Professional Documents
Culture Documents
1. ICDL EXAMS.
Which one of the following terms describes the physical components of a computer
system?
a. Hardware.
b. Freeware.
c. Software.
d. Courseware.
a. Photocopier.
b. Desktop computer.
c. Personal digital assistant.
d. Computer screen.
3) Which one of the following can slow down the computer’s performance?
4) Which one of the following is most likely to be used to input a photograph into a
computer?
a. Stylus.
b. Microphone.
c. Plotter.
d. Scanner.
6) Which one of the following properties of a central processing unit (CPU) is measured
in gigahertz (GHz)?
a. Cost.
b. Volume.
c. Speed.
d. Temperature.
2019
a. Plotter.
b. Monitor.
c. Printer.
d. Scanner.
9) Which one of the following can output the results of work done on a computer?
a. Scanner.
b. Touchpad.
c. Joystick.
d. Printer.
11) Which one of the following devices typically has the largest storage capacity?
12) Which one of the following tasks is best suited to a spread sheet?
13) Which one of the following is a software application that allows a computer to
respond to voice commands?
a. A screen reader.
b. A screen magnifier.
c. A speech recognition utility.
2019
d. An on-screen keyboard.
14) Which one of the following describes the speed at which data can be moved from
one computer to another?
a. Line width.
b. Cache level.
c. Transfer rate.
d. Transform time.
15) Which one of the following is the delivery of training or education programs by
electronic means?
a. E-learning.
b. E-college.
c. E-teaching.
d. E-school.
17) Which one of the following statements about Internet connection services is true?
19) The computers in your local office building are connected together so staff in the
building can share files and printers. What is this arrangement of computers called?
a. LAN.
b. ISDN.
c. WAN.
d. FTP.
2019
20) Which one of the following describes RSS (Really Simple Syndication)?
a. An audio or video recording posted on a website that can be downloaded and played later.
b. A Web feed format used to publish frequently updated content such as blog entries, news
headlines or podcasts.
c. An online journal where an author posts comments and observations in chronological
order.
d. Real-time text-based communication between two or more people over a network such as
the Internet.
21) Which one of the following is an online journal where an author posts personal
views and observations in a chronological order?
a. Podcast.
b. RSS feed.
c. Blog.
d. E-mail.
24) Which one of the following is good working practice when using a computer?
25) Which one of the following is the name commonly given to the buying and selling of
goods on the Internet?
a. e-mail.
b. e-data exchange.
c. e-retail.
d. e-commerce.
2019
26) Which one of the following is good practice when downloading files?
a. Firewall.
b. Firewire.
c. Firmware.
d. Linear.
28) Which one of the following activities could lead to the spread of a computer virus?
29) What is the name for licensed software that can be used for a trial period after
which the user is requested to pay a fee for continued use?
a. Shareware.
b. Freeware.
c. Open Source software.
d. Software bundle.
30) Which one of the following monitors incoming network traffic to prevent
unauthorized attacks?
a. Data guard.
b. Firewall.
c. Fireguard.
d. Data shield.
31) Which one of the following is software introduced into a computer without the
owner’s knowledge to corrupt the computer’s operating system or destroy data?
a. A virus.
b. A germ.
c. A bug.
d. A macro.
2019
32) Which one of the following statements about software copyright is true?
a. Apply settings to automatically power down the screen/monitor when not in regular use.
b. Update your screen saver.
c. Change the screen/monitor background design.
d. Leave the computer on continuously to avoid re-booting the system.
34) Which one of the following statements describes a good approach to information
security for an organisation?
35) Which one of the following allows or denies users the privileges to create, view,
change or delete data on a computer system?
a. Client rights.
b. Access rights.
c. Sign on rights.
d. Entry rights.
36) The theft of which one of the following would result in the loss of contact details?
a. Printer.
b. PDA.
c. Modem.
d. RAM.
a. Internet browser.
b. Printer.
c. Monitor.
d. Keyboard.
2019
38) Which one of the following would be most used by someone who travels by train
to work in various locations?
a. Scanner.
b. Printer.
c. Laptop.
d. Desktop.
39) A laptop is most likely to have which one of the following input devices fitted as
standard?
a. Scanner.
b. Joystick.
c. Mouse.
d. Touchpad.
41) Which one of the following is most likely to improve the performance of the
computer?
42) Which one of the following statements about Read Only Memory is true?
a. A Web feed format used to publish frequently updated news headlines, in a standardized
format.
b. Technology that enables the delivery of telephone conversations over the Internet.
c. Real-time text-based communication between two or more people over the Internet.
d. A frequently updated journal or diary often hosted by a third party on the Internet.
2019
a. A database application.
b. An anti-virus scanner.
c. A backup utility.
d. An operating system.
46) Which one of the following is a software application that helps users with a physical
disability to enter characters on a PC?
a. A screen reader.
b. An on-screen keyboard.
c. A screen magnifier.
d. A screen saver.
47) Which one of the following can be used to both input and output information?
a. Touchscreen.
b. Monitor.
c. Keyboard.
d. Mouse.
a. 1,000,000 bytes.
b. 1000 bytes.
c. 1024 bits.
d. 1024 bytes.
a. CPU.
b. USB Flash Drive.
c. Trackball.
d. Stylus.
2019
50) Which one of the following government services would most likely be provided over
the Internet?
a. Waste Collection.
b. Online Tax enquiries.
c. Prison Service.
d. Marriage Registration.
51) Which type of software controls the allocation of resources and software on the
computer?
52) Which one of the following would require the use of a database application?
53) Which one of the following describes an audio or video recording posted on a
website that can be downloaded and played later?
a. An RSS feed.
b. A broadcast.
c. A web log.
d. A podcast.
54) Which one of the following would be a typical file size for a 2-paged word processed
letter?
a. 30 bits
b. 100 bytes
c. 30 kilobytes
d. 1 megabyte
55) Which one of the following is the delivery of training or education programs by
electronic means?
a. E-learning.
b. E-college.
c. E-teaching.
d. E-school.
2019
56) Which one of the following virtual communities normally allows sharing of photos
and video clips?
57) Which one of the following statements about Internet connection services is true?
58) Which one of the following is safe to post on a social networking website?
59) Which one of the following is commonly used to connect computers in the Italian
and English offices of a multinational company?
60) Which one of the following terms commonly refers to a network where one
computer provides shared resources to other computers?
a. Server / Client.
b. Client / User.
c. Client / Server.
d. Server / Provider.
61) Which one of the following describes RSS (Really Simple Syndication)?
a. A radio program posted on a website that can be downloaded and played later.
b. A Web feed format used to publish frequently updated content such as blog entries, news
headlines or podcasts.
c. An online journal where an author posts comments and observations in chronological
order.
d. Real-time text-based communication between two or more people over a network such as
the Internet.
2019
65) Which one of the following can help maintain a good posture when sitting in front
of a computer?
66) Which one of the following is a harmful software program that can generate copies
of it and spread throughout a computer system?
a. An operating system.
b. An application system.
c. A computer virus.
d. A web log.
67) Which one of the following activities could lead to the spread of a computer virus?
69) How does copyright relate to stories downloaded from a national newspaper’s web
site?
70) What is the best way to protect a computer against data loss?
71) Which one of the following is the reason that users should log on with a username
and password?
72) Which one of the following best describes the purpose of Data protection
legislation?
a. To give computer owners the right to protect themselves against computer fraud.
b. To give software owners the right to promote software copyright.
c. To give governments the right to control data access on the Internet.
d. To give a right to individuals to establish the existence of personal data.