ecdl/icdl module 1 - concepts of ict (information and communication technology) - question &...

31
ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com ICDL CORE 1 Concepts of ICT Test A (135 Questions) Q1. What is the name of the network that is often used by companies to share internal information? Intranet Infonet Webnet Widenet Q2. Which of the following can be used by a computer to connect to the internet? A mobile phone. An external hard disk. A scanner. A wireless headset. Q3. What is the same as a social networking Website? A virtual reality. An online community. A virtual server. An online database. Q4. How can the negative environmental impact of printers be effectively reduced? Never turn off the printer. Only print in black and white. Recycle paper and cartridges. Use inkjet printers Q5. What software is most useful for creating posters and slides? Database software Spreadsheet software Presentation software Word processing software Q6. Which is a multimedia player? Device A. Device B. Device C Device D Q7. Who is a typical desktop PC user? An IT support person that stays at workplace all day. An executive that frequently attends meetings in different location. A sales person that spends most of the time travelling. A student that needs a small and portable computer.

Upload: michael-lew

Post on 22-Jan-2015

11.031 views

Category:

Education


2 download

DESCRIPTION

ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

TRANSCRIPT

Page 1: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

ICDL CORE 1 – Concepts of ICT Test A (135 Questions)

Q1. What is the name of the network that is often used by companies to share internal information?

Intranet Infonet Webnet Widenet

Q2. Which of the following can be used by a computer to connect to the internet?

A mobile phone. An external hard disk. A scanner. A wireless headset.

Q3. What is the same as a social networking Website?

A virtual reality. An online community. A virtual server. An online database.

Q4. How can the negative environmental impact of printers be effectively reduced?

Never turn off the printer. Only print in black and white. Recycle paper and cartridges. Use inkjet printers

Q5. What software is most useful for creating posters and slides?

Database software Spreadsheet software Presentation software Word processing software

Q6. Which is a multimedia player?

Device A. Device B. Device C Device D

Q7. Who is a typical desktop PC user?

An IT support person that stays at workplace all day. An executive that frequently attends meetings in different location. A sales person that spends most of the time travelling. A student that needs a small and portable computer.

Page 2: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q8. How is entertainment, shows and other types of Web content ofen distributed?

Via log files. Via text messages. Via compressed folders. Via podcasts.

Q9. Why is some software called open source?

Because users can download it from the Internet for free. Because users can use it for a limited period for free. Because users can use, improve and distribute it for free. Because users can receive software upgrades for free.

Q10. How is legally purchased software recognised?

The software should display a copyright text. The software should be on a DVD. The software should have a valid license. The software should have a large file size.

Q11. Why is a hard disk required in a computer?

To supply the computer with power. To prevent the computer from overheating. To enable the computer to store data. To provide the computer with wireless connectivity.

Q12. What is an important data protection rule for a data controller?

Data collection must always be approved of by the data subject. Data can only be processed if the collection was done with the last year. Data that is collected can be freely distributed to public authorities. Data must be collected for legitimate purposes and used accordingly.

Q13. Which one of the following has the smallest storage capacity?

A 100 MB hard disk. A 100 KB hard disk. A 100 TB hard disk. A 100 GB hard disk.

Q14. What does the term ICT stand for?

All the technologies that are used for computation and information. All the technologies that are used for the comtemplation of information. All the technologies that are used for communication and information. All the technologies that are used for the comprehension of information.

Q15. What characterises a WLAN network?

It only works indoors. It only works outdoors. It has a wired connection. It has a wireless connection.

Q16. Which of the following is possible to share with other users online?

Only photos. Only video clips. Only audio files. Any digital content.

Page 3: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q17. Why is ergonomics recognised as a way to improve the workplace?

Good design can help employees to be healthier and more productive. Organisational psychology can help employees plan more efficiently. Massage therapy can help employees to be less tense and stressful. Communications technoloy can help employess communicate better.

Q18. What is an important part of data protection legislation?

To protect companies' access to public data. To protect archived information in general. To protect the infrastructure of the Internet. To protect the personal data of individuals.

Q19. Which of the following is a type of internet connection?

Infrared Broadband Bluetooth Firewall

Q20. Which one of the following is most likely to involve a client/server relationship?

Receiving software updates from the Internet. Installing computer hardware. Copying text between documents. Starting a personal computer.

Q21. What is measured in kilobits per second?

Mouse sensitivity Screen resolution Hard disk space Data transfer rate

Q22. What is important for an anti-virus program to effectively find computer viruses?

Make sure it is updated regularly. Make sure it is not a free program version. Make sure it is recently backed up. Make sure it is checking system files only.

Q23. Which one of the following is most likely to connect to the Internet to be fully functional?

A presentation application. An instant messaging application. An image editing application. A spreadsheet application.

Q24. What is an input device?

Printer Speaker Microphone Monitor

Q25. Which measure should primarily be taken to protect information on a computer?

A username and password should be required to log on. A router should be securing the computer from online attacks. The computer should be located in a locked room. The data on the hard drive should be encrypted.

Page 4: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q26. A file has arrived in an e-mail from an unknown sender. What is the best way to act from a security perspective?

Save the file and delete the message. Scan the file for computer viruses. Ask the sender about the file. Disconnect from the Internet and open the file.

Q27. What is an example of e-commerce?

Online voting Online tax collection Online ticket sales Online census systems

Q28. For whom would a screen magnifier be most useful?

People who suffer from visual impairment. People who suffer from cognitive impairment. People who suffer from mobility impairment. People who suffer from hearing impairment.

Q29. What characterises teleworking?

Increased commuting More potential for teamwork Improved human contact Flexible hours

Q30. Which is an output device?

Device A Device B Device C Device D

Q31. What is the best place to store a data backup from a security perspective?

In a hidden folder on the computer's hard disk. In a visible folder on the computer's hard disk. In a different building than the computer. In the same building as the computer.

Q32. What is actually happening when a user e-mails a picture?

Data is being edited in system files. Data is being uploaded to a network. Data is being copied to a backup folder. Data is being deleted from the hard disk.

Page 5: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q33. What does a software end-user license agreement indicate?

The price of the software. The usage terms for the software. The installation details for the software. The changes in the new version of the software.

Q34. What is copyright?

A special consumption tax on software. A programme initiated to raise the quality of software. A right for the consumer to freely copy commercial software. A term that covers the rights of the creator of music, books, software etc.

Q35. What is the purpose of using a firewall?

To increase the hard disk capacity. To prevent unauthorised computer access. To speed up the Internet connection. To disinfect data files that have computer virus.

Q36. How can data theft be prevented most effectively?

Combine the use of a password with a security lock. Connect to the Internet only during office hours. Hide important files in folders that are hard to find. Avoid bringing a laptop computer in public places.

Q37. In which situation is Voice over Internet Protocol (VoIP) used?

Downloading sound files from the Internet. Listening to music broadcasted on the Internet. Making telephone calls via the Internet. Uploading a recording of a lecture on the Internet.

Q38. What is an important data protection right for an ordinary person (data subject)?

The right to access other individuals personal data. The right to financial compensation in exchange for personal data. The right to access your own personal data. The right to remove all personal data from public databases.

Q39. What characterises Random Access Memory (RAM)?

RAM cannot store data when the computer is switched off. RAM can store data when the computer is switched off. Decreasing the amount of RAM decreases the computer's long-term storage capacity. Increasing the amount of RAM increased the computer's long-term storage capacity.

Q40. From a security perspective, what is a simple but effective password policy?

A password should be very easy to remember. A password should have no numbers. A password should never be revealed. A password should never be changed.

Q41. What is Really Simple Syndication (RSS)?

An electronic news service. A way to subscribe to updated Web content. A method of disinfecting computer viruses. A type of Internet connection.

Page 6: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q42. What is an effective energy saving option in computers?

The option to automatically reduce the hard disk capacity. The option to automatically lower the sound level. The option to automatically turn off the screen. The option to automatically decrease the amount of RAM.

Q43. How can physical wellbeing be ensured when working at a computer for long spells?

Use eye relaxation techniques. Reduce the number of breaks. Turn up the workplace temperature. Dim the lighting in the office.

Q44. What characterises a touchscreen?

It is both an input and output device. It is both an internal and external device. It is both a monitor and a loudspeaker. It is both a monitor and a firewall.

Q45. Which one of the following is most likely to speed up a computer?

Increasing the number of input devices. Increasing the number of output devices. Changing to a processor with higher capacity. Changing to a power supply with higher capacity.

Q46. Which one of the following is an example of hardware?

An e-mail message. A keyboard. An operating system. A database.

Q47. What characterises e-mail?

E-mail enables easy and fast transmission of messages. E-mail enables voice communication between computer users. E-mail enables broadcasting of Web based multimedia content. E-mail enables free online mass storage of files.

Q48. What is an example of software?

CPU Mouse Operating System USB flash drive

Q49. What is regarded as a serious health factor associated with computer use in the workplace?

The height and width of the keyboard. The availability and transfer rate of the network. The direction and amount of indoor light. The size and speed of the hard disk.

Q50. What is a Web log (Blog)?

A database that stores usernames and passwords. A catalogue of popular Websites. An application that records visited Websites. An online journal that is regularly updated.

Page 7: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q51. What type of information should be shared with caution online?

Holiday memories Hobby tips Personal information Forum comments

Q52. What is true about operating systems software and applications software?

The applications software is always installed first on a computer, then the operating systems software. The operating systems software is always installed first on a computer, then the applications software. The operating systems software can only interact with software, not hardware. The applications software can only interact with hardware, not software.

Q53. What do Windows and Unix have in common?

They are applications software. They are operating systems. They are hardware devices. They are broadband services.

Q54. What characterises Instant Messaging (IM)?

It is the same as electronic mail. It is real-time text communication. It is only available for wireless devices. It is mostly used when computers are offline.

Q55. Which one of the following types of computer is most likely to be used by a travelling salesman?

A desktop computer. A tablet PC. A server. A laptop.

Q56. Which one of the following is a term for systems used to store, retrieve, process and transmit data?

Internet & Communication Technology. Internet & Information Technology. Information & Communication Technology. Information & Computer Technology.

Q57. Which one of the following measures the speed of the CPU?

Gigahertz (GHz). Bits per second (Bps). Gigabytes (GB). Megabytes (MB).

Q58. Which one of the following is a term for an audio or video recording posted on a web site that can be downloaded and played later?

Podcast. Blog. VoIP. RSS Feed.

Page 8: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q59. Which one of the following describes a computer’s operating system?

Software that can retrieve information from a database. Hardware that can scan and convert photographs into digital files. Software that controls the allocation and usage of hardware. Hardware that can record and send images across the Internet.

Q60. Which one of the following types of software would you most likely use to create a letter?

Web browsing software. Spreadsheet software. Accounting software. Word processing software.

Q61. The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called?

The Internet. A Local Area Network. The World Wide Web. A network port.

Q62. Which one of the following is a private network that allows specified external users’ access?

Intranet. WorldNets. Internet. Extranet.

Q63. Which one of the following devices do you need to be able to communicate with other computers using the telephone network?

CD-ROM. Modem. Printer. Speakers.

Q64. Which one of the following is a software application that assists users who are visually impaired to identify and interpret what is displayed on screen?

A screen calendar. A word processor. A screen reader. A web log.

Q65. Which one of the following is a common feature of e-learning?

Always requires physical class attendance. Cannot download documents for later reading. Learning is self-paced. Travel time and costs are very high.

Q66. Which one of the following is NOT a feature of electronic commerce?

Goods can be advertised and prices compared. There is physical contact between buyer and seller. Transactions can be processed quickly. Services are available 24 hours a day.

Q67. Which one of the following is the best way to maintain a good posture?

Ensure your computer is in a well-lit area. Make sure that there are no cables on the floor. Make sure that your computer is using a fast processor. Make sure that your computer; desk and chair are positioned correctly.

Page 9: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q68. Which one of the following statements describes a good approach to information security for an organisation?

There are no procedures for reporting security lapses. Staff passwords are not changed regularly. Sensitive data is available to everyone that requests it. Keeping an off-site backup of all files.

Q69. Which one of the following is a good password policy for an organisation?

All passwords are changed regularly. All passwords are never changed. All passwords are made up of less than four characters. All passwords are made up of less than four numbers.

Q70. Which one of the following is the best way to protect a computer against computer viruses?

Only virus-check e-mail attachments. Update antivirus software on a regular basis. Always make sure that the operating system is up to date. Only download files from the Internet during business hours.

Q71. Which one of the following statements describes shareware?

Totally free software that is available only on the Internet. Commercial based software that must be paid for. Software available for free on a trial basis after which payment will be required. Copyright free software that allows unlimited copies and distribution.

Q72. There are rules governing the rights of a data subject and the responsibilities of a data controller. What are these rules called?

Data Privacy Policy. Data Management Act. Data Protection legislation or conventions. Data Publicity Law.

Q73. Which one of the following is an example of hardware?

An antivirus program. A spreadsheet application. A mouse. The World Wide Web.

Q74. Which one of the following would improve computer performance?

Using a larger monitor. Increasing the number of applications running. Using a faster printer. Increasing the size of RAM.

Q75. Which one of the following is NOT a function of the Central Processing Unit?

Executing program instructions. Ensuring program instructions are executed in the correct sequence. Sending e-mail. Carrying out calculations.

Q76. Which one of the following is both an input and output device?

Touchscreen. Keyboard. Printer. Scanner.

Page 10: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q77. Which one of the following is a method of publishing frequently updated content such as news headlines online?

A blog. RSS. A podcast. Instant messaging.

Q78. Which one of the following is an example of an operating system?

iTunes. PowerPoint. Windows. Netscape.

Q79. Which one of the following is considered good environmental practice?

Using a slow computer. Printing on both sides of a page. Using up to date software. Backing up data on a regular basis.

Q80. Which one of the following statements about the Internet is TRUE?

The Internet is a global network that links many computer networks together. The Internet is a private company network. The Internet is a visual representation of linked documents. The Internet is a network operating system.

Q81. Which one of the following is an input/output port?

Linear. Radial. Lateral. FireWire.

Q82. Which one of the following is an advantage of teleworking?

Long commuting times. Flexible schedules. Less emphasis on teamwork. Lack of human contact.

Q83. Which one of the following is a characteristic of broadband?

Completely safe from intruders. It has a dial up connection. High speed. Cost can vary from day to day.

Q84. Which one of the following is a text-based communication between two or more people over the Internet?

Podcasting. Really Simple Syndication. Voice over Internet Protocol. Instant Messaging.

Q85. Which one of the following practices helps create a good ergonomic working environment?

Protecting computer monitors from reflections and glare by correct positioning. Taking very few breaks away from the computer. Keeping the office cold and using low overhead lighting. Use of non-adjustable chairs when working with computers.

Page 11: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q86. Why is it necessary for an organisation to adopt a good password policy?

To allow easy sharing of files across the company network. To make it easier for the computer to connect to a network. To protect files against unauthorized use. To make it easier to find files on a computer.

Q87. Which one of the following is a way to prevent the theft of data from a computer?

Use an up to date anti-virus program. Back up data on a regular basis. Remove the monitor when not in use. Set up a username and password.

Q88. Which one of the following should be carried out to safeguard files from loss in case the main copy is damaged?

Backup files to a new location on your computer. Install password security. Backup the files regularly and store offsite. Install a firewall.

Q89. Which one of the following could allow a virus to enter a computer?

Downloading files from the Internet onto the computer. Connecting the computer to a new printer. Running a virus scan on the computer. Setting the computer monitor to a low resolution.

Q90. Which one of the following statements about an End User License Agreement is true?

It gives full ownership of the software to the user of the software. It gives the user the exclusive right to copy and sell the software to other potential users. It gives the user the right to modify the software. It gives the user the right to install and run the software on a specified number of computers.

Q91. What is the name of the law for the storage and use of data in the UK?

Details Provision Act Data Protection Authority Data Privacy Authority Data Protection Act

Q92. What is the best way to prevent a computer virus from entering your computer?

Log out of your computer each time you have finished using it Install and use anti-virus software on your computer Do not use emails on your machine Make sure all your files are safely stored to your floppy disks

Q93. What does RSI stand for?

Repeated Strain Inclusion Regular Systems Initiation Routine Structures Infection Repetitive Strain Injury

Q94. Health and safety is important when working with computers, which of the following will help to prevent injuries?

Always use screen savers Ensure the office is air conditioned All trailing cables should be secured Turn the lights off at the end of the day

Page 12: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q95. Which of the following systems will help to improve communications within the company?

Excel Powerpoint Email Solitaire

Q96. Which is a use of e-commerce on the internet?

Checking flight availability Searching for a suitable holiday Researching holiday destinations Booking a holiday

Q97. Which of the following would you use to find information on the internet?

Email Word Processor Search Engine Photo Editor

Q98. In the home, which of the following would you use the internet for?

Storing friends and family names and addresses Researching information for homework Storing your files Re-booting your computer

Q99. Which is the MAIN advantage of using a network system in the office?

Allows sharing of data Regular backups Costs are reduced Office procedures can be automated

Q100. Which of the following software manages the files and folders on your computer's hard disk drive?

Applications software Anti-virus software Systems software Utilities software

Q101. Identify the computer port shown?

Serial Port USB Port Parallel Port Network Port

Q102. What has got to do with bandwith of transmission?

CPU speed Data transfer rate RAM capacity Speed of printer

Q103. Identify the computer port?

Firewire Port USB Port Parallel Port Serial Port

Page 13: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q104. What does firewall do?

Protect against virus infection Monitor network activities Protect your hardware Prevent software from catching fire

Q105. Identify this computer port?

USB Port Parallel Port Network Port Firewire Port

Q106. What is the usage of firewall?

Prevent virus infection Prevent computer from catching fire Monitor transmission of data Prevent hardware from burning

Q107. Which computer port is shown in this picture?

Network Port Serial Port Firewire Port Parallel Port

Q108. What determines the data transfer rate?

RAM capacity Hard disk speed Bandwidth of transmission CPU clock speed

Q109. Identify this computer port shown in the diagram?

Network Port Serial Port Parallel Port Firewire Port

Q110. Which software application would you use to create a report?

Excel Powerpoint Word Publisher

Q111. Which of the following is NOT an input device?

Monitor Mouse Keyboard Scanner

Q112. What does GUI stand for?

General Utilities Intervention Graphical User Interface General User Intervention Graphical Utilities Interface

Page 14: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q113. What of these is an input device?

CD-Rom Mouse Printer Zip drive

Q114. Which of these computer based operations uses barcode input?

Marking on online test paper Issuing a book in a library Paying for goods using a credit card Ordering goods from a web site

Q115. Which type of memory holds the basic operating system commands?

ROM RAM Cache Auxiliary

Q116. Which of these storage devices holds the most data?

Floppy disk DVD drive Hard Disk drive Thumb drive

Q117. Which type of software would you use to prepare a budget forecast?

Word Processing Database Presentation Spreadsheet

Q118. Which of these is an output device?

CD-ROM Mouse Printer Scanner

Q119. Which of these is a characteristic of electronic mail that does not apply to other methods?

Attachments can be sent Messages can be sent to more than 1 person Mail may get lost Can only send to some people

Q120. Which upgrade will have the most impact on the performance of your computer?

Adding more RAM Reducing the peripheral devices Adding a network card Fitting a second hard disk

Q121. What type of software controls the file system on the computer?

GUI Network software Operating system software Application software

Page 15: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q122. Which is the smallest unit of computer storage?

Byte Bit Kilo bit Megabyte

Q123. Which type of software is used to access the Internet?

Interface Presentation Browser System

Q124. What is connected in a LAN?

Computers on one site Computers in many sites Computers in one office Computers on the Internet

Q125. Which type of software would you use to store customer data?

Database Spreadsheet Presentation Word Processing

Q126. How are computers in a WAN connected?

Cables Telephone lines Internet Intranet

Q127. Why is it important to make regular back-ups of computer data?

To prevent loss of data To comply with the law To protect the computer To increase the storage company

Q128. Your cable modem runs at 10 Mbps. What does this represent?

Speed of your computer Speed of transferring data Speed of your hard disk Speed of cache memory

Q129. Where should you store back up copies of your data?

Near to the computer In a different location In your car In an off-site fire proof store

Q130. You have a modem and a telephone connection. What else do you need to connect your computer to the Internet?

Browser and printer ISP account and printer ISP account and network Browser and ISP account

Page 16: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q131. Which of these describe a computer program?

An input device A set of instructions An interactive user guide A help system

Q132. You have installed more memory in your computer. What type of memory is this?

Cache Virtual ROM RAM

Q133. Which type of computer is used to process large amounts of corporate data?

Notebook Mainframe Mini computer Desktop

Q134. Which is the best way of protecting a computer system from unauthorised use?

Ensuring all users have passwords Locking the office Using a screensaver Maintaining an audit trail

Q135. Which of these devices can be used to input and output information?

Scanner Printer Bar Code Reader Touch Screen

Test B (135 Questions)

Q1. Which type of system is used to provide information for employees within a company?

Internet Intranet Extranet Electronic mail

Q2. Which of these is an example of an e-commerce activity?

Viewing a travel timetable Checking theatre availability Downloading a screen saver Booking a flight

Q3. Which of these is always an advantage of buying goods online?

Longer opening hours Greater choice Personal service Cheaper prices

Page 17: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q4. Which is a ‘laptop’ or a ‘notebook’?

A diary or timetable application A portable PC An electronic organiser A simple word processor

Q5. Which is the main factor in the growth of the ‘Information Society’?

Multimedia computers Faster processors Modems Internet

Q6. Which device would you use to draw shapes on the screen?

Scanner Mouse Optical Character Reader Plotter

Q7. Which of these tasks is a function of the operating system?

Adding slides in presentation Copying a file Producing a database report Adding data to a spreadsheet

Q8. Why is it important that you have adequate lighting when using a computer?

To avoid back injuries To avoid radiation To avoid repetitive strain injuries To avoid eyestrain and headaches

Q9. Which of these is an input device?

Monitor Speaker Scanner Plotter

Q10. Most computers are operating using icons and a mouse. What is this system called?

Graphical user interface Object oriented environment Symbolic user interface Command line interface

Q11. Which is most likely to happen after a power cut?

You can restart the computer and carry on with the same work The computer will not function All unsaved work is lost Your disk drive will be damaged

Q12. Which of the following devices is used to control the software in a games programme?

Keyboard Bar Code reader Joystick Light pen

Page 18: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q13. Which of the following devices sends information from the user to the computer?

Keyboard System unit Monitor Printer

Q14. The computers in your office are connected together so staff can share files and printers. What is this arrangement of computers called?

LAN ISDN TCP/IP WAN

Q15. A Library has a database of all its books. There are over 100,000 books and each record has Title, Author, Publisher, ISBN, date and description. What storage amount is required for the database?

1 byte 1 Kilobyte 1 Megabyte 1 Gigabyte

Q16. Which of the following NOT a permanent storage medium?

Hard disk CD-ROM RAM USB Thumb Drive

Q17. Poor postures at the computer can cause backache and other problems. Which is the best way of avoiding these problems?

Sitting at the recommended distance from the monitor Making sure your chair is the correct height Using a mouse to operate programs Switching off the computer when not in use

Q18. Which of the following is the MAIN advantage of a network system?

Increased speed of operation Reduces cost Allows sharing of data Backs up data

Q19. Which type of software controls the allocation of resources in the computer?

Application software Operating system software Browser software Utility software

Q20. A shareware program is best described as....

a program which may be downloaded and used for a trail period, but must be bought afterwards a program developed by a single team and accessible by anyone in the world a program installed on a Web site and executable on any system in the world a free program developed by students

Page 19: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q21. Which of the following is an example of the use of e-commerce on the Internet?

Checking theatre availability Booking train tickets Using e-mail Downloading information

Q22. Health and safety issues are important when using a computer. To avoid risk of injury, which of the following should always be TRUE?

Trailing cables should be secured Screen savers should be installed A mouse mat should always be used Power extension cables should be used

Q23. Which is the best way of protecting data from loss?

Make regular backups of the data Delete all your old files Lock your computer Change your password

Q24. There are rules governing the storage and supply of computer based information. What are these rules called?

Data Prohibition Law Data Protection Act Data Storage Act Data Supply Policy

Q25. Which of the following systems would improve communication within a company?

Office Software Electronic mail Project Management Database

Q26. Which device could you use for the output of a music file?

Microphone Speaker Digitiser Speech synthesiser

Q27. Which software would you use for creating a set of slides to be shown to an audience?

Database Presentation Desk Top Publishing Spreadsheet

Q28. Which of these statements about Read Only Memory (ROM) is TRUE?

Application programs can write data to the Read Only Memory The contents of the Read Only Memory are not deleted when the computer is switched off. The operating system is loaded into the Read Only Memory when the computer is started. Internet pages are stored in the Read Only Memory while they are being loaded.

Q29. Which of the following is a problem when downloading files from the internet?

The files may not be able to be removed The display settings on you computer may be changed The cache memory on your compute may become full Viruses may be introduced to you computer

Page 20: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q30. The Data Protection Acts is designed to...

Make personal data freely available Create a permanent store for personal data Regulate the use of personal data Enforce deletion of personal data

Q31. What is most likely to be affected by a computer virus?

Your monitor Your data The speed of your computer Read only memory

Q32. What is controlled by software copyright regulation?

Making backups of the software Number of copies sold Type of computer used for the software Illegal distribution of software

Q33. Which type of software would you use to maintain information about account holders at a Bank or Building Society?

Spreadsheet Word processor Database Stock Control

Q34. What is a trackball?

A monitoring system A type of speaker An alternative to the mouse A storage device

Q35. Which type of software can you use without having to pay a fee?

Freeware Shareware Operating system Application software

Q36. Which of these is a hand held device that stores appointments?

Notebook Desktop Mini computer Personal Digital Assistant (PDA)

Q37. Which is the BEST way of preventing loss of your data if there is a power cut?

Use a filtered plug Make frequent back ups of the data Ensure passwords are used Install virus checking software

Q38. Which of these is NOT a benefit of e-mail?

Ability to send attachments Receiving junk mail Instant delivery of your message Sending to more than one person at once

Page 21: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q39. What is the main advantage of a GUI?

Reduces the cost of computing Makes the computer easier to use Required a less powerful computer Does not need updating

Q40. Which device would you use to digitise a photograph?

Mark reader Data logger Scanner Plotter

Q41. Which of these is NOT an input device?

Digital camera Microphone Scanner Speaker

Q42. There are Laws governing the use of software to prevent people from making illegal copies of software. Which of the following is the best way to prevent this from happening?

Labelling the software Using a code to unlock the software Sending offenders to prison Requiring passwords for copying

Q43. Which of the following is a storage device?

Keyboard Monitor Speaker Disk Drive

Q44. Which of the following statements is NOT TRUE in relation to the Data Protection Act? The data user must ensure that the information...

Is obtained fairly and accurately Is stored with proper security Is accurate and up to date Can be sent abroad at any time

Q45. For which of these tasks would you use a search engine?

To find files on your computer To track new network To detect viruses on your computer To find information on the world Wide Web

Q46. Which of these is the major benefit of e-Learning?

Easier Cheaper Reduced contact with other students Available at any time

Q47. Which of these is a characteristic of RAM?

Cannot be erased Lost when the power is switched off Stores data downloaded from the Internet Holds system commands

Page 22: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q48. Which of the following is NOT an output device?

Keyboard Monitor Printer Speaker

Q49. Purchasing goods on a web site is an example of...

Web site design Net working Electronic commerce Search engine

Q50. Which type of memory is used to store applications while they are running?

ROM RAM Cache Auxiliary

Q51. Which of these is NOT a storage device?

RAM USB Thumb Drive Printer Hard Disk Drive

Q52. Computers can damage your health in various ways. Which is the best way of preventing this?

Taking frequent breaks Having good lighting Using a screen protector Raising the height of the monitor

Q53. You want all users to be able to view data in a computer system and selected users to be able to enter and change the data. How can you achieve this?

Allow unrestricted access to the system Give unauthorised users a password Set access rights for different groups of users Allocated keys to authorised users

Q54. Which type of computer stores the common files in a network?

Main frame Laptop Desktop Server

Q55. What does CPU stand for?

Central Power Unit Computer Processing Unit Computer Programming Unit Central Processing Unit

Q56. What is a computer virus?

A program that can damage your computers A hardware fault A program that you have downloaded from an Internet site A corrupted area of your disk

Page 23: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q57. You can help to preserve the environment by.....

Using a screen saver Recycling printer cartridges Using a filtered plug Using a smaller screen

Q58. Which type of computer is used to operate large corporate systems and databases?

Desktop computer Personal Digital Assistant (PDA) Mainframe Laptop

Q59. Which of the following describes the essential components of Information & Communication

Technology?

Primary, secondary and cache memory RAM and ROM Hardware, software and communications technologies Hardware and shareware

Q60. The speed of the Modem is measured in:

Megahertz (MHz) Bits per second (Bps) Gigabytes (GB) Megabytes (MB)

Q61. Which of the following statements about formatting the disk for the first time is true?

Formatting prepares the disk to store data Formatting backs up data onto the disk Formatting copies the disk Formatting unlocks the disk

Q62. Which of the following tasks is a function of the operating system?

Adding data to a spreadsheet Producing a database report File management Producing a presentation

Q63. Which software would you use to search for information in the internet?

Web browsing software Spreadsheet software Accounting software Word processing software

Q64. The computers in your office building are connected together so staff can share files and printers.

What is this arrangement of computers called?

FTP LAN WWW HTTP

Q65. An intranet is:

A network operating system A network filing system A private company network A private company network that includes external specified users

Page 24: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q66. Which of the following devices do you need to be able to communicate with other computers

using the telephone network?

CD-ROM Modem Plotter Speakers

Q67. Computer use can cause repetitive strain injury (RSI). Which of the following is the best way to

avoid this?

Ensure your computer is in a well-lit area Use an operator chair without arms Place your monitor at the correct height Work with your wrists level with the keyboard

Q68. Which of the following statements describes a good approach to information security for an

organisation?

No procedures for reporting security lapses Staff passwords are not changed regularly Sensitive data is available to everyone Computer systems are backed up on a regular basis

Q69. What is the best way of preventing your computer from being infected with a virus?

Only virus-check e-mail attachments Have updateable anti-virus software running on your computer Have anti-virus software running on your computer Never open any e-mail attachments

Q70. Which of the following statements describes shareware?

Shareware is software without copyright protection Shareware is free software Shareware is software you may pay for after an initial time period of use Shareware is software you can use in any way

Q71. There are rules governing the storage and supply of computer-based information. What are

these rules called?

Data Privacy Policy Data Management Act Data Protection Act Data Publicity Law

Q72. Which of the following would be considered a portable computer?

Workstation Mainframe Laptop Desktop computer

Q73. Disk formatting is used to:

Find files on a disk Lock a disk Unlock a disk Prepare a disk to store files

Page 25: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q74. Which of the following is an operating system?

Excel PowerPoint 2007 Windows XP Netscape

Q75. What is ISDN?

Integrated Standard Digital Networks Integrated Services Digital Network Interactive Standard Dynamic Networks Internet Services Data Network

Q76. If you were working from home, what software application could be used to communicate

directly with colleagues and customers?

Presentation Electronic mail (e-mail) Database Spreadsheet

Q77. Which of the following practises helps create a good ergonomic working environment?

Protecting computer monitors from reflections and glare by correct positioning Taking infrequent breaks away from the computer Keeping the office cold and using low overhead lighting Use of non-adjustable chairs when working with computers

Q78. Which of the following can be an advantage of electronic documents?

They can never be lost They can always be e-mailed regardless of size They can reduce the usage of paper They can never be copied

Q79. Which of the following activities could lead to the spread of a computer virus?

Using thumb drive from unknown sources to exchange data Using a standalone computer to output a hard copy letter Using retail software that has been checked for viruses Using a Graphical User Interface (GUI)

Q80. An End User License Agreement:

Is a form of advertising between a software application author or publisher and the user Gives the user the exclusive right to copy and sell the software to other potential users Grants ownership of the software to the user of the software Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, resale, and restricted use

Q81. Which one of the following describes spam?

Gathering information about a person or organisation without their knowledge. Performing an unauthorised, usually malicious, action such as erasing files. Putting unnecessary load on the network by making copies of files. Sending unwanted bulk messages.

Q82. Which one of the following could lead to the spread of a malicious program?

Using only software that has been checked for viruses. Maintaining regularly updated anti-virus software. Opening only virus-checked file attachments from known sources. Using a USB Flash Drive from an unknown source to exchange data.

Page 26: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q83. Which one of the following protects a computer from the risk of malicious programs?

PC diagnostic software. Web tracking software. Anti-spam software. Anti-spyware software.

Q84. Which one of the following describes why it is important to update antivirus software regularly?

To ensure the software identifies old viruses. To protect your computer from all known viruses. To protect your computer from unwanted bulk messages. To prevent the spread of malicious programs on the Internet.

Q85. Which one of the following describes a computer hacker?

A skilled programmer who uses authorised access to exploit information available on a computer. A skilled programmer who secretly invades computers without authorisation. A skilled programmer who writes programs to train new employees. A skilled programmer who helps in the installation of new software for an organisation.

Q86. Which one of the following describes why firewalls are used?

To prevent unauthorised access by incoming transmissions. To prevent destruction of a computer in the event of a fire. To enable easy downloading of data from web sites. To detect and disable viruses already on a computer.

Q87. Which one of the following is the reason that users should log on with a username and

password?

To be aware of who is in the building. To check up on the time-keeping of users. To protect computers against unauthorised use. To enable a personalised greeting for each user.

Q88. Which one of the following statements about a password is TRUE?

It must be changed only if it is compromised. It cannot contain special character symbols. It should be changed regularly. It must be registered with the system administrator.

Q89. Which one of the following should be used to change your password in your computer?

Internet Explorer. Anti-virus software. Control Panel Windows Firewall.

Q90. Which one of the following shows respect for confidentiality of information?

Discussing confidential information over the telephone. Uploading confidential information to a shared web site. Emailing confidential information to a colleague. Disclosing confidential information only to authorised individuals.

Q91. Which one of the following describes why users should lock their computer when leaving their

desk?

To prevent a waste of electricity. To prevent unauthorised access to data. To prevent data from getting corrupted. To prevent the computer from malfunctioning.

Page 27: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q92. Which one of the following is an example of phishing?

An email warning the recipient of a computer virus threat. An email directing the recipient to forward the email to friends. An email directing the recipient to enter personal details on a fake website. An email directing the recipient to download an attachment.

Q93. Which one of the following is unsafe online activity?

Giving your home address to someone you met in a chat room. Using a screen name or nick name that cannot identify you. Meeting someone you met online face-to-face in the company of your parents. Keeping your social network profile private.

Q94. Which one of the following describes how confidential information should be sent using an

unsecured network?

In an unsigned email. In an attachment. In a compressed format. In an encrypted format.

Q95. Which one of the following statements about wireless networks is TRUE?

They cannot be intercepted by unknown users. They limit accessibility to other users. They limit visibility to other users. They can be accessible to other users.

Q96. Which one of the following describes Bluetooth?

Short-range wired protocol for exchanging data. Short-range wireless protocol for exchanging data. Long-range wireless protocol for exchanging data. Long-range wired protocol for exchanging data.

Q97. Which one of the following describes why Bluetooth device settings should be adjusted?

To increase the range of the device. To improve the quality of reception. To prevent the risk of unauthorised access. To reduce interference from other devices.

Q98. Which one of the following should you do to ensure that your USB storage device is kept safe

and secure?

Only use it in private surroundings. Do not access it using a Bluetooth device. Use firewall software. Never leave it unattended.

Q99. Which one of the following departments would usually hold guidelines and procedures for the

secure use of IT within an organisation?

The Marketing Department. The IT Department. The Sales Department. The Finance Department.

Q100. Which one of the following describes why you should follow guidelines and procedures while

using IT resources in an organisation?

To ensure easy access to information on your computer. To ensure the secure use of IT resources.

Page 28: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

To ensure the IT Department is able to monitor all activity. To ensure the Finance Department is able to monitor the costs of IT resources.

Q101. Which one of the following describes how a breach in IT security should be reported?

Using the telephone. By emailing to the IT Manager. Using the method listed in the organisation’s security policy. Using any means of communication.

Q102. Which one of the following would prevent the theft of a laptop?

Anti-virus software. A webcam. Spyware. A security cable and lock.

Q103. Which one of the following would NOT happen if a computer suddenly malfunctions?

The operating system will fail. Files saved on the hard drive will be lost. All off-site backups will be lost. Some software may have to be reinstalled.

Q104. Which one of the following should you use to backup personal data?

A labelled CD. A printout. A website offering a file sharing service. A friend’s computer.

Q105. Which one of the following describes why it is important to have a secure off-site backup copy

of files?

To improve accessible of files from other locations. To speed up the process of accessing the files at any time. To prevent the loss of data in the event of a fire. To reduce the possibility of data theft.

Q106. Which one of the following describes how software can be stored safely?

Storing it in a fireproof safe. Storing it in a cupboard. Storing backups of the software. Storing it close to the computer.

Q107. Which of The Following Can Convert The Computer Signals From Digital To Analog?

ISDN Modem DSL HDSL

Q108. The Speed of the Central Processing Unit is measured in

Mega hertz Hectares Revolutions per minute. Bits per second

Q109. Which one of the following printers uses a toner in printing?

Laser Dot matrix

Page 29: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Ink jet Bubble jet

Q110. Which one of these statements is False?

A network of computer linked within a building is called a LAN Databases can be accessed by many users who connected to a LAN. A network-linking computer over cities countries is called WAN Applications cannot be shared over a LAN.

Q111. Which of the following statements is True?

A mainframe computer enables users to share files, printers and other resources. Minicomputer enables users to share files, printers and other resources. A laptop computer enables users to share files, printers and other resources. Network computer enables users to share files, printers and other resources.

Q112. Which of the following statements is TRUE?

ROM loses information when the computer is powered off. ROM chips can be plugged into the motherboard to provide more memory. ROM can't be written to , it's pre-programmed. ROM data can be written when you are loading an application software

Q113. One byte is equivalent to:

2 bit 8 bit 16 bit 4 bit

Q114. What hardware helps you input data and give commands?

Pointer Mouse Keyboard Scanner

Q115. RAM Can Hold the Data And Programs Which In Currently Use, It Is UN Volatile Memory.

True False

Q116. Peripherals Devices Are Part of Hardware?

True False

Q117. What Device Prints the output on paper.

Scanner Touch Screen Printer CPU

Q118. Which printer type would MOST likely produce the most noise?

Dot Matrix Inkjet Laser Thermal

Q119. Which of the following requires power to be on in order to maintain the data it stores?

Page 30: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

ROM RAM Hard Disk USB Flash Disk

Q120. Which one of these computers is too expensive?

Minicomputer Lap top Mainframe Tablet

Q121. When working away from the office a sales representative might typically use which type of

computer?

Desktop computer. Laptop computer An analogue computer A mainframe computer

Q122. Special plastic cards containing a processor and memory are used to pay for goods and

services. Each time the card is used the details on the card are updated. What is the name of such a card?

Magnetic card Memory card Smart card Processor card

Q123. Which computer would typically be the cheapest to buy?

Desktop computer Laptop computer Mainframe computer Mini computer

Q124. Which of the following would be the slowest device for accessing data?

Floppy Disk Hard Disk USB Flash Drive DVD

Q125. Which of the following would be the fastest device for accessing data?

Floppy Disk DVD Hard Disk Magnetic Tape Drive

Q126. Which of the following is hardware?

A database A spreadsheet A mouse An operating system

Q127. Which of the following is a peripheral device?

Display Card CPU RAM Printer

Page 31: ECDL/ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - Question & Answers

ICDL/ECDL Lessons & Quiz at: http://ICDL-Test.Blogspot.com

Q128. The generic name of the devices, which are connected to externally, and controlled by, the

central processing unit, is:

Keyboards RAM Monitors Peripherals

Q129. Which of the following printers is the most suitable for a secretary to produce the final copy of a

document?

Dot matrix Laser Plotter Any of them

Q130. Which type of memory is used to store the current status of computer application whilst it is

being processed?

EPROM PROM ROM RAM

Q131. Small businesses often use computer system to run the company. Typically it is most likely to

be:

A Mainframe computer A microprocessor A mini computer A personal computer

Q132. Which of the following could be considered typical users of a mainframe computer?

A bank A school A doctor's surgery A small business

Q133. Which list shows the correct order of memory capacity for these computers, smallest first?

Mainframe computer, personal computer and minicomputer Personal computer, minicomputer and mainframe computer. Personal computer, mainframe computer and minicomputer Mainframe computer, minicomputer and personal computer.

Q134. Which of these is an input device?

CD-ROM Mouse Printer Speaker

Q135. Your modem runs at 2M bps. What does this represent?

Speed of your computer Speed of transferring data Speed of your hard disk Speed of cache memory