PEARL INSTITUTE QUIZ
Home
Subjects
Quizzes
Leaderboard
About
Contact
Login
Register
Computer GK
Computer GK Quiz 4 (Internet & Cyber Safety)
--:--
Attempt #1491 • Total: 20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Save Progress
Submit Quiz
Back to Quiz
Green = answered
Q1.
Mark for Review
A VPN helps by:
A)
Creating an encrypted tunnel for traffic
B)
Deleting cookies
C)
Making monitor brighter
D)
Formatting drives
Prev
Next
Q2.
Mark for Review
Which is a common sign of a phishing email?
A)
Spelling mistakes and urgent payment request
B)
Email from your saved contact only
C)
Correct domain and no urgency
D)
No links
Prev
Next
Q3.
Mark for Review
Which action is safest when you receive an unknown link?
A)
Verify sender and avoid clicking
B)
Forward to friends
C)
Reply with OTP
D)
Click immediately
Prev
Next
Q4.
Mark for Review
Which protocol is used for sending emails?
A)
SMTP
B)
FTP
C)
IMAP only
D)
HTTP
Prev
Next
Q5.
Mark for Review
Public Wi‑Fi is risky mainly because:
A)
Data can be intercepted if not secured
B)
It damages battery
C)
It is always slow
D)
It disables Bluetooth
Prev
Next
Q6.
Mark for Review
Which is the safest way to download software?
A)
Official website/app store
B)
Forwarded APK from chat
C)
Unknown links
D)
Random popups
Prev
Next
Q7.
Mark for Review
The device that shares internet to multiple devices in a home is usually a:
A)
Printer
B)
Router
C)
Scanner
D)
Projector
Prev
Next
Q8.
Mark for Review
Phishing is an attempt to:
A)
Encrypt files for backup
B)
Steal sensitive information by pretending to be trusted
C)
Repair a computer
D)
Speed up internet
Prev
Next
Q9.
Mark for Review
HTTPS is more secure than HTTP because it uses:
A)
More RAM
B)
Compression
C)
A faster cable
D)
Encryption (TLS/SSL)
Prev
Next
Q10.
Mark for Review
Which of these is a web browser?
A)
Windows
B)
MS Word
C)
Chrome
D)
Linux
Prev
Next
Q11.
Mark for Review
Which protocol is used to transfer web pages?
A)
POP3
B)
FTP
C)
SMTP
D)
HTTP
Prev
Next
Q12.
Mark for Review
A strong password should typically include:
A)
Your name and birthdate
B)
Only numbers
C)
A mix of letters, numbers and symbols
D)
Only lowercase letters
Prev
Next
Q13.
Mark for Review
Which protocol is commonly used to receive emails?
A)
POP3/IMAP
B)
SSH
C)
SMTP
D)
HTTP
Prev
Next
Q14.
Mark for Review
The full form of URL is:
A)
Uniform Resource Locator
B)
Uniform Record Locator
C)
Unified Resource Link
D)
Universal Record Link
Prev
Next
Q15.
Mark for Review
A firewall is used to:
A)
Increase monitor size
B)
Block/allow network traffic based on rules
C)
Format hard disk
D)
Print pages
Prev
Next
Q16.
Mark for Review
The full form of Wi‑Fi is commonly referred to as:
A)
Wide Field
B)
Wire Filter
C)
Wireless Fidelity
D)
Web Finder
Prev
Next
Q17.
Mark for Review
Malware is:
A)
A computer game
B)
An email client
C)
A harmful software
D)
A network cable
Prev
Next
Q18.
Mark for Review
Which of these is an example of two-factor authentication (2FA)?
A)
Username only
B)
Password only
C)
Password + OTP
D)
PIN only
Prev
Next
Q19.
Mark for Review
OTP should be:
A)
Shared with anyone
B)
Never shared with anyone
C)
Shared only with bank staff
D)
Posted on social media
Prev
Next
Q20.
Mark for Review
Cookies in a browser are primarily used to:
A)
Clean viruses
B)
Damage the computer
C)
Increase CPU speed
D)
Store small site data (sessions/preferences)
Prev
Next
We use cookies
We use essential cookies for login and quiz functionality. You can also allow optional cookies to help us improve the website.
Reject
Customize
Accept
Essential cookies are always enabled. Choose optional categories:
Analytics (optional)
Save Preferences
Close