Sie sind auf Seite 1von 15

7262 e-Quals Sample multiple choice questions

Level 1 IT User 101 IT Principles Level 2 IT User 121 IT Principles Level 3 IT User 141 IT Principles
The knowledge requirements for each of the above units will be assessed by a multiple choice written paper comprising 40 questions and covering each outcome of the unit as detailed in the test specification in the Scheme Handbook.

7262 -101 IT Principles Level 1

1. Refer to the figure. The device shown is a a b c d base processor unit laser printer modem or terminal adapter visual display unit.

2. Which one of the following is an input device? a b c d Scanner. Printer. Loudspeaker. Plotter.

3. Which one of the following parts of a computer is necessary to enable it to play music? a b c d Sound card. CD-ROM. MIDI interface. Serial interface.

4. Which one of the following printers is suitable for printing sprocket fed carbon copies? a b c d Laser. Dot matrix. Ink-jet. Drum.

5. a b c d 6. a b c d 7. a b c d

Which one of the following is twice the size of A4 paper? A2. A3. A5. A6. A spreadsheet is the BEST application for handling simple accounts writing a report which included tables producing a grid-referenced map keeping an inventory of equipment used. Which one of the following is considered to be SYSTEMS software? Generic . File management. Database. Presentation.

8. a b c d

To be effective a virus checker should be replaced regularly never updated updated regularly updated once a year.

9. a b c d 10. a b c d

Which one of the following software applications would be the MOST appropriate for performing numerical and statistical calculations? Database. Document processor. Graphics package. Spreadsheet. The BEST description of the usual directory and folders structure on a computer is a tree loop chain list.

11. a b c d 12. a b c d 13. a b c d

Passwords enable users to get into the system quickly make efficient use of time retain confidentiality of files simplify file structures. How many bytes do 4 Kilobytes represent? 512. 1024. 4096. 8192. Back up of the data files will help to prevent loss of confidentiality duplication of data virus infection loss of data.

14. a b c d

Which one of the following is a shortcut commonly used to switch between programs? Alt+shift. Ctrl+Shift. Ctrl+Tab. Alt+Tab.

15. a b c d 16. a b c d

When a terminal connected to a network validates a password, the checking is done by the disk operating system Graphical User Interface operating system Network operating system terminal operating system. Video conferencing is BEST described as a communication link used to conduct meetings between people in different locations, which may be international in different locations, which must be in the same country in the same location in the same compa ny.

17. a b c d 18. a b c d 19. a b c d

Automated transactions for the purchase of goods over the Internet is called E-shopping Web purchase E-commerce Web shopping. Eye strain can be reduced by increasing the monitor brightness sitting closer to the monitor using the lowest screen resolution possible taking frequent short breaks. It is important that fire exits are obstructed unobstructed unmarked hidden.

7262 -121 Level 2 IT Principles 1. a b c d Output which is made up of pictures, sound and video is BEST described as graphics multimedia hard copy multi aspect.

2. a b c d 3. a b c d 4. a b c d 5. a b c d 6. a b c d

The speed of a printer can be measured in LPS PPM PPS DPI. Which one of the following is the MOST common internet protocol? TCP/IP . HTML. IPX/SPX. NetBEUI. The advantage of a PC network is that access to the internet is quicker files can be shared the printer can do 1000s of pages a day the operating system is easy to use. The speed of a PC is measured in Nanoseconds Megabytes Kiloseconds Megahertz. Which one of the following types of storage devices uses a laser? Zip drive. Magnetic tape. CD drive. Hard drive.

7. a b c d 8. a b c d 9. a b c d

Opening the hole on a 3 copy protect the data re protect the data back up the data write protect the data . A gigabyte is equal to 1024 bytes a million megabytes a thousand kilobytes 1024 megabytes.

disk will

An advantage of integrated software is that each application is bought separately applications are compatible with each other it has to be installed on a network it does not need a site licence.

10. a b c d 11. a b c d 12. a b c d

A field item in a database for a postcode with the format HP16 4LU is best input with a data type of Number Text Memo Logical. Which one of the following would be the BEST to use to produce 100 le tters to clients? Personal information manager. Email group. Desktop publisher. Mail merge. Which one of the following groups contains graphical file extensions? JPG, CPX, GCM. GIF, TCF, WMF. TCP, JPG, BMP. JPG, GIF, BMP.

13. a b c d 14. a b c d 15. a b c d

The term A:\ refers to a file name a subdirectory the root directory the hard drive. A package, which can be used for a short period before purchasing it is termed try and buy freeware shareware borrow-ware. The MAIN problem associated with leaving screens on is that the monitor gets hot the power goes off an image burns in screen savers can be timed.

16. a b c d

Protecting files from view by others is BEST achieved by copyright backup read only passwords.

17. a b c d 18. a b c d

Which one of the following is a source of danger is a PC suite ? Unobstructed fire doors Ducted cables Fire extinguishers Trailing cables Slouching in a chair in front of a PC should be avoided because you tend to fall asleep your work does not get finished you can injure your back vision can be impaired.

19.

Ergonomics is the study of

a b c d

work output related to time how people interact with each other how we can get the most out of our machinery how people interact with their surroundings.

20. a b c d

The BEST method of cleaning a keyboard is to use nail polish remover foam cleaner soap and water methylated spirits.

Level 3 IT Principles 1. a b c d Mega pixels are NORMALLY associated with a voice digitiser screen resolution in SVGA mode screen resolution in the EGA range digital camera.

2 a b c d 3. a b c d 4 a b c d 5. a b c d 6 a b c d

Which one of the following is the MAIN function of a driver file? Enables someone to learn windows. Enables a specific device to work. Configures auto route express. Used mainly for PC golf games. UPS stands for universal port serial up-line provider service uninterruptable power supply uniform page source. A jaz drive is used to produce a specific type of MPEG coding for MP3 files driver file that allows instruments to be hooked up to a P C removable storage media optical music media . Bespoke is a system for using telephones over a computer and the internet a file driver for playing voice files software that has been written specifically for an individual user a technique for reading text files aloud for a visually impaired user. Shareware is software you can buy and share with anyone that you can use totally free of charge continually you can obtain from anywhere but must purchase after a set condition that can only be shared over an in-house network.

7. a b c d 8. a b c d 9 a b c d

The main problem associated with uninstalling software is that orphan files can be left on the system the program executable may not allow it to be uninstalled the system requires a network administrator to uninstall it the system always requires a re-boot and defrag afterwards. Passwords are applied to files in order to assist in maintenance speed up access prevent unauthorised access allow encryption. File extensions are used in order to name the file ensure the filename is not lost identify the file identify the file type.

10. a b c d

Which one of the following would breach the integrity of a system? Locking the room to prevent theft. Full access rights for all users. Fitting the system with an anti-theft device. Protecting the system against wilful or accidental damage.

11. a b c d 12. a b c d

The term HTTP stands for hyper terminal tracing program hypertext tracing program hypertext transfer protocol hypertext tracing protocol. A proxy server is used as the computer with external access acting as a backup performing file handling accessing user permissions.

13. a b c d 14. a b c d 15. a b c d

Software which prevents external access to a system is termed firewall gateway router virus checker. Protocol is software that facilitates connection to the internet a list of rules for transferring data over a network software that allows file copying a gateway calling program for internet bridging. Which one of the following is a valid email address? enquiries@guilds.co.uk sales@enquiries.guilds.co.uk @sales.enquiries@guilds.co.uk sales.enquiries.guilds.co.uk

16. a b c d

Which one of the following is the correct colour for a foam fire extinguisher? Yellow. Red. Red with a yellow label. Black.

17. a b c d 18. a b c d

Which one of the following is the BEST fire extinguisher for IT equipment? Dry powder. Bromochloride. Co2. Water. In which major piece of equip ment is the highest residual charge stored? The power unit of the system. The chip. The UPS. The monitor.

19. a b c d

Which one of the following is NOT a network topology? Star. Bus. Linear. Ring.

Answer keys & Outcome and Underpinning Knowledge References IT Principles Level 1 Question 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Answer D A A B B A B C D A C C D D C A C D B Outcome 1 1 1 1 1 2 2 2 2 3 3 3 3 4 5 5 5 6 6 Underpinning Knowledge Reference 1 2 3 4 5 1 2 3 4 1 4 6 8 1 1 2 4 3 5

IT Principles Level 2 Question 1 2 3 4 5 6 7 8 9 10 Answer B B A B D C D D B B Outcome 1 1 1 1 1 1 3 1 2 2 Underpinning Knowledge Reference 2 2 4 4 5 6 3 8 2 4

11 12 13 14 15 16 17 18 19 20

D D C C C D D C D B

2 3 3 3 4 4 5 5 5 5

6 1 2 4 4 3 3 6 5 7

IT Principles Level 3 Question 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Answer D B C C C C A C D B C A A B A C C D C Outcome 1 1 1 1 2 2 2 3 3 3 4 4 4 4 4 5 5 5 4 Underpinning Knowledge Reference 2 3 4 5 1 5 6 3 6 10 3 4 4 4 3 4 4 2 1

Das könnte Ihnen auch gefallen