Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
Grade 7 ICT Final
40 Questions
|
By Sonia.s | Updated: Mar 18, 2022
| Attempts: 98
Share
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 40
0 %
0/100
Score
0/100
1.
When you receive a random message from an unknown sender on your phone to follow the link and give your details, it is called?
Submit
Start Quiz
About This Quiz
.
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
When you are being hassled by a stranger over the computer/online for unknown reasons, it is known as?
Submit
3.
What is another name for "Spam email"?
Submit
4.
A software which can monitor the use of your computer/internet browsing is known as?
Submit
5.
The messages that web servers pass to your web browser when you visit Internet sites and saves the history is called?
Submit
6.
What is one feature on your phone that you should keep "off" at all times for security purposes.
Submit
7.
Write the full form of VGA cable
Submit
8.
There are 3 types of USB's in the market, what is the latest type? USB A, USB B or USB C?
Submit
9.
GB stands for Gigabyte?
True
False
Submit
10.
What does VPN stand for?
Submit
11.
Www.yahoo.com is the address of a popular website. Which part of it is known as domain?
Submit
12.
Social media can
make
or
break
your reputation?
True
False
Submit
13.
What are the examples of personal information?
All of the below
Phone number
Email address
ID Card number
Submit
14.
What is the name of the world famous hacker?
Submit
15.
Using the phone/social media for a long period of time can cause Migraine?
True
False
Submit
16.
What is the other name for "Ethernet" cable?
Submit
17.
What is hacking?
Is a way of catching another person's information in order to expose them
To gain unauthorised access to a computer system without the user knowledge or permission.
Stealing users information at your convenience.
To gain authorised access to a computer system with the user knowledge or permission.
Submit
18.
What does ISP stand for?
Internet Service Provider
Information System Provider
Internet Security Protocol
Internet Sourcing Provider
Submit
19.
One should regularly check your ________________________ to keep track of any suspicious activity on your credit card.
Submit
20.
Which of the following is an advantage of "Social media"?
Help building communities
Awareness
Connectivity
All of the above
Submit
21.
Fingerprint scan is one of the most secure and latest way to keep our data on the phone safe?
True
False
Submit
22.
Which of the following is a strategy to prevent "Phishing"?
User filter on your email accounts
Always turn the computer ON and OFF in order to restart
Make sure you are connected to a WiFi
Do NOT check your emails if not necessary
Submit
23.
What should be done in order to increase the speed of the computer?
Upgrade
Remove date
Install
Downgrade
Submit
24.
What are the effects of a Spam Email?
Can create unnecessary traffic flooding the network
Network can become slower
The details can be taken if not careful
All of the above
Submit
25.
ROM stands for Read only Memory?
True
False
Submit
26.
Computer Virus is a programming code.
True
False
Submit
27.
What are the disadvantages of using Social media?
Health issues
Creating awareness
Connectivity
All of the above
Submit
28.
Every Internet Provider has the same IP (Internet Protocol) address?
True
False
Submit
29.
Which of the following strategies can help prevent hacking?
Use of Firewalls & keeping strong passwords
Use protection software and keep easy passwords
Hire a professional hacker to test the weakness of your system
Option A & C
Submit
30.
What does "PAN" stand for?
Pacific Area Network
Protocol Area Network
Portable Area Netwwork
Personal Area Network
Submit
31.
What does HTTP stand for?
High definition Transfer Protocol
Hypertext Topology Protocol
Hypertext Transmission Protocol
Hypertext Transfer Protocol
Submit
32.
You typed www.ebay.com on the address bar but you were directed to another website called www.eebay.com. What is the act known as?
Phishing
Pharming
Smishing
Hacking
Submit
33.
WAN stands for Wireless Area Network?
True
False
Submit
34.
Below are the examples of cables that we use in daily life.
VGA and HDMI
VGA, HDMI and USB
VGA, HDMI, USB and LAN
HDMI and display port
Submit
35.
A syndrome where you think your phone is buzzing but in reality it didn't. This is caused due to heavy use/addiction of social media. What is the name of this syndrome?
Particular vibration syndrome
Phantom vibration syndrome
Premature vibration syndrome
Paralyze vibration syndrome
Submit
36.
McAfee is an example of an operating system?
True
False
Submit
37.
Excess use of Social media also releases the "feel good" chemical . What is the name of that chemical/hormone?
Adrenaline
Dopamine
Oxytocin
Endorphins
Submit
38.
VGA cable is an Input device?
True
False
Submit
39.
What protects the device from getting hacked and breaching the security?
Router
Firewall
Antivirus software
Modem
Submit
40.
It is NOT recommended to keep your password as your "favorite city".
True
False
Submit
View My Results
Related Quizzes
Grade 7 Geometry Quiz
Grade 7 Geometry Quiz
Cells Unit Pre-assessment (Grade 7)
Cells Unit Pre-assessment (Grade 7)
Grade 7 Ch 5 L 2: Earth's Interior
Grade 7 Ch 5 L 2: Earth's Interior
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (40)
Unanswered (
)
Answered (
)
When you receive a random message from an unknown sender on your phone...
When you are being hassled by a stranger over the computer/online for...
What is another name for "Spam email"?
A software which can monitor the use of your computer/internet...
The messages that web servers pass to your web browser when you visit...
What is one feature on your phone that you should keep "off"...
Write the full form of VGA cable
There are 3 types of USB's in the market, what is the latest type?...
GB stands for Gigabyte?
What does VPN stand for?
Www.yahoo.com is the address of a popular website. Which part of it is...
Social media can make or break your reputation?
What are the examples of personal information?
What is the name of the world famous hacker?
Using the phone/social media for a long period of time can cause...
What is the other name for "Ethernet" cable?
What is hacking?
What does ISP stand for?
One should regularly check your ________________________ to keep track...
Which of the following is an advantage of "Social media"?
Fingerprint scan is one of the most secure and latest way to keep our...
Which of the following is a strategy to prevent...
What should be done in order to increase the speed of the...
What are the effects of a Spam Email?
ROM stands for Read only Memory?
Computer Virus is a programming code.
What are the disadvantages of using Social media?
Every Internet Provider has the same IP (Internet Protocol)...
Which of the following strategies can help prevent hacking?
What does "PAN" stand for?
What does HTTP stand for?
You typed www.ebay.com on the address bar but you were directed to...
WAN stands for Wireless Area Network?
Below are the examples of cables that we use in daily life.
A syndrome where you think your phone is buzzing but in reality it...
McAfee is an example of an operating system?
Excess use of Social media also releases the "feel good"...
VGA cable is an Input device?
What protects the device from getting hacked and breaching the...
It is NOT recommended to keep your password as your "favorite...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement