0% found this document useful (0 votes)
161 views156 pages

IT

it

Uploaded by

ahmedkhalednasr
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
161 views156 pages

IT

it

Uploaded by

ahmedkhalednasr
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

IT Exercises

Which one of these is computer hardware?


O

The operating system.


A CPU.

A word processing package.


A spreadsheet.

Data storage

Containing CPU

Output Device Monitor

Input Device Mouse

Hard Disk

System Case

Mouse
Monitor

Hard Disk System Case

Which one of the following dose not influence the Performance of a computer?
The amount of free space on the PCs hard disk. The amount of main memory (RAM) that is installed.

The use of trackball rather than a mouse.


The type of graphics card that is installed.

The speed of a computer CPU can be measured in:

o Gigabytes.
o Gigawatts.

o Gigahertz Gigahertz.
o Gigacycles.

Which two of the following devices can be used to input data to a computer ?
1- Joystick 2- printer 3- speaker

4- standard monitor
5- keyboard

Which one of these devices can be used to output data from a computer?
1- Joystick 2- printer 3- Mouse

4- Scanner

Which one of these devices can be used to input and output data ?
1- Scanner 2- Microphone 3- Touch screen

4- Light pen

Which one of these statements about formatting Computer storage media is true?
O

Disks are automatically formatted when you save a file.


A used floppy disk cannot be reformatted. Unformatted disks need operating system data written to them before they can store files.

A Full format does not erase data from your disk.

Which one of these statements correctly completes the following sentence? A computers operating system:
O

is the last program to load when you start the computer.


does not control devices connected to the PC. is not necessary on high-powered personal computers. instructs the screen to display data entered with the keyboard.

O O O

10

A web browser

To view web pages

Word processing

Produce a catalogue containing graphics


Create interactive learning material Payroll and stock control Produce charts and graphs

A multimedia application An Accounting Application

A spreadsheet Application

A web browser
11

A spreadsheet Application

An Accounting Application

A multimedia application

Word processing

Which of following best describes a graphical user interface (GUI):


O

using a software application for technical drawing.


using a windows, icons and a mouse to operate a computer. using a system of typed commands to operate a computer. using picture rather than words for online help.

12

Which one of these stages of software development is the last stage to be finally completed?

Analysis. Design. Programming. Testing Testing.

13

Which two statement about local area networks (LAN) are true?
O

Applications cannot be shared over a LAN.

Authorized users can access and use data stored anywhere on a LAN.
Telecommunication services cannot be shared over a LAN. Large data files can be transferred between computers using a LAN.

It is not possible for users of a LAN share printers.

14

Which one of the following best describes an intranet?


O

A network which can only be accessed using an ISP. A world-wide collection of computer files connected by links.

A network, using e-mail and web, within a single organization.


A network that is shared between more than one organization.

15

Which one of the following best describes an extranet?


A network, using e-mail to share data between organizations.

An extra-fast intranet within a single organizations.


A very large intranet used by the general public. A network used to share data within a single organization.

16

Drag two of the statements that describe the World Wide Web into the box.

The World Wide Web


A Vast collection of linked documents held on computers all over the world

Can be accessed using a browser

A global network of computers linked together using communications equipment

A Vast collection of linked documents held on computers all over the world

The world-wide e-mail system

A network that grew out of the American military


17

Can be accessed using a browser

Which one of these statement about the speed of connecting to the internet is true?
O

Data transfer is slower with a digital line than with an analog line. The processor speed of the computer affects the speed of data transfer on the internet. A 14.4 Kbps modem transfers data more slowly than a 56 Kbps modem. The speed of data transfer does not vary significantly with the time of the day.

18

For which one of these tasks would a computerized solution be more appropriate?
O

Calculating payroll of staff. staff Solving staff relations. Motivating staff.

Selecting new staff.

19

Large-scale computer applications are increasingly used in business.

Check policy details. Analyse statistics to estimate premiums. Provide quotes for premiums

Check an account. Transfer funds. Apply for loans.

Administer Employee payrolls. Process orders. Track invoices.

Check timetables. Check ticket availability.

Insurance claim processing

Online banking

Business administration

Airline booking

Online banking

Insurance claim processing

Airline booking

Business administration

20

Large-scale computer applications are increasingly used in government.

Policy documents.

Income tax Payment form.

Census records.

Public health warnings.

Television license Payment form.

Vehicle registration listing.

Public information systems

Administration systems

Public record systems

Public information systems

Public record systems

Administration systems

21

For which two of the following tasks in hospitals and health care would large-scale computer applications be most appropriate?
O

Bereavement counseling.

O Tracking
O O O

treatment costs.

Informing a patient of a diagnosis. Providing a medical database. Treating mental health issues.

22

Which of the following are examples of large-scale applications of computers in education? Match the following statements with the correct boxes.
Computer based education Student registration systems Student registration systems Provide student counseling Distance learning Researching homework on the internet Coaching of slower students Coaching of slower students Uses traditional methods Provide student counseling

Distance learning

Researching homework on the internet


23

What is the meaning of the letter e in the word email?

Express.

Electric.

O Electronic. Electronic.

Efficient.

24

Which two of the following contribute to a good working environment for a computer operator?
O O O O O

Use of a monitor filter to reduce the glare. Sitting as close as possible to the monitor. A good level of ventilation in the room. Plenty disk space in which to move the mouse. The keyboard positioned close to the front edge of the disk.

25

You can reduce the risk of repetitive strain injury by one of the following actions:
O

using an adjustable chair.

O
O

sitting with your feet firmly on the ground.


using an anti-glare screen.

taking frequent breaks form your work.

26

Which one of these actions demonstrate poor health and safety practice?
O

Installing too much of software on a computer. Leaving power cable unsecured. Turning off the power without first shutting down the PC. Running several applications at the same time.

27

Which statement about computers and the environment is true?


O Running

an animated screensavers saves power.

O Printer
O

toner cartridges can be recycled.

You cant recycle paper from a laser printer.

O Laptops

on standby use more electricity than when running normally.

28

Drag each of the statements about user IDs and passwords to the relevant box.
Should be changed regularly Must be unique on the network Identifies a specific user on a network Not confidential Not confidential Ensures that the person logging on is who they say they are Ensures that the person logging on is who they say they are

ID Must be unique on the network

Password

Should be changed regularly

Identifies a specific user on a network

29

Which one of the following statement describes the process of backup?


O Restoring O Copying O

work from an older file.

a file from your C: drive to your desktop.

Keeping copies of data in two locations. a file to a different folder on a hard drive.

O Moving

30

A PDA which has been backed up - but not password protected - has been stolen. Which one of the following consequences may result?
O Loss O Time

of the right to use the software that came with PDA.

wasted on re-entering all the records in a replacement PDA. Misuse of confidential files and telephone numbers. of contact details on the stolen PDA.

O Loss

31

A mobile phone which has been insured but not password protected has been stolen. Which one of the following consequences may result? A. Misuse of confidential numbers.

B. Meeting the cost of replacement.


C. Paying for calls made after the theft is reported. D. Taking out new insurance on the replacement phone.
32

A laptop which has been password protected, but not backed up, has been stolen. Which one of the following consequences may result?
O

You will have to change your e-mail address. Confidential files can be Misused. You will need to change your password. Work stored on the laptop will be lost.

33

Anti-virus software can disable a virus on your computer. This action is called:
O O O O

De-installing. Disinfecting. Disinfecting Restoring. Scanning.

34

Good Anti-virus practice Deleting e-mail from unknown sources Putting a viruschecked disk in a floppy drive

Opening e-mail from unknown sources Deleting e-mail from unknown sources Putting a viruschecked disk in a floppy drive Downloading and running free software from the web

Poor Anti-virus practice

Opening e-mail from unknown sources Downloading and running free software from the web

35

Which one of the following statements about copyright is true?


O

If you can copy material from a disk you automatically gain the copyright. Copyrights provides control over how other people make disk copies of someones work. Graphics published on CD-ROM are not subjected to any form of copyright. If you create a CD-ROM yourself, you own the copyright to anything you put on it.

36

Shareware is the term that is applied to:


O

an application that is used to track the movement of stocks and share.

software that you try for free but pay for it if you keep it.
any application for which a multi-user license is available. any software that can be used on a server.

37

An important purpose of data protection legislation is to:

O O O O

improve the standards for electronic storage media.

prevent the illegal use of commercial software.


safeguard the privacy of individuals personal data. protect companies from industrial espionage.

38

Which one of these is application software?


O

Graphics card.
Word processor processor.

Central Processing Unit (CPU).


Hard Disk.

39

Which one of these computer types is the most powerful?


-Laptop.

-Mainframe Computer. Computer


-Server. -Personal Computer.

40

Which one of the following statement is true about ROM (read-only memory):

It is wiped clean when you switch off the computer.

It stores the computers operating system.


It cannot be modified by the user.

It is loaded from your hard disk when you switch on the computer.

41

Byte

Bit

Kilobyte

Gigabyte

Megabyte

smallest

Bit

Byte

Kilobyte

Megabyte
Largest
42

Gigabyte

Which two of the following devices can be used to input data to a computer ?
1- Mouse 2- printer 3- speaker

4- Plotter
5- Light pen

43

Which one of these devices can be used to output data from a computer?
1- Keyboard 2- Microphone 3- Plotter

4- Scanner

44

Which one of these types of storage provides the fastest access to data?
1- Zip disk 2- Floppy diskette 3- Hard disk

4- CD-Rom

45

Which two of the following statements about access rights are true?
O

Are intended to protect a companys intellectual property.


Decide who can work in a building outside office hours.

Determine which files individuals can read or change on a network.


Are the same for all users on single network. on which computer you are using to access the network

O Depend

46

A Database Application Desktop Publishing A spreadsheet Application A Multimedia Application

Creating a list of contact details. Producing complex magazine layouts.

Working out budgets.

Creating interactive training materials. Creating letters and business documents.

Word Processing

Desktop Publishing

A spreadsheet Application

A Database Application

47

A multimedia application

Word processing

Which one of these stages of software development is the first stage to be completed?
O O O O

Design. Analysis. Analysis.

Programming.
Testing.

48

Which one of these is the type of network that links computers in different cities or countries?
O
O O O

LAN.
Ethernet. PSTN. WAN. WAN

49

Computer workgroups allow which three of these resources to be shared between multiple users at same time?

Sharable Resources
Printers Applications Disk Space

Printers

Disk Space

Monitors

Applications

Keyboards

50

The term ADSL stands for:


O

Anonymous Digital Service Line.

Asymmetric Digital Subscriber Line. Line


Analog Digital Service Line. Advanced Data Service Link.

51

For which two of these tasks would a computerized solution be most appropriate?
O

Assessing employee performance. Enforcing rules and regulations. Generating invoices.

Carrying out stock control.


Providing a customer support helpline.

52

Large-scale computer applications are increasingly used in government.

Store census information.

Handle social welfare payments Collect television license fees.

Announce policy documents online.

Store passport details.

Notify citizens of government decisions.

Public record systems

Administration systems

Public information systems

Public information systems

Public record systems

Administration systems

53

For which one of the following tasks in hospitals and health care would large-scale computer applications be most appropriate?
O

Running life-support systems. systems


Patient.

O Diagnosis

Comforting patients.

Guiding support groups.

54

Which one of the following statements about teleworking is true?


O

More human contact with the team. Increased company space requirements.

Greater ability to focus on one task.


Inflexible schedules.

55

Which two of the following statements about purchasing on line are true?
O

The consumers rights of the suppliers country apply. E-commerce offers access to goods around the clock. The supplier covers the cost of shipping. All e-commerce transactions are safe. The supplier covers the cost of returning goods.

56

Which one of the following contribute to a good working environment for a computer operator?
O

Locating the PC close to a printer.

O
O

Elbow and wrist support support.


High level of contrast between the screen brightness and other lighting. Direct light shining on the monitor.

57

You can reduce the risk of eye-strain by one of the following actions:
O

increase the contrast between screen and room lighting.

using an anti-glare filter on your monitor. monitor


reducing your monitors colour depth setting.

positioning the screen with a window behind it.

58

Electronic documents help to save paper , while other documents distribution.

Are best printed

Help for a software application Guarantees

Are suitable for electronic distribution


Help for a software application

Guarantees

Contracts

E-mail messages E-mail messages Contracts

59

Which one of the following statements about an organizations information security policy is true?
O

Applies to the employee, not the employer.

O
O

Deals with the handling confidential data.


Deals only with data held on computers.

Covers the licensing of operating system software.

60

Which one of the following statements about Anti virus software is true?
O

Before accessing the internet, you need to run a virus check.


Deleting an infected file will eliminate the virus. Anti-virus software can detect all known viruses. Anti-virus software can disinfect applications as well as files.

O O O

61

Good Anti-virus practice Deleting e-mail from unknown sources Scheduling virus checks to run once a day

Updating anti-virus software once a year Scheduling virus checks to run once a day Deleting e-mail from unknown sources Opening unknown email attachments

Poor Anti-virus practice

Updating anti-virus software once a year

Opening unknown email attachments

62

Which one of the following statements about copyright is true?


O

Text on a web page can be freely copied and re-used. Graphics published on the web are subjected to copyright. When you buy software, the copyright transfer to you.

It is legal to share any audio files on the internet.

63

Which one of the following statements about copyright is true?


O

The paper license that comes with software on CD transfers the copyright to you. You can make a backup CD of software bought for your own use. Software purchased on the web and copied to CD-ROM can be shared with friends. Copying text, images, audio, or video from disk is always illegal.

64

Freeware is the term that is applied to:


O
O

software that you can try free of charge before buying.


software that you dont have to pay for.

old versions of commercial software that are out of date.


software that will run under any operating system

65

Which two of the following have a significant influence on the speed at which a computer performs?
O

Installing new applications.

Clearing all the unwanted files off a hard disk.


Installing a smaller monitor. Increasing the amount of RAM. Adding a CD-ROM drive.

66

Good Anti-virus practice Deleting e-mail from unknown sources Scheduling virus checks to run once a day

Updating anti-virus software once a year Scheduling virus checks to run once a day Deleting e-mail from unknown sources Opening unknown email attachments

Poor Anti-virus practice

Updating anti-virus software once a year

Opening unknown email attachments

67

RAM
The Operating system is loaded into this when the PC is switched on.
The contents of this disappear when the PC is switched off. The contents of this change constantly as the PC is used. The Operating system is loaded into this when the PC is switched on. The contents of this are fixed during the manufacture of the PC

ROM
The contents of this are fixed during the manufacture of the PC
You cannot write to this type of memory.

The contents of this disappear when the PC is switched off. You cannot write to this type of memory.

68

The contents of this change constantly as the PC is used.

Very cheap means of backing up 1 MB of text files

Archiving 1.8GB of graphic files that are not currently needed.

Backing up 1.8GB of files you are currently working on.

1.44 MB Floppy Disk

2GB Back-up Tape

2GB Hard Disk

1.44 MB Floppy Disk

2GB Back-up Tape

2GB Hard Disk

69

An operating System Sets up the look and feel of your computer interface

You can run more than one at the same time Sets up the look and feel of your computer interface Controls the hardware and software of your computer This can be used to edit data files

A Software Application

You can run more than one at the same time

Controls the hardware and software of your computer

This can be used to edit data files

70

Which two of these are operating systems?


o

Windows. Windows . Netscape Navigator.

o
o
o

Yahoo!
Linux. Linux Outlook.

71

Which one of these statements about the internet is false?


O

It enables computer with different operating systems to exchange data. It is not controlled by any single organization. You need a license to publish material on the internet. It allows computers to share data over large distance.

72

Drag just the two of the statements that describe the internet into the box.

Internet
A global network of computers linked together using communications equipment A network that grew out of the American military

A global network of computers linked together using communications equipment

A Vast collection of linked documents held on computers all over the world

The world-wide e-mail system

A network that grew out of the American military


73

Can be accessed using a browser

Which one of these types of computer memory is permanent and unchanging?


O

Random Access Memory. Working Memory.

Virtual Memory.
Memory. Read-Only Memory .

74

Which one of the following isnt operating system?

A. Unix.
B. Windows. C. Ms Word. Word

D. Ms-Dos.

75

Which one of the following descriptions of an extranet is true?


O

A world-wide collection of files connected by links.

A very large intranet within an organization.


An extra-fast intranet for web and e-mail. Shares data between two or more organizations.

76

E-mail stands for:

A. Electric mail.
B. Electronic mail mail.

C. Efficient mail.
D. Express mail.

77

Which one of the following operating system does not have a GUI?

A. UNIX.
B. Microsoft Windows. C. MAC OS X. D. Microsoft DOS .
78

Microsoft Windows is a (an):

A. Database program.
B. Operating Operating system. system C. Word processing program. D. Graphics program.
79

Which of the following is the first stage in the standard sequence of software development?

A. Testing.
Analysis B. Analysis. C. Programming. D. Design.
80

What type of computer application would be used in a hospital to maintain patient medical details?

A. A desktop publishing application.


B. A database application application. C. A accounting application. D. A presentation engine.
81

Which one of these statements about computer application is true?


A. The same version of an application will work on any type of computer. B. They control devices such as printers and scanners that are attached to the PC. C. They enable users to carry out specific tasks such as word processing. D. They are the only programs that you need to use PC.

82

Which one of the following activities is best suited for e-mail?


A. Performing calculations.
B. Sharing very large video files, such as movie trailers. C. Sharing files between workers at different locations. D. Transmitting credit card details.

83

Which one of the following statements about copyright is true?


A. Publishing digital work on disk requires permission of the copyright holder.
B. When you purchase software in CD the copyright transfer to you. C. Any material which is published on disk is subjected to copyright.

D. You can reuse graphics from the web on CD- Rom.

84

Unauthorized access to computer files can be prevented by using:

A. Password. Password
B. Anti-virus software. C. Uninterruptible power supply.

D. Secure backup copies.

85

Which Preventative measure can be used to stop computer system becoming infected with a virus?

A. Install physical security measures.


B. Password protect the start-up process. C. Disable the floppy disk drive.

D. A virus-checking program. program

86

Which of the following precautions would prevent virus-infected software being used on computer? A. Install a virus protection system.
B. Install software to prevent hacking. C. Install password security to the system.

D. Take regular backups.

87

Electronic commerce is best described as:

A. Requesting information from companies selling electronic equipment.


B. The buying of electronic equipments from a high street shop. C. Advertising electronic goods on the internet. D. The buying of goods and services and paying for them on-line.

88

Which of the following can be used to restore programs or data after being altered by a malicious program?
A. Anti-virus software. B. Password. C. Back-up copies. copies D. Hacking.

89

Which of the following provides an example of a good working environment?

A. Adequate lighting. lighting


B. Energy-saving hardware. C. New computer hardware every two years.

D. Staff welfare benefits.

90

A company needs all its 30 office staff to use a spreadsheet application, It should:
A. Copy the spreadsheet application onto each individual PC.
B. Purchase a multi-user license. license C. Use the spreadsheet application regardless of the numbers of users.

D. Purchase a single-user license for each PC.

91

What name is given to software, which under development?


A. Beta software. software
B. Demonstration software. C. Freeware. D. Shareware.

92

Which of the following is the name given to software, which can legally be copied without a license?
A. Beta software. B. Retail software. C. Freeware. Freeware D. Protected software.

93

Which of the following best describes teleworking?


A. Working for a television.
B. Working for a telesales company. C. Designing teletext pages. D. Working at home using electronic communications.

94

An End User License Agreement


A. Is a form of advertising between a software application author and the user.
B. Gives the user the exclusive right to copy and sell the software to other potential users. C. Grants ownership of the software to the user. D. Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, release and restricted use.
95

Which of the following is a good password policy for an organization?


A. All passwords are changed regularly regularly.

B. All passwords are never changed.


C. All passwords are made up of less than four characters. D. All passwords are made up of less than four numbers.

96

Which of the following is not a function of the CPU?


A. Executing program instruction. B. Ensuring program instructions are executed in the right sequence.

C. Sending e-mail e-mail.


D. Carrying out calculations.
97

What is ISDN?

A. Integrated Standard Digital Networks.


B. Integrated Services Digital Network. Network C. Interactive Standard Dynamic Networks. D. Internet Services Data Network.

98

Large Organization often use a computer system to run the company typically it is most likely to be:
A. A Personal Computer.
B. A PDA. C. A Mini Computer. D. A Mainframe Computer Computer.

99

Scanner can be described as:

A. An output device only


B. An input device only C. An input and output device D. Storage device
100

From an output devices: A. Mouse.


B. Keyboard. C. Plotter. Plotter

D. Light Pen.

101

Which of the following statement is true?

A. The CPU is an input devices.


B. The CPU is an output devices.

C. The CPU is used to process program instructions and data.


D. The CPU is used as non volatile storage media.

102

The data stored on CD-Rom are

A. Volatile and read only data.


B. Non Volatile and read only data. data C. Non Volatile and read/write data. D. Volatile and read/write data.

103

Which is the most appropriate application to store census information?

A. Data Logging Application.


B. CAD Application. C. Database Database Application. D. Word Processor Application.

104

A GUI is used to:

A. Draw graphs and drawing.


B. Provide the interface between two peripherals. C. Provide an easy way to use computer. D. Store graphics image as file.

105

The range of voice, computer messages and other services provided by:
A. ISBN.
B. PSBX. C. ISDN ISDN. D. PSDN.

106

Which one of the following is not an input device?

A. Web camera.
B. Scanner. C. Touch pad. D. Monitor .

107

The location of information on the internet can be obtained by using a database:

A. Web editor application.


B. Search engine. engine C. Spreadsheet application. D. Word perfect.

108

Which two of the following is considered as input devices?


A. Printers.
B. Monitor.

C. Microphone Microphone.
D. Plotter. Keyboard E. Keyboard.

109

Which one have the fastest access to data?

A. DVD drive.
B. Floppy disk. C. Zip disk. D. Hard Disk.

110

Which one of these memory can not be changed?


A. Random Access Memory. B. Storing Memory. C. Read Only Memory. D. Virtual Memory.

111

Which one of the following is considered as input devices? A. Plotter.


B. Monitor. C. Web camera. D. Charger.

112

An equipment that attached to computer to stop large volts of electricity:


A. UPS. B. Battery. C. Charger. D. Surge suppressor . suppressor.

113

The baud rate can tell how fast:

A. The hard disk send and revive data.


B. The MODEM can send and revive data. C. The CPU send and revive data. D. The RAM send and revive data.

114

Where the computer is appropriate more than people?


A. In interpreting.
B. In recognizing.

C. In dangerous situation.
D. In completing.

115

A computer virus is a program that

A. Always spotted by antivirus.


B. Make your hard disk unusable. C. The only way for infection is internet. D. Can be avoid by regular backup.

116

Which one is more appropriate about Shareware software?


A. Any software used by a group of people in the same time.
B. Any application you borrow from your friend. C. Any application downloaded from internet. D. Any software you try for free time and pay for keeping it.

117

Which one of the following is not related to the operating system?


A. GUI. B. The program that you can use when the system has been loaded.

C. Allow you to use computer without learn about how hardware work.
D. Special program that run automatically when you start the computer.

118

Which one is not true about RAM?

A. The data stored on it is volatile.


B. Information is lost when you switch off the computer.

C. The data held on it cannot be saved on your hard disk.


D. The operating system is copied on it when you switch on computer.

119

Which one of the following devices connect to the system unit externally and controlled by the central processing unit?
A. Additional devices.
B. Storage Units. C. Input devices. D. Peripheral devices.

120

Which one of these is a computer software?

A. Monitor.
B. Windows. C. System Case. D. Scanner.

121

A Gigabyte is approximately:

A. 1,000 bytes.
B. 100 kilobytes. C. 1,000 kilobytes. D. 1,000 Megabytes.

122

Which two of these are operating systems?

A. Linux.
B. Mac OS.

C. Internet explorer.
D. Outlook. E. Google.
123

Drag each of the stages of development into logical order.

Stage 1

Stage 2

Stage 3

Stage 4

Analysis

Design

Programming

Testing

Programming

Design

Testing

Analysis

124

Computer workgroups allow which three of these resources to be shared between multiple users at same time?

Sharable Resources
Files Disk Storage Applications

Files

Disk Storage

Monitors

Applications

Keyboards

125

The internet is the name that is given to:


A. The physical equipment used to connect computer systems all over the world. B. All the linked documents that are held on a global network of computer systems. C. Linked computer systems that form a vast global network.

D. The dedicated telephone lines that permanently connect commercial networks on distant sites.

126

Which one of the following statements about the use of e-commerce is true?
A. An internet connection is optional for e-commerce.
B. Transaction can occur anywhere in the world.

C. Customers can only pay by e-mailing credit card details.


D. Customers give up the right return unsatisfactory goods.

127

Which two of the following statements about passwords are true?


A. You should use the same password for everything. B. You should write down your password and keep it in a convenient place. C. Passwords should contain both letters and numbers. D. Once you create a password, you cant change it. E. A Password should be known only to the user.

128

Which two of these statements could each be used to complete the following sentence? A computer virus is a program that:
A. Cannot infect a stand alone PC.
B. Disappears once it has displayed a message. C. Can usually be detected by anti-virus software. D. Can be introduced when new software is installed. E. Can enter a computer system if hardware such as a new mouse added.

129

Which one of the following statements about copyright is true?


A. You give up your copyright to text that you publish on the internet. B. You can re-use downloaded graphics in any way. C. Scanned images are subject to copyright.

D. When you purchase software, the copyright transfer to you.

130

E-commerce is the term used to describe business that:

A. uses computers to carry out its work.


B. is carried out using electronic funds transfer. C. involves the import and export of electronic equipment. D. buys or sells goods and services online.

131

Which one of the following statements about purchasing online is true? A. Purchases are only processed during business hours.
B. Shipping of purchases is normally free. C. The consumer rights of your country apply.

D. You are at risk from insecure payment method.

132

You can reduce the risk of neck, back and shoulder pain, by one of the following actions:

A. Using a larger monitor with sharper resolution.


B. Using a wireless mouse. C. Keeping the keyboard close to the front of the disk. D. Using a fully adjustable operators chair.

133

Which one of these actions demonstrate poor health and safety practice in the use of computers?
A. Touching internal parts of the PC.

B. Running several application at the same time.


C. Only using a single power socket for each PC. D. Using out-of-date software.

134

Which one of these statements best describes computer backup?


A. Reverting to the previously saved version of an electronic file.
B. Keeping a copy of computer files on a separate storage device. C. Storing paper printout from your computer files. D. Storing computer files on a Variety of separate storage device.

135

Which one of the following statements about copyright is true?


A. You can use downloaded graphics in any way. B. You are allowed to re-use text you copy from the web.

C. When you purchase software, the copyright transfer to you.


D. Audio files on the internet are subject to copyright.

136

Which two of the following statements about data protection legislation are true?
A. Deals with industrial espionage between competing companies. B. Can result in litigation if personal data is not adequately protected. C. Means that personal data must be stored for certain period of time. D. Ensures that laws about data security are the same in every country. E. Obliges organizations to protect confidential data within their control.

137

Which one of the following is the a digital line, used for both voice and data? A. ISDN. B. FTP.

C. PSTN.
D. HTTP.

138

The device that links computers to telephone networks by converting digital and analog signals is called a:
A. Transcoder. B. Digitiser. C. MODEM. MODEM D. Translator Unit.

139

Which one of the following statements about formatting computer storage media is true?
A. All operating systems format disks in the same way.
B. You cant format a disk if it had been formatted already.

C. A pre-formatted disk can be used immediately to store data.


D. You should regularly format floppy disks.

140

Sort these units of data by increasing order of size.


Megabyte

Terabyte Terabyte Gigabyte Gigabyte Megabyte

Kilobyte
Kilobyte Byte Byte

141

Which one of the following statements applies to PSTN?


A. A network designed to transmit high-speed digital data.
B. Its the Internet e-mail system.

C. Its a form of satellite communication.


D. The Public Analog Telephone network.

142

Which one of the following options describe the effects of teleworking? A. Reduced cost of equipments.
B. Harder to socially interact with team members.

C. Greater use of transport.


D. Inflexible working hours.

143

Which two of the following statements about purchasing on line are true?
A. Initial shipping of goods is free. B. The supplier covers the cost of returning goods. C. The consumers rights of the suppliers country apply.

D. Its more difficult to return goods purchased online than goods bought in a shop.
E. Online purchases are free of customs duties.

144

Which two of the following help to create a good working environment for computer users?
A. Bright fluorescent lighting. B. Use a mouse of mat with wrist support. C. Turning up screen contrast. D. Use of monitor filter to reduce glare. E. Sitting as close as possible to the monitor.

145

You can reduce the risk of eye-strain by one of the following:


A. Using the brightest possible screen setting.
B. Setting the screen facing a window.

C. Sitting approximately 12" from your monitor.


D. Having your eyes level with the top of your monitor.

146

Three of the following are examples of computer uses in education. Match the statements with the correct boxes.
Computer based education
Organizing student timetables

Organizing student timetables


Coaching students with learning difficulties

Uses traditional methods


Coaching students with learning difficulties

Distance learning

Distance learning
Helping students with career advice

Using the Web for research

Helping students with career advice Using the Web for research

147

Electronic documents help to save paper , while other documents are best printed out.

Should be printed
Documents that need careful proof-reading

Staff announcements Documents that need careful proof-reading Working drafts of lengthy report

Can be distributed electronically

Staff announcements

Contracts

Working drafts of lengthy report

Conrtacts

148

Drag these statements into the correct boxes.


True
Full disk formatting completely erases the previous contents of a disk

Formatting is the process of saving data onto a floppy disk


Full disk formatting completely erases the previous contents of a disk You cannot purchase pre-formatted disks All disks need to be formatted before they can store files A used floppy disk cannot be reformatted

False
Formatting is the process of saving data onto a floppy disk

All disks need to be formatted before they can store files

You cannot purchase pre-formatted disks

A used floppy disk cannot be reformatted

149

Word Processing

Creating letters, faxes or memos etc.

A spreadsheet Application A presentation Application A Database Application

Make financial projections.

Create overhead projection or slides. Sorting large amounts of information. Producing a newspaper with complex page layouts

Desktop Publishing Desktop Publishing

A spreadsheet Application

A Database Application

150

A presentation Application

Word processing

Which two of the following documents contain sensitive data and need protection?

These items contain sensitive data


Contact details for sales enquiries

Contact details for sales enquiries Research on new products Training materials

These items do not need protection


Research on new products

Management accounts

Training materials Management accounts

151

Electronic documents help to save paper , while other documents are best printed out.

Should be printed
Planning application

Help for a software application Planning application

Can be distributed electronically


Help for a software application

Academic certificates

Documents that are regularly updated

Documents that are regularly updated

Academic certificates

152

Helps to avoid the risk of spreading a computer virus


Scanning all unfamiliar disks with anti-virus software Write-protecting all copies of application disks once they have been checked Virus scanning all application before loading them onto your hard disk

Scanning all unfamiliar disks with anti-virus software


Write-protecting all copies of application disks once they have been checked Only copying applications from your close friends Rebooting your PC if you find a file that is infected Virus scanning all application before loading them onto your hard disk

Doesnt help to avoid the risk of spreading a computer virus


Only copying applications from your close friends

Rebooting your PC if you find a file that is infected

153

For which two of the following tasks in hospitals and healthcare would large-scale computer applications be most appropriate?

A. Establishing bed availability.

B. Providing information to relatives.


C. Informing a patient of a diagnosis.

D. Treating mental health issues.


E. Tracking patient medical history.

154

For which two of these tasks would people be more appropriate than computers?
A. Calculating payroll for staff.

B. Motivating staff.
C. Storing a list of staff contact details. D. Providing a customer support helpline. E. Maintaining a list of every item in the companys inventory of goods.

155

Which of the following statements about safety precautions when using computers?
A. Faulty cables should be repaired using insulating tape.
B. You should shut down your PC by unplugging it from electricity supply. C. There no safe way to run cables across open areas.

D. More than one computer should not use the same power socket.
156

You might also like