1.
Define digital literacy and explain its importance in today’s
world.
Digital literacy is the ability to access, understand, evaluate, create,
and communicate information using digital technologies. It's
essential in today's world because it enables individuals to
effectively participate in the digital economy, education, and social
life.
2. Differentiate between hardware and software with
examples.
Hardware is the physical part of a computer (e.g., keyboard, mouse,
monitor), while software is the set of instructions that tells the
hardware what to do (e.g., Microsoft Word, Windows OS).
3. List and describe the primary components of a computer
system.
Input Devices: Allow data entry (e.g., keyboard, mouse).
Processor (CPU): Executes instructions and processes data.
Memory (RAM/ROM): Temporary and permanent storage for data.
Storage: Stores data permanently (e.g., SSD, HDD).
Output Devices: Display results (e.g., monitor, printer).
4. What is an operating system? Give three examples.
An operating system is software that manages hardware and
provides services for applications. Examples: Windows, macOS,
Linux.
5. Explain the function of the Central Processing Unit (CPU) in
a computer.
The CPU is the “brain” of the computer. It performs calculations and
runs programs by interpreting instructions from software.
6. What are the different types of memory used in computers?
Explain their uses.
RAM: Temporary memory used when programs are running.
ROM: Permanent memory with startup instructions.
Cache: Small memory in the CPU for quick access.
Virtual Memory: Hard disk space used when RAM is full.
7. Describe the role of RAM and ROM in computer operations.
RAM: Temporarily stores data for active programs; faster access.
ROM: Permanently stores firmware and boot-up instructions.
8. What is cloud computing? List three advantages of using
cloud services.
Cloud computing allows users to access data and programs over the
internet.
Advantages:
Remote access to data
Scalable storage
Automatic updates and backup
9. Explain the concept of digital footprint and its implications.
A digital footprint is the trail of data a person leaves online. It can
impact privacy, security, and personal or professional reputation.
10. Differentiate between input and output devices, giving
two examples for each.
Input: Keyboard, mouse (used to enter data)
Output: Monitor, printer (used to display results)
11. What are peripheral devices? Provide examples of two
common peripheral devices.
Peripheral devices are external hardware that connect to a
computer. Examples: USB drive, scanner.
12. Define data and information, and explain their
relationship.
Data: Raw facts or figures (e.g., numbers)
Information: Processed data with meaning (e.g., sales report)
13. Describe the use of spreadsheet software in data
management.
Spreadsheets like Excel are used to organize, analyze, and visualize
data through tables, formulas, and charts.
14. What is the difference between system software and
application software?
System software: Manages hardware (e.g., Windows OS)
Application software: Performs specific tasks (e.g., Word)
15. Describe three common types of malware and their
effects.
Virus: Spreads and damages files
Worm: Replicates and slows systems
Trojan: Appears useful but steals data
16. What are the basic principles of digital ethics?
Respect for others
Data privacy
Honesty in communication
Fair use of information
17. Explain how to create a secure password. Provide five
tips for creating strong passwords.
Tips:
Use at least 8 characters
Include numbers, symbols, and uppercase letters
Avoid common words or names
Don’t reuse old passwords
Use two-factor authentication
18. What is phishing? How can you protect yourself from
phishing attacks?
Phishing is a scam to steal personal info via fake emails/websites.
Protection:
Verify links before clicking
Don’t share personal data
Use spam filters and antivirus
19. Describe the process of installing an application on a
Windows operating system.
Download installer
Run setup file
Follow on-screen instructions
Accept terms
Choose install location
Finish installation
20. Differentiate between proprietary software and open-
source software.
Proprietary: Owned, paid, closed-source (e.g., MS Office)
Open-source: Free, modifiable, open-code (e.g., LibreOffice)
21. What are firewalls? How do they protect digital
systems?
Firewalls are security systems that monitor and control incoming
and outgoing network traffic. They block unauthorized access and
protect systems from malware and hackers.
22. What is a VPN, and why is it important for digital
security?
A Virtual Private Network (VPN) encrypts your internet connection,
hides your IP address, and secures data from eavesdropping,
especially on public Wi-Fi.
23. Explain the role of antivirus software in safeguarding
computers.
Antivirus software detects, blocks, and removes malicious software.
It provides real-time protection and scans files to prevent infections.
24. Describe the process of backing up data on a computer.
Choose files to back up
Select a backup method (external drive, cloud)
Use software or manual copy
Schedule regular backups
25. What are the benefits of using cloud storage? List
three popular cloud storage services.
Benefits:
Accessible anywhere
Automatic syncing
Easy sharing and collaboration
Examples: Google Drive, Dropbox, OneDrive
26. Explain the purpose of using a spreadsheet to perform
basic calculations.
Spreadsheets automate math operations like addition, averages,
and budgeting, allowing users to analyze and visualize data
efficiently.
27. What is a database? Describe its uses in digital
systems.
A database is an organized collection of data. It's used in systems
for managing information like customers, inventory, and
transactions.
28. Explain the use of presentation software in a digital
environment.
Presentation software (e.g., PowerPoint) allows users to create visual
slideshows for teaching, pitching, or reporting ideas with text,
images, and animations.
29. What is digital communication? List three tools used
for digital communication.
Digital communication is exchanging information via electronic
means. Tools:
Email (e.g., Gmail)
Messaging apps (e.g., WhatsApp)
Video conferencing (e.g., Zoom)
30. Differentiate between email and instant messaging
services.
Email: Asynchronous, formal, suitable for documents
Instant Messaging: Real-time, informal, fast conversation
31. What are digital collaboration tools? Provide three
examples.
These tools enable team communication and joint work online.
Examples: Google Docs, Microsoft Teams, Trello.
32. Describe the use of productivity software in a business
setting.
Used to improve efficiency, manage data, and communicate.
Examples: MS Office for documents, Excel for data analysis, Outlook
for emails.
33. What is digital citizenship? List three qualities of a
good digital citizen.
It’s responsible and ethical use of technology. Qualities:
Respecting others online
Protecting personal data
Reporting harmful content
34. What is cyberbullying? How can it be prevented in a
digital environment?
Cyberbullying is harassment via digital platforms. Prevention:
Educate users
Use blocking/reporting tools
Encourage positive behavior
35. Describe the concept of netiquette and its importance
in digital communication.
Netiquette is online etiquette—respectful, polite behavior. It's
important for maintaining positive and effective digital interactions.
36. What is digital literacy, and how does it differ from
computer literacy?
Digital literacy: Broad skills including using online tools and
evaluating content.
Computer literacy: Basic knowledge of using a computer system.
37. Define digital rights and responsibilities.
Digital rights include access to digital tools and privacy.
Responsibilities involve ethical usage, not spreading false or harmful
content.
38. Explain the importance of data privacy and
confidentiality.
Protects sensitive information from misuse, identity theft, or
unauthorized access. Essential for personal and organizational trust.
39. What is the role of social media in digital literacy?
Social media teaches communication, content creation, and critical
thinking. It also highlights the need for privacy and digital ethics.
40. Differentiate between a LAN and a WAN.
LAN (Local Area Network): Covers a small area like a home or
office.
WAN (Wide Area Network): Covers large areas; connects multiple
LANs (e.g., the Internet).
41. Describe the function of a router in a network.
A router directs data between different devices and the internet. It
connects a local network (LAN) to the internet and assigns IP
addresses to devices.
42. What is Wi-Fi, and how does it work?
Wi-Fi is a wireless networking technology that allows devices to
connect to the internet via radio waves through a router or access
point.
43. Explain the concept of IP address and its significance in
networking.
An IP address is a unique number assigned to each device on a
network. It identifies and allows communication between devices on
the internet.
44. What is a domain name, and how is it used in internet
navigation?
A domain name is a readable address for websites (e.g.,
google.com). It's translated into an IP address so browsers can
locate web servers.
45. Define the Internet of Things (IoT) and provide
examples of IoT devices.
IoT is a network of connected devices that share data. Examples:
Smart thermostat, smartwatches, smart refrigerators.
46. Describe the basic components of a network system.
Router: Connects devices to the internet
Switch: Connects devices within a LAN
Cables/Wi-Fi: Transmit data
Devices: Computers, printers, etc.
47. What are the advantages and disadvantages of
wireless networks?
Advantages: Mobility, easy installation, scalability
Disadvantages: Interference, security risks, slower speeds
compared to wired networks
48. Explain the concept of bandwidth and its effect on
network speed.
Bandwidth is the amount of data that can be transmitted in a given
time. Higher bandwidth = faster network speed and better
performance.
49. What is cybersecurity? List three best practices for
maintaining cybersecurity.
Cybersecurity is protecting systems from cyber threats. Best
practices:
Use strong passwords
Update software regularly
Avoid suspicious links and attachments
50. What are digital footprints, and how can they affect
one’s reputation?
A digital footprint is your online presence. Negative content can hurt
job prospects or relationships, while positive activity builds
credibility.
51. Explain the concept of digital wellness and its
importance.
Digital wellness refers to using technology in a healthy and balanced
way. It helps reduce screen time, stress, and supports mental well-
being.
52. What is the role of encryption in digital
communication?
Encryption converts data into unreadable format to prevent
unauthorized access. It's used in messaging apps, websites, and
secure transactions.
53. Differentiate between HTTP and HTTPS protocols.
HTTP: Unsecured data transmission
HTTPS: Secure; uses SSL/TLS encryption for data protection
(indicated by padlock icon)
54. What is digital forensics, and where is it applied?
Digital forensics involves investigating digital devices for legal
evidence. It’s used in cybercrime cases, data breaches, and law
enforcement.
55. Describe the steps involved in troubleshooting common
network problems.
56. Check physical connections
57. Restart router/device
58. Run diagnostics
59. Check IP settings
60. Contact ISP if needed
61. What is a modem, and how is it used in a network?
A modem converts digital signals to analog and vice versa. It
connects your home network to your ISP through phone or cable
lines.
62. Explain the concept of peer-to-peer networking.
Peer-to-peer (P2P) networks allow devices to share files directly
without a central server. Common in file-sharing apps like BitTorrent.
63. What are digital certificates, and how do they ensure
secure communication?
Digital certificates verify a website’s identity and encrypt
communications. They’re issued by trusted certificate authorities
(CAs).
64. Differentiate between synchronous and asynchronous
communication.
Synchronous: Real-time (e.g., video call)
Asynchronous: Delayed response (e.g., email)
60. What is the purpose of using a file management
system?
It helps organize, store, and retrieve files efficiently using folders,
naming conventions, and file types.
61. Explain the steps involved in creating and organizing
folders in a computer.
Right-click in a directory or desktop
Select "New" > "Folder"
Name the folder
Drag or save files into appropriate folders
Use subfolders to further organize content
62. What is data compression? Explain the difference
between lossless and lossy compression.
Data compression reduces file size.
Lossless: No data lost; used in text or ZIP files.
Lossy: Some data lost; used in media files (e.g., JPEG, MP3).
63. What is cloud computing, and how does it enhance
digital collaboration?
Cloud computing allows shared access to resources over the
internet. It supports teamwork through file sharing, editing, and
communication tools like Google Docs or Microsoft Teams.
64. Differentiate between a search engine and a web
browser.
Search engine: Finds information (e.g., Google, Bing)
Web browser: Displays web pages (e.g., Chrome, Firefox)
65. Explain the role of digital signatures in verifying
document authenticity.
Digital signatures verify the identity of the sender and confirm that
the document hasn’t been altered. Used in contracts, emails, and
legal documents.
66. What is digital storytelling, and how is it used in
education?
Digital storytelling combines media (text, audio, video) to tell a
story. It helps students creatively present knowledge and improves
engagement.
67. What are some common file formats used in digital
literacy? Provide examples.
Text: .docx, .pdf
Image: .jpg, .png
Audio: .mp3
Video: .mp4
Spreadsheet: .xlsx
Presentation: .pptx
68. Describe the impact of artificial intelligence on digital
systems.
AI automates tasks, enhances decision-making, and powers tools
like chatbots, recommendation systems, and facial recognition.
69. What is a chatbot, and how is it used in digital
communication?
A chatbot is a program that simulates human conversation. It helps
with customer service, FAQs, and guiding users on websites.
70. Explain how social engineering is used to manipulate
digital users.
Social engineering tricks users into revealing personal information
(e.g., fake emails). It relies on psychological manipulation, not
hacking.
71. What is a firewall, and how does it protect a digital
system?
(Repeated from Q21) A firewall monitors and controls network traffic
to block unauthorized access and keep systems secure.
72. What are cookies, and how do they affect user privacy?
Cookies are small files stored by websites to remember user activity.
While useful for personalization, they can track browsing behavior,
affecting privacy.
73. Define and explain the significance of cloud security.
Cloud security includes practices to protect data stored online. It
ensures data privacy, access control, and protection from cyber
threats.
74. What is a digital certificate, and how is it used to
secure online transactions?
A digital certificate ensures the identity of websites or users. It's
used in HTTPS to encrypt sensitive transactions, like banking or
shopping.
75. What is a proxy server, and how does it work?
A proxy server acts as a middleman between a user and the
internet. It hides the user's IP address and can filter or monitor
content.
76. Explain the purpose of a digital content management
system.
A CMS (like WordPress) is used to create, edit, and publish digital
content without needing coding knowledge.
77. What is e-waste, and what are some ways to reduce it?
E-waste is discarded electronic devices. To reduce it:
Recycle electronics
Donate or resell old devices
Buy energy-efficient, long-lasting gadgets
78. What are the main features of a word processing
software?
Features include text editing, formatting, inserting images/tables,
spell check, saving, printing, and collaboration (e.g., in MS Word or
Google Docs).
79. Describe how spreadsheets are used for data
visualization.
Spreadsheets convert data into charts and graphs (bar, pie, line),
helping users understand patterns and trends visually.
80. Explain the concept of data mining and its significance
in digital literacy.
Data mining is analyzing large data sets to find patterns and
insights. It’s used in business, marketing, and decision-making.
81. What is a hyperlink, and how is it used in digital
documents?
A hyperlink is clickable text or image that leads to another location,
such as a webpage or another section of a document. It improves
navigation and access to related content.
82. Explain the role of metadata in organizing digital
information.
Metadata is data about data (e.g., author, file size, creation date). It
helps categorize, sort, and retrieve digital files efficiently.
83. What is a QR code, and how is it used in digital
communication?
A QR code is a machine-readable square barcode that stores
information. Scanning it with a smartphone can open websites, files,
or apps instantly.
84. Describe the use of digital dashboards in monitoring
system performance.
Digital dashboards visually display key metrics and data in real-
time. Used in business, IT, and education to track performance and
make decisions quickly.
85. What are the benefits of using collaborative editing
tools?
Real-time editing
Team collaboration
Reduced duplication
Cloud-based access (e.g., Google Docs, Microsoft Teams)
86. Explain the concept of net neutrality and its impact on
internet usage.
Net neutrality is the principle that all internet traffic should be
treated equally. Without it, ISPs could prioritize or block content,
limiting user freedom.
87. What are the different types of digital learning tools?
Provide examples.
LMS: Google Classroom, Moodle
Video tools: Zoom, YouTube
Interactive apps: Kahoot!, Quizlet
88. Explain the role of online forums in digital literacy.
Online forums allow users to share knowledge, ask questions, and
learn from others. They promote community learning and digital
engagement.
89. What are the benefits of using e-learning platforms?
Flexible and self-paced learning
Access to a wide range of resources
Interactive and engaging content
Cost-effective
90. Describe the process of creating a digital presentation.
Open software (e.g., PowerPoint)
Choose a template
Add slides with content
Insert images, charts, and animations
Review and rehearse
Save and present
91. What is the significance of file encryption?
File encryption secures data by converting it into unreadable code.
Only authorized users with a decryption key can access the file,
protecting it from theft.
92. Explain the role of a server in digital networks.
A server provides services like hosting websites, storing files, or
managing emails. It responds to requests from client devices over a
network.
93. Describe the impact of digital technology on education.
Enables e-learning and virtual classrooms
Offers interactive content
Supports collaboration and remote access
Increases access to educational resources
94. What are the different types of computer networks?
LAN (Local Area Network)
WAN (Wide Area Network)
MAN (Metropolitan Area Network)
PAN (Personal Area Network)
WLAN (Wireless LAN)
95. Explain the concept of virtual reality and its
applications.
VR is an immersive digital environment that simulates real or
imaginary experiences. Used in gaming, training, healthcare, and
education.
96. What are digital libraries, and how do they enhance
learning?
Digital libraries store books, articles, and media online. They provide
easy, 24/7 access to vast educational resources globally.
97. Describe the impact of social media on digital
communication.
Social media enables instant sharing and interaction but can also
lead to misinformation and reduced face-to-face interactions.
98. What is cloud computing, and how does it support
digital collaboration?
(Repeated from Q8/Q63) Cloud computing enables real-time file
sharing, storage, and communication across locations, enhancing
teamwork.
99. What is the significance of internet safety in digital
literacy?
Internet safety protects users from cyber threats, identity theft, and
harmful content. It’s crucial for responsible and secure online
behavior.
100. What is a digital footprint, and how can one maintain a
positive online reputation?
(Repeated from Q9/Q50) A digital footprint is your online activity
record. To maintain a good reputation:
Think before posting
Avoid negative interactions
Keep profiles professional
Regularly review privacy settings