1. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
ICDL CORE 1 – Concepts of ICT
Test A (135 Questions)
Q1. What is the name of the network that is often used by companies to share internal information?
Q2. Which of the following can be used by a computer to connect to the internet?
A mobile phone.
An external hard disk.
A wireless headset.
Q3. What is the same as a social networking Website?
A virtual reality.
An online community.
A virtual server.
An online database.
Q4. How can the negative environmental impact of printers be effectively reduced?
Never turn off the printer.
Only print in black and white.
Recycle paper and cartridges.
Use inkjet printers
Q5. What software is most useful for creating posters and slides?
Word processing software
Q6. Which is a multimedia player?
Q7. Who is a typical desktop PC user?
An IT support person that stays at workplace all day.
An executive that frequently attends meetings in different location.
A sales person that spends most of the time travelling.
A student that needs a small and portable computer.
2. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q8. How is entertainment, shows and other types of Web content ofen distributed?
Via log files.
Via text messages.
Via compressed folders.
Q9. Why is some software called open source?
Because users can download it from the Internet for free.
Because users can use it for a limited period for free.
Because users can use, improve and distribute it for free.
Because users can receive software upgrades for free.
Q10. How is legally purchased software recognised?
The software should display a copyright text.
The software should be on a DVD.
The software should have a valid license.
The software should have a large file size.
Q11. Why is a hard disk required in a computer?
To supply the computer with power.
To prevent the computer from overheating.
To enable the computer to store data.
To provide the computer with wireless connectivity.
Q12. What is an important data protection rule for a data controller?
Data collection must always be approved of by the data subject.
Data can only be processed if the collection was done with the last year.
Data that is collected can be freely distributed to public authorities.
Data must be collected for legitimate purposes and used accordingly.
Q13. Which one of the following has the smallest storage capacity?
A 100 MB hard disk.
A 100 KB hard disk.
A 100 TB hard disk.
A 100 GB hard disk.
Q14. What does the term ICT stand for?
All the technologies that are used for computation and information.
All the technologies that are used for the comtemplation of information.
All the technologies that are used for communication and information.
All the technologies that are used for the comprehension of information.
Q15. What characterises a WLAN network?
It only works indoors.
It only works outdoors.
It has a wired connection.
It has a wireless connection.
Q16. Which of the following is possible to share with other users online?
Only video clips.
Only audio files.
Any digital content.
3. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q17. Why is ergonomics recognised as a way to improve the workplace?
Good design can help employees to be healthier and more productive.
Organisational psychology can help employees plan more efficiently.
Massage therapy can help employees to be less tense and stressful.
Communications technoloy can help employess communicate better.
Q18. What is an important part of data protection legislation?
To protect companies' access to public data.
To protect archived information in general.
To protect the infrastructure of the Internet.
To protect the personal data of individuals.
Q19. Which of the following is a type of internet connection?
Q20. Which one of the following is most likely to involve a client/server relationship?
Receiving software updates from the Internet.
Installing computer hardware.
Copying text between documents.
Starting a personal computer.
Q21. What is measured in kilobits per second?
Hard disk space
Data transfer rate
Q22. What is important for an anti-virus program to effectively find computer viruses?
Make sure it is updated regularly.
Make sure it is not a free program version.
Make sure it is recently backed up.
Make sure it is checking system files only.
Q23. Which one of the following is most likely to connect to the Internet to be fully functional?
A presentation application.
An instant messaging application.
An image editing application.
A spreadsheet application.
Q24. What is an input device?
Q25. Which measure should primarily be taken to protect information on a computer?
A username and password should be required to log on.
A router should be securing the computer from online attacks.
The computer should be located in a locked room.
The data on the hard drive should be encrypted.
4. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q26. A file has arrived in an e-mail from an unknown sender. What is the best way to act from a
Save the file and delete the message.
Scan the file for computer viruses.
Ask the sender about the file.
Disconnect from the Internet and open the file.
Q27. What is an example of e-commerce?
Online tax collection
Online ticket sales
Online census systems
Q28. For whom would a screen magnifier be most useful?
People who suffer from visual impairment.
People who suffer from cognitive impairment.
People who suffer from mobility impairment.
People who suffer from hearing impairment.
Q29. What characterises teleworking?
More potential for teamwork
Improved human contact
Q30. Which is an output device?
Q31. What is the best place to store a data backup from a security perspective?
In a hidden folder on the computer's hard disk.
In a visible folder on the computer's hard disk.
In a different building than the computer.
In the same building as the computer.
Q32. What is actually happening when a user e-mails a picture?
Data is being edited in system files.
Data is being uploaded to a network.
Data is being copied to a backup folder.
Data is being deleted from the hard disk.
5. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q33. What does a software end-user license agreement indicate?
The price of the software.
The usage terms for the software.
The installation details for the software.
The changes in the new version of the software.
Q34. What is copyright?
A special consumption tax on software.
A programme initiated to raise the quality of software.
A right for the consumer to freely copy commercial software.
A term that covers the rights of the creator of music, books, software etc.
Q35. What is the purpose of using a firewall?
To increase the hard disk capacity.
To prevent unauthorised computer access.
To speed up the Internet connection.
To disinfect data files that have computer virus.
Q36. How can data theft be prevented most effectively?
Combine the use of a password with a security lock.
Connect to the Internet only during office hours.
Hide important files in folders that are hard to find.
Avoid bringing a laptop computer in public places.
Q37. In which situation is Voice over Internet Protocol (VoIP) used?
Downloading sound files from the Internet.
Listening to music broadcasted on the Internet.
Making telephone calls via the Internet.
Uploading a recording of a lecture on the Internet.
Q38. What is an important data protection right for an ordinary person (data subject)?
The right to access other individuals personal data.
The right to financial compensation in exchange for personal data.
The right to access your own personal data.
The right to remove all personal data from public databases.
Q39. What characterises Random Access Memory (RAM)?
RAM cannot store data when the computer is switched off.
RAM can store data when the computer is switched off.
Decreasing the amount of RAM decreases the computer's long-term storage capacity.
Increasing the amount of RAM increased the computer's long-term storage capacity.
Q40. From a security perspective, what is a simple but effective password policy?
A password should be very easy to remember.
A password should have no numbers.
A password should never be revealed.
A password should never be changed.
Q41. What is Really Simple Syndication (RSS)?
An electronic news service.
A way to subscribe to updated Web content.
A method of disinfecting computer viruses.
A type of Internet connection.
6. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q42. What is an effective energy saving option in computers?
The option to automatically reduce the hard disk capacity.
The option to automatically lower the sound level.
The option to automatically turn off the screen.
The option to automatically decrease the amount of RAM.
Q43. How can physical wellbeing be ensured when working at a computer for long spells?
Use eye relaxation techniques.
Reduce the number of breaks.
Turn up the workplace temperature.
Dim the lighting in the office.
Q44. What characterises a touchscreen?
It is both an input and output device.
It is both an internal and external device.
It is both a monitor and a loudspeaker.
It is both a monitor and a firewall.
Q45. Which one of the following is most likely to speed up a computer?
Increasing the number of input devices.
Increasing the number of output devices.
Changing to a processor with higher capacity.
Changing to a power supply with higher capacity.
Q46. Which one of the following is an example of hardware?
An e-mail message.
An operating system.
Q47. What characterises e-mail?
E-mail enables easy and fast transmission of messages.
E-mail enables voice communication between computer users.
E-mail enables broadcasting of Web based multimedia content.
E-mail enables free online mass storage of files.
Q48. What is an example of software?
USB flash drive
Q49. What is regarded as a serious health factor associated with computer use in the workplace?
The height and width of the keyboard.
The availability and transfer rate of the network.
The direction and amount of indoor light.
The size and speed of the hard disk.
Q50. What is a Web log (Blog)?
A database that stores usernames and passwords.
A catalogue of popular Websites.
An application that records visited Websites.
An online journal that is regularly updated.
7. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q51. What type of information should be shared with caution online?
Q52. What is true about operating systems software and applications software?
The applications software is always installed first on a computer, then the operating systems
The operating systems software is always installed first on a computer, then the applications
The operating systems software can only interact with software, not hardware.
The applications software can only interact with hardware, not software.
Q53. What do Windows and Unix have in common?
They are applications software.
They are operating systems.
They are hardware devices.
They are broadband services.
Q54. What characterises Instant Messaging (IM)?
It is the same as electronic mail.
It is real-time text communication.
It is only available for wireless devices.
It is mostly used when computers are offline.
Q55. Which one of the following types of computer is most likely to be used by a travelling salesman?
A desktop computer.
A tablet PC.
Q56. Which one of the following is a term for systems used to store, retrieve, process and transmit
Internet & Communication Technology.
Internet & Information Technology.
Information & Communication Technology.
Information & Computer Technology.
Q57. Which one of the following measures the speed of the CPU?
Bits per second (Bps).
Q58. Which one of the following is a term for an audio or video recording posted on a web site that
can be downloaded and played later?
8. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q59. Which one of the following describes a computer’s operating system?
Software that can retrieve information from a database.
Hardware that can scan and convert photographs into digital files.
Software that controls the allocation and usage of hardware.
Hardware that can record and send images across the Internet.
Q60. Which one of the following types of software would you most likely use to create a letter?
Web browsing software.
Word processing software.
Q61. The computers in your office building are connected together so staff can share files and
printers. What is this arrangement of computers called?
A Local Area Network.
The World Wide Web.
A network port.
Q62. Which one of the following is a private network that allows specified external users’ access?
Q63. Which one of the following devices do you need to be able to communicate with other
computers using the telephone network?
Q64. Which one of the following is a software application that assists users who are visually
impaired to identify and interpret what is displayed on screen?
A screen calendar.
A word processor.
A screen reader.
A web log.
Q65. Which one of the following is a common feature of e-learning?
Always requires physical class attendance.
Cannot download documents for later reading.
Learning is self-paced.
Travel time and costs are very high.
Q66. Which one of the following is NOT a feature of electronic commerce?
Goods can be advertised and prices compared.
There is physical contact between buyer and seller.
Transactions can be processed quickly.
Services are available 24 hours a day.
Q67. Which one of the following is the best way to maintain a good posture?
Ensure your computer is in a well-lit area.
Make sure that there are no cables on the floor.
Make sure that your computer is using a fast processor.
Make sure that your computer; desk and chair are positioned correctly.
9. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q68. Which one of the following statements describes a good approach to information security for an
There are no procedures for reporting security lapses.
Staff passwords are not changed regularly.
Sensitive data is available to everyone that requests it.
Keeping an off-site backup of all files.
Q69. Which one of the following is a good password policy for an organisation?
All passwords are changed regularly.
All passwords are never changed.
All passwords are made up of less than four characters.
All passwords are made up of less than four numbers.
Q70. Which one of the following is the best way to protect a computer against computer viruses?
Only virus-check e-mail attachments.
Update antivirus software on a regular basis.
Always make sure that the operating system is up to date.
Only download files from the Internet during business hours.
Q71. Which one of the following statements describes shareware?
Totally free software that is available only on the Internet.
Commercial based software that must be paid for.
Software available for free on a trial basis after which payment will be required.
Copyright free software that allows unlimited copies and distribution.
Q72. There are rules governing the rights of a data subject and the responsibilities of a data
controller. What are these rules called?
Data Management Act.
Data Protection legislation or conventions.
Data Publicity Law.
Q73. Which one of the following is an example of hardware?
An antivirus program.
A spreadsheet application.
The World Wide Web.
Q74. Which one of the following would improve computer performance?
Using a larger monitor.
Increasing the number of applications running.
Using a faster printer.
Increasing the size of RAM.
Q75. Which one of the following is NOT a function of the Central Processing Unit?
Executing program instructions.
Ensuring program instructions are executed in the correct sequence.
Carrying out calculations.
Q76. Which one of the following is both an input and output device?
10. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q77. Which one of the following is a method of publishing frequently updated content such as
news headlines online?
Q78. Which one of the following is an example of an operating system?
Q79. Which one of the following is considered good environmental practice?
Using a slow computer.
Printing on both sides of a page.
Using up to date software.
Backing up data on a regular basis.
Q80. Which one of the following statements about the Internet is TRUE?
The Internet is a global network that links many computer networks together.
The Internet is a private company network.
The Internet is a visual representation of linked documents.
The Internet is a network operating system.
Q81. Which one of the following is an input/output port?
Q82. Which one of the following is an advantage of teleworking?
Long commuting times.
Less emphasis on teamwork.
Lack of human contact.
Q83. Which one of the following is a characteristic of broadband?
Completely safe from intruders.
It has a dial up connection.
Cost can vary from day to day.
Q84. Which one of the following is a text-based communication between two or more people over
Really Simple Syndication.
Voice over Internet Protocol.
Q85. Which one of the following practices helps create a good ergonomic working environment?
Protecting computer monitors from reflections and glare by correct positioning.
Taking very few breaks away from the computer.
Keeping the office cold and using low overhead lighting.
Use of non-adjustable chairs when working with computers.
11. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q86. Why is it necessary for an organisation to adopt a good password policy?
To allow easy sharing of files across the company network.
To make it easier for the computer to connect to a network.
To protect files against unauthorized use.
To make it easier to find files on a computer.
Q87. Which one of the following is a way to prevent the theft of data from a computer?
Use an up to date anti-virus program.
Back up data on a regular basis.
Remove the monitor when not in use.
Set up a username and password.
Q88. Which one of the following should be carried out to safeguard files from loss in case the main
copy is damaged?
Backup files to a new location on your computer.
Install password security.
Backup the files regularly and store offsite.
Install a firewall.
Q89. Which one of the following could allow a virus to enter a computer?
Downloading files from the Internet onto the computer.
Connecting the computer to a new printer.
Running a virus scan on the computer.
Setting the computer monitor to a low resolution.
Q90. Which one of the following statements about an End User License Agreement is true?
It gives full ownership of the software to the user of the software.
It gives the user the exclusive right to copy and sell the software to other potential users.
It gives the user the right to modify the software.
It gives the user the right to install and run the software on a specified number of computers.
Q91. What is the name of the law for the storage and use of data in the UK?
Details Provision Act
Data Protection Authority
Data Privacy Authority
Data Protection Act
Q92. What is the best way to prevent a computer virus from entering your computer?
Log out of your computer each time you have finished using it
Install and use anti-virus software on your computer
Do not use emails on your machine
Make sure all your files are safely stored to your floppy disks
Q93. What does RSI stand for?
Repeated Strain Inclusion
Regular Systems Initiation
Routine Structures Infection
Repetitive Strain Injury
Q94. Health and safety is important when working with computers, which of the following will help to
Always use screen savers
Ensure the office is air conditioned
All trailing cables should be secured
Turn the lights off at the end of the day
12. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q95. Which of the following systems will help to improve communications within the company?
Q96. Which is a use of e-commerce on the internet?
Checking flight availability
Searching for a suitable holiday
Researching holiday destinations
Booking a holiday
Q97. Which of the following would you use to find information on the internet?
Q98. In the home, which of the following would you use the internet for?
Storing friends and family names and addresses
Researching information for homework
Storing your files
Re-booting your computer
Q99. Which is the MAIN advantage of using a network system in the office?
Allows sharing of data
Costs are reduced
Office procedures can be automated
Q100. Which of the following software manages the files and folders on your computer's hard disk
Q101. Identify the computer port shown?
Q102. What has got to do with bandwith of transmission?
Data transfer rate
Speed of printer
Q103. Identify the computer port?
13. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q104. What does firewall do?
Protect against virus infection
Monitor network activities
Protect your hardware
Prevent software from catching fire
Q105. Identify this computer port?
Q106. What is the usage of firewall?
Prevent virus infection
Prevent computer from catching fire
Monitor transmission of data
Prevent hardware from burning
Q107. Which computer port is shown in this picture?
Q108. What determines the data transfer rate?
Hard disk speed
Bandwidth of transmission
CPU clock speed
Q109. Identify this computer port shown in the diagram?
Q110. Which software application would you use to create a report?
Q111. Which of the following is NOT an input device?
Q112. What does GUI stand for?
General Utilities Intervention
Graphical User Interface
General User Intervention
Graphical Utilities Interface
14. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q113. What of these is an input device?
Q114. Which of these computer based operations uses barcode input?
Marking on online test paper
Issuing a book in a library
Paying for goods using a credit card
Ordering goods from a web site
Q115. Which type of memory holds the basic operating system commands?
Q116. Which of these storage devices holds the most data?
Hard Disk drive
Q117. Which type of software would you use to prepare a budget forecast?
Q118. Which of these is an output device?
Q119. Which of these is a characteristic of electronic mail that does not apply to other methods?
Attachments can be sent
Messages can be sent to more than 1 person
Mail may get lost
Can only send to some people
Q120. Which upgrade will have the most impact on the performance of your computer?
Adding more RAM
Reducing the peripheral devices
Adding a network card
Fitting a second hard disk
Q121. What type of software controls the file system on the computer?
Operating system software
15. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q122. Which is the smallest unit of computer storage?
Q123. Which type of software is used to access the Internet?
Q124. What is connected in a LAN?
Computers on one site
Computers in many sites
Computers in one office
Computers on the Internet
Q125. Which type of software would you use to store customer data?
Q126. How are computers in a WAN connected?
Q127. Why is it important to make regular back-ups of computer data?
To prevent loss of data
To comply with the law
To protect the computer
To increase the storage company
Q128. Your cable modem runs at 10 Mbps. What does this represent?
Speed of your computer
Speed of transferring data
Speed of your hard disk
Speed of cache memory
Q129. Where should you store back up copies of your data?
Near to the computer
In a different location
In your car
In an off-site fire proof store
Q130. You have a modem and a telephone connection. What else do you need to connect your
computer to the Internet?
Browser and printer
ISP account and printer
ISP account and network
Browser and ISP account
16. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q131. Which of these describe a computer program?
An input device
A set of instructions
An interactive user guide
A help system
Q132. You have installed more memory in your computer. What type of memory is this?
Q133. Which type of computer is used to process large amounts of corporate data?
Q134. Which is the best way of protecting a computer system from unauthorised use?
Ensuring all users have passwords
Locking the office
Using a screensaver
Maintaining an audit trail
Q135. Which of these devices can be used to input and output information?
Bar Code Reader
Test B (135 Questions)
Q1. Which type of system is used to provide information for employees within a company?
Q2. Which of these is an example of an e-commerce activity?
Viewing a travel timetable
Checking theatre availability
Downloading a screen saver
Booking a flight
Q3. Which of these is always an advantage of buying goods online?
Longer opening hours
17. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q4. Which is a ‘laptop’ or a ‘notebook’?
A diary or timetable application
A portable PC
An electronic organiser
A simple word processor
Q5. Which is the main factor in the growth of the ‘Information Society’?
Q6. Which device would you use to draw shapes on the screen?
Optical Character Reader
Q7. Which of these tasks is a function of the operating system?
Adding slides in presentation
Copying a file
Producing a database report
Adding data to a spreadsheet
Q8. Why is it important that you have adequate lighting when using a computer?
To avoid back injuries
To avoid radiation
To avoid repetitive strain injuries
To avoid eyestrain and headaches
Q9. Which of these is an input device?
Q10. Most computers are operating using icons and a mouse. What is this system called?
Graphical user interface
Object oriented environment
Symbolic user interface
Command line interface
Q11. Which is most likely to happen after a power cut?
You can restart the computer and carry on with the same work
The computer will not function
All unsaved work is lost
Your disk drive will be damaged
Q12. Which of the following devices is used to control the software in a games programme?
Bar Code reader
18. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q13. Which of the following devices sends information from the user to the computer?
Q14. The computers in your office are connected together so staff can share files and printers.
What is this arrangement of computers called?
Q15. A Library has a database of all its books. There are over 100,000 books and each record has
Title, Author, Publisher, ISBN, date and description. What storage amount is required for the
Q16. Which of the following NOT a permanent storage medium?
USB Thumb Drive
Q17. Poor postures at the computer can cause backache and other problems. Which is the best way
of avoiding these problems?
Sitting at the recommended distance from the monitor
Making sure your chair is the correct height
Using a mouse to operate programs
Switching off the computer when not in use
Q18. Which of the following is the MAIN advantage of a network system?
Increased speed of operation
Allows sharing of data
Backs up data
Q19. Which type of software controls the allocation of resources in the computer?
Operating system software
Q20. A shareware program is best described as....
a program which may be downloaded and used for a trail period, but must be bought afterwards
a program developed by a single team and accessible by anyone in the world
a program installed on a Web site and executable on any system in the world
a free program developed by students
19. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q21. Which of the following is an example of the use of e-commerce on the Internet?
Checking theatre availability
Booking train tickets
Q22. Health and safety issues are important when using a computer. To avoid risk of injury, which of
the following should always be TRUE?
Trailing cables should be secured
Screen savers should be installed
A mouse mat should always be used
Power extension cables should be used
Q23. Which is the best way of protecting data from loss?
Make regular backups of the data
Delete all your old files
Lock your computer
Change your password
Q24. There are rules governing the storage and supply of computer based information. What are
these rules called?
Data Prohibition Law
Data Protection Act
Data Storage Act
Data Supply Policy
Q25. Which of the following systems would improve communication within a company?
Q26. Which device could you use for the output of a music file?
Q27. Which software would you use for creating a set of slides to be shown to an audience?
Desk Top Publishing
Q28. Which of these statements about Read Only Memory (ROM) is TRUE?
Application programs can write data to the Read Only Memory
The contents of the Read Only Memory are not deleted when the computer is switched off.
The operating system is loaded into the Read Only Memory when the computer is started.
Internet pages are stored in the Read Only Memory while they are being loaded.
Q29. Which of the following is a problem when downloading files from the internet?
The files may not be able to be removed
The display settings on you computer may be changed
The cache memory on your compute may become full
Viruses may be introduced to you computer
20. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q30. The Data Protection Acts is designed to...
Make personal data freely available
Create a permanent store for personal data
Regulate the use of personal data
Enforce deletion of personal data
Q31. What is most likely to be affected by a computer virus?
The speed of your computer
Read only memory
Q32. What is controlled by software copyright regulation?
Making backups of the software
Number of copies sold
Type of computer used for the software
Illegal distribution of software
Q33. Which type of software would you use to maintain information about account holders at a
Bank or Building Society?
Q34. What is a trackball?
A monitoring system
A type of speaker
An alternative to the mouse
A storage device
Q35. Which type of software can you use without having to pay a fee?
Q36. Which of these is a hand held device that stores appointments?
Personal Digital Assistant (PDA)
Q37. Which is the BEST way of preventing loss of your data if there is a power cut?
Use a filtered plug
Make frequent back ups of the data
Ensure passwords are used
Install virus checking software
Q38. Which of these is NOT a benefit of e-mail?
Ability to send attachments
Receiving junk mail
Instant delivery of your message
Sending to more than one person at once
21. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q39. What is the main advantage of a GUI?
Reduces the cost of computing
Makes the computer easier to use
Required a less powerful computer
Does not need updating
Q40. Which device would you use to digitise a photograph?
Q41. Which of these is NOT an input device?
Q42. There are Laws governing the use of software to prevent people from making illegal copies of
software. Which of the following is the best way to prevent this from happening?
Labelling the software
Using a code to unlock the software
Sending offenders to prison
Requiring passwords for copying
Q43. Which of the following is a storage device?
Q44. Which of the following statements is NOT TRUE in relation to the Data Protection Act?
The data user must ensure that the information...
Is obtained fairly and accurately
Is stored with proper security
Is accurate and up to date
Can be sent abroad at any time
Q45. For which of these tasks would you use a search engine?
To find files on your computer
To track new network
To detect viruses on your computer
To find information on the world Wide Web
Q46. Which of these is the major benefit of e-Learning?
Reduced contact with other students
Available at any time
Q47. Which of these is a characteristic of RAM?
Cannot be erased
Lost when the power is switched off
Stores data downloaded from the Internet
Holds system commands
22. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q48. Which of the following is NOT an output device?
Q49. Purchasing goods on a web site is an example of...
Web site design
Q50. Which type of memory is used to store applications while they are running?
Q51. Which of these is NOT a storage device?
USB Thumb Drive
Hard Disk Drive
Q52. Computers can damage your health in various ways. Which is the best way of preventing this?
Taking frequent breaks
Having good lighting
Using a screen protector
Raising the height of the monitor
Q53. You want all users to be able to view data in a computer system and selected users to be able
to enter and change the data. How can you achieve this?
Allow unrestricted access to the system
Give unauthorised users a password
Set access rights for different groups of users
Allocated keys to authorised users
Q54. Which type of computer stores the common files in a network?
Q55. What does CPU stand for?
Central Power Unit
Computer Processing Unit
Computer Programming Unit
Central Processing Unit
Q56. What is a computer virus?
A program that can damage your computers
A hardware fault
A program that you have downloaded from an Internet site
A corrupted area of your disk
23. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q57. You can help to preserve the environment by.....
Using a screen saver
Recycling printer cartridges
Using a filtered plug
Using a smaller screen
Q58. Which type of computer is used to operate large corporate systems and databases?
Personal Digital Assistant (PDA)
Q59. Which of the following describes the essential components of Information & Communication
Primary, secondary and cache memory
RAM and ROM
Hardware, software and communications technologies
Hardware and shareware
Q60. The speed of the Modem is measured in:
Bits per second (Bps)
Q61. Which of the following statements about formatting the disk for the first time is true?
Formatting prepares the disk to store data
Formatting backs up data onto the disk
Formatting copies the disk
Formatting unlocks the disk
Q62. Which of the following tasks is a function of the operating system?
Adding data to a spreadsheet
Producing a database report
Producing a presentation
Q63. Which software would you use to search for information in the internet?
Web browsing software
Word processing software
Q64. The computers in your office building are connected together so staff can share files and printers.
What is this arrangement of computers called?
Q65. An intranet is:
A network operating system
A network filing system
A private company network
A private company network that includes external specified users
24. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q66. Which of the following devices do you need to be able to communicate with other computers
using the telephone network?
Q67. Computer use can cause repetitive strain injury (RSI). Which of the following is the best way to
Ensure your computer is in a well-lit area
Use an operator chair without arms
Place your monitor at the correct height
Work with your wrists level with the keyboard
Q68. Which of the following statements describes a good approach to information security for an
No procedures for reporting security lapses
Staff passwords are not changed regularly
Sensitive data is available to everyone
Computer systems are backed up on a regular basis
Q69. What is the best way of preventing your computer from being infected with a virus?
Only virus-check e-mail attachments
Have updateable anti-virus software running on your computer
Have anti-virus software running on your computer
Never open any e-mail attachments
Q70. Which of the following statements describes shareware?
Shareware is software without copyright protection
Shareware is free software
Shareware is software you may pay for after an initial time period of use
Shareware is software you can use in any way
Q71. There are rules governing the storage and supply of computer-based information. What are
these rules called?
Data Management Act
Data Protection Act
Data Publicity Law
Q72. Which of the following would be considered a portable computer?
Q73. Disk formatting is used to:
Find files on a disk
Lock a disk
Unlock a disk
Prepare a disk to store files
25. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q74. Which of the following is an operating system?
Q75. What is ISDN?
Integrated Standard Digital Networks
Integrated Services Digital Network
Interactive Standard Dynamic Networks
Internet Services Data Network
Q76. If you were working from home, what software application could be used to communicate
directly with colleagues and customers?
Electronic mail (e-mail)
Q77. Which of the following practises helps create a good ergonomic working environment?
Protecting computer monitors from reflections and glare by correct positioning
Taking infrequent breaks away from the computer
Keeping the office cold and using low overhead lighting
Use of non-adjustable chairs when working with computers
Q78. Which of the following can be an advantage of electronic documents?
They can never be lost
They can always be e-mailed regardless of size
They can reduce the usage of paper
They can never be copied
Q79. Which of the following activities could lead to the spread of a computer virus?
Using thumb drive from unknown sources to exchange data
Using a standalone computer to output a hard copy letter
Using retail software that has been checked for viruses
Using a Graphical User Interface (GUI)
Q80. An End User License Agreement:
Is a form of advertising between a software application author or publisher and the user
Gives the user the exclusive right to copy and sell the software to other potential users
Grants ownership of the software to the user of the software
Is a legal contract between a software application author or publisher and the user with regard to
terms of distribution, resale, and restricted use
Q81. Which one of the following describes spam?
Gathering information about a person or organisation without their knowledge.
Performing an unauthorised, usually malicious, action such as erasing files.
Putting unnecessary load on the network by making copies of files.
Sending unwanted bulk messages.
Q82. Which one of the following could lead to the spread of a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
26. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q83. Which one of the following protects a computer from the risk of malicious programs?
PC diagnostic software.
Web tracking software.
Q84. Which one of the following describes why it is important to update antivirus software regularly?
To ensure the software identifies old viruses.
To protect your computer from all known viruses.
To protect your computer from unwanted bulk messages.
To prevent the spread of malicious programs on the Internet.
Q85. Which one of the following describes a computer hacker?
A skilled programmer who uses authorised access to exploit information available on a computer.
A skilled programmer who secretly invades computers without authorisation.
A skilled programmer who writes programs to train new employees.
A skilled programmer who helps in the installation of new software for an organisation.
Q86. Which one of the following describes why firewalls are used?
To prevent unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.
Q87. Which one of the following is the reason that users should log on with a username and
To be aware of who is in the building.
To check up on the time-keeping of users.
To protect computers against unauthorised use.
To enable a personalised greeting for each user.
Q88. Which one of the following statements about a password is TRUE?
It must be changed only if it is compromised.
It cannot contain special character symbols.
It should be changed regularly.
It must be registered with the system administrator.
Q89. Which one of the following should be used to change your password in your computer?
Q90. Which one of the following shows respect for confidentiality of information?
Discussing confidential information over the telephone.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
Disclosing confidential information only to authorised individuals.
Q91. Which one of the following describes why users should lock their computer when leaving their
To prevent a waste of electricity.
To prevent unauthorised access to data.
To prevent data from getting corrupted.
To prevent the computer from malfunctioning.
27. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q92. Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat.
An email directing the recipient to forward the email to friends.
An email directing the recipient to enter personal details on a fake website.
An email directing the recipient to download an attachment.
Q93. Which one of the following is unsafe online activity?
Giving your home address to someone you met in a chat room.
Using a screen name or nick name that cannot identify you.
Meeting someone you met online face-to-face in the company of your parents.
Keeping your social network profile private.
Q94. Which one of the following describes how confidential information should be sent using an
In an unsigned email.
In an attachment.
In a compressed format.
In an encrypted format.
Q95. Which one of the following statements about wireless networks is TRUE?
They cannot be intercepted by unknown users.
They limit accessibility to other users.
They limit visibility to other users.
They can be accessible to other users.
Q96. Which one of the following describes Bluetooth?
Short-range wired protocol for exchanging data.
Short-range wireless protocol for exchanging data.
Long-range wireless protocol for exchanging data.
Long-range wired protocol for exchanging data.
Q97. Which one of the following describes why Bluetooth device settings should be adjusted?
To increase the range of the device.
To improve the quality of reception.
To prevent the risk of unauthorised access.
To reduce interference from other devices.
Q98. Which one of the following should you do to ensure that your USB storage device is kept safe
Only use it in private surroundings.
Do not access it using a Bluetooth device.
Use firewall software.
Never leave it unattended.
Q99. Which one of the following departments would usually hold guidelines and procedures for the
secure use of IT within an organisation?
The Marketing Department.
The IT Department.
The Sales Department.
The Finance Department.
Q100. Which one of the following describes why you should follow guidelines and procedures while
using IT resources in an organisation?
To ensure easy access to information on your computer.
To ensure the secure use of IT resources.
28. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
To ensure the IT Department is able to monitor all activity.
To ensure the Finance Department is able to monitor the costs of IT resources.
Q101. Which one of the following describes how a breach in IT security should be reported?
Using the telephone.
By emailing to the IT Manager.
Using the method listed in the organisation’s security policy.
Using any means of communication.
Q102. Which one of the following would prevent the theft of a laptop?
A security cable and lock.
Q103. Which one of the following would NOT happen if a computer suddenly malfunctions?
The operating system will fail.
Files saved on the hard drive will be lost.
All off-site backups will be lost.
Some software may have to be reinstalled.
Q104. Which one of the following should you use to backup personal data?
A labelled CD.
A website offering a file sharing service.
A friend’s computer.
Q105. Which one of the following describes why it is important to have a secure off-site backup copy
To improve accessible of files from other locations.
To speed up the process of accessing the files at any time.
To prevent the loss of data in the event of a fire.
To reduce the possibility of data theft.
Q106. Which one of the following describes how software can be stored safely?
Storing it in a fireproof safe.
Storing it in a cupboard.
Storing backups of the software.
Storing it close to the computer.
Q107. Which of The Following Can Convert The Computer Signals From Digital To Analog?
Q108. The Speed of the Central Processing Unit is measured in
Revolutions per minute.
Bits per second
Q109. Which one of the following printers uses a toner in printing?
29. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q110. Which one of these statements is False?
A network of computer linked within a building is called a LAN
Databases can be accessed by many users who connected to a LAN.
A network-linking computer over cities countries is called WAN
Applications cannot be shared over a LAN.
Q111. Which of the following statements is True?
A mainframe computer enables users to share files, printers and other resources.
Minicomputer enables users to share files, printers and other resources.
A laptop computer enables users to share files, printers and other resources.
Network computer enables users to share files, printers and other resources.
Q112. Which of the following statements is TRUE?
ROM loses information when the computer is powered off.
ROM chips can be plugged into the motherboard to provide more memory.
ROM can't be written to , it's pre-programmed.
ROM data can be written when you are loading an application software
Q113. One byte is equivalent to:
Q114. What hardware helps you input data and give commands?
Q115. RAM Can Hold the Data And Programs Which In Currently Use, It Is UN Volatile Memory.
Q116. Peripherals Devices Are Part of Hardware?
Q117. What Device Prints the output on paper.
Q118. Which printer type would MOST likely produce the most noise?
Q119. Which of the following requires power to be on in order to maintain the data it stores?
30. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
USB Flash Disk
Q120. Which one of these computers is too expensive?
Q121. When working away from the office a sales representative might typically use which type of
An analogue computer
A mainframe computer
Q122. Special plastic cards containing a processor and memory are used to pay for goods and
services. Each time the card is used the details on the card are updated.
What is the name of such a card?
Q123. Which computer would typically be the cheapest to buy?
Q124. Which of the following would be the slowest device for accessing data?
USB Flash Drive
Q125. Which of the following would be the fastest device for accessing data?
Magnetic Tape Drive
Q126. Which of the following is hardware?
An operating system
Q127. Which of the following is a peripheral device?
31. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q128. The generic name of the devices, which are connected to externally, and controlled by, the
central processing unit, is:
Q129. Which of the following printers is the most suitable for a secretary to produce the final copy of a
Any of them
Q130. Which type of memory is used to store the current status of computer application whilst it is
Q131. Small businesses often use computer system to run the company. Typically it is most likely to
A Mainframe computer
A mini computer
A personal computer
Q132. Which of the following could be considered typical users of a mainframe computer?
A doctor's surgery
A small business
Q133. Which list shows the correct order of memory capacity for these computers, smallest first?
Mainframe computer, personal computer and minicomputer
Personal computer, minicomputer and mainframe computer.
Personal computer, mainframe computer and minicomputer
Mainframe computer, minicomputer and personal computer.
Q134. Which of these is an input device?
Q135. Your modem runs at 2M bps. What does this represent?
Speed of your computer
Speed of transferring data
Speed of your hard disk
Speed of cache memory