SlideShare a Scribd company logo
1 of 31
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
ICDL CORE 1 – Concepts of ICT
Test A (135 Questions)
Q1. What is the name of the network that is often used by companies to share internal information?
Intranet
Infonet
Webnet
Widenet
Q2. Which of the following can be used by a computer to connect to the internet?
A mobile phone.
An external hard disk.
A scanner.
A wireless headset.
Q3. What is the same as a social networking Website?
A virtual reality.
An online community.
A virtual server.
An online database.
Q4. How can the negative environmental impact of printers be effectively reduced?
Never turn off the printer.
Only print in black and white.
Recycle paper and cartridges.
Use inkjet printers
Q5. What software is most useful for creating posters and slides?
Database software
Spreadsheet software
Presentation software
Word processing software
Q6. Which is a multimedia player?
Device A.
Device B.
Device C
Device D
Q7. Who is a typical desktop PC user?
An IT support person that stays at workplace all day.
An executive that frequently attends meetings in different location.
A sales person that spends most of the time travelling.
A student that needs a small and portable computer.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q8. How is entertainment, shows and other types of Web content ofen distributed?
Via log files.
Via text messages.
Via compressed folders.
Via podcasts.
Q9. Why is some software called open source?
Because users can download it from the Internet for free.
Because users can use it for a limited period for free.
Because users can use, improve and distribute it for free.
Because users can receive software upgrades for free.
Q10. How is legally purchased software recognised?
The software should display a copyright text.
The software should be on a DVD.
The software should have a valid license.
The software should have a large file size.
Q11. Why is a hard disk required in a computer?
To supply the computer with power.
To prevent the computer from overheating.
To enable the computer to store data.
To provide the computer with wireless connectivity.
Q12. What is an important data protection rule for a data controller?
Data collection must always be approved of by the data subject.
Data can only be processed if the collection was done with the last year.
Data that is collected can be freely distributed to public authorities.
Data must be collected for legitimate purposes and used accordingly.
Q13. Which one of the following has the smallest storage capacity?
A 100 MB hard disk.
A 100 KB hard disk.
A 100 TB hard disk.
A 100 GB hard disk.
Q14. What does the term ICT stand for?
All the technologies that are used for computation and information.
All the technologies that are used for the comtemplation of information.
All the technologies that are used for communication and information.
All the technologies that are used for the comprehension of information.
Q15. What characterises a WLAN network?
It only works indoors.
It only works outdoors.
It has a wired connection.
It has a wireless connection.
Q16. Which of the following is possible to share with other users online?
Only photos.
Only video clips.
Only audio files.
Any digital content.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q17. Why is ergonomics recognised as a way to improve the workplace?
Good design can help employees to be healthier and more productive.
Organisational psychology can help employees plan more efficiently.
Massage therapy can help employees to be less tense and stressful.
Communications technoloy can help employess communicate better.
Q18. What is an important part of data protection legislation?
To protect companies' access to public data.
To protect archived information in general.
To protect the infrastructure of the Internet.
To protect the personal data of individuals.
Q19. Which of the following is a type of internet connection?
Infrared
Broadband
Bluetooth
Firewall
Q20. Which one of the following is most likely to involve a client/server relationship?
Receiving software updates from the Internet.
Installing computer hardware.
Copying text between documents.
Starting a personal computer.
Q21. What is measured in kilobits per second?
Mouse sensitivity
Screen resolution
Hard disk space
Data transfer rate
Q22. What is important for an anti-virus program to effectively find computer viruses?
Make sure it is updated regularly.
Make sure it is not a free program version.
Make sure it is recently backed up.
Make sure it is checking system files only.
Q23. Which one of the following is most likely to connect to the Internet to be fully functional?
A presentation application.
An instant messaging application.
An image editing application.
A spreadsheet application.
Q24. What is an input device?
Printer
Speaker
Microphone
Monitor
Q25. Which measure should primarily be taken to protect information on a computer?
A username and password should be required to log on.
A router should be securing the computer from online attacks.
The computer should be located in a locked room.
The data on the hard drive should be encrypted.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q26. A file has arrived in an e-mail from an unknown sender. What is the best way to act from a
security perspective?
Save the file and delete the message.
Scan the file for computer viruses.
Ask the sender about the file.
Disconnect from the Internet and open the file.
Q27. What is an example of e-commerce?
Online voting
Online tax collection
Online ticket sales
Online census systems
Q28. For whom would a screen magnifier be most useful?
People who suffer from visual impairment.
People who suffer from cognitive impairment.
People who suffer from mobility impairment.
People who suffer from hearing impairment.
Q29. What characterises teleworking?
Increased commuting
More potential for teamwork
Improved human contact
Flexible hours
Q30. Which is an output device?
Device A
Device B
Device C
Device D
Q31. What is the best place to store a data backup from a security perspective?
In a hidden folder on the computer's hard disk.
In a visible folder on the computer's hard disk.
In a different building than the computer.
In the same building as the computer.
Q32. What is actually happening when a user e-mails a picture?
Data is being edited in system files.
Data is being uploaded to a network.
Data is being copied to a backup folder.
Data is being deleted from the hard disk.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q33. What does a software end-user license agreement indicate?
The price of the software.
The usage terms for the software.
The installation details for the software.
The changes in the new version of the software.
Q34. What is copyright?
A special consumption tax on software.
A programme initiated to raise the quality of software.
A right for the consumer to freely copy commercial software.
A term that covers the rights of the creator of music, books, software etc.
Q35. What is the purpose of using a firewall?
To increase the hard disk capacity.
To prevent unauthorised computer access.
To speed up the Internet connection.
To disinfect data files that have computer virus.
Q36. How can data theft be prevented most effectively?
Combine the use of a password with a security lock.
Connect to the Internet only during office hours.
Hide important files in folders that are hard to find.
Avoid bringing a laptop computer in public places.
Q37. In which situation is Voice over Internet Protocol (VoIP) used?
Downloading sound files from the Internet.
Listening to music broadcasted on the Internet.
Making telephone calls via the Internet.
Uploading a recording of a lecture on the Internet.
Q38. What is an important data protection right for an ordinary person (data subject)?
The right to access other individuals personal data.
The right to financial compensation in exchange for personal data.
The right to access your own personal data.
The right to remove all personal data from public databases.
Q39. What characterises Random Access Memory (RAM)?
RAM cannot store data when the computer is switched off.
RAM can store data when the computer is switched off.
Decreasing the amount of RAM decreases the computer's long-term storage capacity.
Increasing the amount of RAM increased the computer's long-term storage capacity.
Q40. From a security perspective, what is a simple but effective password policy?
A password should be very easy to remember.
A password should have no numbers.
A password should never be revealed.
A password should never be changed.
Q41. What is Really Simple Syndication (RSS)?
An electronic news service.
A way to subscribe to updated Web content.
A method of disinfecting computer viruses.
A type of Internet connection.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q42. What is an effective energy saving option in computers?
The option to automatically reduce the hard disk capacity.
The option to automatically lower the sound level.
The option to automatically turn off the screen.
The option to automatically decrease the amount of RAM.
Q43. How can physical wellbeing be ensured when working at a computer for long spells?
Use eye relaxation techniques.
Reduce the number of breaks.
Turn up the workplace temperature.
Dim the lighting in the office.
Q44. What characterises a touchscreen?
It is both an input and output device.
It is both an internal and external device.
It is both a monitor and a loudspeaker.
It is both a monitor and a firewall.
Q45. Which one of the following is most likely to speed up a computer?
Increasing the number of input devices.
Increasing the number of output devices.
Changing to a processor with higher capacity.
Changing to a power supply with higher capacity.
Q46. Which one of the following is an example of hardware?
An e-mail message.
A keyboard.
An operating system.
A database.
Q47. What characterises e-mail?
E-mail enables easy and fast transmission of messages.
E-mail enables voice communication between computer users.
E-mail enables broadcasting of Web based multimedia content.
E-mail enables free online mass storage of files.
Q48. What is an example of software?
CPU
Mouse
Operating System
USB flash drive
Q49. What is regarded as a serious health factor associated with computer use in the workplace?
The height and width of the keyboard.
The availability and transfer rate of the network.
The direction and amount of indoor light.
The size and speed of the hard disk.
Q50. What is a Web log (Blog)?
A database that stores usernames and passwords.
A catalogue of popular Websites.
An application that records visited Websites.
An online journal that is regularly updated.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q51. What type of information should be shared with caution online?
Holiday memories
Hobby tips
Personal information
Forum comments
Q52. What is true about operating systems software and applications software?
The applications software is always installed first on a computer, then the operating systems
software.
The operating systems software is always installed first on a computer, then the applications
software.
The operating systems software can only interact with software, not hardware.
The applications software can only interact with hardware, not software.
Q53. What do Windows and Unix have in common?
They are applications software.
They are operating systems.
They are hardware devices.
They are broadband services.
Q54. What characterises Instant Messaging (IM)?
It is the same as electronic mail.
It is real-time text communication.
It is only available for wireless devices.
It is mostly used when computers are offline.
Q55. Which one of the following types of computer is most likely to be used by a travelling salesman?
A desktop computer.
A tablet PC.
A server.
A laptop.
Q56. Which one of the following is a term for systems used to store, retrieve, process and transmit
data?
Internet & Communication Technology.
Internet & Information Technology.
Information & Communication Technology.
Information & Computer Technology.
Q57. Which one of the following measures the speed of the CPU?
Gigahertz (GHz).
Bits per second (Bps).
Gigabytes (GB).
Megabytes (MB).
Q58. Which one of the following is a term for an audio or video recording posted on a web site that
can be downloaded and played later?
Podcast.
Blog.
VoIP.
RSS Feed.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q59. Which one of the following describes a computer’s operating system?
Software that can retrieve information from a database.
Hardware that can scan and convert photographs into digital files.
Software that controls the allocation and usage of hardware.
Hardware that can record and send images across the Internet.
Q60. Which one of the following types of software would you most likely use to create a letter?
Web browsing software.
Spreadsheet software.
Accounting software.
Word processing software.
Q61. The computers in your office building are connected together so staff can share files and
printers. What is this arrangement of computers called?
The Internet.
A Local Area Network.
The World Wide Web.
A network port.
Q62. Which one of the following is a private network that allows specified external users’ access?
Intranet.
WorldNets.
Internet.
Extranet.
Q63. Which one of the following devices do you need to be able to communicate with other
computers using the telephone network?
CD-ROM.
Modem.
Printer.
Speakers.
Q64. Which one of the following is a software application that assists users who are visually
impaired to identify and interpret what is displayed on screen?
A screen calendar.
A word processor.
A screen reader.
A web log.
Q65. Which one of the following is a common feature of e-learning?
Always requires physical class attendance.
Cannot download documents for later reading.
Learning is self-paced.
Travel time and costs are very high.
Q66. Which one of the following is NOT a feature of electronic commerce?
Goods can be advertised and prices compared.
There is physical contact between buyer and seller.
Transactions can be processed quickly.
Services are available 24 hours a day.
Q67. Which one of the following is the best way to maintain a good posture?
Ensure your computer is in a well-lit area.
Make sure that there are no cables on the floor.
Make sure that your computer is using a fast processor.
Make sure that your computer; desk and chair are positioned correctly.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q68. Which one of the following statements describes a good approach to information security for an
organisation?
There are no procedures for reporting security lapses.
Staff passwords are not changed regularly.
Sensitive data is available to everyone that requests it.
Keeping an off-site backup of all files.
Q69. Which one of the following is a good password policy for an organisation?
All passwords are changed regularly.
All passwords are never changed.
All passwords are made up of less than four characters.
All passwords are made up of less than four numbers.
Q70. Which one of the following is the best way to protect a computer against computer viruses?
Only virus-check e-mail attachments.
Update antivirus software on a regular basis.
Always make sure that the operating system is up to date.
Only download files from the Internet during business hours.
Q71. Which one of the following statements describes shareware?
Totally free software that is available only on the Internet.
Commercial based software that must be paid for.
Software available for free on a trial basis after which payment will be required.
Copyright free software that allows unlimited copies and distribution.
Q72. There are rules governing the rights of a data subject and the responsibilities of a data
controller. What are these rules called?
Data Privacy Policy.
Data Management Act.
Data Protection legislation or conventions.
Data Publicity Law.
Q73. Which one of the following is an example of hardware?
An antivirus program.
A spreadsheet application.
A mouse.
The World Wide Web.
Q74. Which one of the following would improve computer performance?
Using a larger monitor.
Increasing the number of applications running.
Using a faster printer.
Increasing the size of RAM.
Q75. Which one of the following is NOT a function of the Central Processing Unit?
Executing program instructions.
Ensuring program instructions are executed in the correct sequence.
Sending e-mail.
Carrying out calculations.
Q76. Which one of the following is both an input and output device?
Touchscreen.
Keyboard.
Printer.
Scanner.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q77. Which one of the following is a method of publishing frequently updated content such as
news headlines online?
A blog.
RSS.
A podcast.
Instant messaging.
Q78. Which one of the following is an example of an operating system?
iTunes.
PowerPoint.
Windows.
Netscape.
Q79. Which one of the following is considered good environmental practice?
Using a slow computer.
Printing on both sides of a page.
Using up to date software.
Backing up data on a regular basis.
Q80. Which one of the following statements about the Internet is TRUE?
The Internet is a global network that links many computer networks together.
The Internet is a private company network.
The Internet is a visual representation of linked documents.
The Internet is a network operating system.
Q81. Which one of the following is an input/output port?
Linear.
Radial.
Lateral.
FireWire.
Q82. Which one of the following is an advantage of teleworking?
Long commuting times.
Flexible schedules.
Less emphasis on teamwork.
Lack of human contact.
Q83. Which one of the following is a characteristic of broadband?
Completely safe from intruders.
It has a dial up connection.
High speed.
Cost can vary from day to day.
Q84. Which one of the following is a text-based communication between two or more people over
the Internet?
Podcasting.
Really Simple Syndication.
Voice over Internet Protocol.
Instant Messaging.
Q85. Which one of the following practices helps create a good ergonomic working environment?
Protecting computer monitors from reflections and glare by correct positioning.
Taking very few breaks away from the computer.
Keeping the office cold and using low overhead lighting.
Use of non-adjustable chairs when working with computers.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q86. Why is it necessary for an organisation to adopt a good password policy?
To allow easy sharing of files across the company network.
To make it easier for the computer to connect to a network.
To protect files against unauthorized use.
To make it easier to find files on a computer.
Q87. Which one of the following is a way to prevent the theft of data from a computer?
Use an up to date anti-virus program.
Back up data on a regular basis.
Remove the monitor when not in use.
Set up a username and password.
Q88. Which one of the following should be carried out to safeguard files from loss in case the main
copy is damaged?
Backup files to a new location on your computer.
Install password security.
Backup the files regularly and store offsite.
Install a firewall.
Q89. Which one of the following could allow a virus to enter a computer?
Downloading files from the Internet onto the computer.
Connecting the computer to a new printer.
Running a virus scan on the computer.
Setting the computer monitor to a low resolution.
Q90. Which one of the following statements about an End User License Agreement is true?
It gives full ownership of the software to the user of the software.
It gives the user the exclusive right to copy and sell the software to other potential users.
It gives the user the right to modify the software.
It gives the user the right to install and run the software on a specified number of computers.
Q91. What is the name of the law for the storage and use of data in the UK?
Details Provision Act
Data Protection Authority
Data Privacy Authority
Data Protection Act
Q92. What is the best way to prevent a computer virus from entering your computer?
Log out of your computer each time you have finished using it
Install and use anti-virus software on your computer
Do not use emails on your machine
Make sure all your files are safely stored to your floppy disks
Q93. What does RSI stand for?
Repeated Strain Inclusion
Regular Systems Initiation
Routine Structures Infection
Repetitive Strain Injury
Q94. Health and safety is important when working with computers, which of the following will help to
prevent injuries?
Always use screen savers
Ensure the office is air conditioned
All trailing cables should be secured
Turn the lights off at the end of the day
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q95. Which of the following systems will help to improve communications within the company?
Excel
Powerpoint
Email
Solitaire
Q96. Which is a use of e-commerce on the internet?
Checking flight availability
Searching for a suitable holiday
Researching holiday destinations
Booking a holiday
Q97. Which of the following would you use to find information on the internet?
Email
Word Processor
Search Engine
Photo Editor
Q98. In the home, which of the following would you use the internet for?
Storing friends and family names and addresses
Researching information for homework
Storing your files
Re-booting your computer
Q99. Which is the MAIN advantage of using a network system in the office?
Allows sharing of data
Regular backups
Costs are reduced
Office procedures can be automated
Q100. Which of the following software manages the files and folders on your computer's hard disk
drive?
Applications software
Anti-virus software
Systems software
Utilities software
Q101. Identify the computer port shown?
Serial Port
USB Port
Parallel Port
Network Port
Q102. What has got to do with bandwith of transmission?
CPU speed
Data transfer rate
RAM capacity
Speed of printer
Q103. Identify the computer port?
Firewire Port
USB Port
Parallel Port
Serial Port
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q104. What does firewall do?
Protect against virus infection
Monitor network activities
Protect your hardware
Prevent software from catching fire
Q105. Identify this computer port?
USB Port
Parallel Port
Network Port
Firewire Port
Q106. What is the usage of firewall?
Prevent virus infection
Prevent computer from catching fire
Monitor transmission of data
Prevent hardware from burning
Q107. Which computer port is shown in this picture?
Network Port
Serial Port
Firewire Port
Parallel Port
Q108. What determines the data transfer rate?
RAM capacity
Hard disk speed
Bandwidth of transmission
CPU clock speed
Q109. Identify this computer port shown in the diagram?
Network Port
Serial Port
Parallel Port
Firewire Port
Q110. Which software application would you use to create a report?
Excel
Powerpoint
Word
Publisher
Q111. Which of the following is NOT an input device?
Monitor
Mouse
Keyboard
Scanner
Q112. What does GUI stand for?
General Utilities Intervention
Graphical User Interface
General User Intervention
Graphical Utilities Interface
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q113. What of these is an input device?
CD-Rom
Mouse
Printer
Zip drive
Q114. Which of these computer based operations uses barcode input?
Marking on online test paper
Issuing a book in a library
Paying for goods using a credit card
Ordering goods from a web site
Q115. Which type of memory holds the basic operating system commands?
ROM
RAM
Cache
Auxiliary
Q116. Which of these storage devices holds the most data?
Floppy disk
DVD drive
Hard Disk drive
Thumb drive
Q117. Which type of software would you use to prepare a budget forecast?
Word Processing
Database
Presentation
Spreadsheet
Q118. Which of these is an output device?
CD-ROM
Mouse
Printer
Scanner
Q119. Which of these is a characteristic of electronic mail that does not apply to other methods?
Attachments can be sent
Messages can be sent to more than 1 person
Mail may get lost
Can only send to some people
Q120. Which upgrade will have the most impact on the performance of your computer?
Adding more RAM
Reducing the peripheral devices
Adding a network card
Fitting a second hard disk
Q121. What type of software controls the file system on the computer?
GUI
Network software
Operating system software
Application software
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q122. Which is the smallest unit of computer storage?
Byte
Bit
Kilo bit
Megabyte
Q123. Which type of software is used to access the Internet?
Interface
Presentation
Browser
System
Q124. What is connected in a LAN?
Computers on one site
Computers in many sites
Computers in one office
Computers on the Internet
Q125. Which type of software would you use to store customer data?
Database
Spreadsheet
Presentation
Word Processing
Q126. How are computers in a WAN connected?
Cables
Telephone lines
Internet
Intranet
Q127. Why is it important to make regular back-ups of computer data?
To prevent loss of data
To comply with the law
To protect the computer
To increase the storage company
Q128. Your cable modem runs at 10 Mbps. What does this represent?
Speed of your computer
Speed of transferring data
Speed of your hard disk
Speed of cache memory
Q129. Where should you store back up copies of your data?
Near to the computer
In a different location
In your car
In an off-site fire proof store
Q130. You have a modem and a telephone connection. What else do you need to connect your
computer to the Internet?
Browser and printer
ISP account and printer
ISP account and network
Browser and ISP account
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q131. Which of these describe a computer program?
An input device
A set of instructions
An interactive user guide
A help system
Q132. You have installed more memory in your computer. What type of memory is this?
Cache
Virtual
ROM
RAM
Q133. Which type of computer is used to process large amounts of corporate data?
Notebook
Mainframe
Mini computer
Desktop
Q134. Which is the best way of protecting a computer system from unauthorised use?
Ensuring all users have passwords
Locking the office
Using a screensaver
Maintaining an audit trail
Q135. Which of these devices can be used to input and output information?
Scanner
Printer
Bar Code Reader
Touch Screen
Test B (135 Questions)
Q1. Which type of system is used to provide information for employees within a company?
Internet
Intranet
Extranet
Electronic mail
Q2. Which of these is an example of an e-commerce activity?
Viewing a travel timetable
Checking theatre availability
Downloading a screen saver
Booking a flight
Q3. Which of these is always an advantage of buying goods online?
Longer opening hours
Greater choice
Personal service
Cheaper prices
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q4. Which is a ‘laptop’ or a ‘notebook’?
A diary or timetable application
A portable PC
An electronic organiser
A simple word processor
Q5. Which is the main factor in the growth of the ‘Information Society’?
Multimedia computers
Faster processors
Modems
Internet
Q6. Which device would you use to draw shapes on the screen?
Scanner
Mouse
Optical Character Reader
Plotter
Q7. Which of these tasks is a function of the operating system?
Adding slides in presentation
Copying a file
Producing a database report
Adding data to a spreadsheet
Q8. Why is it important that you have adequate lighting when using a computer?
To avoid back injuries
To avoid radiation
To avoid repetitive strain injuries
To avoid eyestrain and headaches
Q9. Which of these is an input device?
Monitor
Speaker
Scanner
Plotter
Q10. Most computers are operating using icons and a mouse. What is this system called?
Graphical user interface
Object oriented environment
Symbolic user interface
Command line interface
Q11. Which is most likely to happen after a power cut?
You can restart the computer and carry on with the same work
The computer will not function
All unsaved work is lost
Your disk drive will be damaged
Q12. Which of the following devices is used to control the software in a games programme?
Keyboard
Bar Code reader
Joystick
Light pen
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q13. Which of the following devices sends information from the user to the computer?
Keyboard
System unit
Monitor
Printer
Q14. The computers in your office are connected together so staff can share files and printers.
What is this arrangement of computers called?
LAN
ISDN
TCP/IP
WAN
Q15. A Library has a database of all its books. There are over 100,000 books and each record has
Title, Author, Publisher, ISBN, date and description. What storage amount is required for the
database?
1 byte
1 Kilobyte
1 Megabyte
1 Gigabyte
Q16. Which of the following NOT a permanent storage medium?
Hard disk
CD-ROM
RAM
USB Thumb Drive
Q17. Poor postures at the computer can cause backache and other problems. Which is the best way
of avoiding these problems?
Sitting at the recommended distance from the monitor
Making sure your chair is the correct height
Using a mouse to operate programs
Switching off the computer when not in use
Q18. Which of the following is the MAIN advantage of a network system?
Increased speed of operation
Reduces cost
Allows sharing of data
Backs up data
Q19. Which type of software controls the allocation of resources in the computer?
Application software
Operating system software
Browser software
Utility software
Q20. A shareware program is best described as....
a program which may be downloaded and used for a trail period, but must be bought afterwards
a program developed by a single team and accessible by anyone in the world
a program installed on a Web site and executable on any system in the world
a free program developed by students
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q21. Which of the following is an example of the use of e-commerce on the Internet?
Checking theatre availability
Booking train tickets
Using e-mail
Downloading information
Q22. Health and safety issues are important when using a computer. To avoid risk of injury, which of
the following should always be TRUE?
Trailing cables should be secured
Screen savers should be installed
A mouse mat should always be used
Power extension cables should be used
Q23. Which is the best way of protecting data from loss?
Make regular backups of the data
Delete all your old files
Lock your computer
Change your password
Q24. There are rules governing the storage and supply of computer based information. What are
these rules called?
Data Prohibition Law
Data Protection Act
Data Storage Act
Data Supply Policy
Q25. Which of the following systems would improve communication within a company?
Office Software
Electronic mail
Project Management
Database
Q26. Which device could you use for the output of a music file?
Microphone
Speaker
Digitiser
Speech synthesiser
Q27. Which software would you use for creating a set of slides to be shown to an audience?
Database
Presentation
Desk Top Publishing
Spreadsheet
Q28. Which of these statements about Read Only Memory (ROM) is TRUE?
Application programs can write data to the Read Only Memory
The contents of the Read Only Memory are not deleted when the computer is switched off.
The operating system is loaded into the Read Only Memory when the computer is started.
Internet pages are stored in the Read Only Memory while they are being loaded.
Q29. Which of the following is a problem when downloading files from the internet?
The files may not be able to be removed
The display settings on you computer may be changed
The cache memory on your compute may become full
Viruses may be introduced to you computer
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q30. The Data Protection Acts is designed to...
Make personal data freely available
Create a permanent store for personal data
Regulate the use of personal data
Enforce deletion of personal data
Q31. What is most likely to be affected by a computer virus?
Your monitor
Your data
The speed of your computer
Read only memory
Q32. What is controlled by software copyright regulation?
Making backups of the software
Number of copies sold
Type of computer used for the software
Illegal distribution of software
Q33. Which type of software would you use to maintain information about account holders at a
Bank or Building Society?
Spreadsheet
Word processor
Database
Stock Control
Q34. What is a trackball?
A monitoring system
A type of speaker
An alternative to the mouse
A storage device
Q35. Which type of software can you use without having to pay a fee?
Freeware
Shareware
Operating system
Application software
Q36. Which of these is a hand held device that stores appointments?
Notebook
Desktop
Mini computer
Personal Digital Assistant (PDA)
Q37. Which is the BEST way of preventing loss of your data if there is a power cut?
Use a filtered plug
Make frequent back ups of the data
Ensure passwords are used
Install virus checking software
Q38. Which of these is NOT a benefit of e-mail?
Ability to send attachments
Receiving junk mail
Instant delivery of your message
Sending to more than one person at once
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q39. What is the main advantage of a GUI?
Reduces the cost of computing
Makes the computer easier to use
Required a less powerful computer
Does not need updating
Q40. Which device would you use to digitise a photograph?
Mark reader
Data logger
Scanner
Plotter
Q41. Which of these is NOT an input device?
Digital camera
Microphone
Scanner
Speaker
Q42. There are Laws governing the use of software to prevent people from making illegal copies of
software. Which of the following is the best way to prevent this from happening?
Labelling the software
Using a code to unlock the software
Sending offenders to prison
Requiring passwords for copying
Q43. Which of the following is a storage device?
Keyboard
Monitor
Speaker
Disk Drive
Q44. Which of the following statements is NOT TRUE in relation to the Data Protection Act?
The data user must ensure that the information...
Is obtained fairly and accurately
Is stored with proper security
Is accurate and up to date
Can be sent abroad at any time
Q45. For which of these tasks would you use a search engine?
To find files on your computer
To track new network
To detect viruses on your computer
To find information on the world Wide Web
Q46. Which of these is the major benefit of e-Learning?
Easier
Cheaper
Reduced contact with other students
Available at any time
Q47. Which of these is a characteristic of RAM?
Cannot be erased
Lost when the power is switched off
Stores data downloaded from the Internet
Holds system commands
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q48. Which of the following is NOT an output device?
Keyboard
Monitor
Printer
Speaker
Q49. Purchasing goods on a web site is an example of...
Web site design
Net working
Electronic commerce
Search engine
Q50. Which type of memory is used to store applications while they are running?
ROM
RAM
Cache
Auxiliary
Q51. Which of these is NOT a storage device?
RAM
USB Thumb Drive
Printer
Hard Disk Drive
Q52. Computers can damage your health in various ways. Which is the best way of preventing this?
Taking frequent breaks
Having good lighting
Using a screen protector
Raising the height of the monitor
Q53. You want all users to be able to view data in a computer system and selected users to be able
to enter and change the data. How can you achieve this?
Allow unrestricted access to the system
Give unauthorised users a password
Set access rights for different groups of users
Allocated keys to authorised users
Q54. Which type of computer stores the common files in a network?
Main frame
Laptop
Desktop
Server
Q55. What does CPU stand for?
Central Power Unit
Computer Processing Unit
Computer Programming Unit
Central Processing Unit
Q56. What is a computer virus?
A program that can damage your computers
A hardware fault
A program that you have downloaded from an Internet site
A corrupted area of your disk
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q57. You can help to preserve the environment by.....
Using a screen saver
Recycling printer cartridges
Using a filtered plug
Using a smaller screen
Q58. Which type of computer is used to operate large corporate systems and databases?
Desktop computer
Personal Digital Assistant (PDA)
Mainframe
Laptop
Q59. Which of the following describes the essential components of Information & Communication
Technology?
Primary, secondary and cache memory
RAM and ROM
Hardware, software and communications technologies
Hardware and shareware
Q60. The speed of the Modem is measured in:
Megahertz (MHz)
Bits per second (Bps)
Gigabytes (GB)
Megabytes (MB)
Q61. Which of the following statements about formatting the disk for the first time is true?
Formatting prepares the disk to store data
Formatting backs up data onto the disk
Formatting copies the disk
Formatting unlocks the disk
Q62. Which of the following tasks is a function of the operating system?
Adding data to a spreadsheet
Producing a database report
File management
Producing a presentation
Q63. Which software would you use to search for information in the internet?
Web browsing software
Spreadsheet software
Accounting software
Word processing software
Q64. The computers in your office building are connected together so staff can share files and printers.
What is this arrangement of computers called?
FTP
LAN
WWW
HTTP
Q65. An intranet is:
A network operating system
A network filing system
A private company network
A private company network that includes external specified users
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q66. Which of the following devices do you need to be able to communicate with other computers
using the telephone network?
CD-ROM
Modem
Plotter
Speakers
Q67. Computer use can cause repetitive strain injury (RSI). Which of the following is the best way to
avoid this?
Ensure your computer is in a well-lit area
Use an operator chair without arms
Place your monitor at the correct height
Work with your wrists level with the keyboard
Q68. Which of the following statements describes a good approach to information security for an
organisation?
No procedures for reporting security lapses
Staff passwords are not changed regularly
Sensitive data is available to everyone
Computer systems are backed up on a regular basis
Q69. What is the best way of preventing your computer from being infected with a virus?
Only virus-check e-mail attachments
Have updateable anti-virus software running on your computer
Have anti-virus software running on your computer
Never open any e-mail attachments
Q70. Which of the following statements describes shareware?
Shareware is software without copyright protection
Shareware is free software
Shareware is software you may pay for after an initial time period of use
Shareware is software you can use in any way
Q71. There are rules governing the storage and supply of computer-based information. What are
these rules called?
Data Privacy Policy
Data Management Act
Data Protection Act
Data Publicity Law
Q72. Which of the following would be considered a portable computer?
Workstation
Mainframe
Laptop
Desktop computer
Q73. Disk formatting is used to:
Find files on a disk
Lock a disk
Unlock a disk
Prepare a disk to store files
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q74. Which of the following is an operating system?
Excel
PowerPoint 2007
Windows XP
Netscape
Q75. What is ISDN?
Integrated Standard Digital Networks
Integrated Services Digital Network
Interactive Standard Dynamic Networks
Internet Services Data Network
Q76. If you were working from home, what software application could be used to communicate
directly with colleagues and customers?
Presentation
Electronic mail (e-mail)
Database
Spreadsheet
Q77. Which of the following practises helps create a good ergonomic working environment?
Protecting computer monitors from reflections and glare by correct positioning
Taking infrequent breaks away from the computer
Keeping the office cold and using low overhead lighting
Use of non-adjustable chairs when working with computers
Q78. Which of the following can be an advantage of electronic documents?
They can never be lost
They can always be e-mailed regardless of size
They can reduce the usage of paper
They can never be copied
Q79. Which of the following activities could lead to the spread of a computer virus?
Using thumb drive from unknown sources to exchange data
Using a standalone computer to output a hard copy letter
Using retail software that has been checked for viruses
Using a Graphical User Interface (GUI)
Q80. An End User License Agreement:
Is a form of advertising between a software application author or publisher and the user
Gives the user the exclusive right to copy and sell the software to other potential users
Grants ownership of the software to the user of the software
Is a legal contract between a software application author or publisher and the user with regard to
terms of distribution, resale, and restricted use
Q81. Which one of the following describes spam?
Gathering information about a person or organisation without their knowledge.
Performing an unauthorised, usually malicious, action such as erasing files.
Putting unnecessary load on the network by making copies of files.
Sending unwanted bulk messages.
Q82. Which one of the following could lead to the spread of a malicious program?
Using only software that has been checked for viruses.
Maintaining regularly updated anti-virus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q83. Which one of the following protects a computer from the risk of malicious programs?
PC diagnostic software.
Web tracking software.
Anti-spam software.
Anti-spyware software.
Q84. Which one of the following describes why it is important to update antivirus software regularly?
To ensure the software identifies old viruses.
To protect your computer from all known viruses.
To protect your computer from unwanted bulk messages.
To prevent the spread of malicious programs on the Internet.
Q85. Which one of the following describes a computer hacker?
A skilled programmer who uses authorised access to exploit information available on a computer.
A skilled programmer who secretly invades computers without authorisation.
A skilled programmer who writes programs to train new employees.
A skilled programmer who helps in the installation of new software for an organisation.
Q86. Which one of the following describes why firewalls are used?
To prevent unauthorised access by incoming transmissions.
To prevent destruction of a computer in the event of a fire.
To enable easy downloading of data from web sites.
To detect and disable viruses already on a computer.
Q87. Which one of the following is the reason that users should log on with a username and
password?
To be aware of who is in the building.
To check up on the time-keeping of users.
To protect computers against unauthorised use.
To enable a personalised greeting for each user.
Q88. Which one of the following statements about a password is TRUE?
It must be changed only if it is compromised.
It cannot contain special character symbols.
It should be changed regularly.
It must be registered with the system administrator.
Q89. Which one of the following should be used to change your password in your computer?
Internet Explorer.
Anti-virus software.
Control Panel
Windows Firewall.
Q90. Which one of the following shows respect for confidentiality of information?
Discussing confidential information over the telephone.
Uploading confidential information to a shared web site.
Emailing confidential information to a colleague.
Disclosing confidential information only to authorised individuals.
Q91. Which one of the following describes why users should lock their computer when leaving their
desk?
To prevent a waste of electricity.
To prevent unauthorised access to data.
To prevent data from getting corrupted.
To prevent the computer from malfunctioning.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q92. Which one of the following is an example of phishing?
An email warning the recipient of a computer virus threat.
An email directing the recipient to forward the email to friends.
An email directing the recipient to enter personal details on a fake website.
An email directing the recipient to download an attachment.
Q93. Which one of the following is unsafe online activity?
Giving your home address to someone you met in a chat room.
Using a screen name or nick name that cannot identify you.
Meeting someone you met online face-to-face in the company of your parents.
Keeping your social network profile private.
Q94. Which one of the following describes how confidential information should be sent using an
unsecured network?
In an unsigned email.
In an attachment.
In a compressed format.
In an encrypted format.
Q95. Which one of the following statements about wireless networks is TRUE?
They cannot be intercepted by unknown users.
They limit accessibility to other users.
They limit visibility to other users.
They can be accessible to other users.
Q96. Which one of the following describes Bluetooth?
Short-range wired protocol for exchanging data.
Short-range wireless protocol for exchanging data.
Long-range wireless protocol for exchanging data.
Long-range wired protocol for exchanging data.
Q97. Which one of the following describes why Bluetooth device settings should be adjusted?
To increase the range of the device.
To improve the quality of reception.
To prevent the risk of unauthorised access.
To reduce interference from other devices.
Q98. Which one of the following should you do to ensure that your USB storage device is kept safe
and secure?
Only use it in private surroundings.
Do not access it using a Bluetooth device.
Use firewall software.
Never leave it unattended.
Q99. Which one of the following departments would usually hold guidelines and procedures for the
secure use of IT within an organisation?
The Marketing Department.
The IT Department.
The Sales Department.
The Finance Department.
Q100. Which one of the following describes why you should follow guidelines and procedures while
using IT resources in an organisation?
To ensure easy access to information on your computer.
To ensure the secure use of IT resources.
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
To ensure the IT Department is able to monitor all activity.
To ensure the Finance Department is able to monitor the costs of IT resources.
Q101. Which one of the following describes how a breach in IT security should be reported?
Using the telephone.
By emailing to the IT Manager.
Using the method listed in the organisation’s security policy.
Using any means of communication.
Q102. Which one of the following would prevent the theft of a laptop?
Anti-virus software.
A webcam.
Spyware.
A security cable and lock.
Q103. Which one of the following would NOT happen if a computer suddenly malfunctions?
The operating system will fail.
Files saved on the hard drive will be lost.
All off-site backups will be lost.
Some software may have to be reinstalled.
Q104. Which one of the following should you use to backup personal data?
A labelled CD.
A printout.
A website offering a file sharing service.
A friend’s computer.
Q105. Which one of the following describes why it is important to have a secure off-site backup copy
of files?
To improve accessible of files from other locations.
To speed up the process of accessing the files at any time.
To prevent the loss of data in the event of a fire.
To reduce the possibility of data theft.
Q106. Which one of the following describes how software can be stored safely?
Storing it in a fireproof safe.
Storing it in a cupboard.
Storing backups of the software.
Storing it close to the computer.
Q107. Which of The Following Can Convert The Computer Signals From Digital To Analog?
ISDN
Modem
DSL
HDSL
Q108. The Speed of the Central Processing Unit is measured in
Mega hertz
Hectares
Revolutions per minute.
Bits per second
Q109. Which one of the following printers uses a toner in printing?
Laser
Dot matrix
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Ink jet
Bubble jet
Q110. Which one of these statements is False?
A network of computer linked within a building is called a LAN
Databases can be accessed by many users who connected to a LAN.
A network-linking computer over cities countries is called WAN
Applications cannot be shared over a LAN.
Q111. Which of the following statements is True?
A mainframe computer enables users to share files, printers and other resources.
Minicomputer enables users to share files, printers and other resources.
A laptop computer enables users to share files, printers and other resources.
Network computer enables users to share files, printers and other resources.
Q112. Which of the following statements is TRUE?
ROM loses information when the computer is powered off.
ROM chips can be plugged into the motherboard to provide more memory.
ROM can't be written to , it's pre-programmed.
ROM data can be written when you are loading an application software
Q113. One byte is equivalent to:
2 bit
8 bit
16 bit
4 bit
Q114. What hardware helps you input data and give commands?
Pointer
Mouse
Keyboard
Scanner
Q115. RAM Can Hold the Data And Programs Which In Currently Use, It Is UN Volatile Memory.
True
False
Q116. Peripherals Devices Are Part of Hardware?
True
False
Q117. What Device Prints the output on paper.
Scanner
Touch Screen
Printer
CPU
Q118. Which printer type would MOST likely produce the most noise?
Dot Matrix
Inkjet
Laser
Thermal
Q119. Which of the following requires power to be on in order to maintain the data it stores?
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
ROM
RAM
Hard Disk
USB Flash Disk
Q120. Which one of these computers is too expensive?
Minicomputer
Lap top
Mainframe
Tablet
Q121. When working away from the office a sales representative might typically use which type of
computer?
Desktop computer.
Laptop computer
An analogue computer
A mainframe computer
Q122. Special plastic cards containing a processor and memory are used to pay for goods and
services. Each time the card is used the details on the card are updated.
What is the name of such a card?
Magnetic card
Memory card
Smart card
Processor card
Q123. Which computer would typically be the cheapest to buy?
Desktop computer
Laptop computer
Mainframe computer
Mini computer
Q124. Which of the following would be the slowest device for accessing data?
Floppy Disk
Hard Disk
USB Flash Drive
DVD
Q125. Which of the following would be the fastest device for accessing data?
Floppy Disk
DVD
Hard Disk
Magnetic Tape Drive
Q126. Which of the following is hardware?
A database
A spreadsheet
A mouse
An operating system
Q127. Which of the following is a peripheral device?
Display Card
CPU
RAM
Printer
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com
Q128. The generic name of the devices, which are connected to externally, and controlled by, the
central processing unit, is:
Keyboards
RAM
Monitors
Peripherals
Q129. Which of the following printers is the most suitable for a secretary to produce the final copy of a
document?
Dot matrix
Laser
Plotter
Any of them
Q130. Which type of memory is used to store the current status of computer application whilst it is
being processed?
EPROM
PROM
ROM
RAM
Q131. Small businesses often use computer system to run the company. Typically it is most likely to
be:
A Mainframe computer
A microprocessor
A mini computer
A personal computer
Q132. Which of the following could be considered typical users of a mainframe computer?
A bank
A school
A doctor's surgery
A small business
Q133. Which list shows the correct order of memory capacity for these computers, smallest first?
Mainframe computer, personal computer and minicomputer
Personal computer, minicomputer and mainframe computer.
Personal computer, mainframe computer and minicomputer
Mainframe computer, minicomputer and personal computer.
Q134. Which of these is an input device?
CD-ROM
Mouse
Printer
Speaker
Q135. Your modem runs at 2M bps. What does this represent?
Speed of your computer
Speed of transferring data
Speed of your hard disk
Speed of cache memory

More Related Content

What's hot

Raid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive DisksRaid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive DisksMudit Mishra
 
Multiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersMultiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersKate Bailey
 
IGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringIGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringShamir George
 
The Computer Its Parts (External)
The Computer Its Parts (External)The Computer Its Parts (External)
The Computer Its Parts (External)Melchor Balolong
 
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...Kaushal Mehta
 
Computer hardware-ports-connectors
Computer hardware-ports-connectorsComputer hardware-ports-connectors
Computer hardware-ports-connectorsRoshan sp
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 
Computer Fundamentals Test
Computer Fundamentals TestComputer Fundamentals Test
Computer Fundamentals TestSamir Sabry
 
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)Muhammad Zaini
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenancegeepatty
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Junaid Qadir
 

What's hot (20)

Raid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive DisksRaid- Redundant Array of Inexpensive Disks
Raid- Redundant Array of Inexpensive Disks
 
Multiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computersMultiple choice quiz for introductions to computers
Multiple choice quiz for introductions to computers
 
Module3 system unit
Module3 system unitModule3 system unit
Module3 system unit
 
IGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation AuthoringIGCSE ICT (0417) P3 Presentation Authoring
IGCSE ICT (0417) P3 Presentation Authoring
 
The Computer Its Parts (External)
The Computer Its Parts (External)The Computer Its Parts (External)
The Computer Its Parts (External)
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
ICT Model Questions
ICT Model Questions ICT Model Questions
ICT Model Questions
 
Parts of a Computer ppt
Parts of a Computer pptParts of a Computer ppt
Parts of a Computer ppt
 
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
ICT, Basic of Computer, Hardware, Various parts of computer hardware, What is...
 
Computer hardware-ports-connectors
Computer hardware-ports-connectorsComputer hardware-ports-connectors
Computer hardware-ports-connectors
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
SS3 DATA PROCESSING EXAMINATION (FIRST TERM)
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 
Disk Management
Disk ManagementDisk Management
Disk Management
 
Computer Fundamentals Test
Computer Fundamentals TestComputer Fundamentals Test
Computer Fundamentals Test
 
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1Fundamentals of ICT - Lecture 1
Fundamentals of ICT - Lecture 1
 

Similar to ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyChristoanSmit
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxPaulRomanoBenavidesR
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxbartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxannette228280
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyHamisi Kibonde
 

Similar to ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers (20)

Topic 7
Topic 7Topic 7
Topic 7
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Cyber Security and GDPR Made Easy
Cyber Security and GDPR Made EasyCyber Security and GDPR Made Easy
Cyber Security and GDPR Made Easy
 
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptxFUNDAMENTALS OF COMPUTER SYSTEM.pptx
FUNDAMENTALS OF COMPUTER SYSTEM.pptx
 
Activate
ActivateActivate
Activate
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Internet
InternetInternet
Internet
 
IOT
IOTIOT
IOT
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
iot_ppt.pptx
iot_ppt.pptxiot_ppt.pptx
iot_ppt.pptx
 
It Exercises
It ExercisesIt Exercises
It Exercises
 
Knowledge of IoT
Knowledge of IoTKnowledge of IoT
Knowledge of IoT
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
111 01 intro
111 01 intro111 01 intro
111 01 intro
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Edith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the SocietyEdith Turuka: Cyber-Security, An Eye Opener to the Society
Edith Turuka: Cyber-Security, An Eye Opener to the Society
 

More from Michael Lew

Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...Michael Lew
 
Big Data & Text Analytics - Lesson Schedule
Big Data & Text Analytics - Lesson ScheduleBig Data & Text Analytics - Lesson Schedule
Big Data & Text Analytics - Lesson ScheduleMichael Lew
 
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)Michael Lew
 
ICDL Image Editing (GIMP)
ICDL Image Editing (GIMP)ICDL Image Editing (GIMP)
ICDL Image Editing (GIMP)Michael Lew
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using OutlookMichael Lew
 
Online collaboration
Online collaborationOnline collaboration
Online collaborationMichael Lew
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of ITMichael Lew
 
Scenario (Evaluation)
Scenario (Evaluation)Scenario (Evaluation)
Scenario (Evaluation)Michael Lew
 
Manage online information
Manage online informationManage online information
Manage online informationMichael Lew
 
CE Diagnostic answers
CE Diagnostic answersCE Diagnostic answers
CE Diagnostic answersMichael Lew
 
OE Diagnostic Test Questions
OE Diagnostic Test QuestionsOE Diagnostic Test Questions
OE Diagnostic Test QuestionsMichael Lew
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...Michael Lew
 
ICDL Advanced Excel 2010 - Tutorial
ICDL Advanced Excel 2010 - TutorialICDL Advanced Excel 2010 - Tutorial
ICDL Advanced Excel 2010 - TutorialMichael Lew
 
Ecdl v5 module 7 print
Ecdl v5 module 7 printEcdl v5 module 7 print
Ecdl v5 module 7 printMichael Lew
 
Ecdl v5 module 6 print
Ecdl v5 module 6 printEcdl v5 module 6 print
Ecdl v5 module 6 printMichael Lew
 
Ecdl v5 module 5 print
Ecdl v5 module 5 printEcdl v5 module 5 print
Ecdl v5 module 5 printMichael Lew
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 printMichael Lew
 
Ecdl v5 module 3 print
Ecdl v5 module 3 printEcdl v5 module 3 print
Ecdl v5 module 3 printMichael Lew
 
Ecdl v5 module 2 print
Ecdl v5 module 2 printEcdl v5 module 2 print
Ecdl v5 module 2 printMichael Lew
 

More from Michael Lew (20)

Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
 
Big Data & Text Analytics - Lesson Schedule
Big Data & Text Analytics - Lesson ScheduleBig Data & Text Analytics - Lesson Schedule
Big Data & Text Analytics - Lesson Schedule
 
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
 
ICDL Image Editing (GIMP)
ICDL Image Editing (GIMP)ICDL Image Editing (GIMP)
ICDL Image Editing (GIMP)
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using Outlook
 
Online collaboration
Online collaborationOnline collaboration
Online collaboration
 
Secure Use of IT
Secure Use of ITSecure Use of IT
Secure Use of IT
 
Scenario (Evaluation)
Scenario (Evaluation)Scenario (Evaluation)
Scenario (Evaluation)
 
Manage online information
Manage online informationManage online information
Manage online information
 
CE Diagnostic answers
CE Diagnostic answersCE Diagnostic answers
CE Diagnostic answers
 
OE Diagnostic Test Questions
OE Diagnostic Test QuestionsOE Diagnostic Test Questions
OE Diagnostic Test Questions
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
 
ICDL Advanced Excel 2010 - Tutorial
ICDL Advanced Excel 2010 - TutorialICDL Advanced Excel 2010 - Tutorial
ICDL Advanced Excel 2010 - Tutorial
 
ICT Blog1
ICT Blog1ICT Blog1
ICT Blog1
 
Ecdl v5 module 7 print
Ecdl v5 module 7 printEcdl v5 module 7 print
Ecdl v5 module 7 print
 
Ecdl v5 module 6 print
Ecdl v5 module 6 printEcdl v5 module 6 print
Ecdl v5 module 6 print
 
Ecdl v5 module 5 print
Ecdl v5 module 5 printEcdl v5 module 5 print
Ecdl v5 module 5 print
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 print
 
Ecdl v5 module 3 print
Ecdl v5 module 3 printEcdl v5 module 3 print
Ecdl v5 module 3 print
 
Ecdl v5 module 2 print
Ecdl v5 module 2 printEcdl v5 module 2 print
Ecdl v5 module 2 print
 

Recently uploaded

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Recently uploaded (20)

What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

  • 1. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com ICDL CORE 1 – Concepts of ICT Test A (135 Questions) Q1. What is the name of the network that is often used by companies to share internal information? Intranet Infonet Webnet Widenet Q2. Which of the following can be used by a computer to connect to the internet? A mobile phone. An external hard disk. A scanner. A wireless headset. Q3. What is the same as a social networking Website? A virtual reality. An online community. A virtual server. An online database. Q4. How can the negative environmental impact of printers be effectively reduced? Never turn off the printer. Only print in black and white. Recycle paper and cartridges. Use inkjet printers Q5. What software is most useful for creating posters and slides? Database software Spreadsheet software Presentation software Word processing software Q6. Which is a multimedia player? Device A. Device B. Device C Device D Q7. Who is a typical desktop PC user? An IT support person that stays at workplace all day. An executive that frequently attends meetings in different location. A sales person that spends most of the time travelling. A student that needs a small and portable computer.
  • 2. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q8. How is entertainment, shows and other types of Web content ofen distributed? Via log files. Via text messages. Via compressed folders. Via podcasts. Q9. Why is some software called open source? Because users can download it from the Internet for free. Because users can use it for a limited period for free. Because users can use, improve and distribute it for free. Because users can receive software upgrades for free. Q10. How is legally purchased software recognised? The software should display a copyright text. The software should be on a DVD. The software should have a valid license. The software should have a large file size. Q11. Why is a hard disk required in a computer? To supply the computer with power. To prevent the computer from overheating. To enable the computer to store data. To provide the computer with wireless connectivity. Q12. What is an important data protection rule for a data controller? Data collection must always be approved of by the data subject. Data can only be processed if the collection was done with the last year. Data that is collected can be freely distributed to public authorities. Data must be collected for legitimate purposes and used accordingly. Q13. Which one of the following has the smallest storage capacity? A 100 MB hard disk. A 100 KB hard disk. A 100 TB hard disk. A 100 GB hard disk. Q14. What does the term ICT stand for? All the technologies that are used for computation and information. All the technologies that are used for the comtemplation of information. All the technologies that are used for communication and information. All the technologies that are used for the comprehension of information. Q15. What characterises a WLAN network? It only works indoors. It only works outdoors. It has a wired connection. It has a wireless connection. Q16. Which of the following is possible to share with other users online? Only photos. Only video clips. Only audio files. Any digital content.
  • 3. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q17. Why is ergonomics recognised as a way to improve the workplace? Good design can help employees to be healthier and more productive. Organisational psychology can help employees plan more efficiently. Massage therapy can help employees to be less tense and stressful. Communications technoloy can help employess communicate better. Q18. What is an important part of data protection legislation? To protect companies' access to public data. To protect archived information in general. To protect the infrastructure of the Internet. To protect the personal data of individuals. Q19. Which of the following is a type of internet connection? Infrared Broadband Bluetooth Firewall Q20. Which one of the following is most likely to involve a client/server relationship? Receiving software updates from the Internet. Installing computer hardware. Copying text between documents. Starting a personal computer. Q21. What is measured in kilobits per second? Mouse sensitivity Screen resolution Hard disk space Data transfer rate Q22. What is important for an anti-virus program to effectively find computer viruses? Make sure it is updated regularly. Make sure it is not a free program version. Make sure it is recently backed up. Make sure it is checking system files only. Q23. Which one of the following is most likely to connect to the Internet to be fully functional? A presentation application. An instant messaging application. An image editing application. A spreadsheet application. Q24. What is an input device? Printer Speaker Microphone Monitor Q25. Which measure should primarily be taken to protect information on a computer? A username and password should be required to log on. A router should be securing the computer from online attacks. The computer should be located in a locked room. The data on the hard drive should be encrypted.
  • 4. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q26. A file has arrived in an e-mail from an unknown sender. What is the best way to act from a security perspective? Save the file and delete the message. Scan the file for computer viruses. Ask the sender about the file. Disconnect from the Internet and open the file. Q27. What is an example of e-commerce? Online voting Online tax collection Online ticket sales Online census systems Q28. For whom would a screen magnifier be most useful? People who suffer from visual impairment. People who suffer from cognitive impairment. People who suffer from mobility impairment. People who suffer from hearing impairment. Q29. What characterises teleworking? Increased commuting More potential for teamwork Improved human contact Flexible hours Q30. Which is an output device? Device A Device B Device C Device D Q31. What is the best place to store a data backup from a security perspective? In a hidden folder on the computer's hard disk. In a visible folder on the computer's hard disk. In a different building than the computer. In the same building as the computer. Q32. What is actually happening when a user e-mails a picture? Data is being edited in system files. Data is being uploaded to a network. Data is being copied to a backup folder. Data is being deleted from the hard disk.
  • 5. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q33. What does a software end-user license agreement indicate? The price of the software. The usage terms for the software. The installation details for the software. The changes in the new version of the software. Q34. What is copyright? A special consumption tax on software. A programme initiated to raise the quality of software. A right for the consumer to freely copy commercial software. A term that covers the rights of the creator of music, books, software etc. Q35. What is the purpose of using a firewall? To increase the hard disk capacity. To prevent unauthorised computer access. To speed up the Internet connection. To disinfect data files that have computer virus. Q36. How can data theft be prevented most effectively? Combine the use of a password with a security lock. Connect to the Internet only during office hours. Hide important files in folders that are hard to find. Avoid bringing a laptop computer in public places. Q37. In which situation is Voice over Internet Protocol (VoIP) used? Downloading sound files from the Internet. Listening to music broadcasted on the Internet. Making telephone calls via the Internet. Uploading a recording of a lecture on the Internet. Q38. What is an important data protection right for an ordinary person (data subject)? The right to access other individuals personal data. The right to financial compensation in exchange for personal data. The right to access your own personal data. The right to remove all personal data from public databases. Q39. What characterises Random Access Memory (RAM)? RAM cannot store data when the computer is switched off. RAM can store data when the computer is switched off. Decreasing the amount of RAM decreases the computer's long-term storage capacity. Increasing the amount of RAM increased the computer's long-term storage capacity. Q40. From a security perspective, what is a simple but effective password policy? A password should be very easy to remember. A password should have no numbers. A password should never be revealed. A password should never be changed. Q41. What is Really Simple Syndication (RSS)? An electronic news service. A way to subscribe to updated Web content. A method of disinfecting computer viruses. A type of Internet connection.
  • 6. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q42. What is an effective energy saving option in computers? The option to automatically reduce the hard disk capacity. The option to automatically lower the sound level. The option to automatically turn off the screen. The option to automatically decrease the amount of RAM. Q43. How can physical wellbeing be ensured when working at a computer for long spells? Use eye relaxation techniques. Reduce the number of breaks. Turn up the workplace temperature. Dim the lighting in the office. Q44. What characterises a touchscreen? It is both an input and output device. It is both an internal and external device. It is both a monitor and a loudspeaker. It is both a monitor and a firewall. Q45. Which one of the following is most likely to speed up a computer? Increasing the number of input devices. Increasing the number of output devices. Changing to a processor with higher capacity. Changing to a power supply with higher capacity. Q46. Which one of the following is an example of hardware? An e-mail message. A keyboard. An operating system. A database. Q47. What characterises e-mail? E-mail enables easy and fast transmission of messages. E-mail enables voice communication between computer users. E-mail enables broadcasting of Web based multimedia content. E-mail enables free online mass storage of files. Q48. What is an example of software? CPU Mouse Operating System USB flash drive Q49. What is regarded as a serious health factor associated with computer use in the workplace? The height and width of the keyboard. The availability and transfer rate of the network. The direction and amount of indoor light. The size and speed of the hard disk. Q50. What is a Web log (Blog)? A database that stores usernames and passwords. A catalogue of popular Websites. An application that records visited Websites. An online journal that is regularly updated.
  • 7. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q51. What type of information should be shared with caution online? Holiday memories Hobby tips Personal information Forum comments Q52. What is true about operating systems software and applications software? The applications software is always installed first on a computer, then the operating systems software. The operating systems software is always installed first on a computer, then the applications software. The operating systems software can only interact with software, not hardware. The applications software can only interact with hardware, not software. Q53. What do Windows and Unix have in common? They are applications software. They are operating systems. They are hardware devices. They are broadband services. Q54. What characterises Instant Messaging (IM)? It is the same as electronic mail. It is real-time text communication. It is only available for wireless devices. It is mostly used when computers are offline. Q55. Which one of the following types of computer is most likely to be used by a travelling salesman? A desktop computer. A tablet PC. A server. A laptop. Q56. Which one of the following is a term for systems used to store, retrieve, process and transmit data? Internet & Communication Technology. Internet & Information Technology. Information & Communication Technology. Information & Computer Technology. Q57. Which one of the following measures the speed of the CPU? Gigahertz (GHz). Bits per second (Bps). Gigabytes (GB). Megabytes (MB). Q58. Which one of the following is a term for an audio or video recording posted on a web site that can be downloaded and played later? Podcast. Blog. VoIP. RSS Feed.
  • 8. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q59. Which one of the following describes a computer’s operating system? Software that can retrieve information from a database. Hardware that can scan and convert photographs into digital files. Software that controls the allocation and usage of hardware. Hardware that can record and send images across the Internet. Q60. Which one of the following types of software would you most likely use to create a letter? Web browsing software. Spreadsheet software. Accounting software. Word processing software. Q61. The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called? The Internet. A Local Area Network. The World Wide Web. A network port. Q62. Which one of the following is a private network that allows specified external users’ access? Intranet. WorldNets. Internet. Extranet. Q63. Which one of the following devices do you need to be able to communicate with other computers using the telephone network? CD-ROM. Modem. Printer. Speakers. Q64. Which one of the following is a software application that assists users who are visually impaired to identify and interpret what is displayed on screen? A screen calendar. A word processor. A screen reader. A web log. Q65. Which one of the following is a common feature of e-learning? Always requires physical class attendance. Cannot download documents for later reading. Learning is self-paced. Travel time and costs are very high. Q66. Which one of the following is NOT a feature of electronic commerce? Goods can be advertised and prices compared. There is physical contact between buyer and seller. Transactions can be processed quickly. Services are available 24 hours a day. Q67. Which one of the following is the best way to maintain a good posture? Ensure your computer is in a well-lit area. Make sure that there are no cables on the floor. Make sure that your computer is using a fast processor. Make sure that your computer; desk and chair are positioned correctly.
  • 9. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q68. Which one of the following statements describes a good approach to information security for an organisation? There are no procedures for reporting security lapses. Staff passwords are not changed regularly. Sensitive data is available to everyone that requests it. Keeping an off-site backup of all files. Q69. Which one of the following is a good password policy for an organisation? All passwords are changed regularly. All passwords are never changed. All passwords are made up of less than four characters. All passwords are made up of less than four numbers. Q70. Which one of the following is the best way to protect a computer against computer viruses? Only virus-check e-mail attachments. Update antivirus software on a regular basis. Always make sure that the operating system is up to date. Only download files from the Internet during business hours. Q71. Which one of the following statements describes shareware? Totally free software that is available only on the Internet. Commercial based software that must be paid for. Software available for free on a trial basis after which payment will be required. Copyright free software that allows unlimited copies and distribution. Q72. There are rules governing the rights of a data subject and the responsibilities of a data controller. What are these rules called? Data Privacy Policy. Data Management Act. Data Protection legislation or conventions. Data Publicity Law. Q73. Which one of the following is an example of hardware? An antivirus program. A spreadsheet application. A mouse. The World Wide Web. Q74. Which one of the following would improve computer performance? Using a larger monitor. Increasing the number of applications running. Using a faster printer. Increasing the size of RAM. Q75. Which one of the following is NOT a function of the Central Processing Unit? Executing program instructions. Ensuring program instructions are executed in the correct sequence. Sending e-mail. Carrying out calculations. Q76. Which one of the following is both an input and output device? Touchscreen. Keyboard. Printer. Scanner.
  • 10. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q77. Which one of the following is a method of publishing frequently updated content such as news headlines online? A blog. RSS. A podcast. Instant messaging. Q78. Which one of the following is an example of an operating system? iTunes. PowerPoint. Windows. Netscape. Q79. Which one of the following is considered good environmental practice? Using a slow computer. Printing on both sides of a page. Using up to date software. Backing up data on a regular basis. Q80. Which one of the following statements about the Internet is TRUE? The Internet is a global network that links many computer networks together. The Internet is a private company network. The Internet is a visual representation of linked documents. The Internet is a network operating system. Q81. Which one of the following is an input/output port? Linear. Radial. Lateral. FireWire. Q82. Which one of the following is an advantage of teleworking? Long commuting times. Flexible schedules. Less emphasis on teamwork. Lack of human contact. Q83. Which one of the following is a characteristic of broadband? Completely safe from intruders. It has a dial up connection. High speed. Cost can vary from day to day. Q84. Which one of the following is a text-based communication between two or more people over the Internet? Podcasting. Really Simple Syndication. Voice over Internet Protocol. Instant Messaging. Q85. Which one of the following practices helps create a good ergonomic working environment? Protecting computer monitors from reflections and glare by correct positioning. Taking very few breaks away from the computer. Keeping the office cold and using low overhead lighting. Use of non-adjustable chairs when working with computers.
  • 11. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q86. Why is it necessary for an organisation to adopt a good password policy? To allow easy sharing of files across the company network. To make it easier for the computer to connect to a network. To protect files against unauthorized use. To make it easier to find files on a computer. Q87. Which one of the following is a way to prevent the theft of data from a computer? Use an up to date anti-virus program. Back up data on a regular basis. Remove the monitor when not in use. Set up a username and password. Q88. Which one of the following should be carried out to safeguard files from loss in case the main copy is damaged? Backup files to a new location on your computer. Install password security. Backup the files regularly and store offsite. Install a firewall. Q89. Which one of the following could allow a virus to enter a computer? Downloading files from the Internet onto the computer. Connecting the computer to a new printer. Running a virus scan on the computer. Setting the computer monitor to a low resolution. Q90. Which one of the following statements about an End User License Agreement is true? It gives full ownership of the software to the user of the software. It gives the user the exclusive right to copy and sell the software to other potential users. It gives the user the right to modify the software. It gives the user the right to install and run the software on a specified number of computers. Q91. What is the name of the law for the storage and use of data in the UK? Details Provision Act Data Protection Authority Data Privacy Authority Data Protection Act Q92. What is the best way to prevent a computer virus from entering your computer? Log out of your computer each time you have finished using it Install and use anti-virus software on your computer Do not use emails on your machine Make sure all your files are safely stored to your floppy disks Q93. What does RSI stand for? Repeated Strain Inclusion Regular Systems Initiation Routine Structures Infection Repetitive Strain Injury Q94. Health and safety is important when working with computers, which of the following will help to prevent injuries? Always use screen savers Ensure the office is air conditioned All trailing cables should be secured Turn the lights off at the end of the day
  • 12. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q95. Which of the following systems will help to improve communications within the company? Excel Powerpoint Email Solitaire Q96. Which is a use of e-commerce on the internet? Checking flight availability Searching for a suitable holiday Researching holiday destinations Booking a holiday Q97. Which of the following would you use to find information on the internet? Email Word Processor Search Engine Photo Editor Q98. In the home, which of the following would you use the internet for? Storing friends and family names and addresses Researching information for homework Storing your files Re-booting your computer Q99. Which is the MAIN advantage of using a network system in the office? Allows sharing of data Regular backups Costs are reduced Office procedures can be automated Q100. Which of the following software manages the files and folders on your computer's hard disk drive? Applications software Anti-virus software Systems software Utilities software Q101. Identify the computer port shown? Serial Port USB Port Parallel Port Network Port Q102. What has got to do with bandwith of transmission? CPU speed Data transfer rate RAM capacity Speed of printer Q103. Identify the computer port? Firewire Port USB Port Parallel Port Serial Port
  • 13. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q104. What does firewall do? Protect against virus infection Monitor network activities Protect your hardware Prevent software from catching fire Q105. Identify this computer port? USB Port Parallel Port Network Port Firewire Port Q106. What is the usage of firewall? Prevent virus infection Prevent computer from catching fire Monitor transmission of data Prevent hardware from burning Q107. Which computer port is shown in this picture? Network Port Serial Port Firewire Port Parallel Port Q108. What determines the data transfer rate? RAM capacity Hard disk speed Bandwidth of transmission CPU clock speed Q109. Identify this computer port shown in the diagram? Network Port Serial Port Parallel Port Firewire Port Q110. Which software application would you use to create a report? Excel Powerpoint Word Publisher Q111. Which of the following is NOT an input device? Monitor Mouse Keyboard Scanner Q112. What does GUI stand for? General Utilities Intervention Graphical User Interface General User Intervention Graphical Utilities Interface
  • 14. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q113. What of these is an input device? CD-Rom Mouse Printer Zip drive Q114. Which of these computer based operations uses barcode input? Marking on online test paper Issuing a book in a library Paying for goods using a credit card Ordering goods from a web site Q115. Which type of memory holds the basic operating system commands? ROM RAM Cache Auxiliary Q116. Which of these storage devices holds the most data? Floppy disk DVD drive Hard Disk drive Thumb drive Q117. Which type of software would you use to prepare a budget forecast? Word Processing Database Presentation Spreadsheet Q118. Which of these is an output device? CD-ROM Mouse Printer Scanner Q119. Which of these is a characteristic of electronic mail that does not apply to other methods? Attachments can be sent Messages can be sent to more than 1 person Mail may get lost Can only send to some people Q120. Which upgrade will have the most impact on the performance of your computer? Adding more RAM Reducing the peripheral devices Adding a network card Fitting a second hard disk Q121. What type of software controls the file system on the computer? GUI Network software Operating system software Application software
  • 15. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q122. Which is the smallest unit of computer storage? Byte Bit Kilo bit Megabyte Q123. Which type of software is used to access the Internet? Interface Presentation Browser System Q124. What is connected in a LAN? Computers on one site Computers in many sites Computers in one office Computers on the Internet Q125. Which type of software would you use to store customer data? Database Spreadsheet Presentation Word Processing Q126. How are computers in a WAN connected? Cables Telephone lines Internet Intranet Q127. Why is it important to make regular back-ups of computer data? To prevent loss of data To comply with the law To protect the computer To increase the storage company Q128. Your cable modem runs at 10 Mbps. What does this represent? Speed of your computer Speed of transferring data Speed of your hard disk Speed of cache memory Q129. Where should you store back up copies of your data? Near to the computer In a different location In your car In an off-site fire proof store Q130. You have a modem and a telephone connection. What else do you need to connect your computer to the Internet? Browser and printer ISP account and printer ISP account and network Browser and ISP account
  • 16. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q131. Which of these describe a computer program? An input device A set of instructions An interactive user guide A help system Q132. You have installed more memory in your computer. What type of memory is this? Cache Virtual ROM RAM Q133. Which type of computer is used to process large amounts of corporate data? Notebook Mainframe Mini computer Desktop Q134. Which is the best way of protecting a computer system from unauthorised use? Ensuring all users have passwords Locking the office Using a screensaver Maintaining an audit trail Q135. Which of these devices can be used to input and output information? Scanner Printer Bar Code Reader Touch Screen Test B (135 Questions) Q1. Which type of system is used to provide information for employees within a company? Internet Intranet Extranet Electronic mail Q2. Which of these is an example of an e-commerce activity? Viewing a travel timetable Checking theatre availability Downloading a screen saver Booking a flight Q3. Which of these is always an advantage of buying goods online? Longer opening hours Greater choice Personal service Cheaper prices
  • 17. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q4. Which is a ‘laptop’ or a ‘notebook’? A diary or timetable application A portable PC An electronic organiser A simple word processor Q5. Which is the main factor in the growth of the ‘Information Society’? Multimedia computers Faster processors Modems Internet Q6. Which device would you use to draw shapes on the screen? Scanner Mouse Optical Character Reader Plotter Q7. Which of these tasks is a function of the operating system? Adding slides in presentation Copying a file Producing a database report Adding data to a spreadsheet Q8. Why is it important that you have adequate lighting when using a computer? To avoid back injuries To avoid radiation To avoid repetitive strain injuries To avoid eyestrain and headaches Q9. Which of these is an input device? Monitor Speaker Scanner Plotter Q10. Most computers are operating using icons and a mouse. What is this system called? Graphical user interface Object oriented environment Symbolic user interface Command line interface Q11. Which is most likely to happen after a power cut? You can restart the computer and carry on with the same work The computer will not function All unsaved work is lost Your disk drive will be damaged Q12. Which of the following devices is used to control the software in a games programme? Keyboard Bar Code reader Joystick Light pen
  • 18. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q13. Which of the following devices sends information from the user to the computer? Keyboard System unit Monitor Printer Q14. The computers in your office are connected together so staff can share files and printers. What is this arrangement of computers called? LAN ISDN TCP/IP WAN Q15. A Library has a database of all its books. There are over 100,000 books and each record has Title, Author, Publisher, ISBN, date and description. What storage amount is required for the database? 1 byte 1 Kilobyte 1 Megabyte 1 Gigabyte Q16. Which of the following NOT a permanent storage medium? Hard disk CD-ROM RAM USB Thumb Drive Q17. Poor postures at the computer can cause backache and other problems. Which is the best way of avoiding these problems? Sitting at the recommended distance from the monitor Making sure your chair is the correct height Using a mouse to operate programs Switching off the computer when not in use Q18. Which of the following is the MAIN advantage of a network system? Increased speed of operation Reduces cost Allows sharing of data Backs up data Q19. Which type of software controls the allocation of resources in the computer? Application software Operating system software Browser software Utility software Q20. A shareware program is best described as.... a program which may be downloaded and used for a trail period, but must be bought afterwards a program developed by a single team and accessible by anyone in the world a program installed on a Web site and executable on any system in the world a free program developed by students
  • 19. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q21. Which of the following is an example of the use of e-commerce on the Internet? Checking theatre availability Booking train tickets Using e-mail Downloading information Q22. Health and safety issues are important when using a computer. To avoid risk of injury, which of the following should always be TRUE? Trailing cables should be secured Screen savers should be installed A mouse mat should always be used Power extension cables should be used Q23. Which is the best way of protecting data from loss? Make regular backups of the data Delete all your old files Lock your computer Change your password Q24. There are rules governing the storage and supply of computer based information. What are these rules called? Data Prohibition Law Data Protection Act Data Storage Act Data Supply Policy Q25. Which of the following systems would improve communication within a company? Office Software Electronic mail Project Management Database Q26. Which device could you use for the output of a music file? Microphone Speaker Digitiser Speech synthesiser Q27. Which software would you use for creating a set of slides to be shown to an audience? Database Presentation Desk Top Publishing Spreadsheet Q28. Which of these statements about Read Only Memory (ROM) is TRUE? Application programs can write data to the Read Only Memory The contents of the Read Only Memory are not deleted when the computer is switched off. The operating system is loaded into the Read Only Memory when the computer is started. Internet pages are stored in the Read Only Memory while they are being loaded. Q29. Which of the following is a problem when downloading files from the internet? The files may not be able to be removed The display settings on you computer may be changed The cache memory on your compute may become full Viruses may be introduced to you computer
  • 20. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q30. The Data Protection Acts is designed to... Make personal data freely available Create a permanent store for personal data Regulate the use of personal data Enforce deletion of personal data Q31. What is most likely to be affected by a computer virus? Your monitor Your data The speed of your computer Read only memory Q32. What is controlled by software copyright regulation? Making backups of the software Number of copies sold Type of computer used for the software Illegal distribution of software Q33. Which type of software would you use to maintain information about account holders at a Bank or Building Society? Spreadsheet Word processor Database Stock Control Q34. What is a trackball? A monitoring system A type of speaker An alternative to the mouse A storage device Q35. Which type of software can you use without having to pay a fee? Freeware Shareware Operating system Application software Q36. Which of these is a hand held device that stores appointments? Notebook Desktop Mini computer Personal Digital Assistant (PDA) Q37. Which is the BEST way of preventing loss of your data if there is a power cut? Use a filtered plug Make frequent back ups of the data Ensure passwords are used Install virus checking software Q38. Which of these is NOT a benefit of e-mail? Ability to send attachments Receiving junk mail Instant delivery of your message Sending to more than one person at once
  • 21. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q39. What is the main advantage of a GUI? Reduces the cost of computing Makes the computer easier to use Required a less powerful computer Does not need updating Q40. Which device would you use to digitise a photograph? Mark reader Data logger Scanner Plotter Q41. Which of these is NOT an input device? Digital camera Microphone Scanner Speaker Q42. There are Laws governing the use of software to prevent people from making illegal copies of software. Which of the following is the best way to prevent this from happening? Labelling the software Using a code to unlock the software Sending offenders to prison Requiring passwords for copying Q43. Which of the following is a storage device? Keyboard Monitor Speaker Disk Drive Q44. Which of the following statements is NOT TRUE in relation to the Data Protection Act? The data user must ensure that the information... Is obtained fairly and accurately Is stored with proper security Is accurate and up to date Can be sent abroad at any time Q45. For which of these tasks would you use a search engine? To find files on your computer To track new network To detect viruses on your computer To find information on the world Wide Web Q46. Which of these is the major benefit of e-Learning? Easier Cheaper Reduced contact with other students Available at any time Q47. Which of these is a characteristic of RAM? Cannot be erased Lost when the power is switched off Stores data downloaded from the Internet Holds system commands
  • 22. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q48. Which of the following is NOT an output device? Keyboard Monitor Printer Speaker Q49. Purchasing goods on a web site is an example of... Web site design Net working Electronic commerce Search engine Q50. Which type of memory is used to store applications while they are running? ROM RAM Cache Auxiliary Q51. Which of these is NOT a storage device? RAM USB Thumb Drive Printer Hard Disk Drive Q52. Computers can damage your health in various ways. Which is the best way of preventing this? Taking frequent breaks Having good lighting Using a screen protector Raising the height of the monitor Q53. You want all users to be able to view data in a computer system and selected users to be able to enter and change the data. How can you achieve this? Allow unrestricted access to the system Give unauthorised users a password Set access rights for different groups of users Allocated keys to authorised users Q54. Which type of computer stores the common files in a network? Main frame Laptop Desktop Server Q55. What does CPU stand for? Central Power Unit Computer Processing Unit Computer Programming Unit Central Processing Unit Q56. What is a computer virus? A program that can damage your computers A hardware fault A program that you have downloaded from an Internet site A corrupted area of your disk
  • 23. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q57. You can help to preserve the environment by..... Using a screen saver Recycling printer cartridges Using a filtered plug Using a smaller screen Q58. Which type of computer is used to operate large corporate systems and databases? Desktop computer Personal Digital Assistant (PDA) Mainframe Laptop Q59. Which of the following describes the essential components of Information & Communication Technology? Primary, secondary and cache memory RAM and ROM Hardware, software and communications technologies Hardware and shareware Q60. The speed of the Modem is measured in: Megahertz (MHz) Bits per second (Bps) Gigabytes (GB) Megabytes (MB) Q61. Which of the following statements about formatting the disk for the first time is true? Formatting prepares the disk to store data Formatting backs up data onto the disk Formatting copies the disk Formatting unlocks the disk Q62. Which of the following tasks is a function of the operating system? Adding data to a spreadsheet Producing a database report File management Producing a presentation Q63. Which software would you use to search for information in the internet? Web browsing software Spreadsheet software Accounting software Word processing software Q64. The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called? FTP LAN WWW HTTP Q65. An intranet is: A network operating system A network filing system A private company network A private company network that includes external specified users
  • 24. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q66. Which of the following devices do you need to be able to communicate with other computers using the telephone network? CD-ROM Modem Plotter Speakers Q67. Computer use can cause repetitive strain injury (RSI). Which of the following is the best way to avoid this? Ensure your computer is in a well-lit area Use an operator chair without arms Place your monitor at the correct height Work with your wrists level with the keyboard Q68. Which of the following statements describes a good approach to information security for an organisation? No procedures for reporting security lapses Staff passwords are not changed regularly Sensitive data is available to everyone Computer systems are backed up on a regular basis Q69. What is the best way of preventing your computer from being infected with a virus? Only virus-check e-mail attachments Have updateable anti-virus software running on your computer Have anti-virus software running on your computer Never open any e-mail attachments Q70. Which of the following statements describes shareware? Shareware is software without copyright protection Shareware is free software Shareware is software you may pay for after an initial time period of use Shareware is software you can use in any way Q71. There are rules governing the storage and supply of computer-based information. What are these rules called? Data Privacy Policy Data Management Act Data Protection Act Data Publicity Law Q72. Which of the following would be considered a portable computer? Workstation Mainframe Laptop Desktop computer Q73. Disk formatting is used to: Find files on a disk Lock a disk Unlock a disk Prepare a disk to store files
  • 25. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q74. Which of the following is an operating system? Excel PowerPoint 2007 Windows XP Netscape Q75. What is ISDN? Integrated Standard Digital Networks Integrated Services Digital Network Interactive Standard Dynamic Networks Internet Services Data Network Q76. If you were working from home, what software application could be used to communicate directly with colleagues and customers? Presentation Electronic mail (e-mail) Database Spreadsheet Q77. Which of the following practises helps create a good ergonomic working environment? Protecting computer monitors from reflections and glare by correct positioning Taking infrequent breaks away from the computer Keeping the office cold and using low overhead lighting Use of non-adjustable chairs when working with computers Q78. Which of the following can be an advantage of electronic documents? They can never be lost They can always be e-mailed regardless of size They can reduce the usage of paper They can never be copied Q79. Which of the following activities could lead to the spread of a computer virus? Using thumb drive from unknown sources to exchange data Using a standalone computer to output a hard copy letter Using retail software that has been checked for viruses Using a Graphical User Interface (GUI) Q80. An End User License Agreement: Is a form of advertising between a software application author or publisher and the user Gives the user the exclusive right to copy and sell the software to other potential users Grants ownership of the software to the user of the software Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, resale, and restricted use Q81. Which one of the following describes spam? Gathering information about a person or organisation without their knowledge. Performing an unauthorised, usually malicious, action such as erasing files. Putting unnecessary load on the network by making copies of files. Sending unwanted bulk messages. Q82. Which one of the following could lead to the spread of a malicious program? Using only software that has been checked for viruses. Maintaining regularly updated anti-virus software. Opening only virus-checked file attachments from known sources. Using a USB Flash Drive from an unknown source to exchange data.
  • 26. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q83. Which one of the following protects a computer from the risk of malicious programs? PC diagnostic software. Web tracking software. Anti-spam software. Anti-spyware software. Q84. Which one of the following describes why it is important to update antivirus software regularly? To ensure the software identifies old viruses. To protect your computer from all known viruses. To protect your computer from unwanted bulk messages. To prevent the spread of malicious programs on the Internet. Q85. Which one of the following describes a computer hacker? A skilled programmer who uses authorised access to exploit information available on a computer. A skilled programmer who secretly invades computers without authorisation. A skilled programmer who writes programs to train new employees. A skilled programmer who helps in the installation of new software for an organisation. Q86. Which one of the following describes why firewalls are used? To prevent unauthorised access by incoming transmissions. To prevent destruction of a computer in the event of a fire. To enable easy downloading of data from web sites. To detect and disable viruses already on a computer. Q87. Which one of the following is the reason that users should log on with a username and password? To be aware of who is in the building. To check up on the time-keeping of users. To protect computers against unauthorised use. To enable a personalised greeting for each user. Q88. Which one of the following statements about a password is TRUE? It must be changed only if it is compromised. It cannot contain special character symbols. It should be changed regularly. It must be registered with the system administrator. Q89. Which one of the following should be used to change your password in your computer? Internet Explorer. Anti-virus software. Control Panel Windows Firewall. Q90. Which one of the following shows respect for confidentiality of information? Discussing confidential information over the telephone. Uploading confidential information to a shared web site. Emailing confidential information to a colleague. Disclosing confidential information only to authorised individuals. Q91. Which one of the following describes why users should lock their computer when leaving their desk? To prevent a waste of electricity. To prevent unauthorised access to data. To prevent data from getting corrupted. To prevent the computer from malfunctioning.
  • 27. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q92. Which one of the following is an example of phishing? An email warning the recipient of a computer virus threat. An email directing the recipient to forward the email to friends. An email directing the recipient to enter personal details on a fake website. An email directing the recipient to download an attachment. Q93. Which one of the following is unsafe online activity? Giving your home address to someone you met in a chat room. Using a screen name or nick name that cannot identify you. Meeting someone you met online face-to-face in the company of your parents. Keeping your social network profile private. Q94. Which one of the following describes how confidential information should be sent using an unsecured network? In an unsigned email. In an attachment. In a compressed format. In an encrypted format. Q95. Which one of the following statements about wireless networks is TRUE? They cannot be intercepted by unknown users. They limit accessibility to other users. They limit visibility to other users. They can be accessible to other users. Q96. Which one of the following describes Bluetooth? Short-range wired protocol for exchanging data. Short-range wireless protocol for exchanging data. Long-range wireless protocol for exchanging data. Long-range wired protocol for exchanging data. Q97. Which one of the following describes why Bluetooth device settings should be adjusted? To increase the range of the device. To improve the quality of reception. To prevent the risk of unauthorised access. To reduce interference from other devices. Q98. Which one of the following should you do to ensure that your USB storage device is kept safe and secure? Only use it in private surroundings. Do not access it using a Bluetooth device. Use firewall software. Never leave it unattended. Q99. Which one of the following departments would usually hold guidelines and procedures for the secure use of IT within an organisation? The Marketing Department. The IT Department. The Sales Department. The Finance Department. Q100. Which one of the following describes why you should follow guidelines and procedures while using IT resources in an organisation? To ensure easy access to information on your computer. To ensure the secure use of IT resources.
  • 28. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com To ensure the IT Department is able to monitor all activity. To ensure the Finance Department is able to monitor the costs of IT resources. Q101. Which one of the following describes how a breach in IT security should be reported? Using the telephone. By emailing to the IT Manager. Using the method listed in the organisation’s security policy. Using any means of communication. Q102. Which one of the following would prevent the theft of a laptop? Anti-virus software. A webcam. Spyware. A security cable and lock. Q103. Which one of the following would NOT happen if a computer suddenly malfunctions? The operating system will fail. Files saved on the hard drive will be lost. All off-site backups will be lost. Some software may have to be reinstalled. Q104. Which one of the following should you use to backup personal data? A labelled CD. A printout. A website offering a file sharing service. A friend’s computer. Q105. Which one of the following describes why it is important to have a secure off-site backup copy of files? To improve accessible of files from other locations. To speed up the process of accessing the files at any time. To prevent the loss of data in the event of a fire. To reduce the possibility of data theft. Q106. Which one of the following describes how software can be stored safely? Storing it in a fireproof safe. Storing it in a cupboard. Storing backups of the software. Storing it close to the computer. Q107. Which of The Following Can Convert The Computer Signals From Digital To Analog? ISDN Modem DSL HDSL Q108. The Speed of the Central Processing Unit is measured in Mega hertz Hectares Revolutions per minute. Bits per second Q109. Which one of the following printers uses a toner in printing? Laser Dot matrix
  • 29. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Ink jet Bubble jet Q110. Which one of these statements is False? A network of computer linked within a building is called a LAN Databases can be accessed by many users who connected to a LAN. A network-linking computer over cities countries is called WAN Applications cannot be shared over a LAN. Q111. Which of the following statements is True? A mainframe computer enables users to share files, printers and other resources. Minicomputer enables users to share files, printers and other resources. A laptop computer enables users to share files, printers and other resources. Network computer enables users to share files, printers and other resources. Q112. Which of the following statements is TRUE? ROM loses information when the computer is powered off. ROM chips can be plugged into the motherboard to provide more memory. ROM can't be written to , it's pre-programmed. ROM data can be written when you are loading an application software Q113. One byte is equivalent to: 2 bit 8 bit 16 bit 4 bit Q114. What hardware helps you input data and give commands? Pointer Mouse Keyboard Scanner Q115. RAM Can Hold the Data And Programs Which In Currently Use, It Is UN Volatile Memory. True False Q116. Peripherals Devices Are Part of Hardware? True False Q117. What Device Prints the output on paper. Scanner Touch Screen Printer CPU Q118. Which printer type would MOST likely produce the most noise? Dot Matrix Inkjet Laser Thermal Q119. Which of the following requires power to be on in order to maintain the data it stores?
  • 30. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com ROM RAM Hard Disk USB Flash Disk Q120. Which one of these computers is too expensive? Minicomputer Lap top Mainframe Tablet Q121. When working away from the office a sales representative might typically use which type of computer? Desktop computer. Laptop computer An analogue computer A mainframe computer Q122. Special plastic cards containing a processor and memory are used to pay for goods and services. Each time the card is used the details on the card are updated. What is the name of such a card? Magnetic card Memory card Smart card Processor card Q123. Which computer would typically be the cheapest to buy? Desktop computer Laptop computer Mainframe computer Mini computer Q124. Which of the following would be the slowest device for accessing data? Floppy Disk Hard Disk USB Flash Drive DVD Q125. Which of the following would be the fastest device for accessing data? Floppy Disk DVD Hard Disk Magnetic Tape Drive Q126. Which of the following is hardware? A database A spreadsheet A mouse An operating system Q127. Which of the following is a peripheral device? Display Card CPU RAM Printer
  • 31. ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com Q128. The generic name of the devices, which are connected to externally, and controlled by, the central processing unit, is: Keyboards RAM Monitors Peripherals Q129. Which of the following printers is the most suitable for a secretary to produce the final copy of a document? Dot matrix Laser Plotter Any of them Q130. Which type of memory is used to store the current status of computer application whilst it is being processed? EPROM PROM ROM RAM Q131. Small businesses often use computer system to run the company. Typically it is most likely to be: A Mainframe computer A microprocessor A mini computer A personal computer Q132. Which of the following could be considered typical users of a mainframe computer? A bank A school A doctor's surgery A small business Q133. Which list shows the correct order of memory capacity for these computers, smallest first? Mainframe computer, personal computer and minicomputer Personal computer, minicomputer and mainframe computer. Personal computer, mainframe computer and minicomputer Mainframe computer, minicomputer and personal computer. Q134. Which of these is an input device? CD-ROM Mouse Printer Speaker Q135. Your modem runs at 2M bps. What does this represent? Speed of your computer Speed of transferring data Speed of your hard disk Speed of cache memory