You are on page 1of 9

The City School

PECHS Campus
ICT Question Bank

UNIT-INTERNET SEARCH TECHNIQUE E-SAFETY & SWAY


Name: _______________________________ Class/ Sec: 8 ____

NOTE:
 The following material is just to give you an idea of the topics and
questions which can be asked in the ICT EXAMS.
 For the preparation of EXAMS learners should not only depend on the
given document but must go through the complete units of the syllabus.
 ICT EXAMS will include Fill in the blanks, True/ False, MCQ’s, Q/A &
Diagrams.
1. Define plagiarism?
2. What is a search engine?
3. Give examples of search engines. Any three.
4. Google receives about searches per seconds on any given day.
5. What are internet searching strategies? Describe 2 of them.
6. Why is it important to site ethical sources for your research?
7. What is a digitally resilient person?
8. Cyber bullying occurs online, often through instant messages, text, calls. State
whether it is true or false.
9. How can you identify if a certain news is fake.
10. How do you block popup?
11. What factors you need for live streaming?
12. Write down any 2 risks of live stream.
13. A password should be kept strong so hackers cannot easily hack. Explain the
statement.
14. Describe some tips to have a secure password.
15. What is Digital citizenship?
16. WHAT IS SEARCH ENGINE ?
17. WHAT ARE INTERNET SEARCHING STRATIGIES ?
18. WHAT IS MEANT BY DIGITAL CITIZENSHIP ?
19. LIST DOWN THE FACTORS OF DIGITAL RESILIENCE ?
20. WHAT HARSHS DO YOU FACE IN CYBER BULLYING ?
21. WHAT HAPPENS IN LIVE STREAMING ?
22. LIST DOWN AT LEAST 3 EXAMPLES OF CYBER BULLYING .
23. ELABORATE SOME OF THE RISKS OF LIVE STREAMING .
24. HOW CAN WE PROTECT OUR PASSWORD ?
25. Create different ____________for different accounts .
26. A _________ is a secret word .
27. WHAT WILL YOU DO IF YOU GET HACKED ?
28. DEFINE ETHICAL CITATION .
29. IN YOUR OPINION HOW WE CAN AVOID CYBER BULLYING.EXPLAIN YOUR ANSWER .
30. YOU MAY HAVE HEARD TERM FAKE NEWS, DEFINE IT .
31. HOW DOES POP –UP BLOCKING WORKS ?
32. A __________ IS DESIGNED TO SEARCH FOR INFORMATION ON THE WORLD WIDE
WEB.
33. THE SEARCH RESULT ARE USUALLY PRESENTED IN A LIST COMMONLY CALLED
_______.
34. __________ IS FOR GENERALLY SEARCHING FOR ANYTHING.
35. ________ IS USE FOR READING ONLINE BOOKS.
36. _________ RECIEVES OVER ______ SEARCHES FOR EVERY SECOND.
37. WHILE HUMAN _________ AND ________ SUBJECT DIRECTORISE.
38. WHEN PERFOMING A SEARCH, BREAK DOWN THE TOPIC INTO _________ CONCEPT.
39. IF YOU ARE __________ THIS MEAN YOU BELONG TO GROUP OF PEOPLE.
40. ____________ IS BULLING THAT OCCURS ONLINE.
41. IN CYPERBULLING PEOPLE BULL PEOPLE ON TEXT MESSAGES, CALLS, SOCIAL MEDIA
ETC.
42. THERE IS ONLY ONE SOLUTION TO BE SAVE FROM ___________.
43. PASSWORD IS A __________ WORD.
44. THERE ARE MANY TYPES OF PASSWORD, SOME ARE EASY AND SOME ___________.
45. ___________ IS YOUR CLASSROOM OR NEIGHBOURS.
46. IN _________ ARE INFORMATION CAN BE HACKED.
47. __________ IS FOR ORGANIC SEARCHING.
48. ____________ IS FOR IMAGE SEARCHING.
49. _____________ CONTAIN ONE KEYBOARD.
50. DUCKDUCKGO IS ALSOO A ________________.
51. LYCOS IS ____________ APP.
52. How a search engine works?
53. What are the different in ways various search engine works and how many are they
and what are the task?
54. Name three of the common search engine
55. What is a search engine?
56. What are the several strategies for boosting search engine performance? Name
them.
57. What is digital citizenship?
58. What is a digital resilience?
59. What are the examples of cyber bullying?
60. How to avoid cyber bullying?
61. Define the definition “fake news”?
62. What is live streaming?
63. What are some risks of live streaming?
64. What are some handy tips for protecting and kepping your password safe?
65. Why is it important to keep your private information safe?
66. If you share too much information what will happen?
67. What is it meants by pop-up blocking?
68. How many people use google in a year?
69. How many people use google for searching in an hour?
70. Cyber bullying can our through?
71. How many people search on Google receives per second?
72. How does a search engine works?
73. When performing a search, the key words might be..?
74. How does cyberbullying happens?
75. Write any 3 examples of cyberbullying.
76. Anybody can make mistakes online. Even if you are careful accidents can happen.
What will you do if things go wrong online?
77. How can we protect our password?
78. What is live streaming?
79. Write any 4 risks of live streaming?
80. What is the use of plus and minus?
81. What are different types of fake news?
82. Plus sign is the equivalent of ______ and minus sign is the equivalent of
____________
83. Creating a fake profile to ___________ someone
84. Write advantages and disadvantages of internet?
85. What are some handy tips to use internet?
86. How to protect yourself and others from cyber bullying?
87. How live streaming broadcasting in real time?
88. Write any 3 points to avoid cyberbullying?
89. What is digital resilience?
90. How can digital citizenship help us?
91. What is meant by the phrase called “E-SAFETY” and what technique should we use
to follow it?
92. Do u think internet is important to us in our daily lives? What does it impact on us?
93. What do you mean by the word “cyberbullying”? In what ways can we avoid cyber
bullying happening to us?
94. Imagine if u get a text of a person who is unknown trying to threaten you, what will
you do in this situation? Explain in detail
95. Many people can lose their passwords which can give the hackers a great
opportunity to hack our accounts and maybe one day we could be in that situation
as well, in what ways do you think we could avoid this happening to us?
96. What is a search engine designed for?
97. Name 5 types of common search engine:
98. Tell the 3 basic tasks which are performed in various search engines:
99. Tell 2 internet searching strategies:
100. Tell the identification keywords:
101. What is the plus and minus symbol used for?
102. Tell some qualities of a digital resilient person:
103. How does cyberbullying occurs online?
104. Tell 2 examples of cyberbullying and 2 ways to avoid it:
105. How can we identify if it is a fake news or not?
106. What is Pop-up-Blocking?
107. Identify some platforms of live streaming?
108. Tell some risks of live streaming:
109. A password is a --------, ------- or a ----------- of character that allows you to access
to protected information or an account.
110. What is a strong password?
111. Tell some tips for password protection:
112. What are the pros and cons of password protection?
113. What does being a digital citizen means?
114. Being a digital citizen what rules do u need to follow?
115. Sharing too much personal information could leave you vulnerable for what
reasons?

You might also like