LET360 owl LET360

GenEd Science and Technology — LET Practice Questions

This GenEd Science and Technology section of the LET General Education exam covers 6 expert-reviewed practice questions. Each question has a plain-English explanation and notes on why the wrong answers are wrong.

6 reviewed questions on GenEd Science and Technology — and over 300 across General Education overall — are available with a free LET360 account. Sign up free →

Sample questions with answers and explanations

Sample 1

Which part of the computer is considered the 'brain' where most data processing takes place?

Answer: C

The Central Processing Unit (CPU) is called the brain of the computer because it carries out the instructions that make programs run — calculations, comparisons, data movement. Other parts support the CPU: RAM holds data temporarily for the CPU to use, the hard drive stores files long-term, and the motherboard connects everything. But the actual processing — the thinking — happens in the CPU.

Why the other choices are wrong
  • A. The hard drive is permanent storage; it holds files but doesn't process them.
  • B. RAM is fast working memory that holds data for the CPU; it doesn't compute on its own.
  • D. The motherboard is the connecting circuit board — important, but it doesn't do the processing itself.

Sample 2

Which security measure is specifically designed to prevent unauthorized access to or from a private network?

Answer: B

A firewall is a security system — software, hardware, or both — that monitors traffic between a private network and outside networks. It checks data packets against a set of security rules and blocks anything suspicious or unauthorized. Imagine a guard at a gate: every visitor's ID is checked against a list, and only those with permission get in. Firewalls protect computers from unauthorized remote access, block known malicious sources, and can hide internal network details from outsiders. They're a first line of defense for any internet-connected system.

Why the other choices are wrong
  • A. Antivirus removes or blocks malicious software AFTER it tries to run on a computer — different layer of defense.
  • C. Digital signature verifies the origin/integrity of a document or message — doesn't block network access.
  • D. Encryption scrambles data so only authorized readers can decode it — protects content, not access.

Sample 3

In the TPACK framework for ICT integration, what does the 'P' stand for?

Answer: C

TPACK is a framework by Mishra and Koehler (2006) describing what teachers need to integrate technology effectively. It has three overlapping circles: Technology Knowledge (knowing the tools), Pedagogical Knowledge (knowing how to teach — strategies, learner needs, assessment), and Content Knowledge (knowing your subject deeply). The 'P' stands for Pedagogy. Strong TPACK teachers don't just know each circle separately — they know how to use a particular tech tool for a particular topic with particular students.

Why the other choices are wrong
  • A. 'Practical' isn't the standard meaning of P in TPACK; the framework specifies Pedagogy.
  • B. 'Professional' isn't the formal term Mishra and Koehler used.
  • D. 'Programmatic' isn't the framework component.
Want all 6 questions on GenEd Science and Technology plus timed practice tests?
Sign up free with Google →

Related topics