SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
ECDL-tests.com

ECDL Module 1 Sample Test

The following sample test for Module 1, Concepts of Information and Communication
Technology (ICT), contains 36 multiple-choice questions. Attempt each of the 36 questions.
Each question has one correct answer.
Enter A, B, C, or D in answer.doc in the space for question number.
1. Which one of the following measures the speed of the CPU?
a. Gigahertz (GHz).
b. Bits per second (Bps).
c. Gigabytes (GB).
d. Megabytes (MB).
2. Which one of the following describes a computer’s operating system?
a. Software that can retrieve information from a database.
b. Hardware that can scan and convert photographs into digital files.
c. Software that controls the allocation and usage of hardware.
d. Hardware that can record and send images across the Internet.
3. Which one of the following describes spam?
a. Gathering information about a person or organisation without their knowledge.
b. Performing an unauthorised, usually malicious, action such as erasing files.
c. Putting unnecessary load on the network by making copies of files.
d. Sending unwanted bulk messages.
4. Which one of the following could lead to the spread of a malicious program?
a. Using only software that has been checked for viruses.
b. Maintaining regularly updated anti-virus software.
c. Opening only virus-checked file attachments from known sources.
d. Using a USB Flash Drive from an unknown source to exchange data.
5. Which one of the following protects a computer from the risk of malicious programs?
a. PC diagnostic software.
b. Web tracking software.
c. Anti-spam software.
d. Anti-spyware software.
6. Which one of the following describes why it is important to update antivirus software
regularly?
a. To ensure the software identifies old viruses.
b. To protect your computer from all known viruses.
c. To protect your computer from unwanted bulk messages.
d. To prevent the spread of malicious programs on the Internet.
7. Which one of the following is a term for an audio or video recording posted on a web site
that can be downloaded and played later?
a. Podcast.
b. Blog.
c. VoIP.
d. RSS Feed.
8. Which one of the following types of software would you most likely use to create a letter?
a. Web browsing software.
ECDL-tests.com

ECDL Module 1 Sample Test

b. Spreadsheet software.
c. Accounting software.
d. Word processing software.
9. Which one of the following describes a computer hacker?
a. A skilled programmer who uses authorised access to exploit information
available on a computer.
b. A skilled programmer who secretly invades computers without authorisation.
c. A skilled programmer who writes programs to train new employees.
d. A skilled programmer who helps in the installation of new software for an
organisation.
10. The computers in your office building are connected together so staff can share files and
printers. What is this arrangement of computers called?
a. The Internet.
b. A Local Area Network.
c. The World Wide Web.
d. A network port.
11. Which of the following systems will help to improve communications within the company?
a. Excel
b. Powerpoint
c. Email
d. Solitaire
12. Which of the following is NOT an input device?
a.
b.
c.
d.

Monitor
Mouse
Keyboard
Scanner

13. Which one of the following is a private network that allows specified external users
access?
a. Intranet.
b. WorldNets.
c. Internet.
d. Extranet.
14. Which one of the following is a software application that assists users who are visually
impaired to identify and interpret what is displayed on screen?
a. A screen calendar.
b. A word processor.
c. A screen reader.
d. A web log.
15. Which one of the following describes why firewalls are used?
a. To prevent unauthorised access by incoming transmissions.
b. To prevent destruction of a computer in the event of a fire.
c. To enable easy downloading of data from web sites.
d. To detect and disable viruses already on a computer.
16. Which one of the following is MOST likely to be a hoax?
ECDL-tests.com

ECDL Module 1 Sample Test

a. An email from a friend you have not seen recently.
b. An email with an attachment sent by a colleague using their personal email
address.
c. An email asking you to go to a website for a free computer scan.
d. An email advertisement from a local shop you subscribe to.
17. Which one of the following is NOT a feature of electronic commerce?
a. Goods can be advertised and prices compared.
b. There is physical contact between buyer and seller.
c. Transactions can be processed quickly.
d. Services are available 24 hours a day.
18. Which one of the following is the reason that users should log on with a username and
password?
a. To be aware of who is in the building.
b. To check up on the time-keeping of users.
c. To protect computers against unauthorised use.
d. To enable a personalised greeting for each user.
19. Which one of the following statements about a password is TRUE?
a. It must be changed only if it is compromised.
b. It cannot contain special character symbols.
c. It should be changed regularly.
d. It must be registered with the system administrator.
20. Which one of the following statements describes a good approach to information security
for an organisation?
a. There are no procedures for reporting security lapses.
b. Staff passwords are not changed regularly.
c. Sensitive data is available to everyone that requests it.
d. Keeping an off-site backup of all files.
21. Which one of the following is the best way to protect a computer against computer
viruses?
a. Only virus-check e-mail attachments.
b. pdate antivirus software on a regular basis.
c. Always make sure that the operating system is up to date.
d. UOnly download files from the Internet during business hours.
22. Which one of the following would be considered the BEST way to store a PIN number?
a. Keep a written note of it with you bank cards.
b. Store it on your computer.
c. Memorise it.
d. Keep a written note of it in your office drawer.
23. Which one of the following describes why users should lock their computer when leaving
their desk?
a. To prevent a waste of electricity.
b. To prevent unauthorised access to data.
c. To prevent data from getting corrupted.
d. To prevent the computer from malfunctioning.
ECDL-tests.com

ECDL Module 1 Sample Test

24. There are rules governing the rights of a data subject and the responsibilities of a data
controller. What are these rules called?
a. Data Privacy Policy.
b. Data Management Act.
c. Data Protection legislation or conventions.
d. Data Publicity Law.
25. Which one of the following is an example of an operating system
a. iTunes.
b. PowerPoint.
c. Windows.
d. Netscape.
26. Which one of the following is unsafe online activity?
a. Giving your home address to someone you met in a chat room.
b. Using a screen name or nick name that cannot identify you.
c. Meeting someone you met online face-to-face in the company of your parents.
d. Keeping your social network profile private.
27. Which one of the following describes how confidential information should be sent using
an unsecured network?
a. In an unsigned email.
b. In an attachment.
c. In a compressed format.
d. In an encrypted format.
28. Which one of the following statements about the Internet is TRUE? [1 Mark]
a. The Internet is a global network that links many computer networks together.
b. The Internet is a private company network.
c. The Internet is a visual representation of linked documents.
d. The Internet is a network operating system.
29. Which one of the following is an input/output port?
a. Linear.
b. Radial.
c. Lateral.
d. FireWire.
30. Which one of the following describes Bluetooth?
a. Short-range wired protocol for exchanging data.
b. Short-range wireless protocol for exchanging data.
c. Long-range wireless protocol for exchanging data.
d. Long-range wired protocol for exchanging data.
31. Which one of the following describes why Bluetooth device settings should be adjusted?
a. To increase the range of the device.
b. To improve the quality of reception.
c. To prevent the risk of unauthorised access.
d. To reduce interference from other devices.
ECDL-tests.com

ECDL Module 1 Sample Test

32. Which one of the following would result in the loss of contact details if it were stolen?
a. Printer.
b. Mobile Phone.
c. Modem.
d. MP3.
33. Which one of the following is a characteristic of broadband?
a. Completely safe from intruders.
b. It has a dial up connection.
c. High speed.
d. Cost can vary from day to day.
34. Which one of the following is a text-based communication between two or more people
over the Internet?
a. Podcasting.
b. Really Simple Syndication.
c. Voice over Internet Protocol.
d. Instant Messaging.
35. Which one of the following describes how a breach in IT security should be reported?
a. Using the telephone.
b. By emailing to the IT Manager.
c. Using the method listed in the organisation’s security policy.
d. Using any means of communication.
36. Which one of the following describes why it is important to have a secure off-site backup
copy of files?
a. To improve accessible of files from other locations.
b. To speed up the process of accessing the files at any time.
c. To prevent the loss of data in the event of a fire.
d. To reduce the possibility of data theft.

Mais conteúdo relacionado

Mais procurados

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
advantage and disadvantage of technology
advantage and disadvantage of technology advantage and disadvantage of technology
advantage and disadvantage of technology Ziyad Siso
 
Business Optimization via Causal Inference
Business Optimization via Causal InferenceBusiness Optimization via Causal Inference
Business Optimization via Causal InferenceHanan Shteingart
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfnight seem
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantagesHamza Iqbal
 
Digital divide pp
Digital divide ppDigital divide pp
Digital divide ppTechined
 
Class 5 Cbse EVS Sample Paper Term 1 Model 2
Class 5 Cbse EVS Sample Paper Term 1 Model 2Class 5 Cbse EVS Sample Paper Term 1 Model 2
Class 5 Cbse EVS Sample Paper Term 1 Model 2Sunaina Rawat
 
Operating system security
Operating system securityOperating system security
Operating system securityRachel Jeewa
 
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)Muhammad Zaini
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internetLeomar Bondoc
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY127r1a05h9
 
Computer questions with answers
Computer questions with answersComputer questions with answers
Computer questions with answersletsguru guru
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, featuresKiran Kurian Philip
 

Mais procurados (20)

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
advantage and disadvantage of technology
advantage and disadvantage of technology advantage and disadvantage of technology
advantage and disadvantage of technology
 
Internet Grade 6
Internet Grade 6Internet Grade 6
Internet Grade 6
 
Business Optimization via Causal Inference
Business Optimization via Causal InferenceBusiness Optimization via Causal Inference
Business Optimization via Causal Inference
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantages
 
Digital divide pp
Digital divide ppDigital divide pp
Digital divide pp
 
Class 5 Cbse EVS Sample Paper Term 1 Model 2
Class 5 Cbse EVS Sample Paper Term 1 Model 2Class 5 Cbse EVS Sample Paper Term 1 Model 2
Class 5 Cbse EVS Sample Paper Term 1 Model 2
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Basic computer
Basic computerBasic computer
Basic computer
 
Network security
Network security Network security
Network security
 
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT 1)
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
Computer Quiz MCQ's
Computer Quiz MCQ'sComputer Quiz MCQ's
Computer Quiz MCQ's
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
RAIN TECHNOLOGY
RAIN TECHNOLOGYRAIN TECHNOLOGY
RAIN TECHNOLOGY
 
Computer questions with answers
Computer questions with answersComputer questions with answers
Computer questions with answers
 
Internet ,merits demerits, features
Internet ,merits demerits, featuresInternet ,merits demerits, features
Internet ,merits demerits, features
 

Semelhante a Modul 1-sample-test

Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxsleeperharwell
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docxcorbing9ttj
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docxambersalomon88660
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxJeanmarieColbert3
 
Question 1 of 205.0 PointsWhat is the primary limitation o.docx
Question 1 of 205.0 PointsWhat is the primary limitation o.docxQuestion 1 of 205.0 PointsWhat is the primary limitation o.docx
Question 1 of 205.0 PointsWhat is the primary limitation o.docxIRESH3
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_keythinkict
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfANJUMOHANANU
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
1) Which of the following are Penetration testing methodology .docx
1) Which of the following are Penetration testing methodology  .docx1) Which of the following are Penetration testing methodology  .docx
1) Which of the following are Penetration testing methodology .docxSONU61709
 
INTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfINTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfoscardarius
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Yazeed Khalid
 
Questions 1 to 20 Select the best answer to each question. Note t.docx
Questions 1 to 20 Select the best answer to each question. Note t.docxQuestions 1 to 20 Select the best answer to each question. Note t.docx
Questions 1 to 20 Select the best answer to each question. Note t.docxrudybinks
 
COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4kefyalew013
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3enersivard
 

Semelhante a Modul 1-sample-test (20)

Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docx
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx
 
Security (IP)
Security (IP)Security (IP)
Security (IP)
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
 
Question 1 of 205.0 PointsWhat is the primary limitation o.docx
Question 1 of 205.0 PointsWhat is the primary limitation o.docxQuestion 1 of 205.0 PointsWhat is the primary limitation o.docx
Question 1 of 205.0 PointsWhat is the primary limitation o.docx
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
1) Which of the following are Penetration testing methodology .docx
1) Which of the following are Penetration testing methodology  .docx1) Which of the following are Penetration testing methodology  .docx
1) Which of the following are Penetration testing methodology .docx
 
Security (FE)
Security (FE)Security (FE)
Security (FE)
 
Wa
WaWa
Wa
 
INTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfINTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdf
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
 
Bit%20 ch02
Bit%20 ch02Bit%20 ch02
Bit%20 ch02
 
Questions 1 to 20 Select the best answer to each question. Note t.docx
Questions 1 to 20 Select the best answer to each question. Note t.docxQuestions 1 to 20 Select the best answer to each question. Note t.docx
Questions 1 to 20 Select the best answer to each question. Note t.docx
 
COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3
 

Último

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Modul 1-sample-test

  • 1. ECDL-tests.com ECDL Module 1 Sample Test The following sample test for Module 1, Concepts of Information and Communication Technology (ICT), contains 36 multiple-choice questions. Attempt each of the 36 questions. Each question has one correct answer. Enter A, B, C, or D in answer.doc in the space for question number. 1. Which one of the following measures the speed of the CPU? a. Gigahertz (GHz). b. Bits per second (Bps). c. Gigabytes (GB). d. Megabytes (MB). 2. Which one of the following describes a computer’s operating system? a. Software that can retrieve information from a database. b. Hardware that can scan and convert photographs into digital files. c. Software that controls the allocation and usage of hardware. d. Hardware that can record and send images across the Internet. 3. Which one of the following describes spam? a. Gathering information about a person or organisation without their knowledge. b. Performing an unauthorised, usually malicious, action such as erasing files. c. Putting unnecessary load on the network by making copies of files. d. Sending unwanted bulk messages. 4. Which one of the following could lead to the spread of a malicious program? a. Using only software that has been checked for viruses. b. Maintaining regularly updated anti-virus software. c. Opening only virus-checked file attachments from known sources. d. Using a USB Flash Drive from an unknown source to exchange data. 5. Which one of the following protects a computer from the risk of malicious programs? a. PC diagnostic software. b. Web tracking software. c. Anti-spam software. d. Anti-spyware software. 6. Which one of the following describes why it is important to update antivirus software regularly? a. To ensure the software identifies old viruses. b. To protect your computer from all known viruses. c. To protect your computer from unwanted bulk messages. d. To prevent the spread of malicious programs on the Internet. 7. Which one of the following is a term for an audio or video recording posted on a web site that can be downloaded and played later? a. Podcast. b. Blog. c. VoIP. d. RSS Feed. 8. Which one of the following types of software would you most likely use to create a letter? a. Web browsing software.
  • 2. ECDL-tests.com ECDL Module 1 Sample Test b. Spreadsheet software. c. Accounting software. d. Word processing software. 9. Which one of the following describes a computer hacker? a. A skilled programmer who uses authorised access to exploit information available on a computer. b. A skilled programmer who secretly invades computers without authorisation. c. A skilled programmer who writes programs to train new employees. d. A skilled programmer who helps in the installation of new software for an organisation. 10. The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called? a. The Internet. b. A Local Area Network. c. The World Wide Web. d. A network port. 11. Which of the following systems will help to improve communications within the company? a. Excel b. Powerpoint c. Email d. Solitaire 12. Which of the following is NOT an input device? a. b. c. d. Monitor Mouse Keyboard Scanner 13. Which one of the following is a private network that allows specified external users access? a. Intranet. b. WorldNets. c. Internet. d. Extranet. 14. Which one of the following is a software application that assists users who are visually impaired to identify and interpret what is displayed on screen? a. A screen calendar. b. A word processor. c. A screen reader. d. A web log. 15. Which one of the following describes why firewalls are used? a. To prevent unauthorised access by incoming transmissions. b. To prevent destruction of a computer in the event of a fire. c. To enable easy downloading of data from web sites. d. To detect and disable viruses already on a computer. 16. Which one of the following is MOST likely to be a hoax?
  • 3. ECDL-tests.com ECDL Module 1 Sample Test a. An email from a friend you have not seen recently. b. An email with an attachment sent by a colleague using their personal email address. c. An email asking you to go to a website for a free computer scan. d. An email advertisement from a local shop you subscribe to. 17. Which one of the following is NOT a feature of electronic commerce? a. Goods can be advertised and prices compared. b. There is physical contact between buyer and seller. c. Transactions can be processed quickly. d. Services are available 24 hours a day. 18. Which one of the following is the reason that users should log on with a username and password? a. To be aware of who is in the building. b. To check up on the time-keeping of users. c. To protect computers against unauthorised use. d. To enable a personalised greeting for each user. 19. Which one of the following statements about a password is TRUE? a. It must be changed only if it is compromised. b. It cannot contain special character symbols. c. It should be changed regularly. d. It must be registered with the system administrator. 20. Which one of the following statements describes a good approach to information security for an organisation? a. There are no procedures for reporting security lapses. b. Staff passwords are not changed regularly. c. Sensitive data is available to everyone that requests it. d. Keeping an off-site backup of all files. 21. Which one of the following is the best way to protect a computer against computer viruses? a. Only virus-check e-mail attachments. b. pdate antivirus software on a regular basis. c. Always make sure that the operating system is up to date. d. UOnly download files from the Internet during business hours. 22. Which one of the following would be considered the BEST way to store a PIN number? a. Keep a written note of it with you bank cards. b. Store it on your computer. c. Memorise it. d. Keep a written note of it in your office drawer. 23. Which one of the following describes why users should lock their computer when leaving their desk? a. To prevent a waste of electricity. b. To prevent unauthorised access to data. c. To prevent data from getting corrupted. d. To prevent the computer from malfunctioning.
  • 4. ECDL-tests.com ECDL Module 1 Sample Test 24. There are rules governing the rights of a data subject and the responsibilities of a data controller. What are these rules called? a. Data Privacy Policy. b. Data Management Act. c. Data Protection legislation or conventions. d. Data Publicity Law. 25. Which one of the following is an example of an operating system a. iTunes. b. PowerPoint. c. Windows. d. Netscape. 26. Which one of the following is unsafe online activity? a. Giving your home address to someone you met in a chat room. b. Using a screen name or nick name that cannot identify you. c. Meeting someone you met online face-to-face in the company of your parents. d. Keeping your social network profile private. 27. Which one of the following describes how confidential information should be sent using an unsecured network? a. In an unsigned email. b. In an attachment. c. In a compressed format. d. In an encrypted format. 28. Which one of the following statements about the Internet is TRUE? [1 Mark] a. The Internet is a global network that links many computer networks together. b. The Internet is a private company network. c. The Internet is a visual representation of linked documents. d. The Internet is a network operating system. 29. Which one of the following is an input/output port? a. Linear. b. Radial. c. Lateral. d. FireWire. 30. Which one of the following describes Bluetooth? a. Short-range wired protocol for exchanging data. b. Short-range wireless protocol for exchanging data. c. Long-range wireless protocol for exchanging data. d. Long-range wired protocol for exchanging data. 31. Which one of the following describes why Bluetooth device settings should be adjusted? a. To increase the range of the device. b. To improve the quality of reception. c. To prevent the risk of unauthorised access. d. To reduce interference from other devices.
  • 5. ECDL-tests.com ECDL Module 1 Sample Test 32. Which one of the following would result in the loss of contact details if it were stolen? a. Printer. b. Mobile Phone. c. Modem. d. MP3. 33. Which one of the following is a characteristic of broadband? a. Completely safe from intruders. b. It has a dial up connection. c. High speed. d. Cost can vary from day to day. 34. Which one of the following is a text-based communication between two or more people over the Internet? a. Podcasting. b. Really Simple Syndication. c. Voice over Internet Protocol. d. Instant Messaging. 35. Which one of the following describes how a breach in IT security should be reported? a. Using the telephone. b. By emailing to the IT Manager. c. Using the method listed in the organisation’s security policy. d. Using any means of communication. 36. Which one of the following describes why it is important to have a secure off-site backup copy of files? a. To improve accessible of files from other locations. b. To speed up the process of accessing the files at any time. c. To prevent the loss of data in the event of a fire. d. To reduce the possibility of data theft.