Study

CAT

  •   0%
  •  0     0     0

  • What are the risks of opening unknown email attachments?
    They could contain malware or viruses.
  • In Word, what feature can you use to copy the same formatting?
    The Format Painter.
  • IP address
    Unique number that identifies a device on a network.
  • What is netiquette?
    The proper way to behave and communicate online.
  • Bug
    Error or flaw in a program.
  • Why are updates important for operating systems?
    They fix bugs, patch security issues, and improve performance.
  • Digital footprint
    The data you leave behind when using the internet.
  • What is the difference between a search engine and a web browser?
    A browser displays websites (e.g. Chrome); a search engine finds websites (e.g. Google).
  • Telecommuting
    Working from home using ICT.
  • What is the function of the IF formula in Excel?
    It checks if a condition is true or false and returns different results.
  • What is the difference between Save and Save As?
    "Save" keeps changes in the same file; "Save As" creates a new copy.
  • What is the purpose of CC and BCC in an email?
    CC: Sends a copy to others. BCC: Sends a hidden copy without showing addresses.
  • Encryption
    Scrambles data to protect it from unauthorized access.
  • License agreement (EULA)
    Legal contract for using software.
  • Keylogger
    Records every key you press (often used for spying).
  • How can you insert a header or footer in a Word document?
    Use the “Insert” tab and choose “Header” or “Footer”.
  • Explain the difference between volatile and non-volatile memory.
    Volatile memory (like RAM) loses data when power is off; non-volatile memory (like ROM or SSD) keeps data.
  • Cyberbullying
    Using tech to harass or threaten someone.
  • SSID
    Name of a Wi-Fi network.
  • What is the difference between a file and a folder?
    A file stores data; a folder holds one or more files or subfolders.
  • In Excel, what symbol is used to start a formula?
    An equals sign (=).
  • What is multitasking in an operating system?
    Running more than one program at the same time.
  • Spyware
    Malware that secretly gathers information from your device.
  • Cloud syncing
    Updates your files across all devices automatically.