[{"id":1065244,"question":"<p>What is a benefit of online education platforms.</p>","choices":[{"text":"<p>Only for rich studetns</p>","value":"A"},{"text":"<p>Only for city schools</p>","value":"B"},{"text":"<p>No internet needed</p>","value":"C"},{"text":"<p>Students can learn from top universities</p>","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":1065243,"question":"<p>Which event in Pakistan showed the need for data protection.</p>","choices":[{"text":"<p>Growth of Daraz</p>","value":"A"},{"text":"<p>NADRA data leak</p>","value":"B"},{"text":"<p>Rise of smartphones</p>","value":"C"},{"text":"<p>Better internet</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065241,"question":"<p>Why digital literacy important.</p>","choices":[{"text":"<p>To use social medial only</p>","value":"A"},{"text":"<p>To buy mor edevices</p>","value":"B"},{"text":"<p>To spot fake news and stay safe</p>","value":"C"},{"text":"<p>to use apps fast</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065240,"question":"<p>Why does misinformation spread online.</p>","choices":[{"text":"<p>Fast shring of unverified content</p>","value":"A"},{"text":"<p>People read less</p>","value":"B"},{"text":"<p>Better education</p>","value":"C"},{"text":"<p>Slow internet</p>","value":"D"},{"value":"E"}],"correctAnswer":1},{"id":1065239,"question":"<p>How did Social media help during the peshawar school attack</p>","choices":[{"text":"<p>Raised awareness</p>","value":"A"},{"text":"<p>Hid the news</p>","value":"B"},{"text":"<p>Blocked messages</p>","value":"C"},{"text":"<p>Reduced support</p>","value":"D"},{"value":"E"}],"correctAnswer":1},{"id":1065238,"question":"<p>What is a major negative impact of computing in Pakistan.</p>","choices":[{"text":"<p>Better schools</p>","value":"A"},{"text":"<p>More job</p>","value":"B"},{"text":"<p>Fast Internet</p>","value":"C"},{"text":"<p>Digital divide</p>","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":1065236,"question":"<p>What is a benefit of computing in communication.</p>","choices":[{"text":"<p>Global connections</p>","value":"A"},{"text":"<p>Slower messages</p>","value":"B"},{"text":"<p>Less sharing</p>","value":"C"},{"text":"<p>No social media</p>","value":"D"},{"value":"E"}],"correctAnswer":1},{"id":1065235,"question":"<p>How has computing changed learning.</p>","choices":[{"text":"<p>Less access to books</p>","value":"A"},{"text":"<p>Fewer teachers</p>","value":"B"},{"text":"<p>More access to online info</p>","value":"C"},{"text":"<p>No change</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065234,"question":"<p>Why should you use &nbsp;multiple security tools.</p>","choices":[{"text":"<p>To cover different types of threats</p>","value":"A"},{"text":"<p>To slow down the system</p>","value":"B"},{"text":"<p>To delete all emails</p>","value":"C"},{"text":"<p>To track online activity</p>","value":"D"},{"value":"E"}],"correctAnswer":1},{"id":1065233,"question":"<p>What helps protect against pharming.</p>","choices":[{"text":"<p>Click all links</p>","value":"A"},{"text":"<p>Ignore browser warnings</p>","value":"B"},{"text":"<p>Share passwords</p>","value":"C"},{"text":"<p>Check website URL and “https”</p>","value":"D"},{"value":"E"}],"correctAnswer":4},{"id":1065232,"question":"<p>How can you recognize a phishing email.</p>","choices":[{"text":"<p>Clear sender name</p>","value":"A"},{"text":"<p>urgent request for personal info</p>","value":"B"},{"text":"<p>Official company logo</p>","value":"C"},{"text":"<p>Short message</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065231,"question":"<p>Why should you manage cookies.</p>","choices":[{"text":"<p>To speed up the device&nbsp;</p>","value":"A"},{"text":"<p>To download faster</p>","value":"B"},{"text":"<p>To protect privacy</p>","value":"C"},{"text":"<p>To get ads</p>","value":"D"},{"value":"E"}],"correctAnswer":3},{"id":1065229,"question":"<p>What do spam filters do.</p>","choices":[{"text":"<p>Delete all emails</p>","value":"A"},{"text":"<p>Block unwanted or dangerous emails</p>","value":"B"},{"text":"<p>Track user data</p>","value":"C"},{"text":"<p>Install spyware</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065226,"question":"<p>How can cookies be a threat.</p>","choices":[{"text":"<p>They delete files</p>","value":"A"},{"text":"<p>They track online behavior</p>","value":"B"},{"text":"<p>They block websites</p>","value":"C"},{"text":"<p>They slow internet</p>","value":"D"},{"value":"E"}],"correctAnswer":2},{"id":1065225,"question":"<p>What does spyware do.</p>","choices":[{"text":"<p>Blocks ads</p>","value":"A"},{"text":"<p>Secures passwords</p>","value":"B"},{"text":"<p>Filters emails</p>","value":"C"},{"text":"<p>Tracks online activity secretly</p>","value":"D"},{"value":"E"}],"correctAnswer":4}]