
BTUI'24 - Inter-school ICT Quiz - Preliminary Round
Authored by Royal College Computer Society
Information Technology (IT)
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following protocols is used for secure communication over the internet?
Which of the following protocols is used for secure communication over the internet?
HTTP
FTP
HTTPS
SMTP
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between a modem and a router?
What is the difference between a modem and a router?
A modem is used to connect a computer to the internet, while a router is used to connect multiple devices to a network.
A modem is a type of hardware, while a router is a type of software.
A modem is used for data transmission, while a router is used for data storage.
A modem is a type of network device, while a router is a type of input device.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common technique used in social engineering attacks?
Which of the following is a common technique used in social engineering attacks?
Phishing
Malware
Denial of Service (DoS)
SQL Injection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does AR(Augmented reality) differ from VR?
How does AR(Augmented reality) differ from VR?
AR creates a fully immersive virtual environment, while VR overlays digital information on the real world.
AR overlays digital information on the real world, while VR creates a fully immersive virtual environment.
Both AR and VR overlay digital information on the real world.
Both AR and VR create fully immersive virtual environments.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What technique does a 'Polymorphic' virus use to evade detection by antivirus software ?
What technique does a 'Polymorphic' virus use to evade detection by antivirus software ?
Changes its file extension after each infection
Alters the system registry to hide its presence
Attaches itself to email attachments
Encrypts itself with a different key each time it infects a new file
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are several shortcut keys used in MS Word to make the tasks easier for users. What is the shortcut key that can be used to switch between open word documents?
There are several shortcut keys used in MS Word to make the tasks easier for users. What is the shortcut key that can be used to switch between open word documents?
Ctrl + F2
Ctrl + F3
Ctrl + F5
Ctrl + F6
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Here are some parts of a Atmel AVR microcontroller datasheet. What is the programatically correct function for turnOnLed() to turn on a LED connected to the pin 2 ? (Note that there's a + 0x20 for special func register offset )
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?