IT Exercises
Which  one  of these is computer hardware?   <ul><li>O  The operating system. </li></ul><ul><li>O   A CPU. </li></ul><ul><...
Mouse   Monitor System Case Hard Disk Hard Disk System Case Monitor Mouse   Data storage Containing CPU Output Device Inpu...
Which  one  of the following dose  not  influence the Performance of a computer? <ul><li>The amount of free space on the P...
The speed of a computer CPU can be measured in: <ul><li>Gigabytes. </li></ul><ul><li>Gigawatts. </li></ul><ul><li>Gigahert...
Which two of the following devices can be used to input data to a computer ? 1- Joystick  2- printer 3- speaker 4- standar...
Which one of these devices can be used to output data from a computer? 1- Joystick  2- printer 3- Mouse 4- Scanner printer
Which one of these devices can be used to input and output data ? 1- Scanner  2- Microphone 3- Touch screen 4- Light pen T...
Which  one  of these statements about formatting Computer storage media is  true ? <ul><li>O   Disks are automatically for...
Which  one  of these statements correctly completes the  following sentence?  A computer’s operating system: <ul><li>O  is...
A web browser Word processing A multimedia application A spreadsheet Application An Accounting Application A web browser W...
Which of following best describes a graphical user  interface (GUI):   <ul><li>O  using a software application for technic...
Which one of these stages of software development is the last stage to be finally completed? <ul><li>O  Analysis. </li></u...
Which  two  statement about local area networks (LAN) are  true ? <ul><li>O   Applications cannot be shared over a LAN.   ...
Which  one  of the following best describes an intranet? <ul><li>O  A network which can only be accessed using an ISP. </l...
Which  one  of the following best describes an extranet? <ul><li>O  A network, using e-mail to share data  between  organi...
Drag two of the statements that describe the World Wide Web into the box. The World Wide Web A Vast collection of linked d...
Which  one  of these statement about the speed of connecting to the internet is  true ? <ul><li>O  Data transfer is slower...
For which  one  of these tasks would a computerized solution be  more  appropriate? <ul><li>O   Calculating payroll of sta...
Online banking Insurance claim processing Airline booking Business administration Insurance claim processing Airline booki...
Public information systems Public record systems Administration systems Public information systems Administration systems ...
For which  two  of the following tasks in hospitals and health care would large-scale computer applications be most approp...
<ul><li>Which of the following are examples of large-scale applications of computers in education? Match the following sta...
What is the meaning of the letter  e  in the word  e-mail ? <ul><li>O  Express. </li></ul><ul><li>O  Electric. </li></ul><...
Which  two  of the following contribute to a good working environment for a computer operator? <ul><li>O  Use of a monitor...
You can reduce the risk of repetitive strain injury by  one  of the following actions: <ul><li>O  using an adjustable chai...
Which  one  of these actions demonstrate poor health and safety practice? <ul><li>O   Installing too much of software on a...
Which statement about computers and the environment is  true ? <ul><li>O  Running an animated screensavers saves power . <...
<ul><li>Drag each of the statements about user IDs and passwords to the relevant box.  </li></ul>ID Should be changed regu...
Which one of the following statement describes the process of backup? <ul><li>O  Restoring work from an older file . </li>...
A PDA which has been backed up - but not password protected - has been stolen. Which one of the following consequences may...
A mobile phone which has been insured but not password protected has been stolen. Which  one  of the following consequence...
A laptop which has been password protected, but not backed up, has been stolen. Which one of the following consequences ma...
Anti-virus software can disable a virus on your computer. This action is called: <ul><li>O  De-installing. </li></ul><ul><...
Good Anti-virus practice  Opening e-mail from unknown sources Deleting e-mail from unknown sources Putting a virus-checked...
Which  one  of the following statements about copyright is  true ? <ul><li>O   If you can copy material from a disk you au...
Shareware is the term that is applied to: <ul><li>O   an application that is used to track the movement of  stocks and sha...
An important purpose of data protection legislation is to: <ul><li>O   improve the standards for electronic storage media....
Which  one  of these is application software? <ul><li>O   Graphics card. </li></ul><ul><li>O   Word processor. </li></ul><...
Which one of these computer types is the most powerful? <ul><li>- Laptop. </li></ul><ul><li>Mainframe Computer. </li></ul>...
Which one of the following statement is true about ROM (read-only memory): <ul><li>O   It is wiped clean when you switch o...
Bit Kilobyte Gigabyte Megabyte Byte smallest Largest Bit Byte Kilobyte Megabyte Gigabyte
Which two of the following devices can be used to input data to a computer ? 1- Mouse  2- printer 3- speaker 4- Plotter 5-...
Which one of these devices can be used to output data from a computer? 1- Keyboard  2- Microphone 3- Plotter 4- Scanner Pl...
Which one of these types of storage provides the fastest access to data? 1- Zip disk  2- Floppy diskette 3- Hard disk 4- C...
Which  two  of the following statements about access rights are  true ? <ul><li>O   Are intended to protect a company’s in...
Desktop Publishing Word processing A multimedia application A spreadsheet Application A Database Application A Database Ap...
Which one of these stages of software development is the first stage to be completed? <ul><li>O  Design. </li></ul><ul><li...
Which  one  of these is the type of network that links computers in different cities or countries? <ul><li>O  LAN. </li></...
Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resour...
The term ADSL stands for: <ul><li>O  Anonymous Digital Service Line. </li></ul><ul><li>O  Asymmetric Digital Subscriber Li...
For which  two  of these tasks  would a computerized solution be most appropriate? <ul><li>O  Assessing employee performan...
Public information systems Public record systems Administration systems Public information systems Administration systems ...
For which  one  of the following tasks in hospitals and health care would large-scale computer applications be most approp...
Which  one  of the following statements about teleworking is  true ? <ul><li>O  More human contact with the team. </li></u...
Which  two  of the following statements about purchasing on line are  true ? <ul><li>O  The consumers rights of the suppli...
Which  one  of the following contribute to a good working environment for a computer operator? <ul><li>O  Locating the PC ...
You can reduce the risk of eye-strain by  one  of   the   following actions: <ul><li>O  increase the contrast between scre...
Are best printed  Help for a software application Guarantees E-mail messages  Contacts Help for a software application Gua...
Which  one  of   the   following statements about an organization’s information security policy is  true ? <ul><li>O  Appl...
Which  one  of the following statements about Anti virus software  is  true ? <ul><li>O   Before accessing the internet, y...
Good Anti-virus practice  Updating anti-virus software once a year Scheduling virus checks to run once a day  Deleting e-m...
Which  one  of   the   following statements about copyright is  true ? <ul><li>O  Text on a web page can be freely copied ...
Which  one  of   the   following statements about copyright is  true ? <ul><li>O  The paper license that comes with softwa...
Freeware is the term that is applied to: <ul><li>O   software that you can try  free of charge before buying. </li></ul><u...
Which two of the following have a significant influence on the speed at which a computer performs? <ul><li>O  Installing n...
Good Anti-virus practice  Updating anti-virus software once a year Scheduling virus checks to run once a day  Deleting e-m...
RAM   The contents of this are fixed during the manufacture of the PC The Operating system is loaded into this when the PC...
Backing up 1.8GB of files you are currently working on. 1.44 MB Floppy  Disk 2GB Back-up Tape 2GB Hard Disk 1.44 MB Floppy...
An operating System You can run more than one at the same time Sets up the look and feel of your computer interface  Contr...
Which two of these are operating systems? <ul><li>Windows. </li></ul><ul><li>Netscape Navigator. </li></ul><ul><li>Yahoo! ...
Which one of these statements about the internet is false? <ul><li>O   It enables computer with different operating system...
Drag just the two of the statements that describe the internet into the box. Internet A global network of computers linked...
Which one of these types of computer memory is permanent and unchanging? <ul><li>O  Random Access Memory . </li></ul><ul><...
Which one of the following isn’t operating system? <ul><li>A. Unix. </li></ul><ul><li>B. Windows. </li></ul><ul><li>C. Ms ...
Which  one  of the following descriptions of an extranet is true? <ul><li>O  A world-wide collection of files connected by...
E-mail stands for: <ul><li>A. Electric mail. </li></ul><ul><li>B. Electronic mail. </li></ul><ul><li>C. Efficient mail. </...
Which one of the following operating system does not have a GUI? <ul><li>A. UNIX. </li></ul><ul><li>B. Microsoft Windows. ...
Microsoft Windows is a (an): <ul><li>A. Database program. </li></ul><ul><li>B. Operating system. </li></ul><ul><li>C. Word...
Which of the following is the first stage in the standard sequence of software development? <ul><li>A. Testing. </li></ul>...
What type of computer application would be used in a hospital to maintain patient medical details? <ul><li>A. A desktop pu...
Which one of these statements about computer application is true? <ul><li>A. The same version of an application will work ...
Which one of the following activities is best suited for e-mail? <ul><li>A. Performing calculations. </li></ul><ul><li>B. ...
Which one of the following statements about copyright is true? <ul><li>A. Publishing digital work on disk requires permiss...
Unauthorized access to computer files can be prevented by using: <ul><li>A. Password. </li></ul><ul><li>B. Anti-virus soft...
Which Preventative measure can be used to stop computer system becoming infected with a virus? <ul><li>A. Install physical...
Which of the following precautions would prevent virus-infected software being used on computer? <ul><li>A. Install a viru...
Electronic commerce is best described as: <ul><li>A. Requesting information from companies selling  electronic equipment. ...
Which of the following can be used to restore programs or data after being altered by a malicious program? <ul><li>A. Anti...
Which of the following provides an example of a good working environment? <ul><li>A. Adequate lighting. </li></ul><ul><li>...
A company needs all it’s 30 office staff to use a spreadsheet application, It should: <ul><li>A. Copy the spreadsheet appl...
What name is given to software, which under development? <ul><li>A. Beta software.   </li></ul><ul><li>B. Demonstration so...
Which of the following is the name given to software, which can legally be copied without a license? <ul><li>A. Beta softw...
Which of the following best describes teleworking? <ul><li>A. Working for a television.   </li></ul><ul><li>B. Working for...
An End User License Agreement <ul><li>A. Is a form of advertising between a software application  author and the user.  </...
Which of the following is a good password policy for an organization? <ul><li>A. All passwords are changed regularly. </li...
Which of the following is not a function of the CPU? <ul><li>A. Executing program instruction. </li></ul><ul><li>B. Ensuri...
What is ISDN? <ul><li>A. Integrated Standard Digital Networks. </li></ul><ul><li>B. Integrated Services Digital Network. <...
Large Organization often use a computer system to run the company typically it is most likely to be: <ul><li>A. A Personal...
Scanner can be described as:   <ul><li>A. An output device only </li></ul><ul><li>B. An input device only </li></ul><ul><l...
From an output devices: <ul><li>A. Mouse. </li></ul><ul><li>B. Keyboard. </li></ul><ul><li>C. Plotter. </li></ul><ul><li>D...
Which of the following statement is true?   <ul><li>A. The CPU is an input devices. </li></ul><ul><li>B. The CPU is an out...
The data stored on CD-Rom are   <ul><li>A. Volatile and read only data. </li></ul><ul><li>B. Non Volatile and read only da...
Which is the most appropriate application to store census information?   <ul><li>A. Data Logging Application. </li></ul><u...
A GUI is used to:   <ul><li>A. Draw graphs and drawing. </li></ul><ul><li>B. Provide the interface between two peripherals...
The range of voice, computer messages and other services provided by:   <ul><li>A. ISBN. </li></ul><ul><li>B. PSBX. </li><...
Which one of the following is not an input device?   <ul><li>A. Web camera. </li></ul><ul><li>B. Scanner. </li></ul><ul><l...
The location of information on the internet can be obtained by using a database:   <ul><li>A. Web editor application. </li...
Which  two  of the following is considered as input devices?   <ul><li>A. Printers. </li></ul><ul><li>B. Monitor. </li></u...
Which one have the fastest access to data? <ul><li>A. DVD drive. </li></ul><ul><li>B. Floppy disk. </li></ul><ul><li>C. Zi...
Which one of these memory can not be changed? <ul><li>A. Random Access Memory. </li></ul><ul><li>B. Storing Memory. </li><...
Which  one  of the following is considered as input devices? <ul><li>A. Plotter. </li></ul><ul><li>B. Monitor. </li></ul><...
An equipment that attached to computer to stop large volts of electricity:  <ul><li>A. UPS. </li></ul><ul><li>B. Battery. ...
The baud rate can tell how fast:  <ul><li>A. The hard disk send and revive data. </li></ul><ul><li>B. The MODEM can send a...
Where the computer is appropriate more than people?   <ul><li>A. In interpreting. </li></ul><ul><li>B. In recognizing. </l...
A computer virus is a program that   <ul><li>A. Always spotted by antivirus. </li></ul><ul><li>B. Make your hard disk unus...
Which one is more appropriate about Shareware software?   <ul><li>A. Any software used by a group of people in the same  t...
Which one of the following is not related to the operating system?   <ul><li>A. GUI. </li></ul><ul><li>B. The program that...
Which one is not true about RAM?   <ul><li>A. The data stored on it is volatile. </li></ul><ul><li>B. Information is lost ...
Which one of the following devices connect to the system unit externally and controlled by the central processing unit? <u...
Which  one  of these is a computer software? <ul><li>A. Monitor. </li></ul><ul><li>B. Windows. </li></ul><ul><li>C. System...
A Gigabyte is approximately: <ul><li>A. 1,000 bytes. </li></ul><ul><li>B. 100 kilobytes. </li></ul><ul><li>C. 1,000 kiloby...
Which two of these are operating systems? <ul><li>A. Linux. </li></ul><ul><li>B. Mac OS. </li></ul><ul><li>C. Internet exp...
Stage 3 Analysis Design Programming Drag each of the stages of development into logical order. Testing Programming Design ...
Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resour...
The internet is the name that is given to: <ul><li>A. The physical equipment used to connect computer  systems all over th...
Which  one  of the following statements about the use of e-commerce is  true ? <ul><li>A. An internet connection is option...
Which  two  of the following statements about passwords are  true ? <ul><li>A. You should use the same password for everyt...
Which two of these statements could each be used to complete the following sentence? A computer virus is a program that: <...
Which  one  of the following statements about copyright is  true ? <ul><li>A. You give up your copyright to text that you ...
E-commerce is the term used to describe business that: <ul><li>A. uses computers to carry out its work. </li></ul><ul><li>...
Which  one  of the following statements about purchasing online is  true ? <ul><li>A. Purchases are only processed during ...
You can reduce the risk of neck, back and shoulder pain, by  one  of the following actions: <ul><li>A. Using a larger moni...
Which  one  of these actions demonstrate poor health and safety practice in the use of computers? <ul><li>A. Touching inte...
Which  one  of these statements best describes computer backup? <ul><li>A. Reverting to the previously saved version of an...
Which  one  of the following statements about copyright is  true ? <ul><li>A. You can use downloaded graphics in any way. ...
Which  two  of the following statements about data protection legislation are  true ? <ul><li>A. Deals with industrial esp...
Which  one  of the following is the a digital line, used for both voice and data?  <ul><li>A. ISDN. </li></ul><ul><li>B. F...
The device that links computers to telephone networks by converting digital and analog signals is called a: <ul><li>A. Tra...
Which  one  of the following statements about formatting computer storage media is  true ? <ul><li>A. All operating system...
Sort these units of data by increasing order of size. Terabyte Kilobyte Gigabyte Megabyte Byte Byte Kilobyte Megabyte Giga...
Which  one  of the following statements applies to PSTN? <ul><li>A. A network designed to transmit high-speed digital data...
Which  one  of the following options describe the effects of teleworking? <ul><li>A. Reduced cost of equipments. </li></ul...
Which  two  of the following statements about purchasing on line are  true ? <ul><li>A. Initial shipping of goods is free....
Which  two  of the following help to create a good working environment for computer users? <ul><li>A. Bright fluorescent l...
You can reduce the risk of eye-strain by one of the following: <ul><li>A. Using the brightest possible screen setting. </l...
Three of the following are examples of computer uses in education. Match the statements with the correct boxes. Computer b...
Should be printed Staff announcements Documents that need careful proof-reading Working drafts of lengthy report Contacts ...
Drag these statements into the correct boxes.  True Formatting is the process of saving data onto a floppy disk A used flo...
Desktop Publishing Word processing A presentation Application A spreadsheet Application A Database Application Word Proces...
These items contain sensitive data Contact details for sales enquiries Research on new products Training materials Managem...
Should be printed Help for a software application Planning application Documents that are regularly updated Academic certi...
Helps to avoid the risk of spreading a computer virus Scanning all unfamiliar disks with anti-virus software Virus scannin...
For which  two  of the following tasks in hospitals and healthcare would large-scale computer applications be most appropr...
For which  two  of these tasks would people be more appropriate than computers? <ul><li>A. Calculating payroll for staff. ...
Which of the following statements about safety precautions when using computers? <ul><li>A. Faulty cables should be repair...
Upcoming SlideShare
Loading in …5
×

It Exercises

2,758 views

Published on

العرض عبارة عن اسئلة IT

1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total views
2,758
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
67
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

It Exercises

  1. 1. IT Exercises
  2. 2. Which one of these is computer hardware? <ul><li>O The operating system. </li></ul><ul><li>O A CPU. </li></ul><ul><li>O A word processing package. </li></ul><ul><li>O A spreadsheet. </li></ul>A CPU.
  3. 3. Mouse Monitor System Case Hard Disk Hard Disk System Case Monitor Mouse Data storage Containing CPU Output Device Input Device
  4. 4. Which one of the following dose not influence the Performance of a computer? <ul><li>The amount of free space on the PC’s hard disk. </li></ul><ul><li>The amount of main memory (RAM) that is installed. </li></ul><ul><li>The use of trackball rather than a mouse. </li></ul><ul><li>The type of graphics card that is installed. </li></ul>
  5. 5. The speed of a computer CPU can be measured in: <ul><li>Gigabytes. </li></ul><ul><li>Gigawatts. </li></ul><ul><li>Gigahertz. </li></ul><ul><li>Gigacycles. </li></ul>Gigahertz
  6. 6. Which two of the following devices can be used to input data to a computer ? 1- Joystick 2- printer 3- speaker 4- standard monitor 5- keyboard Joystick keyboard
  7. 7. Which one of these devices can be used to output data from a computer? 1- Joystick 2- printer 3- Mouse 4- Scanner printer
  8. 8. Which one of these devices can be used to input and output data ? 1- Scanner 2- Microphone 3- Touch screen 4- Light pen Touch screen
  9. 9. Which one of these statements about formatting Computer storage media is true ? <ul><li>O Disks are automatically formatted when you save a file. </li></ul><ul><li>O A used floppy disk cannot be reformatted. </li></ul><ul><li>O Unformatted disks need operating system data written to them before they can store files. </li></ul><ul><li>O A Full format does not erase data from your disk. </li></ul>
  10. 10. Which one of these statements correctly completes the following sentence? A computer’s operating system: <ul><li>O is the last program to load when you start the computer. </li></ul><ul><li>O does not control devices connected to the PC. </li></ul><ul><li>O is not necessary on high-powered personal computers. </li></ul><ul><li>O instructs the screen to display data entered with the keyboard. </li></ul>
  11. 11. A web browser Word processing A multimedia application A spreadsheet Application An Accounting Application A web browser Word processing A multimedia application An Accounting Application A spreadsheet Application To view web pages Produce a catalogue containing graphics Create interactive learning material Payroll and stock control Produce charts and graphs
  12. 12. Which of following best describes a graphical user interface (GUI): <ul><li>O using a software application for technical drawing. </li></ul><ul><li>O using a windows, icons and a mouse to operate a computer. </li></ul><ul><li>O using a system of typed commands to operate a computer. </li></ul><ul><li>O using picture rather than words for online help. </li></ul>
  13. 13. Which one of these stages of software development is the last stage to be finally completed? <ul><li>O Analysis. </li></ul><ul><li>O Design. </li></ul><ul><li>O Programming. </li></ul><ul><li>O Testing. </li></ul>Testing
  14. 14. Which two statement about local area networks (LAN) are true ? <ul><li>O Applications cannot be shared over a LAN. </li></ul><ul><li>O Authorized users can access and use data stored anywhere on a LAN. </li></ul><ul><li>O Telecommunication services cannot be shared over a LAN. </li></ul><ul><li>O Large data files can be transferred between computers using a LAN. </li></ul><ul><li>O It is not possible for users of a LAN share printers. </li></ul>
  15. 15. Which one of the following best describes an intranet? <ul><li>O A network which can only be accessed using an ISP. </li></ul><ul><li>O A world-wide collection of computer files connected by links. </li></ul><ul><li>O A network, using e-mail and web, within a single organization. </li></ul><ul><li>O A network that is shared between more than one organization. </li></ul>
  16. 16. Which one of the following best describes an extranet? <ul><li>O A network, using e-mail to share data between organizations. </li></ul><ul><li>O An extra-fast intranet within a single organizations. </li></ul><ul><li>O A very large intranet used by the general public. </li></ul><ul><li>O A network used to share data within a single organization. </li></ul>
  17. 17. Drag two of the statements that describe the World Wide Web into the box. The World Wide Web A Vast collection of linked documents held on computers all over the world A global network of computers linked together using communications equipment A Vast collection of linked documents held on computers all over the world Can be accessed using a browser The world-wide e-mail system A network that grew out of the American military Can be accessed using a browser
  18. 18. Which one of these statement about the speed of connecting to the internet is true ? <ul><li>O Data transfer is slower with a digital line than with an analog line. </li></ul><ul><li>O The processor speed of the computer affects the speed of data transfer on the internet. </li></ul><ul><li>O A 14.4 Kbps modem transfers data more slowly than a 56 Kbps modem. </li></ul><ul><li>O The speed of data transfer does not vary significantly with the time of the day. </li></ul>
  19. 19. For which one of these tasks would a computerized solution be more appropriate? <ul><li>O Calculating payroll of staff. </li></ul><ul><li>O Solving staff relations. </li></ul><ul><li>O Motivating staff. </li></ul><ul><li>O Selecting new staff. </li></ul>Calculating payroll of staff
  20. 20. Online banking Insurance claim processing Airline booking Business administration Insurance claim processing Airline booking Business administration Online banking Large-scale computer applications are increasingly used in business. Check policy details. Analyse statistics to estimate premiums. Provide quotes for premiums Check an account. Transfer funds. Apply for loans. Administer Employee payrolls. Process orders. Track invoices. Check timetables. Check ticket availability.
  21. 21. Public information systems Public record systems Administration systems Public information systems Administration systems Public record systems Large-scale computer applications are increasingly used in government. Policy documents. Public health warnings. Income tax Payment form. Television license Payment form. Census records. Vehicle registration listing.
  22. 22. For which two of the following tasks in hospitals and health care would large-scale computer applications be most appropriate? <ul><li>O Bereavement counseling. </li></ul><ul><li>O Tracking treatment costs. </li></ul><ul><li>O Informing a patient of a diagnosis. </li></ul><ul><li>O Providing a medical database. </li></ul><ul><li>O Treating mental health issues. </li></ul>
  23. 23. <ul><li>Which of the following are examples of large-scale applications of computers in education? Match the following statements with the correct boxes. </li></ul>Computer based education Student registration systems Provide student counseling Distance learning Researching homework on the internet Coaching of slower students Provide student counseling Coaching of slower students Student registration systems Distance learning Researching homework on the internet Uses traditional methods
  24. 24. What is the meaning of the letter e in the word e-mail ? <ul><li>O Express. </li></ul><ul><li>O Electric. </li></ul><ul><li>O Electronic. </li></ul><ul><li>O Efficient. </li></ul>Electronic.
  25. 25. Which two of the following contribute to a good working environment for a computer operator? <ul><li>O Use of a monitor filter to reduce the glare. </li></ul><ul><li>O Sitting as close as possible to the monitor. </li></ul><ul><li>O A good level of ventilation in the room. </li></ul><ul><li>O Plenty disk space in which to move the mouse. </li></ul><ul><li>O The keyboard positioned close to the front edge of the disk. </li></ul>
  26. 26. You can reduce the risk of repetitive strain injury by one of the following actions: <ul><li>O using an adjustable chair. </li></ul><ul><li>O sitting with your feet firmly on the ground. </li></ul><ul><li>O using an anti-glare screen. </li></ul><ul><li>O taking frequent breaks form your work. </li></ul>
  27. 27. Which one of these actions demonstrate poor health and safety practice? <ul><li>O Installing too much of software on a computer. </li></ul><ul><li>O Leaving power cable unsecured. </li></ul><ul><li>O Turning off the power without first shutting down the PC. </li></ul><ul><li>O Running several applications at the same time. </li></ul>
  28. 28. Which statement about computers and the environment is true ? <ul><li>O Running an animated screensavers saves power . </li></ul><ul><li>O Printer toner cartridges can be recycled . </li></ul><ul><li>O You can’t recycle paper from a laser printer . </li></ul><ul><li>O Laptops on standby use more electricity than when running normally . </li></ul>
  29. 29. <ul><li>Drag each of the statements about user IDs and passwords to the relevant box. </li></ul>ID Should be changed regularly Must be unique on the network Identifies a specific user on a network Not confidential Ensures that the person logging on is who they say they are Should be changed regularly Must be unique on the network Identifies a specific user on a network Not confidential Ensures that the person logging on is who they say they are Password
  30. 30. Which one of the following statement describes the process of backup? <ul><li>O Restoring work from an older file . </li></ul><ul><li>O Copying a file from your C: drive to your desktop . </li></ul><ul><li>O Keeping copies of data in two locations . </li></ul><ul><li>O Moving a file to a different folder on a hard drive . </li></ul>
  31. 31. A PDA which has been backed up - but not password protected - has been stolen. Which one of the following consequences may result? <ul><li>O Loss of the right to use the software that came with PDA. </li></ul><ul><li>O Time wasted on re-entering all the records in a replacement PDA. </li></ul><ul><li>O Misuse of confidential files and telephone numbers. </li></ul><ul><li>O Loss of contact details on the stolen PDA. </li></ul>
  32. 32. A mobile phone which has been insured but not password protected has been stolen. Which one of the following consequences may result? <ul><li>A. Misuse of confidential numbers. </li></ul><ul><li>B. Meeting the cost of replacement. </li></ul><ul><li>C. Paying for calls made after the theft is reported. </li></ul><ul><li>D. Taking out new insurance on the replacement phone. </li></ul>
  33. 33. A laptop which has been password protected, but not backed up, has been stolen. Which one of the following consequences may result? <ul><li>O You will have to change your e-mail address. </li></ul><ul><li>O Confidential files can be Misused. </li></ul><ul><li>O You will need to change your password. </li></ul><ul><li>O Work stored on the laptop will be lost. </li></ul>
  34. 34. Anti-virus software can disable a virus on your computer. This action is called: <ul><li>O De-installing. </li></ul><ul><li>O Disinfecting. </li></ul><ul><li>O Restoring. </li></ul><ul><li>O Scanning. </li></ul>Disinfecting
  35. 35. Good Anti-virus practice Opening e-mail from unknown sources Deleting e-mail from unknown sources Putting a virus-checked disk in a floppy drive Downloading and running free software from the web Opening e-mail from unknown sources Deleting e-mail from unknown sources Putting a virus-checked disk in a floppy drive Downloading and running free software from the web Poor Anti-virus practice
  36. 36. Which one of the following statements about copyright is true ? <ul><li>O If you can copy material from a disk you automatically gain the copyright. </li></ul><ul><li>O Copyrights provides control over how other people make disk copies of someone’s work. </li></ul><ul><li>O Graphics published on CD-ROM are not subjected to any form of copyright. </li></ul><ul><li>O If you create a CD-ROM yourself, you own the copyright to anything you put on it. </li></ul>
  37. 37. Shareware is the term that is applied to: <ul><li>O an application that is used to track the movement of stocks and share. </li></ul><ul><li>O software that you try for free but pay for it if you keep it. </li></ul><ul><li>O any application for which a multi-user license is available. </li></ul><ul><li>O any software that can be used on a server. </li></ul>
  38. 38. An important purpose of data protection legislation is to: <ul><li>O improve the standards for electronic storage media. </li></ul><ul><li>O prevent the illegal use of commercial software. </li></ul><ul><li>O safeguard the privacy of individuals’ personal data. </li></ul><ul><li>O protect companies from industrial espionage. </li></ul>
  39. 39. Which one of these is application software? <ul><li>O Graphics card. </li></ul><ul><li>O Word processor. </li></ul><ul><li>O Central Processing Unit (CPU). </li></ul><ul><li>O Hard Disk. </li></ul>Word processor
  40. 40. Which one of these computer types is the most powerful? <ul><li>- Laptop. </li></ul><ul><li>Mainframe Computer. </li></ul><ul><li>Server. </li></ul><ul><li>Personal Computer. </li></ul>Mainframe Computer
  41. 41. Which one of the following statement is true about ROM (read-only memory): <ul><li>O It is wiped clean when you switch off the computer. </li></ul><ul><li>O It stores the computer’s operating system. </li></ul><ul><li>O It cannot be modified by the user. </li></ul><ul><li>O It is loaded from your hard disk when you switch on the computer. </li></ul>It cannot be modified by the user.
  42. 42. Bit Kilobyte Gigabyte Megabyte Byte smallest Largest Bit Byte Kilobyte Megabyte Gigabyte
  43. 43. Which two of the following devices can be used to input data to a computer ? 1- Mouse 2- printer 3- speaker 4- Plotter 5- Light pen Mouse Light pen
  44. 44. Which one of these devices can be used to output data from a computer? 1- Keyboard 2- Microphone 3- Plotter 4- Scanner Plotter
  45. 45. Which one of these types of storage provides the fastest access to data? 1- Zip disk 2- Floppy diskette 3- Hard disk 4- CD-Rom Hard disk
  46. 46. Which two of the following statements about access rights are true ? <ul><li>O Are intended to protect a company’s intellectual property. </li></ul><ul><li>O Decide who can work in a building outside office hours. </li></ul><ul><li>O Determine which files individuals can read or change on a network. </li></ul><ul><li>O Are the same for all users on single network. </li></ul><ul><li>O Depend on which computer you are using to access the network </li></ul>
  47. 47. Desktop Publishing Word processing A multimedia application A spreadsheet Application A Database Application A Database Application Desktop Publishing A spreadsheet Application A Multimedia Application Word Processing Creating a list of contact details. Producing complex magazine layouts. Working out budgets. Creating interactive training materials. Creating letters and business documents.
  48. 48. Which one of these stages of software development is the first stage to be completed? <ul><li>O Design. </li></ul><ul><li>O Analysis. </li></ul><ul><li>O Programming. </li></ul><ul><li>O Testing. </li></ul>Analysis .
  49. 49. Which one of these is the type of network that links computers in different cities or countries? <ul><li>O LAN. </li></ul><ul><li>O Ethernet. </li></ul><ul><li>O PSTN. </li></ul><ul><li>O WAN. </li></ul>WAN
  50. 50. Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resources Printers Printers Disk Space Disk Space Monitors Applications Keyboards Applications
  51. 51. The term ADSL stands for: <ul><li>O Anonymous Digital Service Line. </li></ul><ul><li>O Asymmetric Digital Subscriber Line. </li></ul><ul><li>O Analog Digital Service Line. </li></ul><ul><li>O Advanced Data Service Link. </li></ul>Asymmetric Digital Subscriber Line
  52. 52. For which two of these tasks would a computerized solution be most appropriate? <ul><li>O Assessing employee performance. </li></ul><ul><li>O Enforcing rules and regulations. </li></ul><ul><li>O Generating invoices. </li></ul><ul><li>O Carrying out stock control. </li></ul><ul><li>O Providing a customer support helpline. </li></ul>
  53. 53. Public information systems Public record systems Administration systems Public information systems Administration systems Public record systems Large-scale computer applications are increasingly used in government. Store census information. Store passport details. Handle social welfare payments Collect television license fees. Announce policy documents online. Notify citizens of government decisions.
  54. 54. For which one of the following tasks in hospitals and health care would large-scale computer applications be most appropriate? <ul><li>O Running life-support systems. </li></ul><ul><li>O Diagnosis Patient. </li></ul><ul><li>O Comforting patients. </li></ul><ul><li>O Guiding support groups. </li></ul>Running life-support systems
  55. 55. Which one of the following statements about teleworking is true ? <ul><li>O More human contact with the team. </li></ul><ul><li>O Increased company space requirements. </li></ul><ul><li>O Greater ability to focus on one task. </li></ul><ul><li>O Inflexible schedules. </li></ul>
  56. 56. Which two of the following statements about purchasing on line are true ? <ul><li>O The consumers rights of the supplier’s country apply. </li></ul><ul><li>O E-commerce offers access to goods around the clock. </li></ul><ul><li>O The supplier covers the cost of shipping. </li></ul><ul><li>O All e-commerce transactions are safe. </li></ul><ul><li>O The supplier covers the cost of returning goods. </li></ul>
  57. 57. Which one of the following contribute to a good working environment for a computer operator? <ul><li>O Locating the PC close to a printer. </li></ul><ul><li>O Elbow and wrist support. </li></ul><ul><li>O High level of contrast between the screen brightness and other lighting. </li></ul><ul><li>O Direct light shining on the monitor. </li></ul>Elbow and wrist support
  58. 58. You can reduce the risk of eye-strain by one of the following actions: <ul><li>O increase the contrast between screen and room lighting. </li></ul><ul><li>O using an anti-glare filter on your monitor. </li></ul><ul><li>O reducing your monitor’s colour depth setting. </li></ul><ul><li>O positioning the screen with a window behind it. </li></ul>using an anti-glare filter on your monitor
  59. 59. Are best printed Help for a software application Guarantees E-mail messages Contacts Help for a software application Guarantees Contacts E-mail messages Electronic documents help to save paper , while other documents distribution. Are suitable for electronic distribution
  60. 60. Which one of the following statements about an organization’s information security policy is true ? <ul><li>O Applies to the employee, not the employer. </li></ul><ul><li>O Deals with the handling confidential data. </li></ul><ul><li>O Deals only with data held on computers. </li></ul><ul><li>O Covers the licensing of operating system software. </li></ul>
  61. 61. Which one of the following statements about Anti virus software is true ? <ul><li>O Before accessing the internet, you need to run a virus check. </li></ul><ul><li>O Deleting an infected file will eliminate the virus. </li></ul><ul><li>O Anti-virus software can detect all known viruses. </li></ul><ul><li>O Anti-virus software can disinfect applications as well as files. </li></ul>
  62. 62. Good Anti-virus practice Updating anti-virus software once a year Scheduling virus checks to run once a day Deleting e-mail from unknown sources Opening unknown e-mail attachments Updating anti-virus software once a year Deleting e-mail from unknown sources Scheduling virus checks to run once a day Opening unknown e-mail attachments Poor Anti-virus practice
  63. 63. Which one of the following statements about copyright is true ? <ul><li>O Text on a web page can be freely copied and re-used. </li></ul><ul><li>O Graphics published on the web are subjected to copyright. </li></ul><ul><li>O When you buy software, the copyright transfer to you. </li></ul><ul><li>O It is legal to share any audio files on the internet. </li></ul>
  64. 64. Which one of the following statements about copyright is true ? <ul><li>O The paper license that comes with software on CD transfers the copyright to you. </li></ul><ul><li>O You can make a backup CD of software bought for your own use. </li></ul><ul><li>O Software purchased on the web and copied to CD-ROM can be shared with friends. </li></ul><ul><li>O Copying text, images, audio, or video from disk is always illegal. </li></ul>
  65. 65. Freeware is the term that is applied to: <ul><li>O software that you can try free of charge before buying. </li></ul><ul><li>O software that you don’t have to pay for. </li></ul><ul><li>O old versions of commercial software that are out of date. </li></ul><ul><li>O software that will run under any operating system </li></ul>
  66. 66. Which two of the following have a significant influence on the speed at which a computer performs? <ul><li>O Installing new applications. </li></ul><ul><li>O Clearing all the unwanted files off a hard disk. </li></ul><ul><li>O Installing a smaller monitor. </li></ul><ul><li>O Increasing the amount of RAM. </li></ul><ul><li>O Adding a CD-ROM drive. </li></ul>
  67. 67. Good Anti-virus practice Updating anti-virus software once a year Scheduling virus checks to run once a day Deleting e-mail from unknown sources Opening unknown e-mail attachments Updating anti-virus software once a year Deleting e-mail from unknown sources Scheduling virus checks to run once a day Opening unknown e-mail attachments Poor Anti-virus practice
  68. 68. RAM The contents of this are fixed during the manufacture of the PC The Operating system is loaded into this when the PC is switched on. The contents of this disappear when the PC is switched off. You cannot write to this type of memory. The contents of this change constantly as the PC is used. The Operating system is loaded into this when the PC is switched on. The contents of this disappear when the PC is switched off. The contents of this are fixed during the manufacture of the PC The contents of this change constantly as the PC is used. You cannot write to this type of memory. ROM
  69. 69. Backing up 1.8GB of files you are currently working on. 1.44 MB Floppy Disk 2GB Back-up Tape 2GB Hard Disk 1.44 MB Floppy Disk 2GB Back-up Tape 2GB Hard Disk Very cheap means of backing up 1 MB of text files Archiving 1.8GB of graphic files that are not currently needed.
  70. 70. An operating System You can run more than one at the same time Sets up the look and feel of your computer interface Controls the hardware and software of your computer This can be used to edit data files You can run more than one at the same time This can be used to edit data files Sets up the look and feel of your computer interface Controls the hardware and software of your computer A Software Application
  71. 71. Which two of these are operating systems? <ul><li>Windows. </li></ul><ul><li>Netscape Navigator. </li></ul><ul><li>Yahoo! </li></ul><ul><li>Linux. </li></ul><ul><li>Outlook. </li></ul>Windows . Linux
  72. 72. Which one of these statements about the internet is false? <ul><li>O It enables computer with different operating systems to exchange data. </li></ul><ul><li>O It is not controlled by any single organization. </li></ul><ul><li>O You need a license to publish material on the internet. </li></ul><ul><li>O It allows computers to share data over large distance. </li></ul>
  73. 73. Drag just the two of the statements that describe the internet into the box. Internet A global network of computers linked together using communications equipment A Vast collection of linked documents held on computers all over the world The world-wide e-mail system A network that grew out of the American military Can be accessed using a browser A global network of computers linked together using communications equipment A network that grew out of the American military
  74. 74. Which one of these types of computer memory is permanent and unchanging? <ul><li>O Random Access Memory . </li></ul><ul><li>O Working Memory . </li></ul><ul><li>O Virtual Memory . </li></ul><ul><li>O Read-Only Memory . </li></ul>Read-Only Memory.
  75. 75. Which one of the following isn’t operating system? <ul><li>A. Unix. </li></ul><ul><li>B. Windows. </li></ul><ul><li>C. Ms Word. </li></ul><ul><li>D. Ms-Dos. </li></ul>Ms Word
  76. 76. Which one of the following descriptions of an extranet is true? <ul><li>O A world-wide collection of files connected by links . </li></ul><ul><li>O A very large intranet within an organization . </li></ul><ul><li>O An extra-fast intranet for web and e-mail . </li></ul><ul><li>O Shares data between two or more organizations . </li></ul>
  77. 77. E-mail stands for: <ul><li>A. Electric mail. </li></ul><ul><li>B. Electronic mail. </li></ul><ul><li>C. Efficient mail. </li></ul><ul><li>D. Express mail. </li></ul>Electronic mail
  78. 78. Which one of the following operating system does not have a GUI? <ul><li>A. UNIX. </li></ul><ul><li>B. Microsoft Windows. </li></ul><ul><li>C. MAC OS X. </li></ul><ul><li>D. Microsoft DOS . </li></ul>Microsoft DOS
  79. 79. Microsoft Windows is a (an): <ul><li>A. Database program. </li></ul><ul><li>B. Operating system. </li></ul><ul><li>C. Word processing program. </li></ul><ul><li>D. Graphics program. </li></ul>Operating system
  80. 80. Which of the following is the first stage in the standard sequence of software development? <ul><li>A. Testing. </li></ul><ul><li>B. Analysis. </li></ul><ul><li>C. Programming. </li></ul><ul><li>D. Design. </li></ul>Analysis
  81. 81. What type of computer application would be used in a hospital to maintain patient medical details? <ul><li>A. A desktop publishing application. </li></ul><ul><li>B. A database application. </li></ul><ul><li>C. A accounting application. </li></ul><ul><li>D. A presentation engine. </li></ul>A database application
  82. 82. Which one of these statements about computer application is true? <ul><li>A. The same version of an application will work on any type of computer. </li></ul><ul><li>B. They control devices such as printers and scanners that are attached to the PC. </li></ul><ul><li>C. They enable users to carry out specific tasks such as word processing. </li></ul><ul><li>D. They are the only programs that you need to use PC. </li></ul>
  83. 83. Which one of the following activities is best suited for e-mail? <ul><li>A. Performing calculations. </li></ul><ul><li>B. Sharing very large video files, such as movie trailers. </li></ul><ul><li>C. Sharing files between workers at different locations. </li></ul><ul><li>D. Transmitting credit card details. </li></ul>
  84. 84. Which one of the following statements about copyright is true? <ul><li>A. Publishing digital work on disk requires permission of the copyright holder. </li></ul><ul><li>B. When you purchase software in CD the copyright transfer to you. </li></ul><ul><li>C. Any material which is published on disk is subjected to copyright. </li></ul><ul><li>D. You can reuse graphics from the web on CD- Rom. </li></ul>
  85. 85. Unauthorized access to computer files can be prevented by using: <ul><li>A. Password. </li></ul><ul><li>B. Anti-virus software. </li></ul><ul><li>C. Uninterruptible power supply. </li></ul><ul><li>D. Secure backup copies. </li></ul>Password
  86. 86. Which Preventative measure can be used to stop computer system becoming infected with a virus? <ul><li>A. Install physical security measures. </li></ul><ul><li>B. Password protect the start-up process. </li></ul><ul><li>C. Disable the floppy disk drive. </li></ul><ul><li>D. A virus-checking program. </li></ul>A virus-checking program
  87. 87. Which of the following precautions would prevent virus-infected software being used on computer? <ul><li>A. Install a virus protection system. </li></ul><ul><li>B. Install software to prevent hacking. </li></ul><ul><li>C. Install password security to the system. </li></ul><ul><li>D. Take regular backups. </li></ul>Install a virus protection system.
  88. 88. Electronic commerce is best described as: <ul><li>A. Requesting information from companies selling electronic equipment. </li></ul><ul><li>B. The buying of electronic equipments from a high street shop. </li></ul><ul><li>C. Advertising electronic goods on the internet. </li></ul><ul><li>D. The buying of goods and services and paying for them on-line. </li></ul>
  89. 89. Which of the following can be used to restore programs or data after being altered by a malicious program? <ul><li>A. Anti-virus software. </li></ul><ul><li>B. Password. </li></ul><ul><li>C. Back-up copies. </li></ul><ul><li>D. Hacking. </li></ul>Back-up copies
  90. 90. Which of the following provides an example of a good working environment? <ul><li>A. Adequate lighting. </li></ul><ul><li>B. Energy-saving hardware. </li></ul><ul><li>C. New computer hardware every two years. </li></ul><ul><li>D. Staff welfare benefits. </li></ul>Adequate lighting
  91. 91. A company needs all it’s 30 office staff to use a spreadsheet application, It should: <ul><li>A. Copy the spreadsheet application onto each individual PC. </li></ul><ul><li>B. Purchase a multi-user license. </li></ul><ul><li>C. Use the spreadsheet application regardless of the numbers of users. </li></ul><ul><li>D. Purchase a single-user license for each PC. </li></ul>Purchase a multi-user license
  92. 92. What name is given to software, which under development? <ul><li>A. Beta software. </li></ul><ul><li>B. Demonstration software. </li></ul><ul><li>C. Freeware. </li></ul><ul><li>D. Shareware. </li></ul>Beta software
  93. 93. Which of the following is the name given to software, which can legally be copied without a license? <ul><li>A. Beta software. </li></ul><ul><li>B. Retail software. </li></ul><ul><li>C. Freeware. </li></ul><ul><li>D. Protected software. </li></ul>Freeware
  94. 94. Which of the following best describes teleworking? <ul><li>A. Working for a television. </li></ul><ul><li>B. Working for a telesales company. </li></ul><ul><li>C. Designing teletext pages. </li></ul><ul><li>D. Working at home using electronic communications. </li></ul>
  95. 95. An End User License Agreement <ul><li>A. Is a form of advertising between a software application author and the user. </li></ul><ul><li>B. Gives the user the exclusive right to copy and sell the software to other potential users. </li></ul><ul><li>C. Grants ownership of the software to the user. </li></ul><ul><li>D. Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, release and restricted use. </li></ul>
  96. 96. Which of the following is a good password policy for an organization? <ul><li>A. All passwords are changed regularly. </li></ul><ul><li>B. All passwords are never changed. </li></ul><ul><li>C. All passwords are made up of less than four characters. </li></ul><ul><li>D. All passwords are made up of less than four numbers. </li></ul>All passwords are changed regularly
  97. 97. Which of the following is not a function of the CPU? <ul><li>A. Executing program instruction. </li></ul><ul><li>B. Ensuring program instructions are executed in the right sequence. </li></ul><ul><li>C. Sending e-mail. </li></ul><ul><li>D. Carrying out calculations. </li></ul>Sending e-mail
  98. 98. What is ISDN? <ul><li>A. Integrated Standard Digital Networks. </li></ul><ul><li>B. Integrated Services Digital Network. </li></ul><ul><li>C. Interactive Standard Dynamic Networks. </li></ul><ul><li>D. Internet Services Data Network. </li></ul>Integrated Services Digital Network
  99. 99. Large Organization often use a computer system to run the company typically it is most likely to be: <ul><li>A. A Personal Computer. </li></ul><ul><li>B. A PDA. </li></ul><ul><li>C. A Mini Computer. </li></ul><ul><li>D. A Mainframe Computer. </li></ul>A Mainframe Computer
  100. 100. Scanner can be described as: <ul><li>A. An output device only </li></ul><ul><li>B. An input device only </li></ul><ul><li>C. An input and output device </li></ul><ul><li>D. Storage device </li></ul>An input device only
  101. 101. From an output devices: <ul><li>A. Mouse. </li></ul><ul><li>B. Keyboard. </li></ul><ul><li>C. Plotter. </li></ul><ul><li>D. Light Pen. </li></ul>Plotter
  102. 102. Which of the following statement is true? <ul><li>A. The CPU is an input devices. </li></ul><ul><li>B. The CPU is an output devices. </li></ul><ul><li>C. The CPU is used to process program instructions and data. </li></ul><ul><li>D. The CPU is used as non volatile storage media. </li></ul>
  103. 103. The data stored on CD-Rom are <ul><li>A. Volatile and read only data. </li></ul><ul><li>B. Non Volatile and read only data. </li></ul><ul><li>C. Non Volatile and read/write data. </li></ul><ul><li>D. Volatile and read/write data. </li></ul>Non Volatile and read only data
  104. 104. Which is the most appropriate application to store census information? <ul><li>A. Data Logging Application. </li></ul><ul><li>B. CAD Application. </li></ul><ul><li>C. Database Application. </li></ul><ul><li>D. Word Processor Application . </li></ul>Database Application.
  105. 105. A GUI is used to: <ul><li>A. Draw graphs and drawing. </li></ul><ul><li>B. Provide the interface between two peripherals. </li></ul><ul><li>C. Provide an easy way to use computer. </li></ul><ul><li>D. Store graphics image as file . </li></ul>Provide an easy way to use computer.
  106. 106. The range of voice, computer messages and other services provided by: <ul><li>A. ISBN. </li></ul><ul><li>B. PSBX. </li></ul><ul><li>C. ISDN. </li></ul><ul><li>D. PSDN . </li></ul>ISDN
  107. 107. Which one of the following is not an input device? <ul><li>A. Web camera. </li></ul><ul><li>B. Scanner. </li></ul><ul><li>C. Touch pad. </li></ul><ul><li>D. Monitor . </li></ul>Monitor
  108. 108. The location of information on the internet can be obtained by using a database: <ul><li>A. Web editor application. </li></ul><ul><li>B. Search engine. </li></ul><ul><li>C. Spreadsheet application. </li></ul><ul><li>D. Word perfect . </li></ul>Search engine
  109. 109. Which two of the following is considered as input devices? <ul><li>A. Printers. </li></ul><ul><li>B. Monitor. </li></ul><ul><li>C. Microphone. </li></ul><ul><li>D. Plotter. </li></ul><ul><li>E. Keyboard. </li></ul>Microphone Keyboard
  110. 110. Which one have the fastest access to data? <ul><li>A. DVD drive. </li></ul><ul><li>B. Floppy disk. </li></ul><ul><li>C. Zip disk. </li></ul><ul><li>D. Hard Disk . </li></ul>Hard Disk
  111. 111. Which one of these memory can not be changed? <ul><li>A. Random Access Memory. </li></ul><ul><li>B. Storing Memory. </li></ul><ul><li>C. Read Only Memory. </li></ul><ul><li>D. Virtual Memory . </li></ul>Read Only Memory.
  112. 112. Which one of the following is considered as input devices? <ul><li>A. Plotter. </li></ul><ul><li>B. Monitor. </li></ul><ul><li>C. Web camera. </li></ul><ul><li>D. Charger . </li></ul>Web camera.
  113. 113. An equipment that attached to computer to stop large volts of electricity: <ul><li>A. UPS. </li></ul><ul><li>B. Battery. </li></ul><ul><li>C. Charger. </li></ul><ul><li>D. Surge suppressor . </li></ul>Surge suppressor.
  114. 114. The baud rate can tell how fast: <ul><li>A. The hard disk send and revive data. </li></ul><ul><li>B. The MODEM can send and revive data. </li></ul><ul><li>C. The CPU send and revive data. </li></ul><ul><li>D. The RAM send and revive data . </li></ul>The MODEM can send and revive data.
  115. 115. Where the computer is appropriate more than people? <ul><li>A. In interpreting. </li></ul><ul><li>B. In recognizing. </li></ul><ul><li>C. In dangerous situation. </li></ul><ul><li>D. In completing. </li></ul>In dangerous situation.
  116. 116. A computer virus is a program that <ul><li>A. Always spotted by antivirus. </li></ul><ul><li>B. Make your hard disk unusable. </li></ul><ul><li>C. The only way for infection is internet. </li></ul><ul><li>D. Can be avoid by regular backup. </li></ul>Always spotted by antivirus.
  117. 117. Which one is more appropriate about Shareware software? <ul><li>A. Any software used by a group of people in the same time. </li></ul><ul><li>B. Any application you borrow from your friend. </li></ul><ul><li>C. Any application downloaded from internet. </li></ul><ul><li>D. Any software you try for free time and pay for keeping it. </li></ul>Any software you try for free time and pay for keeping it.
  118. 118. Which one of the following is not related to the operating system? <ul><li>A. GUI. </li></ul><ul><li>B. The program that you can use when the system has been loaded. </li></ul><ul><li>C. Allow you to use computer without learn about how hardware work. </li></ul><ul><li>D. Special program that run automatically when you start the computer. </li></ul>
  119. 119. Which one is not true about RAM? <ul><li>A. The data stored on it is volatile. </li></ul><ul><li>B. Information is lost when you switch off the computer. </li></ul><ul><li>C. The data held on it cannot be saved on your hard disk. </li></ul><ul><li>D. The operating system is copied on it when you switch on computer. </li></ul>
  120. 120. Which one of the following devices connect to the system unit externally and controlled by the central processing unit? <ul><li>A. Additional devices. </li></ul><ul><li>B. Storage Units. </li></ul><ul><li>C. Input devices. </li></ul><ul><li>D. Peripheral devices. </li></ul>
  121. 121. Which one of these is a computer software? <ul><li>A. Monitor. </li></ul><ul><li>B. Windows. </li></ul><ul><li>C. System Case. </li></ul><ul><li>D. Scanner. </li></ul>
  122. 122. A Gigabyte is approximately: <ul><li>A. 1,000 bytes. </li></ul><ul><li>B. 100 kilobytes. </li></ul><ul><li>C. 1,000 kilobytes. </li></ul><ul><li>D. 1,000 Megabytes. </li></ul>
  123. 123. Which two of these are operating systems? <ul><li>A. Linux. </li></ul><ul><li>B. Mac OS. </li></ul><ul><li>C. Internet explorer. </li></ul><ul><li>D. Outlook. </li></ul><ul><li>E. Google. </li></ul>
  124. 124. Stage 3 Analysis Design Programming Drag each of the stages of development into logical order. Testing Programming Design Testing Analysis Stage 1 Stage 2 Stage 4
  125. 125. Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resources Files Files Disk Storage Disk Storage Monitors Applications Keyboards Applications
  126. 126. The internet is the name that is given to: <ul><li>A. The physical equipment used to connect computer systems all over the world. </li></ul><ul><li>B. All the linked documents that are held on a global network of computer systems. </li></ul><ul><li>C. Linked computer systems that form a vast global network. </li></ul><ul><li>D. The dedicated telephone lines that permanently connect commercial networks on distant sites. </li></ul>
  127. 127. Which one of the following statements about the use of e-commerce is true ? <ul><li>A. An internet connection is optional for e-commerce. </li></ul><ul><li>B. Transaction can occur anywhere in the world. </li></ul><ul><li>C. Customers can only pay by e-mailing credit card details. </li></ul><ul><li>D. Customers give up the right return unsatisfactory goods. </li></ul>
  128. 128. Which two of the following statements about passwords are true ? <ul><li>A. You should use the same password for everything. </li></ul><ul><li>B. You should write down your password and keep it in a convenient place. </li></ul><ul><li>C. Passwords should contain both letters and numbers. </li></ul><ul><li>D. Once you create a password, you can’t change it. </li></ul><ul><li>E. A Password should be known only to the user. </li></ul>
  129. 129. Which two of these statements could each be used to complete the following sentence? A computer virus is a program that: <ul><li>A. Cannot infect a stand alone PC. </li></ul><ul><li>B. Disappears once it has displayed a message. </li></ul><ul><li>C. Can usually be detected by anti-virus software. </li></ul><ul><li>D. Can be introduced when new software is installed. </li></ul><ul><li>E. Can enter a computer system if hardware such as a new mouse added. </li></ul>
  130. 130. Which one of the following statements about copyright is true ? <ul><li>A. You give up your copyright to text that you publish on the internet. </li></ul><ul><li>B. You can re-use downloaded graphics in any way. </li></ul><ul><li>C. Scanned images are subject to copyright. </li></ul><ul><li>D. When you purchase software, the copyright transfer to you. </li></ul>
  131. 131. E-commerce is the term used to describe business that: <ul><li>A. uses computers to carry out its work. </li></ul><ul><li>B. is carried out using electronic funds transfer. </li></ul><ul><li>C. involves the import and export of electronic equipment. </li></ul><ul><li>D. buys or sells goods and services online. </li></ul>
  132. 132. Which one of the following statements about purchasing online is true ? <ul><li>A. Purchases are only processed during business hours. </li></ul><ul><li>B. Shipping of purchases is normally free. </li></ul><ul><li>C. The consumer rights of your country apply. </li></ul><ul><li>D. You are at risk from insecure payment method. </li></ul>
  133. 133. You can reduce the risk of neck, back and shoulder pain, by one of the following actions: <ul><li>A. Using a larger monitor with sharper resolution. </li></ul><ul><li>B. Using a wireless mouse. </li></ul><ul><li>C. Keeping the keyboard close to the front of the disk. </li></ul><ul><li>D. Using a fully adjustable operator’s chair. </li></ul>
  134. 134. Which one of these actions demonstrate poor health and safety practice in the use of computers? <ul><li>A. Touching internal parts of the PC. </li></ul><ul><li>B. Running several application at the same time. </li></ul><ul><li>C. Only using a single power socket for each PC. </li></ul><ul><li>D. Using out-of-date software. </li></ul>
  135. 135. Which one of these statements best describes computer backup? <ul><li>A. Reverting to the previously saved version of an electronic file. </li></ul><ul><li>B. Keeping a copy of computer files on a separate storage device. </li></ul><ul><li>C. Storing paper printout from your computer files. </li></ul><ul><li>D. Storing computer files on a Variety of separate storage device. </li></ul>
  136. 136. Which one of the following statements about copyright is true ? <ul><li>A. You can use downloaded graphics in any way. </li></ul><ul><li>B. You are allowed to re-use text you copy from the web. </li></ul><ul><li>C. When you purchase software, the copyright transfer to you. </li></ul><ul><li>D. Audio files on the internet are subject to copyright. </li></ul>
  137. 137. Which two of the following statements about data protection legislation are true ? <ul><li>A. Deals with industrial espionage between competing companies. </li></ul><ul><li>B. Can result in litigation if personal data is not adequately protected. </li></ul><ul><li>C. Means that personal data must be stored for certain period of time. </li></ul><ul><li>D. Ensures that laws about data security are the same in every country. </li></ul><ul><li>E. Obliges organizations to protect confidential data within their control. </li></ul>
  138. 138. Which one of the following is the a digital line, used for both voice and data? <ul><li>A. ISDN. </li></ul><ul><li>B. FTP. </li></ul><ul><li>C. PSTN. </li></ul><ul><li>D. HTTP. </li></ul>ISDN.
  139. 139. The device that links computers to telephone networks by converting digital and analog signals is called a: <ul><li>A. Transcoder. </li></ul><ul><li>B. Digitiser. </li></ul><ul><li>C. MODEM. </li></ul><ul><li>D. Translator Unit. </li></ul>MODEM
  140. 140. Which one of the following statements about formatting computer storage media is true ? <ul><li>A. All operating systems format disks in the same way. </li></ul><ul><li>B. You can’t format a disk if it had been formatted already. </li></ul><ul><li>C. A pre-formatted disk can be used immediately to store data. </li></ul><ul><li>D. You should regularly format floppy disks. </li></ul>
  141. 141. Sort these units of data by increasing order of size. Terabyte Kilobyte Gigabyte Megabyte Byte Byte Kilobyte Megabyte Gigabyte Terabyte
  142. 142. Which one of the following statements applies to PSTN? <ul><li>A. A network designed to transmit high-speed digital data. </li></ul><ul><li>B. It’s the Internet e-mail system. </li></ul><ul><li>C. It’s a form of satellite communication. </li></ul><ul><li>D. The Public Analog Telephone network. </li></ul>
  143. 143. Which one of the following options describe the effects of teleworking? <ul><li>A. Reduced cost of equipments. </li></ul><ul><li>B. Harder to socially interact with team members. </li></ul><ul><li>C. Greater use of transport. </li></ul><ul><li>D. Inflexible working hours. </li></ul>
  144. 144. Which two of the following statements about purchasing on line are true ? <ul><li>A. Initial shipping of goods is free. </li></ul><ul><li>B. The supplier covers the cost of returning goods. </li></ul><ul><li>C. The consumers rights of the supplier’s country apply. </li></ul><ul><li>D. It’s more difficult to return goods purchased online than goods bought in a shop. </li></ul><ul><li>E. Online purchases are free of customs duties. </li></ul>
  145. 145. Which two of the following help to create a good working environment for computer users? <ul><li>A. Bright fluorescent lighting. </li></ul><ul><li>B. Use a mouse of mat with wrist support. </li></ul><ul><li>C. Turning up screen contrast. </li></ul><ul><li>D. Use of monitor filter to reduce glare . </li></ul><ul><li>E. Sitting as close as possible to the monitor. </li></ul>
  146. 146. You can reduce the risk of eye-strain by one of the following: <ul><li>A. Using the brightest possible screen setting. </li></ul><ul><li>B. Setting the screen facing a window. </li></ul><ul><li>C. Sitting approximately 12&quot; from your monitor. </li></ul><ul><li>D. Having your eyes level with the top of your monitor. </li></ul>
  147. 147. Three of the following are examples of computer uses in education. Match the statements with the correct boxes. Computer based education Organizing student timetables Using the Web for research Distance learning Coaching students with learning difficulties Helping students with career advice Coaching students with learning difficulties Helping students with career advice Organizing student timetables Distance learning Using the Web for research Uses traditional methods
  148. 148. Should be printed Staff announcements Documents that need careful proof-reading Working drafts of lengthy report Contacts Staff announcements Documents that need careful proof-reading Contacts Working drafts of lengthy report Electronic documents help to save paper , while other documents are best printed out. Can be distributed electronically
  149. 149. Drag these statements into the correct boxes. True Formatting is the process of saving data onto a floppy disk A used floppy disk cannot be reformatted You cannot purchase pre-formatted disks Full disk formatting completely erases the previous contents of a disk All disks need to be formatted before they can store files Formatting is the process of saving data onto a floppy disk You cannot purchase pre-formatted disks Full disk formatting completely erases the previous contents of a disk All disks need to be formatted before they can store files A used floppy disk cannot be reformatted False
  150. 150. Desktop Publishing Word processing A presentation Application A spreadsheet Application A Database Application Word Processing A spreadsheet Application A presentation Application A Database Application Desktop Publishing Creating letters, faxes or memos etc. Make financial projections. Create overhead projection or slides. Sorting large amounts of information. Producing a newspaper with complex page layouts
  151. 151. These items contain sensitive data Contact details for sales enquiries Research on new products Training materials Management accounts Research on new products Contact details for sales enquiries Management accounts Training materials Which two of the following documents contain sensitive data and need protection? These items do not need protection
  152. 152. Should be printed Help for a software application Planning application Documents that are regularly updated Academic certificates Help for a software application Planning application Academic certificates Documents that are regularly updated Electronic documents help to save paper , while other documents are best printed out. Can be distributed electronically
  153. 153. Helps to avoid the risk of spreading a computer virus Scanning all unfamiliar disks with anti-virus software Virus scanning all application before loading them onto your hard disk Only copying applications from your close friends Write-protecting all copies of application disks once they have been checked Rebooting your PC if you find a file that is infected Only copying applications from your close friends Rebooting your PC if you find a file that is infected Scanning all unfamiliar disks with anti-virus software Write-protecting all copies of application disks once they have been checked Virus scanning all application before loading them onto your hard disk Doesn’t help to avoid the risk of spreading a computer virus
  154. 154. For which two of the following tasks in hospitals and healthcare would large-scale computer applications be most appropriate? <ul><li>A. Establishing bed availability. </li></ul><ul><li>B. Providing information to relatives. </li></ul><ul><li>C. Informing a patient of a diagnosis. </li></ul><ul><li>D. Treating mental health issues. </li></ul><ul><li>E. Tracking patient medical history. </li></ul>
  155. 155. For which two of these tasks would people be more appropriate than computers? <ul><li>A. Calculating payroll for staff. </li></ul><ul><li>B. Motivating staff. </li></ul><ul><li>C. Storing a list of staff contact details. </li></ul><ul><li>D. Providing a customer support helpline. </li></ul><ul><li>E. Maintaining a list of every item in the company’s inventory of goods. </li></ul>
  156. 156. Which of the following statements about safety precautions when using computers? <ul><li>A. Faulty cables should be repaired using insulating tape. </li></ul><ul><li>B. You should shut down your PC by unplugging it from electricity supply. </li></ul><ul><li>C. There no safe way to run cables across open areas. </li></ul><ul><li>D. More than one computer should not use the same power socket. </li></ul>

×