Your SlideShare is downloading. ×
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

11,872

Published on

ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers …

ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Published in: Education, Technology
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
11,872
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
320
Comments
0
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com ICDL CORE 1 – Concepts of ICT Test A (135 Questions) Q1. What is the name of the network that is often used by companies to share internal information? Intranet Infonet Webnet Widenet Q2. Which of the following can be used by a computer to connect to the internet? A mobile phone. An external hard disk. A scanner. A wireless headset. Q3. What is the same as a social networking Website? A virtual reality. An online community. A virtual server. An online database. Q4. How can the negative environmental impact of printers be effectively reduced? Never turn off the printer. Only print in black and white. Recycle paper and cartridges. Use inkjet printers Q5. What software is most useful for creating posters and slides? Database software Spreadsheet software Presentation software Word processing software Q6. Which is a multimedia player? Device A. Device B. Device C Device D Q7. Who is a typical desktop PC user? An IT support person that stays at workplace all day. An executive that frequently attends meetings in different location. A sales person that spends most of the time travelling. A student that needs a small and portable computer.
  • 2. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q8. How is entertainment, shows and other types of Web content ofen distributed? Via log files. Via text messages. Via compressed folders. Via podcasts. Q9. Why is some software called open source? Because users can download it from the Internet for free. Because users can use it for a limited period for free. Because users can use, improve and distribute it for free. Because users can receive software upgrades for free. Q10. How is legally purchased software recognised? The software should display a copyright text. The software should be on a DVD. The software should have a valid license. The software should have a large file size. Q11. Why is a hard disk required in a computer? To supply the computer with power. To prevent the computer from overheating. To enable the computer to store data. To provide the computer with wireless connectivity. Q12. What is an important data protection rule for a data controller? Data collection must always be approved of by the data subject. Data can only be processed if the collection was done with the last year. Data that is collected can be freely distributed to public authorities. Data must be collected for legitimate purposes and used accordingly. Q13. Which one of the following has the smallest storage capacity? A 100 MB hard disk. A 100 KB hard disk. A 100 TB hard disk. A 100 GB hard disk. Q14. What does the term ICT stand for? All the technologies that are used for computation and information. All the technologies that are used for the comtemplation of information. All the technologies that are used for communication and information. All the technologies that are used for the comprehension of information. Q15. What characterises a WLAN network? It only works indoors. It only works outdoors. It has a wired connection. It has a wireless connection. Q16. Which of the following is possible to share with other users online? Only photos. Only video clips. Only audio files. Any digital content.
  • 3. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q17. Why is ergonomics recognised as a way to improve the workplace? Good design can help employees to be healthier and more productive. Organisational psychology can help employees plan more efficiently. Massage therapy can help employees to be less tense and stressful. Communications technoloy can help employess communicate better. Q18. What is an important part of data protection legislation? To protect companies' access to public data. To protect archived information in general. To protect the infrastructure of the Internet. To protect the personal data of individuals. Q19. Which of the following is a type of internet connection? Infrared Broadband Bluetooth Firewall Q20. Which one of the following is most likely to involve a client/server relationship? Receiving software updates from the Internet. Installing computer hardware. Copying text between documents. Starting a personal computer. Q21. What is measured in kilobits per second? Mouse sensitivity Screen resolution Hard disk space Data transfer rate Q22. What is important for an anti-virus program to effectively find computer viruses? Make sure it is updated regularly. Make sure it is not a free program version. Make sure it is recently backed up. Make sure it is checking system files only. Q23. Which one of the following is most likely to connect to the Internet to be fully functional? A presentation application. An instant messaging application. An image editing application. A spreadsheet application. Q24. What is an input device? Printer Speaker Microphone Monitor Q25. Which measure should primarily be taken to protect information on a computer? A username and password should be required to log on. A router should be securing the computer from online attacks. The computer should be located in a locked room. The data on the hard drive should be encrypted.
  • 4. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q26. A file has arrived in an e-mail from an unknown sender. What is the best way to act from a security perspective? Save the file and delete the message. Scan the file for computer viruses. Ask the sender about the file. Disconnect from the Internet and open the file. Q27. What is an example of e-commerce? Online voting Online tax collection Online ticket sales Online census systems Q28. For whom would a screen magnifier be most useful? People who suffer from visual impairment. People who suffer from cognitive impairment. People who suffer from mobility impairment. People who suffer from hearing impairment. Q29. What characterises teleworking? Increased commuting More potential for teamwork Improved human contact Flexible hours Q30. Which is an output device? Device A Device B Device C Device D Q31. What is the best place to store a data backup from a security perspective? In a hidden folder on the computer's hard disk. In a visible folder on the computer's hard disk. In a different building than the computer. In the same building as the computer. Q32. What is actually happening when a user e-mails a picture? Data is being edited in system files. Data is being uploaded to a network. Data is being copied to a backup folder. Data is being deleted from the hard disk.
  • 5. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q33. What does a software end-user license agreement indicate? The price of the software. The usage terms for the software. The installation details for the software. The changes in the new version of the software. Q34. What is copyright? A special consumption tax on software. A programme initiated to raise the quality of software. A right for the consumer to freely copy commercial software. A term that covers the rights of the creator of music, books, software etc. Q35. What is the purpose of using a firewall? To increase the hard disk capacity. To prevent unauthorised computer access. To speed up the Internet connection. To disinfect data files that have computer virus. Q36. How can data theft be prevented most effectively? Combine the use of a password with a security lock. Connect to the Internet only during office hours. Hide important files in folders that are hard to find. Avoid bringing a laptop computer in public places. Q37. In which situation is Voice over Internet Protocol (VoIP) used? Downloading sound files from the Internet. Listening to music broadcasted on the Internet. Making telephone calls via the Internet. Uploading a recording of a lecture on the Internet. Q38. What is an important data protection right for an ordinary person (data subject)? The right to access other individuals personal data. The right to financial compensation in exchange for personal data. The right to access your own personal data. The right to remove all personal data from public databases. Q39. What characterises Random Access Memory (RAM)? RAM cannot store data when the computer is switched off. RAM can store data when the computer is switched off. Decreasing the amount of RAM decreases the computer's long-term storage capacity. Increasing the amount of RAM increased the computer's long-term storage capacity. Q40. From a security perspective, what is a simple but effective password policy? A password should be very easy to remember. A password should have no numbers. A password should never be revealed. A password should never be changed. Q41. What is Really Simple Syndication (RSS)? An electronic news service. A way to subscribe to updated Web content. A method of disinfecting computer viruses. A type of Internet connection.
  • 6. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q42. What is an effective energy saving option in computers? The option to automatically reduce the hard disk capacity. The option to automatically lower the sound level. The option to automatically turn off the screen. The option to automatically decrease the amount of RAM. Q43. How can physical wellbeing be ensured when working at a computer for long spells? Use eye relaxation techniques. Reduce the number of breaks. Turn up the workplace temperature. Dim the lighting in the office. Q44. What characterises a touchscreen? It is both an input and output device. It is both an internal and external device. It is both a monitor and a loudspeaker. It is both a monitor and a firewall. Q45. Which one of the following is most likely to speed up a computer? Increasing the number of input devices. Increasing the number of output devices. Changing to a processor with higher capacity. Changing to a power supply with higher capacity. Q46. Which one of the following is an example of hardware? An e-mail message. A keyboard. An operating system. A database. Q47. What characterises e-mail? E-mail enables easy and fast transmission of messages. E-mail enables voice communication between computer users. E-mail enables broadcasting of Web based multimedia content. E-mail enables free online mass storage of files. Q48. What is an example of software? CPU Mouse Operating System USB flash drive Q49. What is regarded as a serious health factor associated with computer use in the workplace? The height and width of the keyboard. The availability and transfer rate of the network. The direction and amount of indoor light. The size and speed of the hard disk. Q50. What is a Web log (Blog)? A database that stores usernames and passwords. A catalogue of popular Websites. An application that records visited Websites. An online journal that is regularly updated.
  • 7. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q51. What type of information should be shared with caution online? Holiday memories Hobby tips Personal information Forum comments Q52. What is true about operating systems software and applications software? The applications software is always installed first on a computer, then the operating systems software. The operating systems software is always installed first on a computer, then the applications software. The operating systems software can only interact with software, not hardware. The applications software can only interact with hardware, not software. Q53. What do Windows and Unix have in common? They are applications software. They are operating systems. They are hardware devices. They are broadband services. Q54. What characterises Instant Messaging (IM)? It is the same as electronic mail. It is real-time text communication. It is only available for wireless devices. It is mostly used when computers are offline. Q55. Which one of the following types of computer is most likely to be used by a travelling salesman? A desktop computer. A tablet PC. A server. A laptop. Q56. Which one of the following is a term for systems used to store, retrieve, process and transmit data? Internet & Communication Technology. Internet & Information Technology. Information & Communication Technology. Information & Computer Technology. Q57. Which one of the following measures the speed of the CPU? Gigahertz (GHz). Bits per second (Bps). Gigabytes (GB). Megabytes (MB). Q58. Which one of the following is a term for an audio or video recording posted on a web site that can be downloaded and played later? Podcast. Blog. VoIP. RSS Feed.
  • 8. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q59. Which one of the following describes a computer’s operating system? Software that can retrieve information from a database. Hardware that can scan and convert photographs into digital files. Software that controls the allocation and usage of hardware. Hardware that can record and send images across the Internet. Q60. Which one of the following types of software would you most likely use to create a letter? Web browsing software. Spreadsheet software. Accounting software. Word processing software. Q61. The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called? The Internet. A Local Area Network. The World Wide Web. A network port. Q62. Which one of the following is a private network that allows specified external users’ access? Intranet. WorldNets. Internet. Extranet. Q63. Which one of the following devices do you need to be able to communicate with other computers using the telephone network? CD-ROM. Modem. Printer. Speakers. Q64. Which one of the following is a software application that assists users who are visually impaired to identify and interpret what is displayed on screen? A screen calendar. A word processor. A screen reader. A web log. Q65. Which one of the following is a common feature of e-learning? Always requires physical class attendance. Cannot download documents for later reading. Learning is self-paced. Travel time and costs are very high. Q66. Which one of the following is NOT a feature of electronic commerce? Goods can be advertised and prices compared. There is physical contact between buyer and seller. Transactions can be processed quickly. Services are available 24 hours a day. Q67. Which one of the following is the best way to maintain a good posture? Ensure your computer is in a well-lit area. Make sure that there are no cables on the floor. Make sure that your computer is using a fast processor. Make sure that your computer; desk and chair are positioned correctly.
  • 9. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q68. Which one of the following statements describes a good approach to information security for an organisation? There are no procedures for reporting security lapses. Staff passwords are not changed regularly. Sensitive data is available to everyone that requests it. Keeping an off-site backup of all files. Q69. Which one of the following is a good password policy for an organisation? All passwords are changed regularly. All passwords are never changed. All passwords are made up of less than four characters. All passwords are made up of less than four numbers. Q70. Which one of the following is the best way to protect a computer against computer viruses? Only virus-check e-mail attachments. Update antivirus software on a regular basis. Always make sure that the operating system is up to date. Only download files from the Internet during business hours. Q71. Which one of the following statements describes shareware? Totally free software that is available only on the Internet. Commercial based software that must be paid for. Software available for free on a trial basis after which payment will be required. Copyright free software that allows unlimited copies and distribution. Q72. There are rules governing the rights of a data subject and the responsibilities of a data controller. What are these rules called? Data Privacy Policy. Data Management Act. Data Protection legislation or conventions. Data Publicity Law. Q73. Which one of the following is an example of hardware? An antivirus program. A spreadsheet application. A mouse. The World Wide Web. Q74. Which one of the following would improve computer performance? Using a larger monitor. Increasing the number of applications running. Using a faster printer. Increasing the size of RAM. Q75. Which one of the following is NOT a function of the Central Processing Unit? Executing program instructions. Ensuring program instructions are executed in the correct sequence. Sending e-mail. Carrying out calculations. Q76. Which one of the following is both an input and output device? Touchscreen. Keyboard. Printer. Scanner.
  • 10. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q77. Which one of the following is a method of publishing frequently updated content such as news headlines online? A blog. RSS. A podcast. Instant messaging. Q78. Which one of the following is an example of an operating system? iTunes. PowerPoint. Windows. Netscape. Q79. Which one of the following is considered good environmental practice? Using a slow computer. Printing on both sides of a page. Using up to date software. Backing up data on a regular basis. Q80. Which one of the following statements about the Internet is TRUE? The Internet is a global network that links many computer networks together. The Internet is a private company network. The Internet is a visual representation of linked documents. The Internet is a network operating system. Q81. Which one of the following is an input/output port? Linear. Radial. Lateral. FireWire. Q82. Which one of the following is an advantage of teleworking? Long commuting times. Flexible schedules. Less emphasis on teamwork. Lack of human contact. Q83. Which one of the following is a characteristic of broadband? Completely safe from intruders. It has a dial up connection. High speed. Cost can vary from day to day. Q84. Which one of the following is a text-based communication between two or more people over the Internet? Podcasting. Really Simple Syndication. Voice over Internet Protocol. Instant Messaging. Q85. Which one of the following practices helps create a good ergonomic working environment? Protecting computer monitors from reflections and glare by correct positioning. Taking very few breaks away from the computer. Keeping the office cold and using low overhead lighting. Use of non-adjustable chairs when working with computers.
  • 11. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q86. Why is it necessary for an organisation to adopt a good password policy? To allow easy sharing of files across the company network. To make it easier for the computer to connect to a network. To protect files against unauthorized use. To make it easier to find files on a computer. Q87. Which one of the following is a way to prevent the theft of data from a computer? Use an up to date anti-virus program. Back up data on a regular basis. Remove the monitor when not in use. Set up a username and password. Q88. Which one of the following should be carried out to safeguard files from loss in case the main copy is damaged? Backup files to a new location on your computer. Install password security. Backup the files regularly and store offsite. Install a firewall. Q89. Which one of the following could allow a virus to enter a computer? Downloading files from the Internet onto the computer. Connecting the computer to a new printer. Running a virus scan on the computer. Setting the computer monitor to a low resolution. Q90. Which one of the following statements about an End User License Agreement is true? It gives full ownership of the software to the user of the software. It gives the user the exclusive right to copy and sell the software to other potential users. It gives the user the right to modify the software. It gives the user the right to install and run the software on a specified number of computers. Q91. What is the name of the law for the storage and use of data in the UK? Details Provision Act Data Protection Authority Data Privacy Authority Data Protection Act Q92. What is the best way to prevent a computer virus from entering your computer? Log out of your computer each time you have finished using it Install and use anti-virus software on your computer Do not use emails on your machine Make sure all your files are safely stored to your floppy disks Q93. What does RSI stand for? Repeated Strain Inclusion Regular Systems Initiation Routine Structures Infection Repetitive Strain Injury Q94. Health and safety is important when working with computers, which of the following will help to prevent injuries? Always use screen savers Ensure the office is air conditioned All trailing cables should be secured Turn the lights off at the end of the day
  • 12. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q95. Which of the following systems will help to improve communications within the company? Excel Powerpoint Email Solitaire Q96. Which is a use of e-commerce on the internet? Checking flight availability Searching for a suitable holiday Researching holiday destinations Booking a holiday Q97. Which of the following would you use to find information on the internet? Email Word Processor Search Engine Photo Editor Q98. In the home, which of the following would you use the internet for? Storing friends and family names and addresses Researching information for homework Storing your files Re-booting your computer Q99. Which is the MAIN advantage of using a network system in the office? Allows sharing of data Regular backups Costs are reduced Office procedures can be automated Q100. Which of the following software manages the files and folders on your computer's hard disk drive? Applications software Anti-virus software Systems software Utilities software Q101. Identify the computer port shown? Serial Port USB Port Parallel Port Network Port Q102. What has got to do with bandwith of transmission? CPU speed Data transfer rate RAM capacity Speed of printer Q103. Identify the computer port? Firewire Port USB Port Parallel Port Serial Port
  • 13. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q104. What does firewall do? Protect against virus infection Monitor network activities Protect your hardware Prevent software from catching fire Q105. Identify this computer port? USB Port Parallel Port Network Port Firewire Port Q106. What is the usage of firewall? Prevent virus infection Prevent computer from catching fire Monitor transmission of data Prevent hardware from burning Q107. Which computer port is shown in this picture? Network Port Serial Port Firewire Port Parallel Port Q108. What determines the data transfer rate? RAM capacity Hard disk speed Bandwidth of transmission CPU clock speed Q109. Identify this computer port shown in the diagram? Network Port Serial Port Parallel Port Firewire Port Q110. Which software application would you use to create a report? Excel Powerpoint Word Publisher Q111. Which of the following is NOT an input device? Monitor Mouse Keyboard Scanner Q112. What does GUI stand for? General Utilities Intervention Graphical User Interface General User Intervention Graphical Utilities Interface
  • 14. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q113. What of these is an input device? CD-Rom Mouse Printer Zip drive Q114. Which of these computer based operations uses barcode input? Marking on online test paper Issuing a book in a library Paying for goods using a credit card Ordering goods from a web site Q115. Which type of memory holds the basic operating system commands? ROM RAM Cache Auxiliary Q116. Which of these storage devices holds the most data? Floppy disk DVD drive Hard Disk drive Thumb drive Q117. Which type of software would you use to prepare a budget forecast? Word Processing Database Presentation Spreadsheet Q118. Which of these is an output device? CD-ROM Mouse Printer Scanner Q119. Which of these is a characteristic of electronic mail that does not apply to other methods? Attachments can be sent Messages can be sent to more than 1 person Mail may get lost Can only send to some people Q120. Which upgrade will have the most impact on the performance of your computer? Adding more RAM Reducing the peripheral devices Adding a network card Fitting a second hard disk Q121. What type of software controls the file system on the computer? GUI Network software Operating system software Application software
  • 15. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q122. Which is the smallest unit of computer storage? Byte Bit Kilo bit Megabyte Q123. Which type of software is used to access the Internet? Interface Presentation Browser System Q124. What is connected in a LAN? Computers on one site Computers in many sites Computers in one office Computers on the Internet Q125. Which type of software would you use to store customer data? Database Spreadsheet Presentation Word Processing Q126. How are computers in a WAN connected? Cables Telephone lines Internet Intranet Q127. Why is it important to make regular back-ups of computer data? To prevent loss of data To comply with the law To protect the computer To increase the storage company Q128. Your cable modem runs at 10 Mbps. What does this represent? Speed of your computer Speed of transferring data Speed of your hard disk Speed of cache memory Q129. Where should you store back up copies of your data? Near to the computer In a different location In your car In an off-site fire proof store Q130. You have a modem and a telephone connection. What else do you need to connect your computer to the Internet? Browser and printer ISP account and printer ISP account and network Browser and ISP account
  • 16. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q131. Which of these describe a computer program? An input device A set of instructions An interactive user guide A help system Q132. You have installed more memory in your computer. What type of memory is this? Cache Virtual ROM RAM Q133. Which type of computer is used to process large amounts of corporate data? Notebook Mainframe Mini computer Desktop Q134. Which is the best way of protecting a computer system from unauthorised use? Ensuring all users have passwords Locking the office Using a screensaver Maintaining an audit trail Q135. Which of these devices can be used to input and output information? Scanner Printer Bar Code Reader Touch Screen Test B (135 Questions) Q1. Which type of system is used to provide information for employees within a company? Internet Intranet Extranet Electronic mail Q2. Which of these is an example of an e-commerce activity? Viewing a travel timetable Checking theatre availability Downloading a screen saver Booking a flight Q3. Which of these is always an advantage of buying goods online? Longer opening hours Greater choice Personal service Cheaper prices
  • 17. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q4. Which is a ‘laptop’ or a ‘notebook’? A diary or timetable application A portable PC An electronic organiser A simple word processor Q5. Which is the main factor in the growth of the ‘Information Society’? Multimedia computers Faster processors Modems Internet Q6. Which device would you use to draw shapes on the screen? Scanner Mouse Optical Character Reader Plotter Q7. Which of these tasks is a function of the operating system? Adding slides in presentation Copying a file Producing a database report Adding data to a spreadsheet Q8. Why is it important that you have adequate lighting when using a computer? To avoid back injuries To avoid radiation To avoid repetitive strain injuries To avoid eyestrain and headaches Q9. Which of these is an input device? Monitor Speaker Scanner Plotter Q10. Most computers are operating using icons and a mouse. What is this system called? Graphical user interface Object oriented environment Symbolic user interface Command line interface Q11. Which is most likely to happen after a power cut? You can restart the computer and carry on with the same work The computer will not function All unsaved work is lost Your disk drive will be damaged Q12. Which of the following devices is used to control the software in a games programme? Keyboard Bar Code reader Joystick Light pen
  • 18. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q13. Which of the following devices sends information from the user to the computer? Keyboard System unit Monitor Printer Q14. The computers in your office are connected together so staff can share files and printers. What is this arrangement of computers called? LAN ISDN TCP/IP WAN Q15. A Library has a database of all its books. There are over 100,000 books and each record has Title, Author, Publisher, ISBN, date and description. What storage amount is required for the database? 1 byte 1 Kilobyte 1 Megabyte 1 Gigabyte Q16. Which of the following NOT a permanent storage medium? Hard disk CD-ROM RAM USB Thumb Drive Q17. Poor postures at the computer can cause backache and other problems. Which is the best way of avoiding these problems? Sitting at the recommended distance from the monitor Making sure your chair is the correct height Using a mouse to operate programs Switching off the computer when not in use Q18. Which of the following is the MAIN advantage of a network system? Increased speed of operation Reduces cost Allows sharing of data Backs up data Q19. Which type of software controls the allocation of resources in the computer? Application software Operating system software Browser software Utility software Q20. A shareware program is best described as.... a program which may be downloaded and used for a trail period, but must be bought afterwards a program developed by a single team and accessible by anyone in the world a program installed on a Web site and executable on any system in the world a free program developed by students
  • 19. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q21. Which of the following is an example of the use of e-commerce on the Internet? Checking theatre availability Booking train tickets Using e-mail Downloading information Q22. Health and safety issues are important when using a computer. To avoid risk of injury, which of the following should always be TRUE? Trailing cables should be secured Screen savers should be installed A mouse mat should always be used Power extension cables should be used Q23. Which is the best way of protecting data from loss? Make regular backups of the data Delete all your old files Lock your computer Change your password Q24. There are rules governing the storage and supply of computer based information. What are these rules called? Data Prohibition Law Data Protection Act Data Storage Act Data Supply Policy Q25. Which of the following systems would improve communication within a company? Office Software Electronic mail Project Management Database Q26. Which device could you use for the output of a music file? Microphone Speaker Digitiser Speech synthesiser Q27. Which software would you use for creating a set of slides to be shown to an audience? Database Presentation Desk Top Publishing Spreadsheet Q28. Which of these statements about Read Only Memory (ROM) is TRUE? Application programs can write data to the Read Only Memory The contents of the Read Only Memory are not deleted when the computer is switched off. The operating system is loaded into the Read Only Memory when the computer is started. Internet pages are stored in the Read Only Memory while they are being loaded. Q29. Which of the following is a problem when downloading files from the internet? The files may not be able to be removed The display settings on you computer may be changed The cache memory on your compute may become full Viruses may be introduced to you computer
  • 20. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q30. The Data Protection Acts is designed to... Make personal data freely available Create a permanent store for personal data Regulate the use of personal data Enforce deletion of personal data Q31. What is most likely to be affected by a computer virus? Your monitor Your data The speed of your computer Read only memory Q32. What is controlled by software copyright regulation? Making backups of the software Number of copies sold Type of computer used for the software Illegal distribution of software Q33. Which type of software would you use to maintain information about account holders at a Bank or Building Society? Spreadsheet Word processor Database Stock Control Q34. What is a trackball? A monitoring system A type of speaker An alternative to the mouse A storage device Q35. Which type of software can you use without having to pay a fee? Freeware Shareware Operating system Application software Q36. Which of these is a hand held device that stores appointments? Notebook Desktop Mini computer Personal Digital Assistant (PDA) Q37. Which is the BEST way of preventing loss of your data if there is a power cut? Use a filtered plug Make frequent back ups of the data Ensure passwords are used Install virus checking software Q38. Which of these is NOT a benefit of e-mail? Ability to send attachments Receiving junk mail Instant delivery of your message Sending to more than one person at once
  • 21. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q39. What is the main advantage of a GUI? Reduces the cost of computing Makes the computer easier to use Required a less powerful computer Does not need updating Q40. Which device would you use to digitise a photograph? Mark reader Data logger Scanner Plotter Q41. Which of these is NOT an input device? Digital camera Microphone Scanner Speaker Q42. There are Laws governing the use of software to prevent people from making illegal copies of software. Which of the following is the best way to prevent this from happening? Labelling the software Using a code to unlock the software Sending offenders to prison Requiring passwords for copying Q43. Which of the following is a storage device? Keyboard Monitor Speaker Disk Drive Q44. Which of the following statements is NOT TRUE in relation to the Data Protection Act? The data user must ensure that the information... Is obtained fairly and accurately Is stored with proper security Is accurate and up to date Can be sent abroad at any time Q45. For which of these tasks would you use a search engine? To find files on your computer To track new network To detect viruses on your computer To find information on the world Wide Web Q46. Which of these is the major benefit of e-Learning? Easier Cheaper Reduced contact with other students Available at any time Q47. Which of these is a characteristic of RAM? Cannot be erased Lost when the power is switched off Stores data downloaded from the Internet Holds system commands
  • 22. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q48. Which of the following is NOT an output device? Keyboard Monitor Printer Speaker Q49. Purchasing goods on a web site is an example of... Web site design Net working Electronic commerce Search engine Q50. Which type of memory is used to store applications while they are running? ROM RAM Cache Auxiliary Q51. Which of these is NOT a storage device? RAM USB Thumb Drive Printer Hard Disk Drive Q52. Computers can damage your health in various ways. Which is the best way of preventing this? Taking frequent breaks Having good lighting Using a screen protector Raising the height of the monitor Q53. You want all users to be able to view data in a computer system and selected users to be able to enter and change the data. How can you achieve this? Allow unrestricted access to the system Give unauthorised users a password Set access rights for different groups of users Allocated keys to authorised users Q54. Which type of computer stores the common files in a network? Main frame Laptop Desktop Server Q55. What does CPU stand for? Central Power Unit Computer Processing Unit Computer Programming Unit Central Processing Unit Q56. What is a computer virus? A program that can damage your computers A hardware fault A program that you have downloaded from an Internet site A corrupted area of your disk
  • 23. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q57. You can help to preserve the environment by..... Using a screen saver Recycling printer cartridges Using a filtered plug Using a smaller screen Q58. Which type of computer is used to operate large corporate systems and databases? Desktop computer Personal Digital Assistant (PDA) Mainframe Laptop Q59. Which of the following describes the essential components of Information & Communication Technology? Primary, secondary and cache memory RAM and ROM Hardware, software and communications technologies Hardware and shareware Q60. The speed of the Modem is measured in: Megahertz (MHz) Bits per second (Bps) Gigabytes (GB) Megabytes (MB) Q61. Which of the following statements about formatting the disk for the first time is true? Formatting prepares the disk to store data Formatting backs up data onto the disk Formatting copies the disk Formatting unlocks the disk Q62. Which of the following tasks is a function of the operating system? Adding data to a spreadsheet Producing a database report File management Producing a presentation Q63. Which software would you use to search for information in the internet? Web browsing software Spreadsheet software Accounting software Word processing software Q64. The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called? FTP LAN WWW HTTP Q65. An intranet is: A network operating system A network filing system A private company network A private company network that includes external specified users
  • 24. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q66. Which of the following devices do you need to be able to communicate with other computers using the telephone network? CD-ROM Modem Plotter Speakers Q67. Computer use can cause repetitive strain injury (RSI). Which of the following is the best way to avoid this? Ensure your computer is in a well-lit area Use an operator chair without arms Place your monitor at the correct height Work with your wrists level with the keyboard Q68. Which of the following statements describes a good approach to information security for an organisation? No procedures for reporting security lapses Staff passwords are not changed regularly Sensitive data is available to everyone Computer systems are backed up on a regular basis Q69. What is the best way of preventing your computer from being infected with a virus? Only virus-check e-mail attachments Have updateable anti-virus software running on your computer Have anti-virus software running on your computer Never open any e-mail attachments Q70. Which of the following statements describes shareware? Shareware is software without copyright protection Shareware is free software Shareware is software you may pay for after an initial time period of use Shareware is software you can use in any way Q71. There are rules governing the storage and supply of computer-based information. What are these rules called? Data Privacy Policy Data Management Act Data Protection Act Data Publicity Law Q72. Which of the following would be considered a portable computer? Workstation Mainframe Laptop Desktop computer Q73. Disk formatting is used to: Find files on a disk Lock a disk Unlock a disk Prepare a disk to store files
  • 25. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q74. Which of the following is an operating system? Excel PowerPoint 2007 Windows XP Netscape Q75. What is ISDN? Integrated Standard Digital Networks Integrated Services Digital Network Interactive Standard Dynamic Networks Internet Services Data Network Q76. If you were working from home, what software application could be used to communicate directly with colleagues and customers? Presentation Electronic mail (e-mail) Database Spreadsheet Q77. Which of the following practises helps create a good ergonomic working environment? Protecting computer monitors from reflections and glare by correct positioning Taking infrequent breaks away from the computer Keeping the office cold and using low overhead lighting Use of non-adjustable chairs when working with computers Q78. Which of the following can be an advantage of electronic documents? They can never be lost They can always be e-mailed regardless of size They can reduce the usage of paper They can never be copied Q79. Which of the following activities could lead to the spread of a computer virus? Using thumb drive from unknown sources to exchange data Using a standalone computer to output a hard copy letter Using retail software that has been checked for viruses Using a Graphical User Interface (GUI) Q80. An End User License Agreement: Is a form of advertising between a software application author or publisher and the user Gives the user the exclusive right to copy and sell the software to other potential users Grants ownership of the software to the user of the software Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, resale, and restricted use Q81. Which one of the following describes spam? Gathering information about a person or organisation without their knowledge. Performing an unauthorised, usually malicious, action such as erasing files. Putting unnecessary load on the network by making copies of files. Sending unwanted bulk messages. Q82. Which one of the following could lead to the spread of a malicious program? Using only software that has been checked for viruses. Maintaining regularly updated anti-virus software. Opening only virus-checked file attachments from known sources. Using a USB Flash Drive from an unknown source to exchange data.
  • 26. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q83. Which one of the following protects a computer from the risk of malicious programs? PC diagnostic software. Web tracking software. Anti-spam software. Anti-spyware software. Q84. Which one of the following describes why it is important to update antivirus software regularly? To ensure the software identifies old viruses. To protect your computer from all known viruses. To protect your computer from unwanted bulk messages. To prevent the spread of malicious programs on the Internet. Q85. Which one of the following describes a computer hacker? A skilled programmer who uses authorised access to exploit information available on a computer. A skilled programmer who secretly invades computers without authorisation. A skilled programmer who writes programs to train new employees. A skilled programmer who helps in the installation of new software for an organisation. Q86. Which one of the following describes why firewalls are used? To prevent unauthorised access by incoming transmissions. To prevent destruction of a computer in the event of a fire. To enable easy downloading of data from web sites. To detect and disable viruses already on a computer. Q87. Which one of the following is the reason that users should log on with a username and password? To be aware of who is in the building. To check up on the time-keeping of users. To protect computers against unauthorised use. To enable a personalised greeting for each user. Q88. Which one of the following statements about a password is TRUE? It must be changed only if it is compromised. It cannot contain special character symbols. It should be changed regularly. It must be registered with the system administrator. Q89. Which one of the following should be used to change your password in your computer? Internet Explorer. Anti-virus software. Control Panel Windows Firewall. Q90. Which one of the following shows respect for confidentiality of information? Discussing confidential information over the telephone. Uploading confidential information to a shared web site. Emailing confidential information to a colleague. Disclosing confidential information only to authorised individuals. Q91. Which one of the following describes why users should lock their computer when leaving their desk? To prevent a waste of electricity. To prevent unauthorised access to data. To prevent data from getting corrupted. To prevent the computer from malfunctioning.
  • 27. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q92. Which one of the following is an example of phishing? An email warning the recipient of a computer virus threat. An email directing the recipient to forward the email to friends. An email directing the recipient to enter personal details on a fake website. An email directing the recipient to download an attachment. Q93. Which one of the following is unsafe online activity? Giving your home address to someone you met in a chat room. Using a screen name or nick name that cannot identify you. Meeting someone you met online face-to-face in the company of your parents. Keeping your social network profile private. Q94. Which one of the following describes how confidential information should be sent using an unsecured network? In an unsigned email. In an attachment. In a compressed format. In an encrypted format. Q95. Which one of the following statements about wireless networks is TRUE? They cannot be intercepted by unknown users. They limit accessibility to other users. They limit visibility to other users. They can be accessible to other users. Q96. Which one of the following describes Bluetooth? Short-range wired protocol for exchanging data. Short-range wireless protocol for exchanging data. Long-range wireless protocol for exchanging data. Long-range wired protocol for exchanging data. Q97. Which one of the following describes why Bluetooth device settings should be adjusted? To increase the range of the device. To improve the quality of reception. To prevent the risk of unauthorised access. To reduce interference from other devices. Q98. Which one of the following should you do to ensure that your USB storage device is kept safe and secure? Only use it in private surroundings. Do not access it using a Bluetooth device. Use firewall software. Never leave it unattended. Q99. Which one of the following departments would usually hold guidelines and procedures for the secure use of IT within an organisation? The Marketing Department. The IT Department. The Sales Department. The Finance Department. Q100. Which one of the following describes why you should follow guidelines and procedures while using IT resources in an organisation? To ensure easy access to information on your computer. To ensure the secure use of IT resources.
  • 28. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com To ensure the IT Department is able to monitor all activity. To ensure the Finance Department is able to monitor the costs of IT resources. Q101. Which one of the following describes how a breach in IT security should be reported? Using the telephone. By emailing to the IT Manager. Using the method listed in the organisation’s security policy. Using any means of communication. Q102. Which one of the following would prevent the theft of a laptop? Anti-virus software. A webcam. Spyware. A security cable and lock. Q103. Which one of the following would NOT happen if a computer suddenly malfunctions? The operating system will fail. Files saved on the hard drive will be lost. All off-site backups will be lost. Some software may have to be reinstalled. Q104. Which one of the following should you use to backup personal data? A labelled CD. A printout. A website offering a file sharing service. A friend’s computer. Q105. Which one of the following describes why it is important to have a secure off-site backup copy of files? To improve accessible of files from other locations. To speed up the process of accessing the files at any time. To prevent the loss of data in the event of a fire. To reduce the possibility of data theft. Q106. Which one of the following describes how software can be stored safely? Storing it in a fireproof safe. Storing it in a cupboard. Storing backups of the software. Storing it close to the computer. Q107. Which of The Following Can Convert The Computer Signals From Digital To Analog? ISDN Modem DSL HDSL Q108. The Speed of the Central Processing Unit is measured in Mega hertz Hectares Revolutions per minute. Bits per second Q109. Which one of the following printers uses a toner in printing? Laser Dot matrix
  • 29. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Ink jet Bubble jet Q110. Which one of these statements is False? A network of computer linked within a building is called a LAN Databases can be accessed by many users who connected to a LAN. A network-linking computer over cities countries is called WAN Applications cannot be shared over a LAN. Q111. Which of the following statements is True? A mainframe computer enables users to share files, printers and other resources. Minicomputer enables users to share files, printers and other resources. A laptop computer enables users to share files, printers and other resources. Network computer enables users to share files, printers and other resources. Q112. Which of the following statements is TRUE? ROM loses information when the computer is powered off. ROM chips can be plugged into the motherboard to provide more memory. ROM can't be written to , it's pre-programmed. ROM data can be written when you are loading an application software Q113. One byte is equivalent to: 2 bit 8 bit 16 bit 4 bit Q114. What hardware helps you input data and give commands? Pointer Mouse Keyboard Scanner Q115. RAM Can Hold the Data And Programs Which In Currently Use, It Is UN Volatile Memory. True False Q116. Peripherals Devices Are Part of Hardware? True False Q117. What Device Prints the output on paper. Scanner Touch Screen Printer CPU Q118. Which printer type would MOST likely produce the most noise? Dot Matrix Inkjet Laser Thermal Q119. Which of the following requires power to be on in order to maintain the data it stores?
  • 30. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com ROM RAM Hard Disk USB Flash Disk Q120. Which one of these computers is too expensive? Minicomputer Lap top Mainframe Tablet Q121. When working away from the office a sales representative might typically use which type of computer? Desktop computer. Laptop computer An analogue computer A mainframe computer Q122. Special plastic cards containing a processor and memory are used to pay for goods and services. Each time the card is used the details on the card are updated. What is the name of such a card? Magnetic card Memory card Smart card Processor card Q123. Which computer would typically be the cheapest to buy? Desktop computer Laptop computer Mainframe computer Mini computer Q124. Which of the following would be the slowest device for accessing data? Floppy Disk Hard Disk USB Flash Drive DVD Q125. Which of the following would be the fastest device for accessing data? Floppy Disk DVD Hard Disk Magnetic Tape Drive Q126. Which of the following is hardware? A database A spreadsheet A mouse An operating system Q127. Which of the following is a peripheral device? Display Card CPU RAM Printer
  • 31. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q128. The generic name of the devices, which are connected to externally, and controlled by, the central processing unit, is: Keyboards RAM Monitors Peripherals Q129. Which of the following printers is the most suitable for a secretary to produce the final copy of a document? Dot matrix Laser Plotter Any of them Q130. Which type of memory is used to store the current status of computer application whilst it is being processed? EPROM PROM ROM RAM Q131. Small businesses often use computer system to run the company. Typically it is most likely to be: A Mainframe computer A microprocessor A mini computer A personal computer Q132. Which of the following could be considered typical users of a mainframe computer? A bank A school A doctor's surgery A small business Q133. Which list shows the correct order of memory capacity for these computers, smallest first? Mainframe computer, personal computer and minicomputer Personal computer, minicomputer and mainframe computer. Personal computer, mainframe computer and minicomputer Mainframe computer, minicomputer and personal computer. Q134. Which of these is an input device? CD-ROM Mouse Printer Speaker Q135. Your modem runs at 2M bps. What does this represent? Speed of your computer Speed of transferring data Speed of your hard disk Speed of cache memory

×