1.
Cable ducts are used to cover wires.
Correct Answer
A. True
Explanation
Cable ducts are specifically designed to provide a protective covering for wires, ensuring their safety and preventing any damage or interference. These ducts are typically made of materials like plastic or metal and are used to neatly organize and conceal wires, reducing the risk of accidents and making maintenance easier. By enclosing the wires within the ducts, they are shielded from environmental factors such as moisture, dust, and physical impact, thereby extending their lifespan and maintaining their functionality. Therefore, the statement "Cable ducts are used to cover wires" is true.
2.
E-mail is used to send messages across the network. What does the "e" stand for?
Correct Answer
electronic
Explanation
The "e" in e-mail stands for electronic. E-mail is a method of sending electronic messages across a network.
3.
What does ISP stand for?
Correct Answer
A. Internet Service Provider
Explanation
ISP stands for Internet Service Provider. An ISP is a company or organization that provides internet access to individuals, businesses, and other organizations. They offer various types of internet connections, such as dial-up, DSL, cable, and fiber optic, allowing users to connect to the internet and access online services. ISPs are responsible for maintaining the necessary infrastructure, including servers, routers, and cables, to deliver internet services to their customers. They also provide technical support and customer service to ensure a reliable and uninterrupted internet connection.
4.
Which of the following are examples of personal details?
Correct Answer
D. All of the above
Explanation
The examples given in the question, address, phone number, and password, are all personal details. Personal details refer to specific information that is unique to an individual and can be used to identify or contact them. In this case, the address and phone number are personal contact details, while the password is a personal security detail. Therefore, all of the options provided are examples of personal details.
5.
You should always keep your location ON for privacy purposes?
Correct Answer
B. False
Explanation
Keeping your location ON can actually pose a threat to your privacy. When your location is enabled, it allows various apps and services to track your whereabouts, which can be used for targeted advertising, surveillance, or even stalking. By keeping your location OFF, you have more control over your privacy and can prevent unauthorized access to your personal information. Therefore, the statement "You should always keep your location ON for privacy purposes" is false.
6.
The emails that come into your inbox without your consent and contain unnecessary information is called?
Correct Answer
Spam Junk
Explanation
The term "spam junk" refers to the emails that are sent to your inbox without your consent and contain unnecessary information. These emails are often unsolicited and can be annoying or potentially harmful. They are commonly known as spam, and they clutter your inbox with unwanted messages.
7.
When someone gets into your account with the intention of stealing your information without your consent, what is it called?
Correct Answer
Hacking
Explanation
Hacking refers to the unauthorized access and manipulation of someone's account or system with the intention of stealing personal information or causing harm. It involves bypassing security measures and gaining control over the targeted account without the owner's consent. Hacking can lead to identity theft, financial loss, and privacy breaches.
8.
When your name is used to create a fake account, what is that act known as?
Correct Answer
Identity theft
Explanation
When someone uses your name to create a fake account, it is known as identity theft. This refers to the illegal act of pretending to be someone else by using their personal information without their consent. Identity theft is a serious crime that can lead to various fraudulent activities, such as financial fraud or impersonation. It is important to protect personal information and report any suspicious activity to prevent becoming a victim of identity theft.
9.
Which of the following could be hazardous in the ICT lab?
Correct Answer
B. Drinks and Cables
Explanation
Drinks and cables could be hazardous in the ICT lab because liquids can spill and damage electronic equipment, causing electrical hazards or malfunctions. Additionally, cables lying around can create tripping hazards, potentially causing accidents or damage to the equipment.
10.
Kevin Raddock is the world famous hacker?
Correct Answer
B. False
Explanation
The question asks if Kevin Raddock is the world famous hacker. The correct answer is False because there is no information provided in the question or any context given to suggest that Kevin Raddock is indeed a world famous hacker. Without any evidence or background information, it is not possible to determine if Kevin Raddock is a world famous hacker or not.