You are on page 1of 10

ECDL Module 1 Quiz 08 1.2.1 Which one of the following would be described as software? a. b. c. d. 1.2.

.2 Which one of the following would be most used by someone who travels by train to work in various locations? a. b. c. d. 1.2.3 A laptop is most likely to have which one of the following input devices fitted as standard? a. b. c. d. 1.2.4 Which one of the following is the CPU in a computer? a. b. c. d. Calculating Process Unit. Control Program Unit. Control Process Unit. Central Processing Unit. Scanner. Joystick. Mouse. Touchpad. Scanner. Printer. Laptop. Desktop. Internet browser. Printer. Monitor. Keyboard.

1.2.5 Which one of the following is most likely to improve the performance of the computer? a. b. c. d. 1.2.6 Which one of the following statements about Read Only Memory is true? a. b. c. d. 1.2.7 Which one of the following describes Instant Messaging (IM)? a. A Web feed format used to publish frequently updated news headlines, in a standardised format. b. c. d. Technology that enables the delivery of telephone conversations over the Internet. Real-time text-based communication between two or more people over the Internet. A frequently updated journal or diary often hosted by a third party on the Internet. Application programs can write data to ROM. The contents of ROM are not deleted when the computer is switched off. Internet pages are stored in ROM while they are being loaded. The contents of ROM are deleted when the computer is switched off. Increasing the number of applications running simultaneously. Increasing the size of the computer monitor being used. Increasing the amount of RAM being used. Attaching a bigger printer.

1.2.8 Which one of the following describes uploading files? a. b. c. d. Transferring data from a personal computer to a web server. Copying a free image from a web page. Transferring data from a web server to a personal computer. Saving a Webpage from the Internet to a personal computer.

1.2.9 Which one of the following describes Windows Vista? a. b. c. d. 1.2.10 Which one of the following is a software application that helps users with a physical disability to enter characters on a PC? a. b. c. d. 1.2.11 Which one of the following can be used to both input and output information? a. b. c. d. Touchscreen. Monitor. Keyboard. Mouse. A screen reader. An on-screen keyboard. A screen magnifier. A screen saver. A database application. An anti-virus scanner. A backup utility. An operating system.

1.2.12 Which one of the following is a kilobyte? a. b. c. d. 1,000,000 bytes. 1000 bytes. 1024 bits. 1024 bytes.

1.2.13 Which one of the following is a storage medium? a. b. c. d. 1.2.14 Which one of the following government services would most likely be provided over the Internet? a. b. c. d. 1.2.15 Which type of software controls the allocation of resources and software on the computer? a. b. c. d. Operating system software. Utility software. Browser software. Security software. Waste Collection. Online Tax enquiries. Prison Service. Marriage Registration. CPU. USB Flash Drive. Trackball. Stylus.

1.2.16 Which one of the following would require the use of a database application? a. b. c. d. Design a cover for a new magazine. Compose a standard letter for a mail shot. Record details of staff training courses. Calculate a budget for a new project.

1.2.17 Which one of the following describes an audio or video recording posted on a website that can be downloaded and played later? a. b. c. d. 1.2.18 Which one of the following would be a typical file size for a 2-paged word processed letter? a. b. c. d. 1.2.19 Which one of the following is the delivery of training or education programs by electronic means? a. b. c. d. E-learning. E-college. E-teaching. E-school. 30 bits 100 bytes 30 kilobytes 1 megabyte An RSS feed. A broadcast. A web log. A podcast.

1.2.20 Which one of the following virtual communities normally allows sharing of photos and video clips? a. b. c. d. 1.2.21 Which one of the following statements about Internet connection services is true? a. b. c. Dial-up connections are always-on while your computer is switched on. Dial-up connections do not stop you from using your telephone line to make calls. Broadband services allow you to share a single connection with more than one computer. d. 1.2.22 Which one of the following is safe to post on a social networking website? a. b. c. d. A personal telephone number. A home address. Hobbies. A school or work-place address. Broadband services usually are slower than dial-up connections. Internet chat rooms. Internet forums. Social networking websites. Online computer games.

1.2.23 Which one of the following is commonly used to connect computers in the Italian and English offices of a multinational company? a. b. c. d. 1.2.24 Which one of the following terms commonly refers to a network where one computer provides shared resources to other computers? a. b. c. d. 1.2.25 Which one of the following describes RSS (Really Simple Syndication)? a. b. A radio programme posted on a website that can be downloaded and played later. A Web feed format used to publish frequently updated content such as blog entries, news headlines or podcasts. c. An online journal where an author posts comments and observations in chronological order. d. Real-time text-based communication between two or more people over a network such as the Internet. Server / Client. Client / User. Client / Server. Server / Provider. The World Wide Web. A local area network. A wide area network. A wireless local area network.

1.2.26 Which one of the following commonly describes an Intranet? a. b. c. d. 1.2.27 Which one of the following is an advantage of teleworking? a. b. c. d. 1.2.28 Which one of the following usually causes RSI? a. b. c. d. 1.2.29 Which one of the following can help maintain a good posture when sitting in front of a computer? a. b. c. d. Using a low level of lighting. Sitting close to the computer monitor. Correctly positioning the computer, desk and seat. Recycling printer cartridges. Viewing a monitor that has a lot of glare and reflections. Working where there is inadequate lighting and ventilation. Using a chair without arms. Typing for a long period of time without breaks. More emphasis on teamwork. Allows only fixed working hours. Allows flexible working hours. Never a need to use a computer or telephone. a network of a maximum of 3 computers. a private company network. only used in the home. a world wide network of computers.

1.2.30 Which one of the following is a harmful software programme that can generate copies of itself and spread throughout a computer system? a. b. c. d. 1.2.31 Which one of the following activities could lead to the spread of a computer virus? a. b. c. d. 1.2.32 Which one of the following is a feature of software copyright? a. b. c. d. 1.2.33 How does copyright relate to stories downloaded from a national newspapers web site? a. b. c. d. Copyright never applies to stories downloaded. Full copyright applies to stories downloaded. Copyright applies for one month from download date. Only part of copyright applies to stories downloaded. It denies the rights of the software author. It recognises the rights of the software author. It makes software freeware. It encourages software piracy. Using only software that has been checked for viruses. Maintaining regularly updated antivirus software. Opening only virus-checked file attachments from known sources. Using a CD from an unknown source to exchange data. An operating system. An application system. A computer virus. A web log.

1.2.34 What is the best way to protect a computer against data loss? a. b. c. d. 1.2.35 Which one of the following is the reason that users should log on with a username and password? a. b. c. d. 1.2.36 Which one of the following best describes the purpose of Data protection legislation? a. b. c. d. To give computer owners the right to protect themselves against computer fraud. To give software owners the right to promote software copyright. To give governments the right to control data access on the Internet. To give a right to individuals to establish the existence of personal data. To be aware of who is in the building. To check up on the time-keeping of users. To protect computers on a network against unauthorised use. To enable a personalized greeting for each user. Lock the computer when it is not being used. Change your password regularly. Delete archive files each month. Make regular backups of data to a removable storage device.

END OF TEST

You might also like