Q: Which of the following statements about information security threats in ICT use are correct?
(A) Phishing involves fraudulent messages or websites that attempt to trick users into revealing sensitive information such as passwords or bank details;
(B) Shoulder surfing refers to observing someone’s screen or keyboard to capture confidential information like passwords or PINs;
(C) Keyloggers are programs or devices that record the keys pressed on a keyboard, often without the user’s knowledge;
(D) Installing software from unverified sources is recommended because it always improves system security and stability;
Choose the correct answer from the options given below:
Q: Which of the following statements about email features and etiquette are correct?
(A) The ‘Cc’ field in an email is used to send a copy of the message to additional recipients for their information;
(B) The ‘Bcc’ field allows the sender to hide the list of certain recipients from other recipients;
(C) Leaving the subject line blank is recommended so that the message content remains confidential;
(D) Attachments can be used to send documents, images and other files along with an email message;
Choose the correct answer from the options given below:
Q: Which of the following statements about ICT tools for collaborative research are correct?
(A) Cloud-based document editors allow multiple researchers to work on the same manuscript simultaneously;
(B) Version control systems help track changes and manage different versions of research documents or code;
(C) Online reference managers cannot be used by research teams and are limited to individual users only;
(D) Collaborative platforms can support sharing of datasets, protocols and analysis scripts among research partners;
Choose the correct answer from the options given below:
Q: Which of the following statements about cryptography in ICT are correct?
(A) Cryptography is the science of protecting information by transforming it into an unreadable form;
(B) Encryption converts plaintext into ciphertext using an algorithm and a key;
(C) Decryption is the process of converting ciphertext back into readable plaintext;
(D) In secure communication, sharing private keys openly on social media is recommended for convenience;
Choose the correct answer from the options given below:
Q: Which of the following statements about Learning Management Systems (LMS) are correct?
(A) An LMS allows teachers to upload course resources, assignments and announcements for enrolled students;
(B) An LMS can track student participation, quiz attempts and grades over time;
(C) A simple static website without authentication automatically provides personalised tracking for each individual visitor;
(D) Many LMS platforms provide tools such as discussion forums, online quizzes and gradebooks within a single environment;
Choose the correct answer from the options given below:

Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!