Computer Science Ics Part 1 Chapter 7 Online Test With Answers

Computer Science Ics Part 1 Chapter 7 Online Test

Sr. # Questions Answers Choice
1

What is a benefit of online education platforms.

<p>Only for rich studetns</p> <p>Only for city schools</p> <p>No internet needed</p> <p>Students can learn from top universities</p>
2

Which event in Pakistan showed the need for data protection.

<p>Growth of Daraz</p> <p>NADRA data leak</p> <p>Rise of smartphones</p> <p>Better internet</p>
3

Why digital literacy important.

<p>To use social medial only</p> <p>To buy mor edevices</p> <p>To spot fake news and stay safe</p> <p>to use apps fast</p>
4

Why does misinformation spread online.

<p>Fast shring of unverified content</p> <p>People read less</p> <p>Better education</p> <p>Slow internet</p>
5

How did Social media help during the peshawar school attack

<p>Raised awareness</p> <p>Hid the news</p> <p>Blocked messages</p> <p>Reduced support</p>
6

What is a major negative impact of computing in Pakistan.

<p>Better schools</p> <p>More job</p> <p>Fast Internet</p> <p>Digital divide</p>
7

What is a benefit of computing in communication.

<p>Global connections</p> <p>Slower messages</p> <p>Less sharing</p> <p>No social media</p>
8

How has computing changed learning.

<p>Less access to books</p> <p>Fewer teachers</p> <p>More access to online info</p> <p>No change</p>
9

Why should you use  multiple security tools.

<p>To cover different types of threats</p> <p>To slow down the system</p> <p>To delete all emails</p> <p>To track online activity</p>
10

What helps protect against pharming.

<p>Click all links</p> <p>Ignore browser warnings</p> <p>Share passwords</p> <p>Check website URL and “https”</p>
11

How can you recognize a phishing email.

<p>Clear sender name</p> <p>urgent request for personal info</p> <p>Official company logo</p> <p>Short message</p>
12

Why should you manage cookies.

<p>To speed up the device&nbsp;</p> <p>To download faster</p> <p>To protect privacy</p> <p>To get ads</p>
13

What do spam filters do.

<p>Delete all emails</p> <p>Block unwanted or dangerous emails</p> <p>Track user data</p> <p>Install spyware</p>
14

How can cookies be a threat.

<p>They delete files</p> <p>They track online behavior</p> <p>They block websites</p> <p>They slow internet</p>
15

What does spyware do.

<p>Blocks ads</p> <p>Secures passwords</p> <p>Filters emails</p> <p>Tracks online activity secretly</p>
Download This Set

Is this page helpful?

Share your comments & questions here

Guest
  • No comments yet. Be the first to comment!