B1 Preliminary Speaking Technology and Internet Vocabulary Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6575 | Total Attempts: 67,424
| Questions: 15 | Updated: May 7, 2026
Please wait...
Question 1 / 16
🏆 Rank #--
0 %
0/100
Score 0/100

1. What is a strong password?

Explanation

A strong password incorporates a mix of uppercase and lowercase letters, numbers, and special characters, making it difficult for unauthorized users to guess or crack. This complexity enhances security by increasing the number of possible combinations, thereby protecting sensitive information from potential cyber threats.

Submit
Please wait...
About This Quiz
B1 Preliminary Speaking Technology and Internet Vocabulary Quiz - Quiz

This B1 Preliminary Speaking Technology and Internet Vocabulary Quiz helps learners master essential digital communication terms and online concepts. Perfect for grade 9 students, it covers common technology vocabulary, internet safety, social media, and digital communication skills needed for real-world conversations. Build confidence speaking about technology in English with medium-level... see morequestions that reflect everyday internet use. see less

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Which term describes unwanted emails or messages?

Explanation

Spam refers to unsolicited or unwanted emails and messages, often sent in bulk. These can include advertisements, promotions, or phishing attempts, cluttering inboxes and potentially posing security risks. The term highlights the annoyance and disruption caused by such communications, which are typically not requested by the recipient.

Submit

3. What does 'WiFi' stand for?

Explanation

WiFi stands for "Wireless Fidelity," which refers to the technology that allows electronic devices to connect to a wireless local area network (WLAN). It enables the transmission of data over radio waves, facilitating internet access and networking without the need for physical cables. The term emphasizes the reliability and quality of wireless connections.

Submit

4. A ____ is a small file stored on your computer when you visit a website.

Explanation

A cookie is a small piece of data that a website stores on your computer to remember information about your visit. This can include login details, preferences, and tracking data, allowing for a more personalized browsing experience. Cookies help websites function efficiently and enhance user interaction by retaining relevant information.

Submit

5. Which social media platform is primarily for professional networking?

Explanation

LinkedIn is specifically designed for professional networking, allowing users to connect with colleagues, showcase their resumes, and share industry-related content. Unlike platforms like TikTok or Instagram, which focus on entertainment and personal sharing, LinkedIn emphasizes career development and professional relationships, making it the go-to choice for networking in a business context.

Submit

6. What is 'phishing'?

Explanation

Phishing is a cybercrime where attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or credit card numbers. This is typically done through emails or fake websites that appear trustworthy, aiming to exploit the victim's trust for malicious purposes.

Submit

7. To ____ means to copy data from the internet to your device.

Explanation

To download means to transfer data from the internet to your device, allowing you to access files, applications, or media offline. This process involves retrieving content from a server and saving it locally, enabling users to view or use the information without needing an active internet connection.

Submit

8. Which is NOT a social media platform?

Explanation

Zoom is primarily a video conferencing tool designed for virtual meetings, webinars, and online collaboration. Unlike Facebook, Twitter, and YouTube, which are designed for social networking and content sharing, Zoom focuses on facilitating real-time communication rather than social interaction or content creation.

Submit

9. What does 'URL' stand for?

Explanation

URL stands for Uniform Resource Locator, which is the address used to access resources on the internet. It specifies the location of a resource and the protocol used to retrieve it, allowing users to navigate to websites and access various online content efficiently.

Submit

10. A ____ is a program designed to damage or disrupt your computer.

Explanation

A virus is a type of malicious software that attaches itself to legitimate programs or files. Once executed, it can replicate and spread to other systems, causing damage by corrupting or deleting data, slowing down performance, or compromising security. Its primary purpose is to disrupt normal computer operations.

Submit

11. True or False: You should share your password with close friends.

Explanation

Sharing your password, even with close friends, compromises your security and privacy. It increases the risk of unauthorized access to your accounts and personal information. Trust can be misplaced, and even a small mistake can lead to significant consequences. It's essential to keep passwords confidential to protect your digital identity.

Submit

12. What is the process of sending data from your device to the internet?

Explanation

Uploading is the process of transferring data from your device to the internet. This involves sending files, images, or information to a server where it can be stored or shared. The term is commonly used in contexts like sharing documents, posting on social media, or backing up files to cloud services.

Submit

13. Which term describes watching videos online without downloading them?

Submit

14. A ____ is a collection of related web pages accessed through the internet.

Submit

15. True or False: Cyberbullying is acceptable behavior online.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (15)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is a strong password?
Which term describes unwanted emails or messages?
What does 'WiFi' stand for?
A ____ is a small file stored on your computer when you visit a...
Which social media platform is primarily for professional networking?
What is 'phishing'?
To ____ means to copy data from the internet to your device.
Which is NOT a social media platform?
What does 'URL' stand for?
A ____ is a program designed to damage or disrupt your computer.
True or False: You should share your password with close friends.
What is the process of sending data from your device to the internet?
Which term describes watching videos online without downloading them?
A ____ is a collection of related web pages accessed through the...
True or False: Cyberbullying is acceptable behavior online.
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!