1.
What is the health effect on us when we use a computer for many hours?
Correct Answer
A. Back and Neck Ache
Explanation
Using a computer for many hours can lead to back and neck ache. This is because sitting in the same position for a prolonged period can strain the muscles in the back and neck, causing pain and discomfort. Poor posture, improper ergonomics, and lack of breaks or stretching can contribute to this issue. Heart disease and disfigurement are not directly related to computer use and are not valid health effects in this context.
2.
Which of the following effects of using ICT is most likely to contribute to the digital divide?
Correct Answer
C. Disparities in access to technology and internet
Explanation
The digital divide refers to the gap between those who have access to modern information and communication technology and those who do not. Disparities in access to technology and the internet are a major factor contributing to this divide, creating inequalities in education, job opportunities, and access to information. The other options are generally positive effects of ICT, but they can exacerbate the digital divide if access is unequal.
3.
Why do hackers hack?
Correct Answer
B. Breaking in to access data, usually because the data has value.
Explanation
Hackers hack to access data, usually because the data has value. This means that they break into systems or networks in order to obtain valuable information. This could include personal data, financial information, trade secrets, or any other data that can be monetized or used for malicious purposes. Hackers are motivated by the potential financial gain or the power that comes with having access to sensitive information.
4.
How can a Computer be Protected from Hacking?
Correct Answer(s)
A. Place a firewall between your computer and any network
B. Use strong passwords to protect your user login account
Explanation
A firewall acts as a barrier between a computer and the network, monitoring and controlling incoming and outgoing network traffic. It helps to prevent unauthorized access and potential hacking attempts by filtering out malicious data. Using strong passwords for user login accounts adds an additional layer of security, making it harder for hackers to gain unauthorized access to the computer. On the other hand, using weak passwords would make it easier for hackers to guess or crack the password, thus compromising the computer's security.
5.
What is Malware?
Correct Answer
A. Malware is short for malicious software. Malware is the name given to any software that could harm a computer system, interfere with a user's data.
Explanation
Malware, short for malicious software, refers to any software that has the potential to harm a computer system and disrupt a user's data. It includes various types of harmful programs such as viruses, worms, trojans, ransomware, spyware, and adware. These malicious programs are designed to exploit vulnerabilities in a computer system, gain unauthorized access, steal sensitive information, or cause damage to the system's functionality. Therefore, it is crucial to have effective security measures in place to protect against malware and regularly update antivirus software to detect and remove any potential threats.
6.
What is a Computer Virus?
Correct Answer
B. A computer virus is a piece of software that can infect a computer (install itself) and copy itself to other computers
Explanation
A computer virus is a type of malicious software that is designed to infect a computer system. It can enter a computer through various means, such as downloading infected files or visiting compromised websites. Once inside the system, the virus can replicate itself and spread to other computers, causing damage to files, stealing personal information, or disrupting the normal functioning of the computer. It is important to have antivirus software and regularly update it to protect against computer viruses.
7.
What are the ways to prevent a virus from infecting your computer?
Correct Answer(s)
A. Don’t open e-mail attachments unless you have scanned them...
B. Install anti-virus software and keep it up-to-date...
Explanation
The correct answer is to not open e-mail attachments unless they have been scanned and to install and keep anti-virus software up-to-date. These measures are effective in preventing viruses from infecting a computer. Opening e-mail attachments without scanning them first can introduce viruses into the system. Additionally, having anti-virus software installed and regularly updating it helps to detect and remove any potential threats. Downloading and installing software from the internet that is unfamiliar can increase the risk of downloading malicious programs, so it is not a recommended practice.
8.
Under the laws of copyright, people must not do?
Correct Answer(s)
A. Copy the software for other people
B. Lend the software to other people
C. Rent the software to other people
Explanation
Under the laws of copyright, it is prohibited to copy the software for other people, lend the software to other people, and rent the software to other people. Copyright laws protect the rights of the software creator and prevent unauthorized copying, distribution, and rental of the software.