○ a) It uses 16 bits per character

○ b) It supports only 127 characters

○ c) It supports a variable-length encoding

○ d) It is used for representing floating-point numbers

○ Answer: b) It supports only 127 characters

○ Explanation: ASCII supports 127 standard characters using a 7-bit encoding.

11. How many characters can be represented in extended ASCII?

○ a) 128

○ b) 256

○ c) 1024

○ d) 512

○ Answer: b) 256

4
○ Explanation: Extended ASCII uses 8 bits and can represent 256 characters.

12. What does "two's complement" help with in binary arithmetic?

○ a) Representing unsigned numbers

○ b) Multiplying binary numbers

○ c) Representing negative numbers

○ d) Converting binary to hexadecimal

○ Answer: c) Representing negative numbers

○ Explanation: Two's complement is used to represent negative binary numbers.

13. What is the range of values that can be stored in a byte?

○ a) 0 to 127

○ b) 0 to 256

○ c) 0 to 255

○ d) 0 to 1024

○ Answer: c) 0 to 255

○ Explanation: A byte can store values from 0 to 255 (2^8 = 256 values, including
0).

14. In binary addition, what is 1010 + 0011?

○ a) 1101

○ b) 1011

○ c) 1110

○ d) 1001

5
○ Answer: c) 1110

○ Explanation: Adding 1010 and 0011 in binary results in 1110.

15. What does the term "gigabyte" refer to?

○ a) 1000 bytes

○ b) 1000 kilobytes

○ c) 1024 megabytes

○ d) 1000 megabytes

○ Answer: c) 1024 megabytes

○ Explanation: A gigabyte is 1024 megabytes (or approximately 1 billion bytes).

16. How are digital images stored?

○ a) As sequences of characters

○ b) As binary codes representing pixels

○ c) As hexadecimal codes

○ d) As MP3 files

○ Answer: b) As binary codes representing pixels

○ Explanation: Digital images are stored as binary codes representing the color of
each pixel.

17. Which of the following represents sound in a computer?

○ a) ASCII code

○ b) Bits and Bytes

○ c) Sampled waveforms

6
○ d) Unicode

○ Answer: c) Sampled waveforms

○ Explanation: Sound is represented as digitized samples of waveforms in


computers.

18. What does Unicode aim to represent?

○ a) Only English letters

○ b) Characters from multiple languages

○ c) Just numbers

○ d) Decimal numbers only

○ Answer: b) Characters from multiple languages

○ Explanation: Unicode is designed to represent characters from many different


languages.

19. What is the sampling rate in audio?

○ a) Number of sound waves per second

○ b) Number of sound samples taken per second

○ c) Amplitude of the sound wave

○ d) Frequency of sound waves

○ Answer: b) Number of sound samples taken per second

○ Explanation: The sampling rate is the number of audio samples recorded per
second.

20. Which format uses base 2 for data representation?

○ a) Decimal

7
○ b) Binary

○ c) Hexadecimal

○ d) Octal

○ Answer: b) Binary

○ Explanation: Binary format is based on base-2 number representation.

True/False Questions

1. A bit is the smallest unit of data in a computer.

○ Answer: True

2. One byte consists of 16 bits.

○ Answer: False

○ Explanation: A byte consists of 8 bits.

3. ASCII can represent all characters in the Unicode standard.

○ Answer: False

○ Explanation: ASCII is limited to 128 characters, while Unicode supports many


more.

4. In a binary system, 1011 is equivalent to 13 in decimal.

○ Answer: True

5. Kilobytes contain exactly 1000 bytes.

○ Answer: False

○ Explanation: A kilobyte contains 1024 bytes.

8
6. The two's complement system is used for representing negative numbers in binary.

○ Answer: True

7. Hexadecimal uses base 8 for number representation.

○ Answer: False

○ Explanation: Hexadecimal uses base 16.

8. A gigabyte is roughly 1000 megabytes.

○ Answer: False

○ Explanation: A gigabyte is 1024 megabytes.

9. Binary addition follows the same rules as decimal addition.

○ Answer: False

○ Explanation: Binary addition has different rules due to base-2 representation.

10. Digital images are stored as sequences of hexadecimal digits.

○ Answer: False

○ Explanation: Digital images are stored as

9
Lecture 2
How do Computers Work?
Multiple-Choice Questions (MCQs)

1. What is a computer?

○ a) A mechanical device

○ b) A device that only performs arithmetic operations

○ c) A programmable electronic device

○ d) A machine that operates with no external input

○ Answer: c) A programmable electronic device

○ Explanation: A computer is a programmable device that processes data to


produce outputs.

2. Who is known as the father of computers?

○ a) Steve Jobs

○ b) Bill Gates

○ c) Charles Babbage

○ d) Alan Turing

○ Answer: c) Charles Babbage

○ Explanation: Charles Babbage invented the first mechanical computer, the


Analytical Engine.

3. What kind of memory is used for permanent data storage?

10
○ a) RAM

○ b) CPU cache

○ c) Hard drive

○ d) CMOS

○ Answer: c) Hard drive

○ Explanation: Hard drives are used for permanent storage of data.

4. Which component is considered the brain of the computer?

○ a) RAM

○ b) CPU

○ c) Hard drive

○ d) Motherboard

○ Answer: b) CPU

○ Explanation: The CPU processes all instructions and performs computations.

5. What is the function of the ALU within the CPU?

○ a) Managing memory

○ b) Performing arithmetic and logical operations

○ c) Storing data permanently

○ d) Controlling input/output devices

○ Answer: b) Performing arithmetic and logical operations

○ Explanation: The ALU (Arithmetic Logic Unit) performs arithmetic and logic
operations within the CPU.

11
6. Which of the following is NOT a type of computer memory?

○ a) RAM

○ b) ROM

○ c) BIOS

○ d) Hard drive

○ Answer: d) Hard drive

○ Explanation: Hard drives are storage devices, not considered part of the memory
hierarchy.

7. Which type of computer is primarily used for scientific research?

○ a) Personal computer

○ b) Supercomputer

○ c) Mainframe computer

○ d) Tablet

○ Answer: b) Supercomputer

○ Explanation: Supercomputers handle complex scientific calculations and


simulations.

8. What type of bus carries addresses in a computer?

○ a) Control bus

○ b) Data bus

○ c) Address bus

○ d) Memory bus

○ Answer: c) Address bus

12
○ Explanation: The address bus carries memory addresses from the CPU to
memory.

9. What is the function of the motherboard?

○ a) Powers the computer

○ b) Stores data

○ c) Connects all the components together

○ d) Processes instructions

○ Answer: c) Connects all the components together

○ Explanation: The motherboard connects all the hardware components and allows
them to communicate.

10. Which of the following is an input device?

○ a) Monitor

○ b) Keyboard

○ c) Printer

○ d) Speaker

○ Answer: b) Keyboard

○ Explanation: A keyboard is an input device used to enter data into the computer.

11. What does RAM stand for?

○ a) Random-Access Memory

○ b) Read-Available Memory

○ c) Rapid Application Memory

○ d) Redundant Array Memory

13
○ Answer: a) Random-Access Memory

○ Explanation: RAM stands for Random-Access Memory, used for temporary data
storage.

12. Which bus carries signals between the control unit and other components?

○ a) Address bus

○ b) Data bus

○ c) Control bus

○ d) Memory bus

○ Answer: c) Control bus

○ Explanation: The control bus carries control signals between the CPU and other
components.

13. What is the first step in the boot process of a PC?

○ a) Loading the operating system

○ b) Powering up the CPU

○ c) Running the Power-On Self-Test (POST)

○ d) Loading BIOS

○ Answer: c) Running the Power-On Self-Test (POST)

○ Explanation: POST checks the hardware to ensure that the system is functioning
properly.

14. Which of the following memory types is non-volatile?

○ a) RAM

○ b) CPU Cache

14
○ c) ROM

○ d) Register

○ Answer: c) ROM

○ Explanation: ROM is non-volatile and retains its data even when the computer is
turned off.

15. What does BIOS stand for?

○ a) Binary Input Operating System

○ b) Basic Input/Output System

○ c) Basic Instruction Optimization System

○ d) Binary Interactive Output System

○ Answer: b) Basic Input/Output System

○ Explanation: BIOS is responsible for booting the computer and managing data
flow between the operating system and attached devices.

16. What does CPU stand for?

○ a) Central Processing Unit

○ b) Core Processing Unit

○ c) Computer Programming Unit

○ d) Control Processing Unit

○ Answer: a) Central Processing Unit

○ Explanation: The CPU is the central part of the computer that processes
instructions.

17. What kind of device is a USB drive?

15
○ a) Input device

○ b) Output device

○ c) Storage device

○ d) Processing device

○ Answer: c) Storage device

○ Explanation: USB drives are portable storage devices used for data transfer and
storage.

18. What is the purpose of the heat sink in a computer?

○ a) Store data

○ b) Cool down the CPU

○ c) Improve memory performance

○ d) Increase the speed of the processor

○ Answer: b) Cool down the CPU

○ Explanation: A heat sink dissipates the heat generated by the CPU to prevent
overheating.

19. Which architecture is most commonly used in modern computers?

○ a) Harvard architecture

○ b) Von Neumann architecture

○ c) RISC architecture

○ d) Microarchitecture

○ Answer: b) Von Neumann architecture

16
○ Explanation: Modern computers primarily follow the Von Neumann architecture,
where programs and data are stored in the same memory.

20. What is the main purpose of the system clock in a computer?

○ a) To provide memory storage

○ b) To manage data flow

○ c) To synchronize all computer operations

○ d) To increase processing speed

○ Answer: c) To synchronize all computer operations

○ Explanation: The system clock ensures all components operate in sync by


providing timing signals.

21. Which device converts analog signals into digital signals?

○ a) Monitor

○ b) Modem

○ c) Keyboard

○ d) Hard Drive

○ Answer: b) Modem

○ Explanation: A modem converts analog signals from a phone line into digital
data and vice versa.

22. Which memory is closest to the CPU and provides fast data access?

○ a) ROM

○ b) SSD

○ c) Cache

17
○ d) Hard Drive

○ Answer: c) Cache

○ Explanation: Cache memory is closest to the CPU and provides faster data access
than RAM.

23. What does the Control Unit (CU) do in a CPU?

○ a) Performs arithmetic operations

○ b) Controls the execution of instructions

○ c) Stores data

○ d) Manages power supply

○ Answer: b) Controls the execution of instructions

○ Explanation: The Control Unit controls and coordinates the execution of


instructions by the CPU.

24. Which component of the computer holds the bootloader?

○ a) RAM

○ b) Hard Drive

○ c) ROM

○ d) BIOS

○ Answer: d) BIOS

○ Explanation: The BIOS contains the bootloader, which helps load the operating
system during startup.

25. What type of device is a monitor?

○ a) Input device

18
○ b) Storage device

○ c) Processing device

○ d) Output device

○ Answer: d) Output device

○ Explanation: A monitor is an output device that displays the visual output of a


computer.

True/False Questions

1. A computer's CPU is often called the brain of the computer.

○ Answer: True

2. RAM permanently stores data on a computer.

○ Answer: False

○ Explanation: RAM is volatile and only stores data temporarily.

3. The motherboard connects all the components of a computer.

○ Answer: True

4. The power supply provides electricity to all the components of a computer.

○ Answer: True

5. A supercomputer is designed to handle simple word processing tasks.

○ Answer: False

○ Explanation: Supercomputers are designed for complex computational tasks.

6. BIOS stands for Binary Input/Output System.

19
○ Answer: False

○ Explanation: BIOS stands for Basic Input/Output System.

7. Cache memory is slower than RAM.

○ Answer: False

○ Explanation: Cache memory is faster than RAM.

8. The system clock helps synchronize computer operations.

○ Answer: True

9. The ALU in a CPU performs all input and output operations.

○ Answer: False

○ Explanation: The ALU performs arithmetic and logical operations, not


input/output operations.

10. USB ports are used for connecting external devices like flash drives to the computer.

○ Answer: True

11. An SSD is faster than a traditional hard drive.

○ Answer: True

12. The Control Unit decodes and executes instructions in the CPU.

○ Answer: True

13. A computer's POST ensures all components are working before the operating system
loads.

○ Answer: True

14. Increasing the number of CPU cores always results in a proportional increase in
performance.

20
○ Answer: False

○ Explanation: While more cores improve multitasking, performance also depends


on other factors like software optimization.

Fill-in-the-Blank Questions

1. The CPU fetches instructions from __ during the fetch phase.

○ Answer: memory

2. __ is the memory used for temporary data storage in a computer.

○ Answer: RAM

3. __ is the permanent storage used to hold programs and data.

○ Answer: Hard drive

4. The __ is responsible for performing arithmetic and logical operations.

○ Answer: ALU

5. __ stands for Basic Input/Output System.

○ Answer: BIOS

6. The __ controls the execution of instructions in the CPU.

○ Answer: Control Unit (CU)

7. A __ is a program that loads the operating system during the boot process.

○ Answer: bootloader

8. The __ in a computer system carries addresses to memory.

○ Answer: address bus

21
9. The __ stores frequently accessed data to speed up processing.

○ Answer: cache

10. A __ converts analog signals to digital signals.

● Answer: modem

13. The __ is the primary circuit board that connects all components of a computer.

● Answer: motherboard

14. __ stores frequently used instructions for faster CPU access.

● Answer: Cache memory

15. __ is the type of memory that stores data even when the computer is turned off.

● Answer: ROM

22
Lecture 3
How do Computer Networks work
Multiple-Choice Questions (MCQs)

1. What is a LAN (Local Area Network)?

○ a) A network within a limited geographical area

○ b) A network that spans large distances globally

○ c) A wireless network

○ d) A network used only in homes

○ Answer: a) A network within a limited geographical area

○ Explanation: LAN is a network that interconnects devices within a small


geographical area, such as an office or a school.

2. Which of the following is used for wireless communication over short


distances?

○ a) Bluetooth

○ b) Ethernet

○ c) Fiber optics

○ d) WAN

○ Answer: a) Bluetooth

23
○ Explanation: Bluetooth uses radio waves to communicate over short
distances, typically less than 30 meters.

3. What device is essential for converting digital data to analog data in


networks?

○ a) Switch

○ b) Modem

○ c) Router

○ d) Hub

○ Answer: b) Modem

○ Explanation: A modem (modulator-demodulator) converts digital data to


analog for transmission and vice versa.

4. Which of the following is NOT a feature of Wi-Fi?

○ a) Wireless data transfer

○ b) Uses infrared signals

○ c) Has better security compared to Bluetooth

○ d) Suitable for long-range data transfer

○ Answer: b) Uses infrared signals

○ Explanation: Wi-Fi uses radio waves for data transmission, not infrared
signals.

5. What is the primary purpose of a router in a network?

○ a) To store data packets

24
○ b) To route data packets between networks

○ c) To increase the speed of data transfer

○ d) To prevent unauthorized access

○ Answer: b) To route data packets between networks

○ Explanation: Routers forward data between networks and determine the


best path for data transmission.

6. What is the range of a PAN (Personal Area Network)?

○ a) 1 meter to 10 meters

○ b) 100 meters to 1 kilometer

○ c) 100 kilometers to 1000 kilometers

○ d) More than 1000 kilometers

○ Answer: a) 1 meter to 10 meters

○ Explanation: PAN typically covers a very short distance, such as a


Bluetooth connection.

7. Which of the following best describes an intranet?

○ a) A public network accessible by anyone

○ b) A network confined to a specific organization

○ c) A global network for connecting people

○ d) A personal network at home

○ Answer: b) A network confined to a specific organization

25
○ Explanation: An intranet is a private network used by an organization for
internal communication.

8. How does Bluetooth minimize interference with other devices?

○ a) Uses fixed frequencies

○ b) Changes channels constantly (frequency hopping)

○ c) Uses fiber optic cables

○ d) Only allows one device at a time

○ Answer: b) Changes channels constantly (frequency hopping)

○ Explanation: Bluetooth uses spread spectrum frequency hopping to avoid


interference.

9. What is the typical range of a Wi-Fi network?

○ a) 1 meter

○ b) 10 meters

○ c) 100 meters

○ d) 1000 meters

○ Answer: c) 100 meters

○ Explanation: Wi-Fi networks typically operate within a range of up to 100


meters.

10. What is the main function of a hub in a network?

○ a) To filter and forward data to a specific device

○ b) To broadcast data to all connected devices

26
○ c) To block unauthorized devices

○ d) To store data

○ Answer: b) To broadcast data to all connected devices

○ Explanation: A hub sends data to all devices connected to it, which is


inefficient compared to switches.

11. Which of the following is a key advantage of a switch over a hub?

○ a) More security

○ b) Faster data transmission

○ c) Directly routes data to the appropriate device

○ d) Both b and c

○ Answer: d) Both b and c

○ Explanation: Switches are more efficient and secure because they route
data directly to the destination device.

12. What is the primary purpose of TCP in the TCP/IP protocol stack?

○ a) Managing wireless connections

○ b) Ensuring data is sent and received reliably

○ c) Converting data into electrical signals

○ d) Managing web page requests

○ Answer: b) Ensuring data is sent and received reliably

○ Explanation: TCP (Transmission Control Protocol) ensures the reliable


delivery of data packets.

27
13. What is the role of the DNS in Internet communication?

○ a) Encrypting data for security

○ b) Converting domain names into IP addresses

○ c) Managing routers in the network

○ d) Filtering data packets

○ Answer: b) Converting domain names into IP addresses

○ Explanation: The Domain Name System (DNS) translates human-readable


domain names into IP addresses.

14. What is the function of a gateway in a network?

○ a) Converts data from one protocol to another

○ b) Stores website data for future use

○ c) Routes data packets to specific IP addresses

○ d) Prevents unauthorized access

○ Answer: a) Converts data from one protocol to another

○ Explanation: Gateways connect networks that use different protocols by


converting data between them.

15. Which type of network spans across multiple cities or countries?

○ a) LAN

○ b) WLAN

○ c) WAN

○ d) Intranet

28
○ Answer: c) WAN

○ Explanation: Wide Area Networks (WANs) span large geographical areas,


connecting multiple locations.

16. What device is used to connect multiple devices in a wired LAN?

○ a) Router

○ b) Modem

○ c) Switch

○ d) Gateway

○ Answer: c) Switch

○ Explanation: Switches connect multiple devices in a wired LAN,


efficiently directing traffic to the correct device.

17. Which protocol is used for secure communication over the internet?

○ a) HTTP

○ b) HTTPS

○ c) FTP

○ d) SMTP

○ Answer: b) HTTPS

○ Explanation: HTTPS is the secure version of HTTP and is used for


encrypted communication over the web.

18. What is the key feature of the Transport Layer in the TCP/IP model?

○ a) Handles physical data transmission

29
○ b) Ensures correct routing of packets

○ c) Breaks data into packets and ensures error-free delivery

○ d) Transmits electrical signals

○ Answer: c) Breaks data into packets and ensures error-free delivery

○ Explanation: The Transport Layer ensures the proper sequencing and


delivery of data packets.

19. What is the purpose of an Ethernet cable in a network?

○ a) Transmitting data wirelessly

○ b) Providing power to the router

○ c) Transmitting data between devices

○ d) Storing IP addresses

○ Answer: c) Transmitting data between devices

○ Explanation: Ethernet cables are used to transmit data between devices in a


wired network.

20. What role does the Internet Protocol (IP) play in data communication?

○ a) Encrypts data

○ b) Ensures data reaches the correct IP address

○ c) Breaks data into packets

○ d) Manages physical connections

○ Answer: b) Ensures data reaches the correct IP address

30
○ Explanation: IP ensures that data is routed to the correct address in the
network.

True/False Questions

1. Bluetooth is typically used for high-speed, long-distance data transfer.

○ Answer: False

○ Explanation: Bluetooth is used for short-range, low-speed data transfer.

2. A switch sends data to all devices on a network.

○ Answer: False

○ Explanation: A switch sends data only to the specific device that is the
intended recipient.

3. A LAN covers a larger geographical area than a WAN.

○ Answer: False

○ Explanation: A WAN covers a larger area than a LAN.

4. An intranet is accessible to anyone with an internet connection.

○ Answer: False

○ Explanation: An intranet is a private network accessible only to authorized


users within an organization.

5. Wi-Fi networks use radio waves for communication.

○ Answer: True

6. The DNS converts IP addresses into human-readable domain names.

31
○ Answer: False

○ Explanation: DNS converts domain names into IP addresses.

7. A gateway acts as a bridge between different networks using the same protocol.

○ Answer: False

○ Explanation: A gateway connects networks using different protocols.

8. A hub is more efficient and secure than a switch.

○ Answer: False

○ Explanation: A switch is more efficient and secure than a hub.

9. WANs typically use public communication networks like telephone lines or


satellites.

○ Answer: True

Fill-in-the-Blank Questions

1. Bluetooth is a wireless communication technology used for short-distance data


transfer.

2. The DNS is responsible for converting domain names into IP addresses.

3. A router is a device that forwards data packets between different networks.

4. Switches are more efficient than hubs because they send data directly to the
destination device.

5. Wi-Fi allows devices to connect wirelessly to the internet within a range of up to


100 meters.

32
6. Modems convert digital signals to analog and vice versa for data transmission
over communication lines.

7. Ethernet cables are used to transmit data in wired networks.

8. Intranets are private networks used by organizations for internal communication


and resource sharing.

33
Lecture 4
What are the Security & Privacy Issues in Networks
Multiple-Choice Questions (MCQs)

1. What is the primary purpose of data privacy laws?

○ a) To restrict access to the internet

○ b) To ensure data is accurate

○ c) To prevent unauthorized access to personal data

○ d) To increase internet speeds

○ Answer: c) To prevent unauthorized access to personal data

○ Explanation: Data privacy laws are designed to prevent unauthorized


access to individuals' or organizations' personal data.

2. Which of the following is a strong password?

○ a) password123

○ b) 12345

○ c) MyCat2020!

○ d) abcd

○ Answer: c) MyCat2020!

○ Explanation: Strong passwords use a mix of uppercase and lowercase


letters, numbers, and special characters.

34
3. What is the main function of a firewall?

○ a) Blocking unauthorized access to a network

○ b) Managing passwords

○ c) Running antivirus software

○ d) Encrypting data

○ Answer: a) Blocking unauthorized access to a network

○ Explanation: Firewalls filter and control network traffic, preventing


unauthorized access to or from a private network.

4. Which of the following is an example of biometric security?

○ a) Passwords

○ b) Fingerprint scan

○ c) Antivirus software

○ d) Firewalls

○ Answer: b) Fingerprint scan

○ Explanation: Biometrics rely on unique human characteristics such as


fingerprints or retina scans for authentication.

5. Which method encrypts data to make it unreadable without a decryption


key?

○ a) Firewall

○ b) Biometrics

○ c) Encryption

35
○ d) Phishing

○ Answer: c) Encryption

○ Explanation: Encryption converts data into a coded form that can only be
read with the correct decryption key.

6. What does antivirus software primarily do?

○ a) Deletes all files on a computer

○ b) Detects and removes viruses

○ c) Enhances computer speed

○ d) Manages passwords

○ Answer: b) Detects and removes viruses

○ Explanation: Antivirus software detects, removes, and prevents malware


infections.

7. What is phishing?

○ a) A method of encryption

○ b) A type of malware

○ c) An attempt to acquire sensitive information through deceptive emails

○ d) A way to store data

○ Answer: c) An attempt to acquire sensitive information through deceptive


emails

○ Explanation: Phishing is a scam that tricks users into giving personal


information via fraudulent emails or websites.

36
8. What is the key distinction between malicious hacking and ethical hacking?

○ a) The skill level of the hacker

○ b) The legality and intent behind the hacking

○ c) The type of software used

○ d) The speed of the hacking process

○ Answer: b) The legality and intent behind the hacking

○ Explanation: Ethical hacking is authorized by organizations to test


security, whereas malicious hacking is illegal and unauthorized.

9. Which of the following is NOT a type of malware?

○ a) Virus

○ b) Trojan horse

○ c) Biometrics

○ d) Worm

○ Answer: c) Biometrics

○ Explanation: Biometrics are a security measure, while viruses, trojan


horses, and worms are forms of malware.

10. How can users protect themselves from phishing attacks?

○ a) By using strong passwords

○ b) By running antivirus software

○ c) By not clicking on suspicious links in emails

○ d) By updating their operating system regularly

37
○ Answer: c) By not clicking on suspicious links in emails

○ Explanation: Avoiding suspicious links can prevent users from falling


victim to phishing scams.

11. What type of malware replicates itself and spreads to other computers?

○ a) Virus

○ b) Worm

○ c) Trojan horse

○ d) Spyware

○ Answer: b) Worm

○ Explanation: Worms are self-replicating programs that spread across


networks without needing a host.

12. What does "https" in a website address signify?

○ a) The website is unsafe

○ b) The website is hosted locally

○ c) The connection is secure and encrypted

○ d) The website is blocked

○ Answer: c) The connection is secure and encrypted

○ Explanation: "https" indicates that the connection between the user's


browser and the website is encrypted.

13. Which of the following software is designed to detect and prevent


unauthorized access?

38
○ a) Firewall

○ b) Router

○ c) VPN

○ d) Biometrics

○ Answer: a) Firewall

○ Explanation: Firewalls filter traffic and help prevent unauthorized access


to a network.

14. What is the purpose of user accounts in securing data?

○ a) To manage network speeds

○ b) To authenticate user identity and control access

○ c) To enhance computer performance

○ d) To encrypt data

○ Answer: b) To authenticate user identity and control access

○ Explanation: User accounts help secure systems by verifying identities and


restricting access levels.

15. What is spyware designed to do?

○ a) Replicate itself across a network

○ b) Gather information about a user without their knowledge

○ c) Encrypt a user's files

○ d) Prevent users from accessing websites

○ Answer: b) Gather information about a user without their knowledge

39
○ Explanation: Spyware secretly monitors user activity and gathers personal
information.

16. Which of the following is a defense against phishing?

○ a) Regular password changes

○ b) Use of biometric authentication

○ c) Anti-phishing toolbars on browsers

○ d) Use of antivirus software

○ Answer: c) Anti-phishing toolbars on browsers

○ Explanation: Anti-phishing toolbars help identify malicious websites


before users interact with them.

17. What is a Trojan horse?

○ a) A self-replicating virus

○ b) A program disguised as legitimate software

○ c) A firewall component

○ d) An encryption tool

○ Answer: b) A program disguised as legitimate software

○ Explanation: A Trojan horse appears to be legitimate software but is


designed to harm or steal data from the user's system.

18. Why is it important to update antivirus software regularly?

○ a) To protect against new and emerging viruses

○ b) To increase system performance

40
○ c) To make passwords more secure

○ d) To install new applications

○ Answer: a) To protect against new and emerging viruses

○ Explanation: Regular updates ensure that antivirus software is equipped to


handle newly discovered malware threats.

19. What kind of software can encrypt data, making it unreadable without a key?

○ a) Firewall

○ b) Antivirus software

○ c) Encryption software

○ d) Malware

○ Answer: c) Encryption software

○ Explanation: Encryption software converts data into unreadable formats


unless decrypted with a key.

20. Which security measure uses unique human characteristics for


authentication?

○ a) Firewalls

○ b) Passwords

○ c) Biometrics

○ d) VPNs

○ Answer: c) Biometrics

41
○ Explanation: Biometrics use human characteristics like fingerprints or
retina scans for authentication.

True/False Questions

1. A weak password consists of common words or easily guessed information.

○ Answer: True

2. Firewalls can be both hardware and software.

○ Answer: True

3. Encryption prevents hackers from accessing data, even if they manage to steal it.

○ Answer: True

4. Worms are a type of malware that require user interaction to spread.

○ Answer: False

○ Explanation: Worms spread automatically without user interaction.

5. Phishing emails often appear to come from trusted sources, such as banks.

○ Answer: True

6. Spyware encrypts files to prevent access without a decryption key.

○ Answer: False

○ Explanation: Spyware gathers user information without their knowledge;


encryption software protects data.

7. Biometrics provide a form of two-factor authentication.

○ Answer: True

42
8. Antivirus software can detect all types of malware, even those not in its database.

○ Answer: False

○ Explanation: Antivirus software primarily detects known malware, but


heuristic analysis can catch some unknown threats.

9. A strong password should be reused across multiple accounts to simplify access.

○ Answer: False

○ Explanation: Strong passwords should be unique to each account to


prevent widespread breaches.

Fill-in-the-Blank Questions

1. Firewalls help filter and monitor incoming and outgoing network traffic.

2. Encryption is a method used to scramble data, making it unreadable without a


key.

3. Phishing involves sending fraudulent emails to trick users into revealing sensitive
information.

4. Antivirus software detects, prevents, and removes malicious software from a


computer.

5. Biometrics use unique physical characteristics for identity verification, such as


fingerprints or retina scans.

6. Spyware secretly collects data from a user's computer without their knowledge.

7. HTTPS indicates that a website uses encryption to secure data transmitted


between the browser and the server.

43
8. VPNs encrypt internet connections to provide privacy and security when using
public Wi-Fi.

9. User accounts control access to systems by verifying the identity of users.

44
Python Programming
Basic I/O, Variables, and Operators
Multiple-Choice Questions (MCQs)

1. What is the correct syntax to output "Hello, World!" in Python?

○ A) echo "Hello, World!"

○ B) printf("Hello, World!")

○ C) print("Hello, World!") ✔

○ D) document.write("Hello, World!")

Explanation: The print() function is used to output text in Python.

2. Which function is used to take input from the user in Python?

○ A) get()

○ B) input() ✔

○ C) cin()

○ D) enter()

Explanation: input() is used to read user input as a string in Python.

3. Which of the following is the correct syntax for declaring a variable in


Python?

○ A) int x = 10;

45
○ B) x : int = 10

○ C) x = 10 ✔

○ D) int x == 10

Explanation: In Python, variables are dynamically typed, so you can assign


values directly without specifying the type.

4. What is the result of the following expression: 7 % 3?

○ A) 1 ✔

○ B) 2

○ C) 3

○ D) 4

Explanation: % is the modulus operator. 7 % 3 returns the remainder when 7 is


divided by 3, which is 1.

5. Which of the following data types is used to store decimal/fraction numbers in


Python?

○ A) int

○ B) float ✔

○ C) bool

○ D) str

Explanation: float is used for decimal numbers, while int is for integers.

46
6. What will the following code output? print(2 + 3 * 4)

○ A) 20

○ B) 14 ✔

○ C) 24

○ D) 10

Explanation: According to operator precedence, multiplication is performed


before addition, so the result is 2 + (3 * 4) = 14.

7. Which of the following is not a valid variable name in Python?

○ A) my_var

○ B) _temp

○ C) 2nd_var ✔

○ D) varName

Explanation: Variable names cannot start with a number in Python.

8. What is the output of the following code? print(10 / 2)

○ A) 5 ✔

○ B) 5.0

○ C) 5.00

○ D) None of the above

47
Explanation: The / operator always returns a float in Python, so the result is
5.0, but it is displayed as 5 when printed.

9. What will be the value of x after executing the following code? x = 5


followed by x += 3

○ A) 5

○ B) 8 ✔

○ C) 3

○ D) 15

Explanation: x += 3 is equivalent to x = x + 3, so x becomes 8.

10. Which operator is used for exponentiation in Python?

○ A) ^

○ B) *

○ C) ** ✔

○ D) //

Explanation: ** is the exponentiation operator in Python, meaning x**y raises


x to the power of y.

11. Which of the following is true about Python variables?

○ A) You must declare the type of variable before using it.

48
○ B) Python variables are case-sensitive. ✔

○ C) Python variables can start with a number.

○ D) Python does not allow variables to store strings.

12. Explanation: Python is case-sensitive, so myVar and myvar would be


considered two different variables.

True/False Questions

1. The input() function returns an integer by default.


False
Explanation: The input() function always returns a string unless explicitly
converted.

2. In Python, variables are dynamically typed.


True
Explanation: Python does not require variable types to be declared; they are
inferred at runtime.

3. In Python, the expression 5 // 2 results in a floating-point number.


False
Explanation: The // operator performs floor division and returns an integer.

4. A single-line comment in Python starts with #.


True
Explanation: Comments in Python begin with the # symbol.

49
5. You cannot change the value of a variable in Python after declaring it.
False
Explanation: Python allows variables to be reassigned new values.

6. In Python, strings are immutable.


True
Explanation: Once a string is created, it cannot be changed (i.e., it is immutable).

7. The % operator is used for exponentiation in Python.


False
Explanation: The % operator is for the modulus operation, not exponentiation.

8. Python uses indentation to define the scope of code blocks.


True
Explanation: Python relies on indentation to group statements.

9. The print() function can take multiple arguments, separated by commas.


True
Explanation: print() can print multiple items separated by commas.

10. Python variable names can contain spaces.


False
Explanation: Variable names cannot contain spaces in Python.

Fill-in-the-Blank Questions

1. The print() function is used to display output on the _____.


Answer: console
Explanation: The console or terminal is where output is displayed in Python.

50
2. The _____() function is used to take input from the user in Python.
Answer: input
Explanation: The input() function allows user input.

3. The operator _____ is used for floor division in Python.


Answer: //
Explanation: // performs floor division, which rounds down the result to the
nearest integer.

4. The data type used to store whole numbers in Python is called _____.
Answer: int
Explanation: int is used to represent integers.

5. The data type used to store text in Python is called _____.


Answer: str
Explanation: Strings are used to store sequences of characters.

6. The modulus operator in Python is represented by the symbol _____.


Answer: %
Explanation: The % operator gives the remainder of a division.

7. The type() function is used to determine the _____ of a variable.


Answer: type
Explanation: type() tells the type of the variable (e.g., int, float, etc.).

8. In Python, variables do not need to be explicitly _____ before use.


Answer: declared
Explanation: Variables are dynamically typed in Python, so declaration is not
required.

51
9. The symbol ** is used for _____ in Python.
Answer: exponentiation
Explanation: ** raises a number to the power of another.

10. The boolean value True in Python is equivalent to the integer _____.
Answer: 1
Explanation: True is represented as 1 in Python, and False as 0.

52

You might also like