PEARL INSTITUTE QUIZ
Home
Subjects
Quizzes
Leaderboard
About
Contact
Login
Register
Computer GK
Computer GK Quiz 4 (Internet & Cyber Safety)
--:--
Attempt #208 • Total: 20
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Save Progress
Submit Quiz
Back to Quiz
Green = answered
Q1.
Mark for Review
Malware is:
A)
A network cable
B)
An email client
C)
A harmful software
D)
A computer game
Prev
Next
Q2.
Mark for Review
Which protocol is commonly used to receive emails?
A)
HTTP
B)
SMTP
C)
SSH
D)
POP3/IMAP
Prev
Next
Q3.
Mark for Review
Cookies in a browser are primarily used to:
A)
Store small site data (sessions/preferences)
B)
Increase CPU speed
C)
Damage the computer
D)
Clean viruses
Prev
Next
Q4.
Mark for Review
The device that shares internet to multiple devices in a home is usually a:
A)
Printer
B)
Projector
C)
Router
D)
Scanner
Prev
Next
Q5.
Mark for Review
Which is the safest way to download software?
A)
Random popups
B)
Unknown links
C)
Forwarded APK from chat
D)
Official website/app store
Prev
Next
Q6.
Mark for Review
Which action is safest when you receive an unknown link?
A)
Click immediately
B)
Reply with OTP
C)
Forward to friends
D)
Verify sender and avoid clicking
Prev
Next
Q7.
Mark for Review
HTTPS is more secure than HTTP because it uses:
A)
Encryption (TLS/SSL)
B)
A faster cable
C)
Compression
D)
More RAM
Prev
Next
Q8.
Mark for Review
Which of these is an example of two-factor authentication (2FA)?
A)
PIN only
B)
Password + OTP
C)
Password only
D)
Username only
Prev
Next
Q9.
Mark for Review
OTP should be:
A)
Posted on social media
B)
Shared only with bank staff
C)
Shared with anyone
D)
Never shared with anyone
Prev
Next
Q10.
Mark for Review
The full form of URL is:
A)
Uniform Resource Locator
B)
Uniform Record Locator
C)
Unified Resource Link
D)
Universal Record Link
Prev
Next
Q11.
Mark for Review
Which protocol is used to transfer web pages?
A)
POP3
B)
FTP
C)
SMTP
D)
HTTP
Prev
Next
Q12.
Mark for Review
The full form of Wi‑Fi is commonly referred to as:
A)
Web Finder
B)
Wireless Fidelity
C)
Wire Filter
D)
Wide Field
Prev
Next
Q13.
Mark for Review
Which protocol is used for sending emails?
A)
HTTP
B)
FTP
C)
IMAP only
D)
SMTP
Prev
Next
Q14.
Mark for Review
Which is a common sign of a phishing email?
A)
No links
B)
Email from your saved contact only
C)
Correct domain and no urgency
D)
Spelling mistakes and urgent payment request
Prev
Next
Q15.
Mark for Review
Which of these is a web browser?
A)
Windows
B)
MS Word
C)
Chrome
D)
Linux
Prev
Next
Q16.
Mark for Review
Public Wi‑Fi is risky mainly because:
A)
It disables Bluetooth
B)
It is always slow
C)
It damages battery
D)
Data can be intercepted if not secured
Prev
Next
Q17.
Mark for Review
Phishing is an attempt to:
A)
Encrypt files for backup
B)
Steal sensitive information by pretending to be trusted
C)
Repair a computer
D)
Speed up internet
Prev
Next
Q18.
Mark for Review
A strong password should typically include:
A)
Your name and birthdate
B)
Only numbers
C)
A mix of letters, numbers and symbols
D)
Only lowercase letters
Prev
Next
Q19.
Mark for Review
A firewall is used to:
A)
Print pages
B)
Format hard disk
C)
Block/allow network traffic based on rules
D)
Increase monitor size
Prev
Next
Q20.
Mark for Review
A VPN helps by:
A)
Formatting drives
B)
Deleting cookies
C)
Making monitor brighter
D)
Creating an encrypted tunnel for traffic
Prev
Next
We use cookies
We use essential cookies for login and quiz functionality. You can also allow optional cookies to help us improve the website.
Reject
Customize
Accept
Essential cookies are always enabled. Choose optional categories:
Analytics (optional)
Save Preferences
Close