Digital Skills Interview Questions

Interview questions in digital skills, that can help you to brush up knowledge.

Q.1 What do you mean by digital citizenship?
Digital citizenship is basically the way we should act while using digital tools, interacting with others online, and what needs to be taught to help the next generation be better stewards of this technology.
Q.2 What are the principles of digital citizenship?
There are three principles developed by Mark Ribble in order to teach digital users how to responsibly use technology for becoming a digital citizen. These are respect, educate, and protect.
Q.3 What do you know about the golden rule of digital citizenship?
The golden rule of citizenship is treat others the same way that you want to be treated. This applies to online friendships and communications, similarly as it does with face-to-face interactions.
Q.4 What are input and output devices?
The devices which accept input from a user and send that data to the computer are called input devices. On the other side, output devices are computer hardware equipments which convert information into human readable form.
Q.5 What is a peripheral device?
A peripheral device is a computer device, like a keyboard or printer, that is not part of an essential computer.
Q.6 Define network.
Network can be defined as something that allows computers to connect and communicate with various computers through any medium.
Q.7 Name some peripheral devices.
Some common peripheral devices are: Monitor Trackball Mouse Keyboard Joy stick Touchpad
Q.8 What are the different types of network?
The different computer networks are: LAN PAN MAN WAN
Q.9 What does wireless LAN refer to?
Wireless LAN that is Wireless Local Area Network is a term that refers to a Local Area Network that doesn't require any cables to connect various devices. Instead, radio waves are used for communication.
Q.10 What are the types of LAN network?
There two types of LAN network are: client/server LANs and peer-to-peer LANs.
Q.11 What do you mean by a band?
Well, a radio communications signal occupies a range of frequencies that carry most of its energy, known as its bandwidth. Henceforth, a frequency band represents one communication channel or is subdivided into many.
Q.12 What are the types of wireless networks?
The basic types of wireless networks are: WAN, PAN and LAN.
Q.13 What is the use of Secure Wi-Fi?
Secure Wi-Fi is a service that automatically detects when you access a Wi-Fi network, and when is it enabled. This encrypts the data we transmit before it leaves our phone to ensure our privacy as well as protection.
Q.14 What is wireless network?
A wireless network is a type of computer network that makes use of wireless data connections between network nodes.
Q.15 What is WiFI?
WiFi refers to Wireless Fidelity. This is the same thing as saying WLAN that stands for Wireless Local Area Network.
Q.16 What does broadband refer to?
Broadband is basically large bandwidth data transmission which transports multiple signals and traffic types. However, the medium can be coaxial cable, radio, optical fiber, twisted pair or satellite.
Q.17 What is an operating system?
An operating system is an essential software that runs on a computer. It is used for managing the computer's memory and processes, and all of its software and hardware.
Q.18 Mention the types of OS.
1.Batch Operating System 2.Embedded Operating System 3.Distributed Operating System 4.Time-Sharing Operating System 5.Real-time Operating System
Q.19 What is the app store?
The app store is a kind of app store platform that is developed and maintained by Apple Inc., for mobile apps on its iOS and iPadOS operating systems.
Q.20 What are the types of e-commerce?
The three main types of e-commerce are: business-to-business (like Shopify), business-to-consumer (like Amazon), and consumer-to-consumer (like eBay).
Q.21 Mention the categories of e-commerce.
The two most popular types of e-Commerce in the world are B2B and B2C. They are the traditional transaction types that most of the people think of when they hear the word e-Commerce.
Q.22 Give some examples of e-business.
E-business take place on two major platforms namely online storefronts and online marketplaces. Some examples of online marketplaces are Amazon, eBay, Etsy, and Upwork.
Q.23 Define e-selling.
E-selling is an activity different from e-marketing,e-commerce and e-retailing. It is conceptualized to be computer–human dialog characterized by the digital spatio-temporal locus, the psychology of online persuasion, along with complex perceptions of value.
Q.24 What is an online service?
An online service is generally the information and services that are provided over the Internet. These services not just enable subscribers to communicate with each other, but also provide unlimited access to information.
Q.25 What is phishing?
Phishing is an online scam wherein the criminals impersonate legitimate organizations through emails, text messages, advertisements or some other means in order to steal sensitive information.
Q.26 What do you mean by malware?
Malware is the short form for malicious software that is a file or code, delivered over a network, that infects, steals or conducts virtually any behavior an attacker wants.
Q.27 Give some examples of malware.
Viruses Spyware Trojan Horses Adware & Scams Bots & Botnets
Q.28 What is a search engine?
A search engine is a tool based on web that allows users to locate information on the World Wide Web.
Q.29 Name the top 5 search engines.
The top 5 search engines in terms of market share in the world are Google, Bing, Yahoo, Baidu, and Yandex.
Q.30 What are the types of search engine queries?
The three different types of search queries are: Navigational search queries Transactional search queries Informational search queries
Q.31 What is netiquette?
Netiquette stands for Internet etiquette. As etiquette is a code of polite behavior in society, similarly netiquette is a code of good behavior on the Internet.
Q.32 Define plagiarism.
Plagiarism means showcasing of another author's language, ideas, thoughts or expressions as one's own original work.
Q.33 What are the types of plagiarism?
Direct Plagiarism Accidental Plagiarism Mosaic Plagiarism Self Plagiarism
Q.34 What is copyright?
Copyright is a legal term that describes the rights of creators over their literary and artistic works. Works covered by copyright range from books, paintings, music, sculpture, and films, to databases, computer programs, advertisements, maps, and technical drawings etc.
Q.35 What are the types of copyrights?
1.Public Performing Right 2.Mechanical License 3.Reproduction Right 4.Public Performance License 5.Synchronization License
Q.36 What do you mean by IPR?
IPR stands for Intellectual property rights. These are the rights given to persons over the creations of their minds. They generally provide the creator an exclusive right over the use of their creations for a particular period of time.
Q.37 What are the benefits of IPR?
Intellectual property protection is important for fostering innovation. Without the protection of ideas, businesses and individuals can not reap the full advantages of their inventions and would then focus less on research and development.
Q.38 What are the types of intellectual properties?
The four types of intellectual properties are copyrights, patents, trademarks, and trade secrets.
Q.39 What is the purpose of data backup?
The purpose of the data backup is to generate a copy of data which can be recovered in the event of a primary data failure.
Q.40 Mention the types of backups.
There are three major types of backup namely full, differential, and incremental.
Q.41 What do you mean by full data backup?
A full data backup is the process of generating one or more copies of all the organizational data files in one backup operation in order to protect them. A data protection specialist like backup administrator designates the files to be duplicated or all files are copied before the full backup process.
Q.42 What are the types of web security threats?
The different types of web security threats are: Phishing Watering hole attacks Network spoofing
Q.43 What is a web threat?
A web threat is a threat that uses the World Wide Web for facilitating cybercrime. These threats use different types of malware and fraud, all of which utilize HTTP or HTTPS protocols.
Q.44 What does public domain include?
The public domain includes all the creative work on which no intellectual property rights apply. Those rights might have had expired, expressly waived, been forfeited or may be inapplicable.
Q.45 Explain the importance of passwords.
Passwords give the first line of defense against any unauthorized access to our computer as well as personal information. The stronger is the password, the more protected our computer will be from hackers and malware. Thus, one should maintain strong passwords for all accounts on their computer.
Q.46 What is cyberbullying?
Cyberbullying is a type of harassment or bullying using electronic means. Cyberbullying and cyberharassment are also called online bullying.
Q.47 What is an email?
An email or electronic mail is an online message delivery system that delivers private messages to individuals and groups. Mostly, these messages are delivered to the recipient's email inbox, within seconds.
Q.48 What is an email address?
An email address is basically a unique identifier for an email account. It is useful both for sending and receiving email messages over the Internet.
Q.49 What is the use of Skype?
Skype is software which enables conversations in the world. Millions of individuals and businesses use Skype for making free video and voice one-to-one and group calls, sending instant messages and sharing files with other people on Skype.
Q.50 What does mobile security refer to?
Mobile device security is the protection of tablets, smartphones and laptops from various threats that are associated with wireless computing.
Q.51 How do you define MyScpace and Facebook?
MySpace and Facebook are primarily profile-based Social Networking Services (SNS). These Social Networking Services (SNS) are primarily organized around members' pages that consist of information about an individual member that includes their picture, interests, likes and dislikes.
Q.52 How would you define digital citizenship?
Digital Citizenship refers to building safe online spaces and communities. Digital Citizenship define the presence to grow and shape your world in a safe, creative way, and inspiring others to do the same. Digital Citizenship defines the norms of appropriate, responsible behaviour with regard to technology use.
Q.53 How will you manage and minimize the negative impact of digital footprint?
In order to manage and minimize the negative impact of digital footprint we must remember - "The Internet is forever". This means what gets posted online never really goes away which gets retrieved by anyone who knows how. Digital footprints includes two kinds of information -
Active information such as what we put on social media
Passive information, which is things like web cookies
Things to be kept in mind while minimizing the impact if digital footprints -
1. Use privacy settings
2. Keep a list of accounts
3. Don’t overshare
4. Use a password keeper
5. Monitor linking accounts
6. Consider using an anonymous secondary email
7. At least skim the terms and conditions
8. Know that sending is like publishing–forever
9. Use digital tools to manage your digital footprint
Q.54 What are your steps to clean digital footprints?
Some of the steps to clean digital footprints are -

1. Do not post anything that places you in a bad light later on which includes web searches and comments in blogs and sites like YouTube.
2. Be cautious with schedules and personal info. Do not disclose addresses, phone numbers, bank card numbers unless necessary.
Remember information posted online is almost impossible to remove. Web archiving and file sharing ensure we have got online records for life. Even when deactivate or delete old accounts, it will still be there.
Q.55 What do you understand by Digital Access?
We can define digital access as the element of digital citizenship that addresses an electronic buying and selling of goods.
Q.56 How would you define Digital Etiquettes?
Digital Etiquette has been described as the electronic standards of conduct or procedure.
Get Govt. Certified Take Test
 For Support