You are on page 1of 38

ECDL / ICDL SYLLABUS v5.

0 - LEVEL 1 OFFICE 2010 TRAINING MANUAL

TERMS OF USE:
© LEARN-NEW-SKILLS-FROM-HOME 2009. Please note that no part of this document may be copied for multi-use without written permission from us. All reasonable precautions have been made in the preparation of this document, including both technical and non-technical proofing; we work to the highest quality and if you find any discrepancies in this user document, please do not hesitate to contact us at: enquires@learn-new-skills-from-home.com.

FREE SAMPLE FULL VERSION 81 PAGES

© www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

TABLE OF CONTENTS
OVERVIEW About ...................................................................................................................................... 2 SYLLABUS v5.0 CHANGES - 2010 About ...................................................................................................................................... 4 HOW TO USE THIS MANUAL About ......................................................................................................................................5 MODULE 1 – IT SECURITY About ...................................................................................................................................... 6 Test – Questions (Full version available on purchase).......................................................... 7 Test – Answers (Full version available on purchase) .......................................................... 17 MODULE 2 - IT USER FUNDAMENTALS About ................................................................................................................................... 19 Test – Questions (Full version available on purchase)....................................................... 20 Test – Answers (Full version available on purchase) .......................................................... 26 MODULE 7- USING EMAIL AND THE INTERNET About ................................................................................................................................... 28 Test – Questions (Full version available on purchase)........................................................ 29 Test – Answers (Full version available on purchase) .......................................................... 35 GLOSSARY A – Z Glossary (Full version available on purchase) .......................................................... 37

© www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

1

OVERVIEW
The ECDL Foundation is the certifying authority of leading ICT computer certifications. The Foundation offers globally recognised computer qualifications which many business have adopted as a prerequisite for their employees including, IBM, IKEA, Tongaat-Hulett Group, Ministry of Defence, Post Office, Bank of England, Shell and Pfizer. The quality and reputation of the Foundation has been built on over a decade of experience in successfully delivering Information Communication Technology (ICT) certification to over 9 million people, in 41 languages, covering 148 countries around the world. The Foundation offers various ability levels (1, 2 and 3), making it flexible and cost-effective for both home learners and employer's. The ECDL (European Computer Driving License) qualification was established in 1997 and due to its success the ICDL (International Computer Driving Licence) was established shortly after in 1999. They are both global recognised qualifications and have the same syllabus and test structure the only difference being the ECDL is designated for European (ECDL) countries the ICDL for regions outside Europe. For further information including the ECDL Foundations latest news, please visit their official website at www.ecdl.org. ECDL/ICDL MODULES Level 1 module’s (IT Security, IT Fundamentals and Internet & Email) are designed for learners whose skills are at a beginner (novice) level in ICT and wish to gain a recognised certification to prove their competence. The level 1 qualification is recognised as GCSE grade D-G equivalent in the UK and generally set to a level 1 standard internationally. OUR LEARNING STYLE Our beginner ICT training materials cover level 1 of the ECDL & ICDL v5.0 SYLLABUS (phased in during 2010) and are formed in three parts:

© www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

2

© www. so we have created manuals that cover 99% of currently globally used (Microsoft Office 2003. whereby leaner’s asses their current ICT skills from the outset by completing their desired ICT module/s within this training manual then cross-referencing them with the supplied answers. We therefore developed a more direct learning approach. ITQ and ICT subjects. when relating to the ECDL/ICDL syllabus. syllabuses and general ICT topics. APPLICATION Many businesses and personal users update their ICT applications software at different stages of release. usually due to convenience and financial reasons. ECDL. PDF.learn-new-skills-from-home. who also participate in answering ICT related questions. books) they have no interaction with other learner’s experiences.com 2010 OFFICE 2010 VERSION 3 . INTERACTION Learners have expressed when purchasing information sources (eBooks. To alleviate this we have supplied an online member’s area whereby learners can discuss with other candidates (worldwide). 2007 and 2010) business applications. answers. ICDL.OVERVIEW CONTINUED… APPROACH Many learners have expressed. that they have some basic/intermediate ICT skills but were unable to identify those areas of strength and weakness. covering practice test questions. When they feel confident with their ICT skills. The online area is mediated and monitored by administrators. Learners can then retry the supplied tests using the provided glossary and online member’s area to help reinforce their knowledge. learners can apply for testing at a convenient date at their local ECDL or ICDL exam centre.

It is recommended that you attempt both syllabus versions as there is some cross compatibility between them.5 syllabus was reviewed in 2007 in order to ensure that it reflected ongoing advances in technologies and relevant practices. The marking structure of Module 1 is still the same in v4.IMPORTANT . The required pass mark is 27 (75%) and you have 45 minutes to complete it.5 and v5.0 from Concepts of Information Technology to IT Security.ICDL (1999) started the course syllabus has continually evolved to reflect changes in technology and its use. making the module more suitable for modern day IT.0 overhaul Module 1 has now been adapted in v5.0 with the required pass mark of 24 (75%) and you have 45 minutes to complete the test. We have catered for syllabus changes by entering question and answers relating to both modules.com 2010 OFFICE 2010 VERSION 4 .0 with 36 questions. The v4. The marking structure of Module 2 is still the same in v4.5 and v5.SYLLABUS CHANGES Since the ECDL (1997) . Due to the above mentioned v5.0 overhaul Module 2 has now been adapted in v5.learn-new-skills-from-home.0 from Using the Computer and Managing Files to IT User Fundamentals.ICDL syllabus v5 which was phased in during 2009. © www. This resulted in the completion of the ECDL. Also due to the above mentioned v5. We have catered for syllabus changes by entering question and answers relating to both modules.

Answer File Marking schemes © www. Remember some questions may be awarded half marks (except multiple-choice) if partially completed or correct but it is best to only mark completely correct answers as right as learning centres may differ in their decision making when awarding partial points.com 2010 OFFICE 2010 VERSION 5 . so if for instance you would like to start with Internet/Email. KEY SYMBOLS Where this symbol is displayed Exam Tips will be shown. MODULE ORDER If you have limited skills then select a module you feel most comfortable with or most relevant to your needs. write in the comments section if your answer was correct or incorrect. These modules particularly IT Security have a large amount of multiple-choice questions that may require research to complete correctly. USE GLOSSARY We have supplied a glossary of information that will help reinforce your knowledge with certain modules (IT Security. Where this symbol is displayed Underpinning Knowledge will be shown. IT User Fundamentals and Using E-mail and Internet). as it would help you at home and work then select the Using Email and the Internet module. MARKING SCHEMES Once you have completed a test printout the relevant marking scheme which is located in the Marking Scheme folder. Where this symbol is displayed Shortcut Tips will be shown. Remember you can take any module exam at a testing centre in any order you like. Where this symbol is displayed Learners can return to the contents page.learn-new-skills-from-home. Cross-reference your answers with the answers provided in this manual.HOW TO USE THE MANUAL FILES All the required files needed for this ICT level 1 training manual are supplied within the 2010-LEVEL-1-SAMPLE folder previously downloaded.

including connectivity. Generally test centres won’t let candidates collect printouts while the test is in progress.) as it will be easier to keep track of your progress. 3. 2. TEST STRUCTURE: The IT Security module test requires a pass mark of 27 (75%) out of the possible 36 marks available.MODULE 1 – IT SECURITY The IT Security module enables candidates to gain an understanding of different types of security issues facing the modern day IT environment. Learners are advised not to spend too long on each question and if unsure of a particular answer to move onto the next question available and return to the original question. network types. It is recommended that use the system clock. viruses. located at the bottom right corner of the monitor to time their progress. This particular module is predominately multiple-choice questions and therefore can cover a wider scope than other modules. etc. Learners have 45 minutes to complete the test and can complete the test questions in any order but it recommended that you attempt them in sequence (1..com 2010 OFFICE 2010 VERSION 6 . email and malicious programs. The test centre invigilator will inform you of the rules and requirements of the test prior to the exam start.. time permitting. © www. The test invigilator will either collect printouts for candidates or candidates will be allowed to collect them at the end of the exam. This can be an advantage to candidates as it saves precious time in waiting for the printing process.learn-new-skills-from-home. as this facility will be available in the test environment.

3 What is a Firewall? a) E-mail program b) Application designed to block unauthorized access while permitting authorized communications c) PC diagnostic software d) Anti-spam software Q.1 Open the Answer File word document located in the Module 1 folder. Q. © www. 4 What is does it mean to SPAM (E-mail) people? a) Send messages using a mobile phone b) Block unauthorized access while permitting authorized communications c) Send a colleague a message d) Send unsolicited bulk e-mail messages indiscriminately.learn-new-skills-from-home. answer the following test questions in there relevant number fields by selecting either the a). Enter your candidate identification (ID) into the Q1. If you don’t have an ID number then your name will suffice. Once your ID is added.com 2010 OFFICE 2010 VERSION 7 .MODULE 1 – IT SECURITY TEST Q. 2 What application protects a computer from malicious programs? a) Firewall b) Web tracking software c) Anti-virus software d) Anti-spam software Q. b). c) or d) answer. Answer section.

.Q. 7 Q 7 Why iitt iis iimporrttantt tto updatte anttiiviirrus soffttwarre rregullarrlly? Why s mpo an o upda e an v us so wa e egu a y? a)) To prrottectt yourr computterr ffrrom SPAM a To p o ec you compu e om SPAM b)) To ensurre olld viirruses arre rremoved b To ensu e o d v uses a e emoved c)) To ensurre tthe soffttwarre can prrottectt agaiinstt allll known viirruses c To ensu e he so wa e can p o ec aga ns a known v uses d)) To prreventt tthe sprread off mallwarre prrogrrams on tthe IIntterrnett d To p even he sp ead o ma wa e p og ams on he n e ne Q.com 2010 OFFICE 2010 VERSION 8 .learn-new-skills-from-home. 5 Q 5 Whiich off tthe ffollllowiing acttiiviittiies coulld llead tto tthe sprread off a computterr viirrus? Wh ch o he o ow ng ac v es cou d ead o he sp ead o a compu e v us? a)) Usiing USB memorry sttiicks ffrrom unknown sourrces tto exchange datta a Us ng USB memo y s cks om unknown sou ces o exchange da a b)) Usiing a sttandallone computterr tto outtputt a harrd copy lletttterr b Us ng a s anda one compu e o ou pu a ha d copy e e c)) Usiing rrettaiill soffttwarre tthatt has been checked fforr viirruses c Us ng e a so wa e ha has been checked o v uses d)) Usiing a Grraphiicall Userr IIntterrfface ((GUII)) d Us ng a G aph ca Use n e ace GU Q. 8 Q 8 Whatt iis Mallwarre? Wha s Ma wa e? a)) An e--maiill prrogrram a An e ma p og am b)) Soffttwarre develloped fforr tthe purrpose off causiing harrm tto a computterr systtem b So wa e deve oped o he pu pose o caus ng ha m o a compu e sys em c)) Anttiiviirrus soffttwarre c An v us so wa e d)) Applliicattiion desiigned tto bllock unautthorriized access whiille perrmiittttiing autthorriized d App ca on des gned o b ock unau ho zed access wh e pe m ng au ho zed communiicattiions commun ca ons © www.. 6 Q 6 Whatt iis tthe name off tthe actt tthatt coverrs hackiing? Wha s he name o he ac ha cove s hack ng? a)) Computterr Hackerrs Actt a Compu e Hacke s Ac b)) Computterr Userrs Prrottecttiion Actt b Compu e Use s P o ec on Ac c)) Computterr Miisuse Actt c Compu e M suse Ac d)) Computterr Prrottecttiion Actt d Compu e P o ec on Ac Q...

.learn-new-skills-from-home. 11 Why shoulld computterr userrs llog on wiitth botth a userrname and passworrd? Q 11 Why shou d compu e use s og on w h bo h a use name and passwo d? a)) To know who iis llogged iin a To know who s ogged n b)) To prrottectt yourr computterr agaiinstt unautthorriised access b To p o ec you compu e aga ns unau ho sed access c)) To keep ttiime--keepiing rrecorrds c To keep me keep ng eco ds d)) So you can access tthe iintterrnett d So you can access he n e ne Q.Q.com 2010 OFFICE 2010 VERSION 9 .. 9 Q 9 Whatt iis a computterr hackerr? Wha s a compu e hacke ? a)) A computterr engiineerr tthatt ffiixes computterrs and nettworrks a A compu e eng nee ha xes compu e s and ne wo ks b)) Prrogrrammerr who uses autthorriised access tto explloiitt iinfforrmattiion b P og amme who uses au ho sed access o exp o n o ma on c)) Prrogrrammerr who secrrettlly iinvades computterrs wiitthoutt autthorriisattiion c P og amme who sec e y nvades compu e s w hou au ho sa on d)) A soffttwarre ttrraiinerr d A so wa e a ne Q. 10 Whatt coulld llead tto tthe sprread off mallwarre? Q 10 Wha cou d ead o he sp ead o ma wa e? a)) Usiing a sttandallone computterr tto outtputt a harrd copy off a sprreadsheett a Us ng a s anda one compu e o ou pu a ha d copy o a sp eadshee b)) Usiing a Grraphiicall Userr IIntterrfface ((GUII)) b Us ng a G aph ca Use n e ace GU c)) Usiing a Flloppy diisk tto exchange datta c Us ng a F oppy d sk o exchange da a d)) Usiing Anttii--spam soffttwarre d Us ng An spam so wa e Q. 12 Whatt shoulld you do iiff you rreceiive an e--maiill wiitth an attttachmentt ffrrom an unknown userr? Q 12 Wha shou d you do you ece ve an e ma w h an a achmen om an unknown use ? a)) Read tthe e--maiill and open tthe attttachmentt a Read he e ma and open he a achmen b)) Dellette tthe emaiill b De e e he ema c)) Forrwarrd tthe emaiill c Fo wa d he ema d)) Downlload tthe attttachmentt ontto yourr deskttop d Down oad he a achmen on o you desk op © www...

14 Whatt woulld you use tto change yourr userr passworrd? Q 14 Wha wou d you use o change you use passwo d? a)) IIntterrnett Expllorrerr a n e ne Exp o e b)) Fiirreffox b F e ox c)) Conttrroll Panell c Con o Pane d)) BIIOS d B OS Q. Whiich llaw arre you Q 16 You e you ends some con den a n o ma on you have access o a wo k Wh ch aw a e you brreakiing? b eak ng? a)) Computterr Miisuse Actt 1990 a Compu e M suse Ac 1990 b)) Datta Prrottecttiion Actt 1998 b Da a P o ec on Ac 1998 c)) Custtomerr Crrediitt Actt 1974 c Cus ome C ed Ac 1974 d)) Diisabiilliitty Diiscrriimiinattiion Actt 2000 d D sab y D sc m na on Ac 2000 © www.. iin a worrk enviirronmentt? Q 15 Why shou d you ock you compu e when away om n a wo k env onmen ? a)) So tthe scrreen saverr iis acttiivatted a So he sc een save s ac va ed b)) Economiicall rreasons b Econom ca easons c)) To prreventt unautthorriised access off yourr iinfforrmattiion c To p even unau ho sed access o you n o ma on d)) To sttop yourr worrk ((datta)) gettttiing llostt d To s op you wo k da a ge ng os Q. 15 Why shoulld you llock yourr computterr when away ffrrom iitt.. 13 Whiich one off tthe ffollllowiing iis sttrrongestt vallue fforr a passworrd? Q 13 Wh ch one o he o ow ng s s onges va ue o a passwo d? a)) Allll charractterrs a A cha ac e s b)) Yourr datte off biirrtth b You da e o b h c)) Yourr mottherr’’s maiiden name c You mo he s ma den name d)) Combiinattiion off rrandom charractterrs and numberrs d Comb na on o andom cha ac e s and numbe s Q.com 2010 OFFICE 2010 VERSION 10 .. 16 You ttellll yourr ffrriiends some conffiidenttiiall iinfforrmattiion you have access tto att worrk..learn-new-skills-from-home.Q...

18 Whiich off tthe ffollllowiing coulld make you vullnerrablle tto ffrraud whiille onlliine? Q 18 Wh ch o he o ow ng cou d make you vu ne ab e o aud wh e on ne? a)) Usiing a scrreen name orr niick name tthatt cannott iidenttiiffy you a Us ng a sc een name o n ck name ha canno den y you b)) Giiviing someone unknown iin a chatt rroom yourr perrsonall dettaiills b G v ng someone unknown n a cha oom you pe sona de a s c)) Keepiing yourr sociiall nettworrk prroffiille prriivatte c Keep ng you soc a ne wo k p o e p va e d)) Usiing a Fiirrewallll d Us ng a F ewa Q. 20 How shoulld you rreporrtt a brreach iin IIT securriitty att worrk? Q 20 How shou d you epo a b each n T secu y a wo k? a)) Emaiill yourr boss a Ema you boss b)) Use tthe metthod as lliistted iin tthe company’’s securriitty polliicy b Use he me hod as s ed n he company s secu y po cy c)) Riing a colllleague c R ng a co eague d)) Usiing any means off communiicattiion d Us ng any means o commun ca on © www. diisguiised as an offffiiciiall e--maiill ffrrom a ((ffiicttiionall)) bank a Send ng an e ma d sgu sed as an o c a e ma om a c ona bank b)) An emaiill warrniing tthe rreciipiientt off a computterr viirrus tthrreatt b An ema wa n ng he ec p en o a compu e v us h ea c)) Sendiing an e--maiill wiitth a genuiine jjob offfferr c Send ng an e ma w h a genu ne ob o e d)) Sendiing an emaiill conttaiiniing an attttachmentt d Send ng an ema con a n ng an a achmen Q...Q.com 2010 OFFICE 2010 VERSION 11 .. 19 Whiich one off tthe ffollllowiing bestt descrriibes Blluettootth? Q 19 Wh ch one o he o ow ng bes desc bes B ue oo h? a)) Open wiirrelless prrottocoll fforr exchangiing datta overr shorrtt rrange diisttances ffrrom ffiixed and mobiille deviices a Open w e ess p o oco o exchang ng da a ove sho ange d s ances om xed and mob e dev ces b)) Long--rrange wiirred prrottocoll fforr exchangiing datta ffrrom ffiixed and mobiille deviices b Long ange w ed p o oco o exchang ng da a om xed and mob e dev ces c)) Shorrtt--rrange wiirred prrottocoll fforr exchangiing datta c Sho ange w ed p o oco o exchang ng da a d)) Open llong--rrange wiirrelless prrottocoll fforr exchangiing datta d Open ong ange w e ess p o oco o exchang ng da a Q.. 17 Whatt iis phiishiing? Q 17 Wha s ph sh ng? a)) Sendiing an e--maiill..learn-new-skills-from-home.

.com 2010 OFFICE 2010 VERSION 12 .Q.. 24 IIn a company orrganiisattiions sttrructturre whatt deparrttmentt woulld holld tthe guiidelliines and prrocedurres fforr tthe Q 24 n a company o gan sa ons s uc u e wha depa men wou d ho d he gu de nes and p ocedu es o he securre use off IIT wiitthiin tthe orrganiisattiions? secu e use o T w h n he o gan sa ons? a)) Perrsonnell Deparrttmentt a Pe sonne Depa men b)) Admiiniisttrrattiion Deparrttmentt b Adm n s a on Depa men c)) Fiinance Deparrttmentt c F nance Depa men d)) IIT Deparrttmentt d T Depa men © www. 23 How can you keep yourr USB sttorrage deviice saffe and securre? Q 23 How can you keep you USB s o age dev ce sa e and secu e? a)) Do nott access iitt usiing a Wii--Fii deviice a Do no access us ng a W F dev ce b)) Onlly use iitt att home b On y use a home c)) Don’’tt lleave iitt unattttended c Don eave una ended d)) Do nott access iitt usiing a Blluettootth deviice d Do no access us ng a B ue oo h dev ce Q.learn-new-skills-from-home.. 22 Why shoulld you ffollllow guiidelliines and prrocedurres whiille usiing IIT rresourrces iin an orrganiisattiion? Q 22 Why shou d you o ow gu de nes and p ocedu es wh e us ng T esou ces n an o gan sa on? a)) To keep ttrrack off emplloyees worrk a To keep ack o emp oyees wo k b)) To enablle easiierr access tto tthe orrganiisattiions nettworrk b To enab e eas e access o he o gan sa ons ne wo k c)) To ensurre tthe securre use off tthe orrganiisattiions IIT rresourrces c To ensu e he secu e use o he o gan sa ons T esou ces d)) To keep ttrrack off IIT rresourrces d To keep ack o T esou ces Q.. 21 Whatt iis a Wii--Fii ((wiirrelless)) nettworrk? Q 21 Wha s a W F w e ess ne wo k? a)) A nettworrk tthatt can have a maxiimum off 10 userr a A ne wo k ha can have a max mum o 10 use b)) A nettworrk tthatt cannott be iintterrceptted by ottherr userrs b A ne wo k ha canno be n e cep ed by o he use s c)) A nettworrk tthatt cannott be hacked c A ne wo k ha canno be hacked d)) A nettworrk tthatt can be accessed by ottherr userrs d A ne wo k ha can be accessed by o he use s Q.

prriintterrs ettc…))? Q 26 Wha wou d p even he he o T equ pmen e PC ap op p n e s e c… ? a)) Securriitty cablle a Secu y cab e b)) Webcam b Webcam c)) Securriitty soffttwarre c Secu y so wa e d)) Spywarre d Spywa e Q..learn-new-skills-from-home. 27 How can you sttorre memorry carrds saffelly? Q 27 How can you s o e memo y ca ds sa e y? a)) Securre iin a drraw a Secu e n a d aw b)) Pllace carrds away ffrrom magnettiic ffiiellds b P ace ca ds away om magne c e ds c)) Keep iitt iin iitts orriigiinall packagiing c Keep n s o g na packag ng d)) Keep backups d Keep backups Q. llapttop. PC. 25 IIff sttollen whiich one off tthe ffollllowiing deviices woulld rresulltt iin tthe lloss off conttactt dettaiills? Q 25 s o en wh ch one o he o ow ng dev ces wou d esu n he oss o con ac de a s? a)) Modem a Modem b)) Prriintterr b P ne c)) Mobiille Phone c Mob e Phone d)) Moniittorr d Mon o Q.e.com 2010 OFFICE 2010 VERSION 13 .. 26 Whatt woulld prreventt tthe tthefftt off IIT equiipmentt ((ii. 28 Whiich one off tthe ffollllowiing iis bestt way tto backup yourr datta? Q 28 Wh ch one o he o ow ng s bes way o backup you da a? a)) Uplload tto tthe iintterrnett a Up oad o he n e ne b)) Fllash drriive b F ash d ve c)) Labelllled CD orr DVD c Labe ed CD o DVD d)) Save ontto yourr harrd drriive iin anottherr llocattiion d Save on o you ha d d ve n ano he oca on © www...Q.....

. 32 Whatt iis a publliic nettworrk? Q 32 Wha s a pub c ne wo k? a)) A nettworrk tthatt has lliimiitted access a A ne wo k ha has m ed access b)) A nettworrk tthatt can be used by anyone b A ne wo k ha can be used by anyone c)) A nettworrk used by busiinesses onlly c A ne wo k used by bus nesses on y d)) A nettworrk tthatt uses prriivatte IIP addrress space d A ne wo k ha uses p va e P add ess space © www.Q.learn-new-skills-from-home. 30 Why shoulld you change yourr computterr llogiin passworrd ffrrequenttlly? Q 30 Why shou d you change you compu e og n passwo d equen y? a)) IImprroves overrallll accessiibiilliitty a mp oves ove a access b y b)) To prreventt tthe rriisk off access tto a nettworrk by unwantted userrs b To p even he sk o access o a ne wo k by unwan ed use s c)) IImprroves LAN accessiibiilliitty c mp oves LAN access b y d)) Saves datta space d Saves da a space Q. 29 Why iis so iimporrttantt tto have a securre offff--siitte backup copy off an orrganiisattiions datta? Q 29 Why s so mpo an o have a secu e o s e backup copy o an o gan sa ons da a? a)) IImprrove WAN accessiibiilliitty a mp ove WAN access b y b)) To sttop tthe lloss off datta iin tthe eventt off a ffiirre b To s op he oss o da a n he even o a e c)) To keep datta morre securre c To keep da a mo e secu e d)) Save datta sttorrage space d Save da a s o age space Q.com 2010 OFFICE 2010 VERSION 14 . 31 Whatt iis emaiill spooffiing? Q 31 Wha s ema spoo ng? a)) Non--malliiciious emaiills a Non ma c ous ema s b)) Prriinttiing emaiills b P n ng ema s c)) Frraudullentt emaiill acttiiviitty c F audu en ema ac v y d)) Access morre tthan one emaiill accountt siimullttaneouslly d Access mo e han one ema accoun s mu aneous y Q....

35 IIn computterr tterrms whatt iis a Worrm? Q 35 n compu e e ms wha s a Wo m? a)) A nettworrk tthatt can be used by anyone a A ne wo k ha can be used by anyone b)) Non--malliiciious e--maiill b Non ma c ous e ma c)) A desttrructtiive soffttwarre prrogrram c A des uc ve so wa e p og am d)) A ttype off securriitty deviice d A ype o secu y dev ce © www.Q. 33 Whatt does WAN sttand fforr? Q 33 Wha does WAN s and o ? a)) Wiide Access Nettworrk a W de Access Ne wo k b)) Wiide Arrea Nettworrk b W de A ea Ne wo k c)) Wiindows Access Nettworrk c W ndows Access Ne wo k d)) Wiindows Arrea Nettworrk d W ndows A ea Ne wo k Q... 34 IIn computterr tterrms whatt iis a Trrojjan horrse? Q 34 n compu e e ms wha s a T o an ho se? a)) A llarrge websiitte a A a ge webs e b)) An applliicattiion allllowiing ottherr userrs tto have access tto yourr computterr b An app ca on a ow ng o he use s o have access o you compu e c)) A llarrge nettworrk c A a ge ne wo k d)) An applliicattiion allllowiing userrs tto have access tto allll nettworrk prriintterrs d An app ca on a ow ng use s o have access o a ne wo k p n e s Q.learn-new-skills-from-home..com 2010 OFFICE 2010 VERSION 15 .

PLEASE VISIT: www.com © www.learn-new-skills-from-home. 36 Whatt iis encrrypttiion? Q 36 Wha s enc yp on? a)) A way off makiing datta harrderr tto access by unwantted userrs a A way o mak ng da a ha de o access by unwan ed use s b)) A desttrructtiive soffttwarre prrogrram b A des uc ve so wa e p og am c)) A way off makiing datta easiierr tto access by unwantted userrs c A way o mak ng da a eas e o access by unwan ed use s d)) A crross compattiiblle brrowserr d A c oss compa b e b owse THIS IS A FREE SAMPLE.com 2010 OFFICE 2010 VERSION 16 . ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA. FOR ALL VISIBLE QUESTIONS.learn-new-skills-from-home.Q..

and other forms of malware.MODULE 1 – IT SECURITY ANSWERS A.1 Open the Answer File word document located in the Module 1 folder by double clicking it. It may also prevent and remove adware. worms. Once your ID is added. and Trojan horses. detect. 2 c) Anti-virus software Antivirus or anti-virus software is used to prevent. Windows has a built in firewall located in the Security centre. If you don’t have an ID number then your name will suffice. Candidate Identification number A. Answer section. In a 2009 a survey by the Symantec Corporation (largest maker of security software for computers) showed that more than 80% of home users have some kind of anti-virus software installed on their machine. © www. spyware.com 2010 OFFICE 2010 VERSION 17 . Required location Required file Enter your candidate identification (ID) into the Q1. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria. 3 b) Application designed to block unauthorized access while permitting authorized communications A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. A. answer the following test questions in there relevant number fields.learn-new-skills-from-home. and remove computer viruses.

FOR ALL VISIBLE QUESTIONS. customer lists. They also use a practice known as "e-mail appending" or "epending" in which they use known information about their target (such as a postal address) to search for the target's e-mail address. ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA. is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail. websites. Spammers collect e-mail addresses from chat-rooms.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION 18 . 4 d) Send unsolicited bulk e-mail messages indiscriminately E-mail spam.learn-new-skills-from-home. Spam currently averages 78% of all e-mail sent (2010 figures). newsgroups.A. THIS IS A FREE SAMPLE. also known as junk e-mail or unsolicited bulk e-mail. and viruses which harvest users' address books. Much of spam is sent to invalid e-mail addresses.com © www. and are sold to other spammers. PLEASE VISIT: www.

time permitting. the subject knowledge required for the IT Fundamentals examination (Renaming. The test centre invigilator will inform you of the rules and requirements of the test prior to the exam start.com 2010 OFFICE 2010 VERSION 19 . Learners are advised not to spend too long on each question and if unsure of a particular answer to move onto the next question available and return to the original question. and how to duplicate. Copying folders etc…) covers the standard features set in all these systems. move and delete files and compress and extract files. It is recommended that use the system clock. Generally test centres won’t let candidates collect printouts while the test is in progress. Although these operating systems GUI (Graphical User Interface) and advanced features may vary. etc. This can be an advantage to candidates as it saves precious time in waiting for the printing process. TEST STRUCTURE: The IT User Fundamentals module test requires a pass mark of 24 (75%) out of the possible 32 marks available. Deleting.. 3.) as it will be easier to keep track of your progress.. Partially completed questions can be awarded half marks. Learners have 45 minutes to complete the test and can complete test questions in any order but are advised that they attempt them in sequence (1. © www. therefore attempting a section of a question is advised. 2. Additional the module addresses how to manage and organize files (Windows Explorer). as this facility will be available in the test environment. located at the bottom right corner of the monitor to time their progress. Please note operating systems may vary (Windows XP/Vista/7) in examination centres. directories. The test invigilator will either collect printouts for candidates or candidates will be allowed to collect them at the end of the exam.MODULE 2 .learn-new-skills-from-home.IT USER FUNDAMENTALS The IT User Fundamentals module enables candidates to gain the knowledge and skills required to understand common functions of a personal computer (PC) and its operating system (Windows Vista). folders. depending on the marking criteria assigned to that particular question.

com 2010 OFFICE 2010 VERSION 20 . (a) It will help to spread viruses on your computer network (b) It will make the computer run faster on the internet (c) It prevents software on your computer being copied (d) It will detect and remove viruses from your computer Q6. Open the Answer File word document contained within it. Q7. Which file type below is often used for databases? Enter your answer (a. Q4. Q2. (a) . Which of the following is an advantage of a virus scanning application? Enter your answer (a.MODULE 2 .accdb (c) . c. b.gif Q5. Which of the following is the correct name for the screen image shown below? Enter your answer (a. or d) in the Answer File (Q. c.. Locate the file bronze document in the Module 2 folder and rename the file to bronze admin members document. (a) Formatting Bar (b) Scroll Bar (c) Status Bar (d) Quick Access Toolbar Q3.IT USER FUNDAMENTALS TEST Q1. 3 space provided). b. Q7 Crreatte a shorrttcutt iicon fforr tthe Modulle 2 ffollderr wiitthiin tthe Fiilles ffollderr orr on yourr deskttop.zip (d) . 5 space provided). Enter your Candidate Identification (or your name) in the space provided on row 1 of the table in the Answer File and save the Answer File. b. c.learn-new-skills-from-home.. or d) in the Answer File (Q.mp3 (b) . or d) in the Answer File (Q. C ea e a sho cu con o he Modu e 2 o de w h n he F es o de o on you desk op © www. Select the Module 2 folder. 4 space provided).

.... ((Q...com 2010 OFFICE 2010 VERSION 21 . answe a b c o d n he Answe F e Q 13 space p ov ded ((a)) Trry rreopeniing tthe applliicattiion a T y eopen ng he app ca on ((b)) Prress Cttrrll + Alltt + Dellette.. c. Go d sub o de Q10. Entterr yourr Q11 Coun he numbe o es nc ud ng any es n sub o de s con a ned n he Modu e 2 o de En e you answerr iin tthe Answerr Fiille ((opened iin questtiion one)) and save. 12 space prroviided))..... Q9 Copy tthe golld admiin memberrs documentt and golld memberr jjpeg iimage ffrrom tthe Modulle 2 ffollderr tto tthe Copy he go d adm n membe s documen and go d membe peg mage om he Modu e 2 o de o he Golld subffollderr. orr d)) iin tthe Answerr Fiille ((Q.. Whiich one off tthe ffollllowiing iis tthe corrrrectt prrocedurre tto shutt down a non--rrespondiing applliicattiion? Entterr yourr Q13 Wh ch one o he o ow ng s he co ec p ocedu e o shu down a non espond ng app ca on? En e you answerr ((a. c. Q8 Locatte tthe Memberrs ffollderr wiitthiin tthe Modulle 2 ffollderr and crreatte tthe ffollllowiing subffollderr sttrructturre as Loca e he Membe s o de w h n he Modu e 2 o de and c ea e he o ow ng sub o de s uc u e as rreprresentted by tthe diiagrram bellow:: ep esen ed by he d ag am be ow Q9.. iin tthe Task Managerr wiindow sellectt tthe non--rrespondiing d P ess C + A + De e e n he Task Manage w ndow se ec he non espond ng applliicattiion and clliick End Task app ca on and c ck End Task © www. answe a b c o d n he Answe F e Q 12 space p ov ded ((a)) a ((b)) b ((c)) c ((d)) d Q13.. answe n he Answe F e opened n ques on one and save Q 11 space p ov ded Q12.learn-new-skills-from-home. b. Whiich one off tthe ffollllowiing iicons shown bellow rreprresentts tthe Wiindows Securriitty Centtrre? Entterr yourr Q12 Wh ch one o he o ow ng cons shown be ow ep esen s he W ndows Secu y Cen e? En e you answerr ((a... Change tthe attttrriibutte off tthe Sttaffff Dettaiills documentt iin tthe Modulle 2 ffollderr tto Read--onlly. Q10 Change he a bu e o he S a De a s documen n he Modu e 2 o de o Read on y Q11.. orr d)) iin tthe Answerr Fiille ((Q.....11 space prroviided)). b... iin tthe Task Managerr wiindow clliick New Task b P ess C + A + De e e n he Task Manage w ndow c ck New Task ((c)) Resttarrtt tthe computterr c Res a he compu e ((d)) Prress Cttrrll + Alltt + Dellette.Q8. Countt tthe numberr off ffiilles ((iinclludiing any ffiilles iin subffollderrs)) conttaiined iin tthe Modulle 2 ffollderr.. 13 space prroviided)).

. Dellette tthe Feedback documentt ffrrom tthe Modulle 2 ffollderr.xllsx d HM 2009Q1A T ad ng x sx Q18. Q14 Wh ch one o he o ow ng Func on Keys ac va es he He p op on n w ndows? En e you answe a b c.. b. c. Conttrroll Panell tthen Perrsonalliize c Se ec S a Con o Pane hen Pe sona ze ((d)) Riightt clliick on tthe deskttop... c. Whiich one off tthe ffollllowiing woulld be consiiderred good prracttiice when namiing tthe Excell 2007 ffiille rrellattiing tto Q17 Wh ch one o he o ow ng wou d be cons de ed good p ac ce when nam ng he Exce 2007 e e a ng o Harrrriisons Mediia’’s ttrradiing ffiigurres fforr tthe ffiirrstt quarrtterr off 2009? Entterr yourr answerr ((a.. 16 Q16 How many Megaby es a e he e n a G gaby e? En e you answe a b c o d n he Answe F e Q 16 space prroviided))... orr d)) Q15 n W ndows V s a wha s he sho cu op on o pe sona ze you desk op? En e you answe a b c o d iin tthe Answerr Fiille ((Q....learn-new-skills-from-home. c o d n he Answe F e Q 14 space p ov ded ((a)) F5 a F5 ((b)) F8 b F8 ((c)) F1 c F1 ((d)) F12 d F12 Q15.. Exttrractt tthe ziipped ffiille named Ziipped Fiilles iin tthe Modulle 2 ffollderr.. IIn Wiindows Viistta whatt iis tthe shorrttcutt opttiion tto perrsonalliize yourr deskttop? Entterr yourr answerr ((a.. c....xlls b Ha sons Med a F gues x s ((c)) Harrrriisons Mediia 2009 Q1 Trradiing. 17 space prroviided)). 14 space prroviided)). space p ov ded ((a)) 10 a 10 ((b)) 100 b 100 ((c)) 1024 c 1024 ((d)) 10000 d 10000 Q17. sellectt New tthen Shorrttcutt d R gh c ck on he desk op se ec New hen Sho cu Q16. 15 space prroviided)).. Save tthe exttrractted ffollderr and ffiilles iintto Q19 Ex ac he z pped e named Z pped F es n he Modu e 2 o de Save he ex ac ed o de and es n o tthe Carrs ffollderr. Whiich one off tthe ffollllowiing Functtiion Keys acttiivattes tthe Hellp opttiion iin wiindows? Entterr yourr answerr ((a. Answe F e Q 17 space p ov ded ((a)) Harrrriisons Trradiing..... How many Megabyttes arre ttherre iin a Giigabytte? Entterr yourr answerr ((a. b.xllsx c Ha sons Med a 2009 Q1 T ad ng x sx ((d)) HM 2009Q1A Trradiing... orr d)) iin tthe Answerr Fiille ((Q.. orr d)) iin tthe Ha sons Med a s ad ng gu es o he s qua e o 2009? En e you answe a b c o d n he Answerr Fiille ((Q. n he Answe F e Q 15 space p ov ded ((a)) Riightt clliick on tthe deskttop and sellectt Perrsonalliize a R gh c ck on he desk op and se ec Pe sona ze ((b)) Sellectt Sttarrtt tthen Nettworrk b Se ec S a hen Ne wo k ((c)) Sellectt Sttarrtt.com 2010 OFFICE 2010 VERSION 22 ... Q18 De e e he Feedback documen om he Modu e 2 o de Q19...xllsx--10 a Ha sons T ad ng x sx 10 ((b)) Harrrriisons Mediia Fiigues..Q14.. b.. b..... orr d)) iin tthe Answerr Fiille ((Q. he Ca s o de © www.

b.. Answe F e Q 20 space p ov ded ((a)) Allllows easiierr access tto tthe iintterrnett a A ows eas e access o he n e ne ((b)) To prreventt tthe rriisk off access tto a nettworrk by unwantted userrs b To p even he sk o access o a ne wo k by unwan ed use s ((c)) IImprroves WAN accessiibiilliitty c mp oves WAN access b y ((d)) Saves morre datta space d Saves mo e da a space Q21. Move tthe Recyclle Biin tto tthe upperr Q23 Emp y he Recyc e B n by se ec ng he equ ed con on he desk op Move he Recyc e B n o he uppe rriightt corrnerr off tthe deskttop scrreen. ns a ed p n e ? En e you answe a b c o d n he Answe F e Q 3 space p ov ded ((a)) Sett as Deffaulltt a Se as De au ((b)) Pause Prriinttiing b Pause P n ng ((c)) Add Prriintterr c Add P n e ((d)) Captturre Prriintterr Porrtt d Cap u e P n e Po Q23. 21 space prroviided)).Q20. Whiich off tthe ffollllowiing iis mostt lliikelly tto hellp rregaiin a llostt iintterrnett connecttiion? Entterr yourr answerr ((a.. b.... Why shoulld you change yourr computterr llogiin passworrd ffrrequenttlly? Entterr yourr answerr ((a. orr d)) iin tthe Q20 Why shou d you change you compu e og n passwo d equen y? En e you answe a b c o d n he Answerr Fiille ((Q. c.. Whatt arre tthe Wiindows shorrttcutt keys tthatt enablle tthe buiilltt iin searrch ffaciilliitty? Entterr yourr answerr ((a... n he Answe F e Q 24 space p ov ded ((a)) Shiifftt + P a Sh + P ((b)) Alltt + F8 b A + F8 ((c)) Cttrrll + Alltt + Dellette c C + A + De e e ((d)) WIINKEY + F d W NKEY + F © www. orr d)) iin tthe Answerr Fiille ((Q. Q21 Wh ch o he o ow ng s mos ke y o he p ega n a os n e ne connec on? En e you answe a b c orr d)) iin tthe Answerr Fiille ((Q. c. orr d)) Q24 Wha a e he W ndows sho cu keys ha enab e he bu n sea ch ac y? En e you answe a b c o d iin tthe Answerr Fiille ((Q.. b. Emptty tthe Recyclle Biin by sellecttiing tthe rrequiirred iicon on tthe deskttop... Whiich off tthe ffollllowiing opttiions wiillll allllow you tto change ffrrom tthe currrrentt iinsttalllled prriintterr tto anottherr Q22 Wh ch o he o ow ng op ons w a ow you o change om he cu en ns a ed p n e o ano he iinsttalllled prriintterr? Entterr yourr answerr ((a...learn-new-skills-from-home.. o d n he Answe F e Q 21 space p ov ded ((a)) Refforrmatte tthe harrd drriive a Re o ma e he ha d d ve ((b)) Check tthe modem and//orr rroutterr connecttiions b Check he modem and o ou e connec ons ((c)) Perrfforrm a viirrus check c Pe o m a v us check ((d)) Open Task Managerr and cllose allll open prrogrrams d Open Task Manage and c ose a open p og ams Q22. b...... 3 space prroviided)).. c... 24 space prroviided)). 20 space prroviided)).. c.. gh co ne o he desk op sc een Q24.com 2010 OFFICE 2010 VERSION 23 ....

. Whatt iis tthe speed off a CPU measurred iin? Entterr yourr answerr ((a. orr d)) iin tthe Answerr Fiille ((Q... c.. Whiich off tthe ffollllowiing woulld sllow down yourr computterr perrfforrmance? Entterr yourr answerr ((a...... whiich one off tthe ffollllowiing ffollderrs woulld be cllasses as a rroott diirrecttorry? Entterr yourr Q25 Us ng he mage be ow wh ch one o he o ow ng o de s wou d be c asses as a oo d ec o y? En e you answerr ((a. c. orr d)) iin tthe Answerr Fiille ((Q. Captturre a prriintt scrreen iimage off yourr deskttop and pastte iitt iintto tthe Q. b. Whatt iis diisk fforrmattttiing used fforr? Entterr yourr answerr ((a. c... b.. p ov ded ((a)) Giigabyttes ((GB)) a G gaby es GB ((b)) Biitts perr second ((Bps)) b B s pe second Bps ((c)) Megaherrttz ((MHz)) c Megahe z MHz ((d)) Megabyttes ((MB)) d Megaby es MB © www.. 26 space prroviided)). b.. orr d)) iin tthe Answerr Fiille ((Q.. c. 27 space prroviided iin tthe Answerr Fiille. b. Usiing tthe iimage bellow. Q27 Cap u e a p n sc een mage o you desk op and pas e n o he Q 27 space p ov ded n he Answe F e Q28.. 25 space prroviided)).Q25....learn-new-skills-from-home. p ov ded ((a)) Fiindiing rrequiirred ffiilles on a harrd diisk a F nd ng equ ed es on a ha d d sk ((b)) Lockiing a harrd drriive b Lock ng a ha d d ve ((c)) Accessiing xlls datta ffiilles c Access ng x s da a es ((d)) To prreparre a diisk tto sttorre ffiilles d To p epa e a d sk o s o e es Q29. 29 space Q29 Wha s he speed o a CPU measu ed n? En e you answe a b c o d n he Answe F e Q 29 space prroviided))...com 2010 OFFICE 2010 VERSION 24 ... 28 space Q28 Wha s d sk o ma ng used o ? En e you answe a b c o d n he Answe F e Q 28 space prroviided))... answe a b c o d n he Answe F e Q 25 space p ov ded ((a)) Book a Book ((b)) ACER ((C)):: b ACER C ((c)) Logs c Logs ((d)) Prrogrram Fiilles d P og am F es Q26. orr d)) iin Q26 Wh ch o he o ow ng wou d s ow down you compu e pe o mance? En e you answe a b c o d n tthe Answerr Fiille ((Q.. he Answe F e Q 26 space p ov ded ((a)) Usiing a llarrgerr moniittorr a Us ng a a ge mon o ((b)) Decrreasiing tthe numberr off applliicattiions rrunniing b Dec eas ng he numbe o app ca ons unn ng ((c)) Usiing a ffastterr prriintterr c Us ng a as e p n e ((d)) Decrreasiing tthe RAM siize iin tthe computterr d Dec eas ng he RAM s ze n he compu e Q27...

learn-new-skills-from-home.. ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA. he e name P n F e Save and c ose he Answe F e documen THIS IS A FREE SAMPLE. Prriintt one copy off tthe Answerr Fiille ((iiff prriintterr avaiillablle)) orr save as a prriintt ffiille tto tthe Modulle 2 ffollderr.com 2010 OFFICE 2010 VERSION 25 .com © www..learn-new-skills-from-home.. PLEASE VISIT: www. Save and cllose tthe Answerr Fiille documentt. FOR ALL VISIBLE QUESTIONS..Q30. usiing Q30 P n one copy o he Answe F e p n e ava ab e o save as a p n e o he Modu e 2 o de us ng tthe ffiille name Prriintt Fiille.

mdb” format.accdb Microsoft Office Access 2007 supports the document format “accdb”. Open the Answer File located in the Module 2 folder by double clicking it (this will open the document directly in your computers word-processing application). d) Quick Access Toolbar The Quick Access Toolbar is located by default at the top of the Word window and provides quick access to tools that you use frequently.com 2010 OFFICE 2010 VERSION 26 .MODULE 2 . to open the document in 2007. b) . A4. Enter your Candidate Identification (or your name.learn-new-skills-from-home. Before you start any test questions make sure the “Minimize the Ribbon” option is deselected on the quick access toolbar otherwise the Office Ribbon will be minimized every time you click on the document page. This format allows users of old versions of Microsoft Access (2000/XP/2003) software which used the “. Required location Answer File A2. You can customize the Quick Access Toolbar by adding commands to it.IT USER FUNDAMENTALS ANSWERS A1. if you have no Candidate Identification Number). © www. but documents that were created in Access 2007 cannot be opened in older versions unless a compatibility program is used. Candidate Identification number A3.

A6. New file name © www. Rename option Change the name of the document to bronze admin members.A5. right click the bronze document and select the Rename option. d) It will detect and remove viruses from your computer It is advisable to scan and update your computer on a regular basis (daily if possible).learn-new-skills-from-home. using your computer anti-virus software.com 2010 OFFICE 2010 VERSION 27 . Locate the bronze document located in the Module 2 folder.

. etc. located at the bottom right corner of the monitor to time their progress. 2. TEST STRUCTURE: The Using Email and the Internet module test requires a pass mark of 24 (75%) out of the possible 32 marks available. as this facility will be available in the test environment. time permitting. Learners have 45 minutes to complete the test and can complete the test questions in any order. 3.USING EMAIL AND THE INTERNET The Using Email and the Internet module also known as Web Browsing and Communication are divided into two separate sections. The test invigilator will either collect printouts for candidates or candidates will be allowed to collect them at the end of the exam. and to appreciate some of the security considerations. The test centre invigilator will inform you of the rules and requirements of the test prior to the exam start. Generally test centres won’t let candidates collect printouts while the test is in progress. and gain the ability to use email software to send and receive messages. Communication. It is recommended that use the system clock.com 2010 OFFICE 2010 VERSION 28 . but it recommended that they attempt them in sequence (1.) as it will be easier to keep track of their progress.learn-new-skills-from-home. In the second section. This can be an advantage to candidates as it saves precious time in waiting for the printing process.MODULE 7 . © www. The first section covers web browsing (Microsoft Internet Explorer) and requires candidates to understand some of the concepts and terms associated with using the Internet. Learners are advised not to spend too long on each question and if unsure of a particular answer to move onto the next question available and return to the original question. and to attach files to mail messages. candidates will learn to understand some of the concepts of electronic mail (Microsoft Outlook)..

What is HTTP? Enter your answer (a. b.learn-new-skills-from-home. or d) in the Answer File (Q. What is a Search Engine? Enter your answer (a. What is a Web Browser Home Page? Enter your answer in the Answer File (Q. 4 space provided).USING EMAIL AND THE INTERNET INTERNET SECTION TEST Q1. a) The first page for a set of Web pages in a Web site b) A Web Browser help system c) A hyperlink to a document d) A start page in a Web Browser © www. Q3. Enter your Candidate Identification (or your name) in the space provided on row 1 of the table in the Answer File. or d) in the Answer File (Q. 3 space provided). b. c. 2 space provided). a) Hyperlink Transfer Protocol b) Hyperlink Transmission Procedure c) Hypertext Transfer Protocol d) Hypertext Transmission Procedure Q2. a) A program that searches Web pages for viruses b) A program that searches for an Internet connection c) A program that refreshes Web pages d) A program that searches the Internet by key words Q4. Open the Answer File contained within it. Select the Module 7 folder.com 2010 OFFICE 2010 VERSION 29 . c.

.com 2010 OFFICE 2010 VERSION 30 . c... b.. b. b.....com page add ess h p www ea n new sk s om home com © www. b. Fiirreffox.7 space prroviided)).. Q6 Whatt iis an RSS ffeed? Entterr yourr answerr ((a..6 space prroviided)).llearrn--new--skiilllls--ffrrom--home.. b www c)) .... IIntterrnett Expllorrerr. p ov ded a)) Encodiing off datta tto prreventt iinffecttiion by computterr viirruses a Encod ng o da a o p even n ec on by compu e v uses b)) Encodiing off datta tto prreventt datta gettttiing llostt b Encod ng o da a o p even da a ge ng os c)) Encodiing off datta tto prreventt acciidenttall dellettiion c Encod ng o da a o p even acc den a de e on d)) Encodiing off datta tto prreventt unautthorriized access tto datta d Encod ng o da a o p even unau ho zed access o da a Q6. Q7 Whiich one off tthe ffollllowiing rrefferrs tto tthe domaiin name iin tthe URL:: httttp::////www... Saffarrii ettc…)) and go tto tthe ffollllowiing web Open a web b ows ng app ca on e n e ne Exp o e F e ox Sa a e c… and go o he o ow ng web page addrress:: httttp::////www.. Entterr yourr answerr ((a. c...learn-new-skills-from-home.. Q5 Whatt iis encrrypttiion and why iis iitt used? Entterr yourr answerr ((a. orr d)) iin tthe Answerr Fiille ((Q.. orr d)) iin tthe Answerr Fiille ((Q..llearrn--new--skiilllls--ffrrom-Wh ch one o he o ow ng e e s o he doma n name n he URL h p www ea n new sk s om hom. Wha s an RSS eed? En e you answe a b c o d n he Answe F e Q 6 space p ov ded a)) A fforrmatt used tto publliish ffrrequenttlly updatted conttentt such as news headlliines orr podcastts a A o ma used o pub sh equen y upda ed con en such as news head nes o podcas s b)) A fforrmatt used tto publliish ffrrequenttlly updatted new userrs tto websiittes b A o ma used o pub sh equen y upda ed new use s o webs es c)) A fforrmatt used tto publliish onlly ttextt datta tto websiittes c A o ma used o pub sh on y ex da a o webs es d)) A fforrmatt used tto publliish onlly numerriicall datta tto websiittes d A o ma used o pub sh on y nume ca da a o webs es Q7.... Q9 Open a web brrowsiing applliicattiion ((ii... Wha s ph sh ng? En e you answe a b c o d n he Answe F e Q 8 space p ov ded a)) Scheme wherre crriimiinalls send unsolliiciitted emaiill orr pop--up messages tto gett perrsonall and a Scheme whe e c m na s send unso c ed ema o pop up messages o ge pe sona and ffiinanciiall iinfforrmattiion ffrrom unsuspecttiing viicttiims nanc a n o ma on om unsuspec ng v c ms b)) An emaiill warrniing tthe rreciipiientt off a computterr viirrus tthrreatt b An ema wa n ng he ec p en o a compu e v us h ea c)) Sendiing an e--maiill wiitth a genuiine jjob offfferr c Send ng an e ma w h a genu ne ob o e d)) Sendiing an emaiill conttaiiniing an attttachmentt d Send ng an ema con a n ng an a achmen Q9..Q5....5 space Wha s enc yp on and why s used? En e you answe a b c o d n he Answe F e Q 5 space prroviided)).e. c. Q8 Whatt iis phiishiing? Entterr yourr answerr ((a. c.. orr d)) iin tthe Answerr Fiille ((Q.com c com d)) llearrn--new--skiilllls--ffrrom--hom d ea n new sk s om hom Q8.8 space prroviided)). orr d)) iin tthe Answerr Fiille ((Q.. hom com En e you answe a b c o d n he Answe F e Q 7 space p ov ded a)) httttp:://// a h p b)) www....com.

Sellectt any websiitte tthatt giives iinfforrmattiion aboutt “IICT iin tthe worrkpllace” ffrrom tthe searrch rresulltts.ttxtt tto Q16 Se ec any webs e ha g ves n o ma on abou London om he sea ch esu s and save as London x o tthe Modulle 7 ffollderr.llearrn--new--skiilllls--ffrrom--home. Access a searrch engiine ((ii.. IIntterrnett Expllorrerr. Prriintt one Q13 Se ec any webs e ha g ves n o ma on abou “ CT n he wo kp ace” om he sea ch esu s P n one copy off tthe page tto an outtputt prriintterr iiff avaiillablle......com.. sc een se ec he Vo e bu on Q11. Saffarrii ettc…)) applliicattiion and go tto tthe Q14 Open you compu e s web b owse e n e ne Exp o e F e ox Sa a e c… app ca on and go o he ffollllowiing web page addrress:: httttp::////www....com 2010 OFFICE 2010 VERSION 31 . MSN.. Save tthe websiitte llogo iimage as o ow ng web page add ess h p www ea n new sk s om home com Save he webs e ogo mage as llogo tto tthe Modulle 7 ffollderr... Yahoo ettc…)) and perrfforrm a searrch usiing tthe phrrase “whatt iis Q12 Access a sea ch eng ne e Goog e MSN Yahoo e c… and pe o m a sea ch us ng he ph ase “wha s IICT”...Q10. ogo o he Modu e 7 o de Q15. ttiime ettc…)) diispllayed on tthe page iintto tthe Answerr Fiille ((Q.. Q15 Access he sea ch eng ne Goog e and pe o m a sea ch us ng he keywo d London Q16... p ov ded Q12.... c you a e add ng a p n e o you Modu e 7 o de Q14. CT” Q13. Open yourr computterrs web brrowserr ((ii.. Googlle. Entterr tthe Fiirrstt Votte dettaiills ((datte.learn-new-skills-from-home... he Modu e 7 o de © www.. Use tthe ffiille name copy o he page o an ou pu p n e ava ab e o as a p n e o he Modu e 7 o de Use he e name iictt iiff you arre addiing a prriintt ffiille tto yourr Modulle 7 ffollderr. 11 space Q11 En e he F s Vo e de a s da e me e c… d sp ayed on he page n o he Answe F e Q 11 space prroviided)).e.... Sellectt any websiitte tthatt giives iinfforrmattiion aboutt London ffrrom tthe searrch rresulltts and save as London...e. Sellectt a rrellevantt answerr ((off yourr choiice)) iin tthe Questtiion modulle llocatted on tthe rriightt hand siide off tthe Q10 Se ec a e evan answe o you cho ce n he Ques on modu e oca ed on he gh hand s de o he scrreen sellectt tthe Votte butttton. Fiirreffox. Access tthe searrch engiine Googlle and perrfforrm a searrch usiing tthe keyworrd London. orr as a prriintt ffiille tto tthe Modulle 7 ffollderr..

Whatt iis a diigiittall siignatturre? Entterr yourr answerr ((a. Q18 Wha s a d g a s gna u e? En e you answe a b c o d n he Answe F e Q 18 space p ov ded a)) An ellecttrroniic siignatturre tthatt iis used tto buy goods on tthe IIntterrnett a An e ec on c s gna u e ha s used o buy goods on he n e ne b)) An ellecttrroniic siignatturre tthatt appearrs on allll ffiille attttachmentts b An e ec on c s gna u e ha appea s on a e a achmen s c)) An ellecttrroniic siignatturre tthatt conttaiins tthe addrress fforr an e--maiill c An e ec on c s gna u e ha con a ns he add ess o an e ma d)) An ellecttrroniic siignatturre tthatt iis used tto autthenttiicatte tthe iidenttiitty off tthe senderr off a message d An e ec on c s gna u e ha s used o au hen ca e he den y o he sende o a message Q19. b. space p ov ded a)) Emaiill messages arre allways easy tto llocatte a Ema messages a e a ways easy o oca e b)) Emaiill iis a llow costt way tto ttrransmiitt messages b Ema s a ow cos way o ansm messages c)) Emaiill iis allways a securre means off sendiing messages c Ema s a ways a secu e means o send ng messages d)) Emaiill elliimiinattes tthe need fforr conventtiionall surrfface maiill d Ema e m na es he need o conven ona su ace ma Q18.. b.. orr d)) iin tthe Answerr Fiille ((Q.. orr d)) iin tthe Answerr Fiille ((Q.... c. b.....EMAIL SECTION Q17. En e you answe a b c o d n he Answe F e Q 19 space p ov ded a)) iintterrnattiionall a n e na ona b)) a.. 18 space prroviided)). Whiich off tthe ffollllowiing iis an advanttage off emaiill? Entterr yourr answerr ((a. b. 20 space prroviided)). orr d)) iin tthe Answerr Fiille ((Q..learn-new-skills-from-home. c.... you answe a b c o d n he Answe F e Q 20 space p ov ded a)) IIP a P b)) POP b POP c)) SMS c S MS d)) RSS d RS S © www..... Whatt iis tthe name off tthe prrottocoll tthatt allllows emaiill clliientts tto rrettrriieve emaiill ffrrom a rremotte serrverr? Entterr Q20 Wha s he name o he p o oco ha a ows ema c en s o e eve ema om a emo e se ve ? En e yourr answerr ((a.. c.. 17 Q17 Wh ch o he o ow ng s an advan age o ema ? En e you answe a b c o d n he Answe F e Q 17 space prroviided)).au whiich parrtt off tthe addrress iidenttiiffiies tthe geogrraphiicall arrea? Q19 n he ema add ess n e na ona @exam au wh ch pa o he add ess den es he geog aph ca a ea? Entterr yourr answerr ((a. IIn tthe emaiill addrress iintterrnattiionall@exam.. c..com 2010 OFFICE 2010 VERSION 32 ...u b au c)) exam c exam d)) @ d @ Q20. orr d)) iin tthe Answerr Fiille ((Q. 19 space prroviided))..

. he sub ec Type he ex be ow n o he body a ea o he e ma Q26. Saffe--Maiill.. b.... Send tthe Carreerr Change message wiitth hiigh prriiorriitty. Q21 Open you ema accoun e Ou ook MSN Sa e Ma Goog e e c… and c ea e a new ma message Q22..doc ffrrom tthe Modulle 7 ffollderr as an attttachmentt tto tthe Carreerr Q23 nse he e Enhance you ca ee p ospec s doc om he Modu e 7 o de as an a achmen o he Ca ee Change message..... Prreparre a new message wiitth tthe maiill addrress _ _ _ _ @ _ _ _ . Q24 Send he Ca ee Change message w h h gh p o y Q25.... Open yourr emaiill accountt ((ii. Q22 P epa e a new message w h he ma add ess _ _ _ _ @ _ _ _ com and en e Ca ee Change as he sub ec Forr tthe purrpose off tthiis exerrciise eiittherr use yourr own orr a ffrriiends e--maiill addrress.. Open he Ca ee Change message om he Sen ems box Prriintt one copy off tthe Carreerr Change message tto an outtputt prriintterr iiff avaiillablle.. Allways doublle check yourr Fo he pu pose o h s exe c se e he use you own o a ends e ma add ess A ways doub e check you e--maiill addrresses as iitt iis easy tto make a siimplle miisttake. space p ov ded a)) IIncrreasiing brroadband capabiilliitty a nc eas ng b oadband capab y b)) Sensiittiive and paymentt ttrransacttiions b Sens ve and paymen ansac ons c)) Searrchiing fforr websiittes c Sea ch ng o webs es d)) Dellettiing ffiilles d De e ng es © www.com 2010 OFFICE 2010 VERSION 33 .. Googlle ettc…)) and crreatte a new maiill message.Q21..com ((off yourr choiice)) and entterr Meettiing as Q25 P epa e a new message w h he ma add ess _ _ _ _ @ _ _ _ com o you cho ce and en e Mee ng as tthe subjjectt. Modu e 7 o de Use he e name ca ee change you a e add ng a p n e o you Modu e 7 o de Q29. orr d)) iin tthe Answerr Fiille ((Q. ma message Q23.....com and entterr Carreerr Change as tthe subjjectt.. Use tthe ffiille name carreerrchange iiff you arre addiing a prriintt ffiille tto yourr Modulle 7 ffollderr. Prreparre a new message wiitth tthe maiill addrress _ _ _ _ @ _ _ _ . Q27 Q28.. IInserrtt tthe ffiille Enhance yourr carreerr prrospectts.. c. MSN.... Whatt arre HTTPS connecttiions maiinlly used fforr? Entterr yourr answerr ((a..learn-new-skills-from-home. Send he Mee ng message w h ow p o y Open tthe Carreerr Change message ffrrom tthe Sentt iittems box..... Q28 Send tthe Meettiing message wiitth llow prriiorriitty.e. orr as a prriintt ffiille tto tthe P n one copy o he Ca ee Change message o an ou pu p n e ava ab e o as a p n e o he Modulle 7 ffollderr. Type tthe ttextt bellow iintto tthe body arrea off tthe e--maiill. Change message Q24.. Q26 Q27. Outtllook... 29 Q29 Wha a e HTTPS connec ons ma n y used o ? En e you answe a b c o d n he Answe F e Q 29 space prroviided)). Entterr tthe ffollllowiing shorrtt ttextt iin tthe body off tthe e ma add esses as s easy o make a s mp e m s ake En e he o ow ng sho ex n he body o he maiill message..

FOR ALL VISIBLE QUESTIONS.learn-new-skills-from-home.. 30 space prroviided)). ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA.. orr d)) iin tthe Answerr Fiille ((Q.Q30. Q30 Wha does SP s and o ? En e you answe a b c o d n he Answe F e Q 30 space p ov ded a)) a b)) b c)) c d)) d IIntterrnett Serrviice Prrocedurre n e ne Se v ce P ocedu e IIntterrnett Securriitty Prrottocoll n e ne Secu y P o oco IIntterrnett Saffe Prroviiderr n e ne Sa e P ov de IIntterrnett Serrviice Prroviiderr n e ne Se v ce P ov de THIS IS A FREE SAMPLE.com 2010 OFFICE 2010 VERSION 34 .... c.. PLEASE VISIT: www.learn-new-skills-from-home. b.com © www. Whatt does IISP sttand fforr? Entterr yourr answerr ((a.

learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION 35 . © www. images. Search engines use complicated algorithms to calculate the displayed results.USING EMAIL AND THE INTERNET INTERNET SECTION ANSWERS A1. This includes webpage’s. Double click the Answer File document (this will open the document directly in your computers word-processing application). Bing and Yahoo etc…) are designed to search for information on the World Wide Web (WWW) via given data initially keyed into the search engine. information and other types of files. query results etc… A3. Search results can consist of web pages. d) A program that searches the internet by key words Web search engines (Google. image files. c) Hypertext Transfer Protocol Hypertext Transfer Protocol (HTTP) is basically a network protocol used to deliver virtually all files and other data on the World Wide Web (WWW). Required location Required file A2. Open the Module 7 folder. The search results are generally shown in order of relevance to the entered data.

A4. d) A start page in a Web Browser The home page is the main or first page of a web site. FOR ALL VISIBLE QUESTIONS.learn-new-skills-from-home. ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA. The page is typically set with all the required hyperlinks to access other web pages within the website.com © www.learn-new-skills-from-home. THIS IS A FREE SAMPLE. PLEASE VISIT: www.com 2010 OFFICE 2010 VERSION 36 .

and traversing information resources on the World Wide Web. and Trojan horses. they can also be used to access information provided by web servers in private networks or files in file systems. Such programs may also prevent and remove adware. and Opera.". presenting. Anti-virus Anti-Virus (Antivirus) software is used to prevent.Virus software should be updated regularly. heuristics can be used. or "bps. recipients listed in the BCC field receive a copy of the message but are not shown on any other recipient's copy including other BCC recipients. can identify new viruses or variants of existing viruses for looking for known malicious code (or slight variations of such code) in files. image. It is usually measured in bits per second. including computer viruses. worms. Browser A web browser is a software application for retrieving. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately. Mozilla Firefox. Although browsers are primarily intended to access the World Wide Web. Apple Safari. video. and other forms of malware. and remove malware. Bandwidth Bandwidth refers to how much data you can send through a network or modem connection. the higher the bandwidth the more computer data information can be transferred within a given amount of time. generic signatures. Google Chrome. However. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page. The major web browsers are Windows Internet Explorer.GLOSSARY A-Z Access (Microsoft Office) Access. The database combines the relational Microsoft Jet Database Engine with a graphical user interface (GUI) and software development tools. To counter such so called zero-day threats. or other piece of content. is a popular (home and commercial) database management system from Microsoft. Hyperlinks present in resources enable users to easily navigate their browsers to related resources. One type of heuristic approach.learn-new-skills-from-home. detect. Anti. Signature-based detection involves searching for known malicious patterns in executable code. BCC BCC (Blind Carbon Copy) is an email field that supplies hidden notification. spyware. it is possible for a user to be infected with new malware in which no signature exists yet. A variety of strategies are typically employed.com 2010 OFFICE 2010 VERSION 37 . © www.