Sie sind auf Seite 1von 159

IT Exercises

?Which one of these is computer hardware

.O The operating system

.O A CPU

.O A word processing package

.O A spreadsheet

.Answer: A CPU
Which one of the following dose not influence the
?Performance of a computer

.O The amount of free space on the PC’s hard disk

.O The amount of main memory (RAM) that is installed

.O The use of trackball rather than a mouse

.O The type of graphics card that is installed

.Answer: The use of trackball rather than a mouse


The speed of a computer CPU can be measured
:in

.O Gigabytes

.O Gigawatts

.O Gigahertz

.O Gigacycles

.Answer: Gigahertz
Which one of these statements about formatting
?Computer storage media is true

O Disks are automatically formatted when you


. save a file

.O A used floppy disk cannot be reformatted

O Unformatted disks need operating system data


. written to them before they can store files

.O A Full format does not erase data from your disk

Answer: Unformatted disks need operating system data


. written to them before they can store files
Which one of these statements correctly
completes the following sentence? A computer’s
:operating system

Ois the last program to load when you start the


. computer

.O does not control devices connected to the PC

.O is not necessary on high-powered personal computers

O instructs the screen to display data entered with the


. keyboard

Answer: instructs the screen to display data entered with


. the keyboard
Which of following best describes a graphical user
: interface (GUI)

.O using a software application for technical drawing

O using a windows, icons and a mouse to operate a


. computer

O using a system of typed commands to operate a


. computer

.O using picture rather than words for online help

Answer: using a windows, icons and a mouse to operate a


. computer
Which one of these stages of software
development is the last stage to be finally
?completed

.O Analysis

.O Design

.O Programming

.O Testing

.Answer: Testing
Which two statement about local area networks (LAN) are
?true

.O Applications cannot be shared over a LAN

O Authorized users can access and use data stored


. anywhere on a LAN

O Telecommunication services cannot be shared over


. a LAN

O Large data files can be transferred between


. computers using a LAN

.O It is not possible for users of a LAN share printers

Answer: 1-Authorized users can access and use data


. stored anywhere on a LAN
Large data files can be transferred between -2
. computers using a LAN
Which one of the following best describes an
?intranet

.O A network which can only be accessed using an ISP

O A world-wide collection of computer files connected


. by links
Harder to socially interact with team members
O A network, using e-mail and web, within a single
. organization

O A network that is shared between more than one


. organization

Answer: A network, using e-mail and web, within a single


. organization
Which one of the following best describes an
?extranet

O A network, using e-mail to share data between


. organizations

.O An extra-fast intranet within a single organizations

.O A very large intranet used by the general public

O A network used to share data within a single


. organization

Answer: A network, using e-mail to share data between


. organizations
Which one of these statement about the speed of
?connecting to the internet is true

O Data transfer is slower with a digital line than with an


. analog line

O The processor speed of the computer affects the


. speed of data transfer on the internet

O A 14.4 Kbps modem transfers data more slowly than a


. 56 Kbps modem

O The speed of data transfer does not vary significantly


. with the time of the day

Answer: A 14.4 Kbps modem transfers data more slowly


. than a 56 Kbps modem
For which one of these tasks would a
?computerized solution be more appropriate

.O Calculating payroll of staff

.O Solving staff relations

.O Motivating staff

.O Selecting new staff

.Answer: Calculating payroll of staff


For which two of the following tasks in hospitals
and health care would large-scale computer
?applications be most appropriate
.O Bereavement counseling

.O Tracking treatment costs

.O Informing a patient of a diagnosis

.O Providing a medical database

.O Treating mental health issues

.Answer: 1-Tracking treatment costs


.Providing a medical database-2
What is the meaning of the letter e in the word e-
?mail

.O Express

.O Electric

.O Electronic

.O Efficient

.Answer: Electronic
Which two of the following contribute to a good
?working environment for a computer operator

.O Use of a monitor filter to reduce the glare

.O Sitting as close as possible to the monitor

.O A good level of ventilation in the room

.O Plenty disk space in which to move the mouse

OThe keyboard positioned close to the front edge of


. the disk

.Answer: 1-Use of a monitor filter to reduce the glare


.A good level of ventilation in the room-2
You can reduce the risk of repetitive strain injury
:by one of the following actions

.O using an adjustable chair

.O sitting with your feet firmly on the ground

.O using an anti-glare screen

.O taking frequent breaks form your work

.Answer: taking frequent breaks form your work


Which one of these actions demonstrate poor
?health and safety practice

.O Installing too much of software on a computer

.O Leaving power cable unsecured

O Turning off the power without first shutting


. down the PC

.O Running several applications at the same time

.Answer: Leaving power cable unsecured


Which statement about computers and the
?environment is true

.O Running an animated screensavers saves power

.O Printer toner cartridges can be recycled

.O You can’t recycle paper from a laser printer


O Laptops on standby use more electricity than when
. running normally

.Answer: Printer toner cartridges can be recycled


Which one of the following statement describes the
?process of backup

.O Restoring work from an older file

.O Copying a file from your C: drive to your desktop

.O Keeping copies of data in two locations

.O Moving a file to a different folder on a hard drive

.Answer: Keeping copies of data in two locations


A PDA which has been backed up - but not
password protected - has been stolen. Which one
?of the following consequences may result

.O Loss of the right to use the software that came with PDA

O Time wasted on re-entering all the records in a


. replacement PDA

.O Misuse of confidential files and telephone numbers

.O Loss of contact details on the stolen PDA

Answer: Misuse of confidential files and telephone


. numbers
Anti-virus software can disable a virus on your
:computer. This action is called

.O De-installing

.O Disinfecting

.O Restoring

.O Scanning

.Answer: Disinfecting
Which one of the following statements about
?copyright is true

O If you can copy material from a disk you automatically


. gain the copyright

O Copyrights provides control over how other people make


. disk copies of someone’s work

O Graphics published on CD-ROM are not subjected to any


. form of copyright

O If you create a CD-ROM yourself, you own the copyright


. to anything you put on it

Answer: Copyrights provides control over how other


. people make disk copies of someone’s work
:Shareware is the term that is applied to

Oan application that is used to track the movement of


. stocks and share

Osoftware that you try for free but pay for it if you
. keep it

O any application for which a multi-user license is


. available

.O any software that can be used on a server

Answer: software that you try for free but pay for it if you
. keep it
An important purpose of data protection legislation
:is to

.O improve the standards for electronic storage media

.O prevent the illegal use of commercial software

.O safeguard the privacy of individuals’ personal data

.O protect companies from industrial espionage

Answer: safeguard the privacy of individuals’ personal


. data
?Which one of these is application software

.O Graphics card

.O Word processor

.O Central Processing Unit (CPU)

.O Hard Disk

.Answer: Word processor


Which one of the following statement is true about
:ROM (read-only memory)

.O It is wiped clean when you switch off the computer

.O It stores the computer’s operating system

.O It cannot be modified by the user

OIt is loaded from your hard disk when you switch on


. the computer

.Answer: It cannot be modified by the user


Which two of the following statements about access rights
?are true

O Are intended to protect a company’s intellectual


. property

.O Decide who can work in a building outside office hours

O Determine which files individuals can read or change on


. a network

.O Are the same for all users on single network

O Depend on which computer you are using to access the


network

Answer: 1-Determine which files individuals can read or


. change on a network
.Are the same for all users on single network-2
Which one of these stages of software
?development is the first stage to be completed

.O Design

.O Analysis

.O Programming

.O Testing

.Answer: Analysis
Which one of these is the type of network that
?links computers in different cities or countries

.O LAN

.O Ethernet

.O PSTN

.O WAN

.Answer: WAN
:The term ADSL stands for

.O Anonymous Digital Service Line

.O Asymmetric Digital Subscriber Line

.O Analog Digital Service Line

.O Advanced Data Service Link

.Answer: Asymmetric Digital Subscriber Line


For which two of these tasks would a computerized
?solution be most appropriate

.O Assessing employee performance

.O Enforcing rules and regulations

.O Generating invoices

.O Carrying out stock control

.O Providing a customer support helpline

.Answer: 1-Generating invoices


.Carrying out stock control -2
For which one of the following tasks in hospitals
and health care would large-scale computer
?applications be most appropriate

.O Running life-support systems

.O Diagnosis Patient

.O Comforting patients

.O Guiding support groups

Answer: Running life-support systems


Which one of the following statements about
?teleworking is true

.O More human contact with the team

.O Increased company space requirements

.O Greater ability to focus on one task

.O Inflexible schedules

.Answer: Greater ability to focus on one task


Which two of the following statements about purchasing on
?line are true
.O The consumers rights of the supplier’s country apply

.O E-commerce offers access to goods around the clock

.O The supplier covers the cost of shipping

.O All e-commerce transactions are safe

.O The supplier covers the cost of returning goods

Answer: 1- The consumers rights of the supplier’s


. country apply
E-commerce offers access to goods around -2
. the clock
Which one of the following contribute to a good
?working environment for a computer operator

.O Locating the PC close to a printer

.O Elbow and wrist support

O High level of contrast between the screen


. brightness and other lighting

.O Direct light shining on the monitor

.Answer: Elbow and wrist support


You can reduce the risk of eye-strain by one of the
:following actions

O increase the contrast between screen and room


.lighting

.O using an anti-glare filter on your monitor

.O reducing your monitor’s colour depth setting

.O positioning the screen with a window behind it

.Answer: using an anti-glare filter on your monitor


Which one of the following statements about an
?organization’s information security policy is true

.O Applies to the employee, not the employer

.O Deals with the handling confidential data

.O Deals only with data held on computers

O Covers the licensing of operating system


. software

.Answer: Deals with the handling confidential data


A laptop which has been password protected, but
not backed up, has been stolen. Which one of the
?following consequences may result

.O You will have to change your e-mail address

.O Confidential files can be Misused

.O You will need to change your password

.O Work stored on the laptop will be lost

.Answer: Work stored on the laptop will be lost


Which one of the following statements about
?formatting computer media is true

O Before accessing the internet, you need to run a virus


. check

.O Deleting an infected file will eliminate the virus

.O Anti-virus software can detect all known viruses

O Anti-virus software can disinfect applications as well


. as files

Answer: Anti-virus software can disinfect applications as


. well as files
Which one of the following statements about
?copyright is true

.O Text on a web page can be freely copied and re-used

O Graphics published on the web are subjected to


. copyright

.O When you buy software, the copyright transfer to you

.O It is legal to share any audio files on the internet

Answer: Graphics published on the web are subjected to


. copyright
Which one of the following statements about
?copyright is true

OThe paper license that comes with software on CD


. transfers the copyright to you

O You can make a backup CD of software bought for your


. own use

O Software purchased on the web and copied to CD-ROM


. can be shared with friends

O Copying text, images, audio, or video from disk is


. always illegal

Answer: You can make a backup CD of software bought for


. your own use
:Freeware is the term that is applied to

.O software that you can try free of charge before buying

.O software that you don’t have to pay for

O old versions of commercial software that are out of


. date

.O software that will run under any operating system

.Answer: software that you don’t have to pay for


Which two of the following have a significant
influence on the speed at which a computer
?performs

.O Installing new applications

.O Clearing all the unwanted files off a hard disk

.O Installing a smaller monitor

.O Increasing the amount of RAM

.O Adding a CD-ROM drive

.Answer:1- Clearing all the unwanted files off a hard disk


.Increasing the amount of RAM -2
?Which two of these are operating systems

.O Windows

.O Netscape Navigator

!O Yahoo

.O Linux

.O Outlook

.Answer:1- Windows
.Linux-2
Which one of these statements about the internet
?is false

OIt enables computer with different operating systems to


. exchange data

.O It is not controlled by any single organization

.O You need a license to publish material on the internet

.O It allows computers to share data over large distance

Answer: You need a license to publish material on the


. internet
Which one of these types of computer memory is
?permanent and unchanging

.O Random Access Memory

.O Working Memory

.O Virtual Memory

.O Read-Only Memory

.Answer: Read-Only Memory


Which one of the following descriptions of an
?extranet is true

.O A world-wide collection of files connected by links

.O A very large intranet within an organization

.O An extra-fast intranet for web and e-mail

.O Shares data between two or more organizations

.Answer: Shares data between two or more organizations


?Which one of the following isn’t operating system

.A. Unix

.B. Windows

.C. Ms Word

.D. Ms-Dos

.Answer: Ms Word
:E-mail stands for

.A. Electric mail

.B. Electronic mail

.C. Efficient mail

.D. Express mail

.Answer: Electronic mail


Which one of the following operating system does
?not have a GUI

.A. UNIX

.B. Microsoft Windows

.C. MAC OS X

. D. Microsoft DOS

.Answer: Microsoft Dos


:Microsoft Windows is a (an)

.A. Database program

.B. Operating system

.C. Word processing program

.D. Graphics program

.Answer: Operating system


The local council wants to design and build a new
bridge. Which is most appropriate software to use
?in the design

.A. CAD application

.B. CAM application

.C. DTP application

.D. Drawing application

.Answer: CAD application


Which of the following is the first stage in the
?standard sequence of software development

.A. Testing

.B. Analysis

.C. Programming

.D. Design

.Answer: Analysis
What type of computer application would be used
?in a hospital to maintain patient medical details

.A. A desktop publishing application

.B. A database application

.C. A accounting application

.D. A presentation engine

.Answer: A database application


Which one of these statements about computer
?application is true

A. The same version of an application will work on any type of


.computer

B. They control devices such as printers and scanners that


.are attached to the PC

C. They enable users to carry out specific tasks such as


.word processing

.D. They are the only programs that you need to use PC

Answer: They enable users to carry out specific tasks


. such as word processing
Which one of the following activities is best suited
?for e-mail

.A. Performing calculations

B. Sharing very large video files, such as movie


. trailers

.C. Sharing files between workers at different locations

.D. Transmitting credit card details

Answer: Sharing files between workers at different


. locations
Which one of the following statements about
?copyright is true

A. Publishing digital work on disk requires permission of


. the copyright holder

B. When you purchase software in CD the copyright


. transfer to you

C. Any material which is published on disk is subjected


. to copyright

.D. You can reuse graphics from the web on CD- Rom

Answer: Publishing digital work on disk requires


. permission of the copyright holder
Unauthorized access to computer files can be
:prevented by using

.A. Password

.B. Anti-virus software

.C. Uninterruptible power supply

.D. Secure backup copies

.Answer: Password
Which Preventative measure can be used to stop
?computer system becoming infected with a virus

.A. Install physical security measures

.B. Password protect the start-up process

.C. Disable the floppy disk drive

.D. A virus-checking program

.Answer: A virus-checking program


When buying goods services from a foreign
country over the internet you would most likely pay
:for the product by using

.A. Foreign currency

.B. A processor card

. C. A check

.D. A credit card

.Answer: A credit card


Which of the following precautions would prevent
?virus-infected software being used on computer

.A. Install a virus protection system

.B. Install software to prevent hacking

.C. Install password security to the system

.D. Take regular backups

.Answer: Install a virus protection system


:Electronic commerce is best described as

A. Requesting information from companies selling


.electronic equipment

B. The buying of electronic equipments from a high


.street shop

.C. Advertising electronic goods on the internet

D. The buying of goods and services and paying for


.them on-line

Answer: The buying of goods and services and paying


. for them on-line
Which of the following can be used to restore
programs or data after being altered by a malicious
?program

.A. Anti-virus software

.B. Password

.C. Back-up copies

.D. Hacking

.Answer: Back-up copies


Which of the following provides an example of a
?good working environment

.A. Adequate lighting

.B. Energy-saving hardware

.C. New computer hardware every two years

.D. Staff welfare benefits

.Answer: Adequate lighting


A company needs all it’s 30 office staff to use a
:spreadsheet application, It should

A. Copy the spreadsheet application onto each


. individual PC

.B. Purchase a multi-user license

C. Use the spreadsheet application regardless of the


. numbers of users

.D. Purchase a single-user license for each PC

.Answer: Purchase a multi-user license


What name is given to software, which under
?development

.A. Beta software

.B. Demonstration software

.C. Freeware

.D. Shareware

.Answer: Beta software


Which of the following is the name given to
software, which can legally be copied without a
?license

.A. Beta software

.B. Retail software

.C. Freeware

.D. Protected software

.Answer: Freeware
?Which of the following best describes teleworking

.A. Working for a television

.B. Working for a telesales company

.C. Designing teletext pages

.D. Working at home using electronic communications

Answer: Working at home using electronic


. communications
An End User License Agreement

A. Is a form of advertising between a software application


. author and the user

B. Gives the user the exclusive right to copy and sell the
. software to other potential users

.C. Grants ownership of the software to the user

D. Is a legal contract between a software application author


or publisher and the user with regard to terms of
. distribution, release and restricted use

Answer: Is a legal contract between a software application author or


publisher and the user with regard to terms of
. distribution, release and restricted use
Which of the following is a good password policy
?for an organization

.A. All passwords are changed regularly

.B. All passwords are never changed

.C. All passwords are made up of less than four characters

.D. All passwords are made up of less than four numbers

.Answer: All passwords are changed regularly


Which of the following is not a function of the
?CPU

.A. Executing program instruction

B. Ensuring program instructions are executed in the right


. sequence

.C. Sending e-mail

.D. Carrying out calculations

.Answer: Sending e-mail


?What is ISDN

.A. Integrated Standard Digital Networks

.B. Integrated Services Digital Network

.C. Interactive Standard Dynamic Networks

.D. Internet Services Data Network

.Answer: Integrated Services Digital Network


Large Organization often use a computer system
:to run the company typically it is most likely to be

.A. A Personal Computer

.B. A PDA

.C. A Mini Computer

.D. A Mainframe Computer

.Answer: A Mainframe Computer


:Scanner can be described as
A. An output device only

B. An input device only

C. An input and output device

D. Storage device

.Answer: An input device only


:From an output devices

.A. Mouse

.B. Keyboard

.C. Plotter

.D. Light Pen

.Answer: Plotter
?Which of the following statement is true

.A. The CPU is an input devices

.B. The CPU is an output devices

C. The CPU is used to process program instructions


. and data

.D. The CPU is used as non volatile storage media

Answer: The CPU is used to process program


. instructions and data
The data stored on CD-Rom are

.A. Volatile and read only data

.B. Non Volatile and read only data

.C. Non Volatile and read/write data

.D. Volatile and read/write data

.Answer: Non Volatile and read only data


Which is the most appropriate application to store
?census information

.A. Data Logging Application

.B. CAD Application

.C. Database Application

.D. Word Processor Application

.Answer: Database Application


:A GUI is used to

.A. Draw graphs and drawing

.B. Provide the interface between two peripherals

.C. Provide an easy way to use computer

.D. Store graphics image as file

.Answer: Provide an easy way to use computer


The range of voice, computer messages and other
:services provided by

.A. ISBN

.B. PSBX

.C. ISDN

.D. PSDN

.Answer: ISDN
?Which one of the following is not an input device

.A. Web camera

.B. Scanner

.C. Touch pad

.D. Monitor

.Answer: Monitor
The location of information on the internet can be
:obtained by using a database

.A. Web editor application

.B. Search engine

.C. Spreadsheet application

.D. Word perfect

.Answer: Search engine


In which situation would a bar code reader the
?most suitable input device

.A. Analysis of blood sample

.B. Filling the client details in a bank

.C. Issuing library books

. D. Stock taking in restaurant

.Answer: Issuing library books


Which two of the following is considered as input
?devices

.A. Printers

.B. Monitor

.C. Microphone

.D. Plotter

.E. Keyboard

.Answer: 1-Microphone
.Keyboard-2
Special plastic cards containing a processor and
memory are used to pay for goods and services,
each time the card used the details on the card
?updated. What is the name of such a card
.A. Magnetic card

.B. Memory card

.C. Smart card

.D. Processor card

.Answer: Smart card


?Which one have the fastest access to data

.A. DVD drive

.B. Floppy disk

.C. Zip disk

.D. Hard Disk

.Answer: Hard Disk


?Which one of these memory can not be changed

.A. Random Access Memory

.B. Storing Memory

.C. Read Only Memory

.D. Virtual Memory

.Answer: Read Only Memory


Which one of the following is considered as input
?devices

.A. Plotter

.B. Monitor

.C. Web camera

.D. Charger

.Answer: Web camera


An equipment that attached to computer to stop
:large volts of electricity

.A. UPS

.B. Battery

.C. Charger

.D. Surge suppressor

.Answer: Surge suppressor


:The baud rate can tell how fast

.A. The hard disk send and revive data

.B. The MODEM can send and revive data

.C. The CPU send and revive data

.D. The RAM send and revive data

.Answer: The MODEM can send and revive data


Where the computer is appropriate more than
?people

.A. In interpreting

.B. In recognizing

.C. In dangerous situation

.D. In completing

.Answer: In dangerous situation


A computer virus is a program that

.A. Always spotted by antivirus

.B. Make your hard disk unusable

.C. The only way for infection is internet

.D. Can be avoid by regular backup

.Answer: Always spotted by antivirus


Which one is more appropriate about Shareware
?software

A. Any software used by a group of people in the same


. time

.B. Any application you borrow from your friend

.C. Any application downloaded from internet

.D. Any software you try for free time and pay for keeping it

Answer: Any software you try for free time and pay for
. keeping it
Which one of the following is not related to the
?operating system

.A. GUI

B. The program that you can use when the system has
. been loaded

C. Allow you to use computer without learn about how


. hardware work

D. Special program that run automatically when you start


. the computer

Answer: The program that you can use when the system
. has been loaded
?Which one is not true about RAM

.A. The data stored on it is volatile

.B. Information is lost when you switch off the computer

.C. The data held on it cannot be saved on your hard disk

D. The operating system is copied on it when you switch on


. computer

Answer: The data held on it cannot be saved on your hard


. disk
Which one of the following devices connect to the
system unit externally and controlled by the central
?processing unit

.A. Additional devices

.B. Storage Units

.C. Input devices

.D. Peripheral devices

.Answer: Peripheral devices


?Which one of these is a computer software

.A. Monitor

.B. Windows

.C. System Case

.D. Scanner

.Answer: Windows
:A Gigabyte is approximately

.A. 1,000 bytes

.B. 100 kilobytes

.C. 1,000 kilobytes

.D. 1,000 Megabytes

.Answer: 1,000 Megabytes


?Which two of these are operating systems

.A. Linux

.B. Mac OS

.C. Internet explorer

.D. Outlook

.E. Google

.Answer: 1-Linux
.Mac OS-2
:The internet is the name that is given to

A. The physical equipment used to connect computer


. systems all over the world

B. All the linked documents that are held on a global


. network of computer systems

C. Linked computer systems that form a vast global


. network

D. The dedicated telephone lines that permanently connect


. commercial networks on distant sites
Answer: Linked computer systems that form a vast global
. network
Which one of the following statements about the
?use of e-commerce is true

.A. An internet connection is optional for e-commerce

.B. Transaction can occur anywhere in the world

.C. Customers can only pay by e-mailing credit card details

.D. Customers give up the right return unsatisfactory goods

.Answer: Transaction can occur anywhere in the world


Which two of the following statements about
?passwords are true

.A. You should use the same password for everything


B. You should write down your password and keep it in a
. convenient place
.C. Passwords should contain both letters and numbers
.D. Once you create a password, you can’t change it
.E. A Password should be known only to the user

Answer: 1-Passwords should contain both letters and


. numbers
.A Password should be known only to the user -2
A mobile phone which has been insured but not
password protected has been stolen. Which one of
?the following consequences may result

.A. Misuse of confidential numbers

.B. Meeting the cost of replacement

.C. Paying for calls made after the theft is reported

.D. Taking out new insurance on the replacement phone

.Answer: Misuse of confidential numbers


Which two of these statements could each be used
to complete the following sentence?
:A computer virus is a program that

.A. Cannot infect a stand alone PC

.B. Disappears once it has displayed a message

.C. Can usually be detected by anti-virus software

.D. Can be introduced when new software is installed

E. Can enter a computer system if hardware such as a new mouse


. added

.Answer: 1- Can usually be detected by anti-virus software


. Can be introduced when new software is installed -2
Which one of the following statements about
?copyright is true

A. You give up your copyright to text that you publish on


. the internet

.B. You can re-use downloaded graphics in any way

.C. Scanned images are subject to copyright

D. When you purchase software, the copyright transfer to


. you

.Answer: Scanned images are subject to copyright


E-commerce is the term used to describe business
:that

.A. uses computers to carry out its work

.B. is carried out using electronic funds transfer

.C. involves the import and export of electronic equipment

.D. buys or sells goods and services online

.Answer: buys or sells goods and services online


Which one of the following statements about
?purchasing online is true

.A. Purchases are only processed during business hours

.B. Shipping of purchases is normally free

.C. The consumer rights of your country apply

.D. You are at risk from insecure payment method

.Answer: You are at risk from insecure payment method


You can reduce the risk of neck, back and
:shoulder pain, by one of the following actions

.A. Using a larger monitor with sharper resolution

.B. Using a wireless mouse

.C. Keeping the keyboard close to the front of the disk

.D. Using a fully adjustable operator’s chair

.Answer: Using a fully adjustable operator’s chair


Which one of these actions demonstrate poor
health and safety practice in the use of
?computers

.A. Touching internal parts of the PC

.B. Running several application at the same time

.C. Only using a single power socket for each PC

.D. Using out-of-date software

.Answer: Touching internal parts of the PC


Which one of these statements best describes
?computer backup
A. Reverting to the previously saved version of an
. electronic file

B. Keeping a copy of computer files on a separate storage


. device

.C. Storing paper printout from your computer files

D. Storing computer files on a Variety of separate storage


. device

Answer: Keeping a copy of computer files on a separate


. storage device
Which one of the following statements about
?copyright is true

.A. You can use downloaded graphics in any way

.B. You are allowed to re-use text you copy from the web

C. When you purchase software, the copyright transfer to


. you

D. Audio files on the internet are subject to


copyright.

Answer: Audio files on the internet are subject to


. copyright
Which two of the following statements about data
?protection legislation are true

.A. Deals with industrial espionage between competing companies

.B. Can result in litigation if personal data is not adequately protected

.C. Means that personal data must be stored for certain period of time

.D. Ensures that laws about data security are the same in every country

.E. Obliges organizations to protect confidential data within their control

Answer: 1- Can result in litigation if personal data is not adequately


. protected
Means that personal data must be stored for certain period -2
. of time
Which one of the following is the a digital line,
?used for both voice and data

.A. ISDN

.B. FTP

.C. PSTN

.D. HTTP

.Answer: ISDN
The device that links computers to telephone
networks by converting digital and analog signals
:is called a

.A. Transcoder

.B. Digitiser

.C. MODEM

.D. Translator Unit

.Answer: MODEM
Which one of the following statements about
?formatting computer storage media is true

.A. All operating systems format disks in the same way

.B. You can’t format a disk if it had been formatted already

C. A pre-formatted disk can be used immediately to store


. data

.D. You should regularly format floppy disks

Answer: A pre-formatted disk can be used immediately


. to store data
.Sort these units of data by increasing order of size
Which one of the following statements applies to
?PSTN

.A. A network designed to transmit high-speed digital data

.B. It’s the Internet e-mail system

.C. It’s a form of satellite communication

.D. The Public Analog Telephone network

.Answer: The Public Analog Telephone network


Which one of the following options describe the
?effects of teleworking

.A. Reduced cost of equipments

.B. Harder to socially interact with team members

.C. Greater use of transport

.D. Inflexible working hours

.Answer: Harder to socially interact with team members


Which two of the following statements about
?purchasing on line are true
.A. Initial shipping of goods is free

.B. The supplier covers the cost of returning goods

.C. The consumers rights of the supplier’s country apply

D. It’s more difficult to return goods purchased online than


. goods bought in a shop

.E. Online purchases are free of customs duties

Answer: 1-The consumers rights of the supplier’s country


. apply
It’s more difficult to return goods purchased -2
. online than goods bought in a shop
Which two of the following help to create a good
?working environment for computer users
.A. Bright fluorescent lighting

.B. Use a mouse of mat with wrist support

.C. Turning up screen contrast

.D. Use of monitor filter to reduce glare


.E. Sitting as close as possible to the monitor

.Answer: 1-Use a mouse of mat with wrist support


.Use of monitor filter to reduce glare-2
You can reduce the risk of eye-strain by one of the
:following

.A. Using the brightest possible screen setting

.B. Setting the screen facing a window

.C. Sitting approximately 12" from your monitor

.D. Having your eyes level with the top of your monitor

Answer: Having your eyes level with the top of your


.monitor
For which two of the following tasks in hospitals
and healthcare would large-scale computer
?applications be most appropriate
.A. Establishing bed availability

.B. Providing information to relatives

.C. Informing a patient of a diagnosis

.D. Treating mental health issues

.E. Tracking patient medical history

.Answer: 1- Providing information to relatives


.Tracking patient medical history -2
For which two of these tasks would people be
?more appropriate than computers

.A. Calculating payroll for staff

.B. Motivating staff

.C. Storing a list of staff contact details

.D. Providing a customer support helpline

E. Maintaining a list of every item in the company’s


. inventory of goods

.Answer: 1- Motivating staff


.Providing a customer support helpline -2
Which of the following statements about safety
?precautions when using computers

.A. Faulty cables should be repaired using insulating tape

B. You should shut down your PC by unplugging it from


. electricity supply

.C. There no safe way to run cables across open areas

D. More than one computer should not use the same power
. socket

Answer: More than one computer should not use the same
. power socket

Das könnte Ihnen auch gefallen