IT Exercises. Which one of these is computer hardware? O The operating system. O A CPU. O A word processing package. O A spreadsheet. A CPU.

Slides:



Advertisements
Similar presentations
Part 2 Networks Advantages of Network It Makes the work more flexible an easy It Makes the work more flexible an easy Via Network, you can share : Via.
Advertisements

Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Computer Basics 1 Computer Basic 1 includes two lessons:
Chapter 1. What is computer fluency? The knowledge possessed by people who are able to navigate the digital world successfully NOT THIS.
IT Exercises.
Introduction to Computer Terminology
Application Software CSC151.
Computer Parts There are many parts that work together to make a computer work.
Introduction to Computers Essential Understanding of Computers and Computer Operations.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
Hardware of Personal Computers
Hardware and Software Basics. Computer Hardware  Central Processing Unit - also called “The Chip”, a CPU, a processor, or a microprocessor  Memory (RAM)
Teaching and Learning with Technology  Allyn and Bacon 2002 Introduction to Personal Computers in the Classroom Chapter 3 Teaching and Learning with Technology.
Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices Section.
A Quick Review of Unit 1 – Recognizing Computers Computing Fundamentals © CCI Learning Solutions.
Bellringer Do you think students should study computers? Why or why not?
Introduction to Computers
ICDL Module 1 Basic Concepts of IT Content overview Hardware and software Processing and data Types of computer system Networks (an introduction!) Use.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Introduction to Computers
Parts of the Computer. Three Components of an Information System 1.Hardware The physical components that make up the computer and other devices connected.
The Office Procedures and Technology
Flash Cards Computer Technology.
Parts of a Computer.
Computers Review Computer Science – Hardware, Systems, and Software.
Teaching and Learning with Technology  Allyn and Bacon 2005 Teaching and Learning with Technology  Allyn and Bacon 2002 Teaching and Learning with Technology.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
ROM Read Only Memory “…computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only.
An Overview of Using Computers
BASIC COMPUTER CONCEPTS What is a computer? An electronic device, operating under the control of instructions stored in its own memory unit, that can.
What does a Computer Do?. What is a Computer? A computer is an electronic device, operating under the control of instructions stored in its own memory,
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
What is a Computer ? What is the application of computer in Our Daily Life ? What is the application of computer in Teaching Field?
Introduction to MS Office Computer Essentials PowerPoint.
How to use a computer and not lose your mind
Computer Parts. Two Basic Parts Hardware & Software.
Course ILT Basics of information technology Unit objectives Define “information technology” (IT), distinguish between hardware and software, and identify.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Software and Hardware Interaction
Eng.Abed Al Ghani H. Abu Jabal Introduction to computers.
Computer Architecture
Computer Basics & Keyboarding. What Is A Computer? An electronic device operating under the control of instructions stored in its own memory unit An electronic.
ELEMENTS OF A COMPUTER SYSTEM HARDWARE SOFTWARE PEOPLEWARE DATA.
 LAN ◦ A LAN (Local Area Network) is a system whereby individual PCs are connected together within a company or organization.  WAN ◦ A WAN (Wide Area.
There are many parts that work together to make a computer work. System Unit Computer Parts.
1 THE COMPUTER. 2 Input Processing Output Storage 4 basic functions.
Ryhooooma1 Main Frame. Ryhooooma2 Mouse Monitor System Case Hard disk Drag each graphic to the box contains its description.
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
Introduction TO Network Administration
Chapter Two Introduction to Information Technology Prepared by: Eman Amer.
Parts of the Computer.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Computer Basics Just How Does a Computer Work?
Chapter 19 Basics of Computers. Chapter 19 examines computer hardware and the software19 programs businesses use.
CHAPTER 2 COMPUTER SOFTWARE. LEARNING OUTCOMES At the end of this class, students should be able to:  Explain the significance of software  Define and.
Computers Mrs. Flowers University High School.
**Input devices** 1- you communicate with the computer via an input device. 2- Input devices allow us to send information to the CPU to tell the computer.
Section 2.1 Section 2.2 Identify hardware
What’s out there and who’s using it
King Saud University- College OF Applied Studies
King Saud University- College OF Applied Studies
Information Technology
IT Exercises.
Computer Hardware and Software
Technology Literacy Hardware.
Chapter 11-Business and Technology
Fundamentals of Information Systems
Part 3.
Information Technology Ms. Abeer Helwa
Presentation transcript:

IT Exercises

Which one of these is computer hardware? O The operating system. O A CPU. O A word processing package. O A spreadsheet. A CPU.

Mouse MonitorSystem Case Hard Disk Data storage Containing CPU Output Device Input Device Hard Disk System Case MonitorMouse

Which one of the following dose not influence the Performance of a computer? The amount of free space on the PC’s hard disk. The amount of main memory (RAM) that is installed. The use of trackball rather than a mouse. The type of graphics card that is installed.

The speed of a computer CPU can be measured in: oGigabytes. oGigawatts. oGigahertz. oGigacycles. Gigahertz

Which two of the following devices can be used to input data to a computer ? 1- Joystick 2- printer 3- speaker 4- standard monitor 5- keyboard Joystick keyboard

Which one of these devices can be used to output data from a computer? 1- Joystick 2- printer 3- Mouse 4- Scanner printer

Which one of these devices can be used to input and output data ? 1- Scanner 2- Microphone 3- Touch screen 4- Light pen Touch screen

Which one of these statements about formatting Computer storage media is true? O Disks are automatically formatted when you save a file. O A used floppy disk cannot be reformatted. O Unformatted disks need operating system data written to them before they can store files. O A Full format does not erase data from your disk.

Which one of these statements correctly completes the following sentence? A computer’s operating system: O is the last program to load when you start the computer. O does not control devices connected to the PC. O is not necessary on high-powered personal computers. O instructs the screen to display data entered with the keyboard.

To view web pages Produce a catalogue containing graphics Create interactive learning material Payroll and stock control Produce charts and graphs A web browser Word processing A multimedia application A spreadsheet Application An Accounting Application A web browser Word processing A multimedia application An Accounting Application A spreadsheet Application

Which of following best describes a graphical user interface (GUI): O using a software application for technical drawing. O using a windows, icons and a mouse to operate a computer. O using a system of typed commands to operate a computer. O using picture rather than words for online help.

Which one of these stages of software development is the last stage to be finally completed? O Analysis. O Design. O Programming. O Testing. Testing

Which two statement about local area networks (LAN) are true? O Applications cannot be shared over a LAN. O Authorized users can access and use data stored anywhere on a LAN. O Telecommunication services cannot be shared over a LAN. O Large data files can be transferred between computers using a LAN. O It is not possible for users of a LAN share printers.

Which one of the following best describes an intranet? O A network which can only be accessed using an ISP. O A world-wide collection of computer files connected by links. O A network, using and web, within a single organization. O A network that is shared between more than one organization.

Which one of the following best describes an extranet? O A network, using to share data between organizations. O An extra-fast intranet within a single organizations. O A very large intranet used by the general public. O A network used to share data within a single organization.

Drag two of the statements that describe the World Wide Web into the box. The World Wide Web A Vast collection of linked documents held on computers all over the world A global network of computers linked together using communications equipment A Vast collection of linked documents held on computers all over the world Can be accessed using a browser The world-wide system A network that grew out of the American military Can be accessed using a browser

Which one of these statement about the speed of connecting to the internet is true? O Data transfer is slower with a digital line than with an analog line. O The processor speed of the computer affects the speed of data transfer on the internet. O A 14.4 Kbps modem transfers data more slowly than a 56 Kbps modem. O The speed of data transfer does not vary significantly with the time of the day.

For which one of these tasks would a computerized solution be more appropriate? O Calculating payroll of staff. O Solving staff relations. O Motivating staff. O Selecting new staff. Calculating payroll of staff

Check policy details. Analyse statistics to estimate premiums. Provide quotes for premiums Check an account. Transfer funds. Apply for loans. Administer Employee payrolls. Process orders. Track invoices. Check timetables. Check ticket availability. Online banking Insurance claim processing Airline booking Business administration Insurance claim processing Airline booking Business administration Online banking Large-scale computer applications are increasingly used in business.

Policy documents. Public health warnings. Income tax Payment form. Television license Payment form. Census records. Vehicle registration listing. Public information systems Public record systems Administration systems Public information systems Administration systems Public record systems Large-scale computer applications are increasingly used in government.

For which two of the following tasks in hospitals and health care would large-scale computer applications be most appropriate? O Bereavement counseling. O Tracking treatment costs. O Informing a patient of a diagnosis. O Providing a medical database. O Treating mental health issues.

Which of the following are examples of large-scale applications of computers in education? Match the following statements with the correct boxes. Computer based education Uses traditional methods Student registration systems Provide student counseling Distance learning Researching homework on the internet Coaching of slower students Provide student counseling Coaching of slower students Student registration systems Distance learning Researching homework on the internet

What is the meaning of the letter e in the word e- mail? O Express. O Electric. O Electronic. O Efficient. Electronic.

Which two of the following contribute to a good working environment for a computer operator? O Use of a monitor filter to reduce the glare. O Sitting as close as possible to the monitor. O A good level of ventilation in the room. O Plenty disk space in which to move the mouse. O The keyboard positioned close to the front edge of the disk.

You can reduce the risk of repetitive strain injury by one of the following actions: O using an adjustable chair. O sitting with your feet firmly on the ground. O using an anti-glare screen. O taking frequent breaks form your work.

Which one of these actions demonstrate poor health and safety practice? O Installing too much of software on a computer. O Leaving power cable unsecured. O Turning off the power without first shutting down the PC. O Running several applications at the same time.

Which statement about computers and the environment is true? O Running an animated screensavers saves power. O Printer toner cartridges can be recycled. O You can’t recycle paper from a laser printer. O Laptops on standby use more electricity than when running normally.

Drag each of the statements about user IDs and passwords to the relevant box. ID Password Should be changed regularly Must be unique on the network Identifies a specific user on a network Not confidential Ensures that the person logging on is who they say they are Should be changed regularly Must be unique on the network Identifies a specific user on a network Not confidential Ensures that the person logging on is who they say they are

Which one of the following statement describes the process of backup? O Restoring work from an older file. O Copying a file from your C: drive to your desktop. O Keeping copies of data in two locations. O Moving a file to a different folder on a hard drive.

A PDA which has been backed up - but not password protected - has been stolen. Which one of the following consequences may result? O Loss of the right to use the software that came with PDA. O Time wasted on re-entering all the records in a replacement PDA. O Misuse of confidential files and telephone numbers. O Loss of contact details on the stolen PDA.

A mobile phone which has been insured but not password protected has been stolen. Which one of the following consequences may result? A. Misuse of confidential numbers. B. Meeting the cost of replacement. C. Paying for calls made after the theft is reported. D. Taking out new insurance on the replacement phone.

A laptop which has been password protected, but not backed up, has been stolen. Which one of the following consequences may result? O You will have to change your address. O Confidential files can be Misused. O You will need to change your password. O Work stored on the laptop will be lost.

Anti-virus software can disable a virus on your computer. This action is called: O De-installing. O Disinfecting. O Restoring. O Scanning. Disinfecting

Good Anti-virus practice Poor Anti-virus practice Opening from unknown sources Deleting from unknown sources Putting a virus- checked disk in a floppy drive Downloading and running free software from the web Opening from unknown sources Deleting from unknown sources Putting a virus- checked disk in a floppy drive Downloading and running free software from the web

Which one of the following statements about copyright is true? O If you can copy material from a disk you automatically gain the copyright. O Copyrights provides control over how other people make disk copies of someone’s work. O Graphics published on CD-ROM are not subjected to any form of copyright. O If you create a CD-ROM yourself, you own the copyright to anything you put on it.

Shareware is the term that is applied to: O an application that is used to track the movement of stocks and share. O software that you try for free but pay for it if you keep it. O any application for which a multi-user license is available. O any software that can be used on a server.

An important purpose of data protection legislation is to: O improve the standards for electronic storage media. O prevent the illegal use of commercial software. O safeguard the privacy of individuals’ personal data. O protect companies from industrial espionage.

Which one of these is application software? O Graphics card. O Word processor. O Central Processing Unit (CPU). O Hard Disk. Word processor

Which one of these computer types is the most powerful? -Laptop. -Mainframe Computer. -Server. -Personal Computer. Mainframe Computer

Which one of the following statement is true about ROM (read-only memory): O It is wiped clean when you switch off the computer. O It stores the computer’s operating system. O It cannot be modified by the user. O It is loaded from your hard disk when you switch on the computer. It cannot be modified by the user.

BitKilobyteGigabyteMegabyteByte smallest Largest Bit Byte Kilobyte Megabyte Gigabyte

Which two of the following devices can be used to input data to a computer ? 1- Mouse 2- printer 3- speaker 4- Plotter 5- Light pen Mouse Light pen

Which one of these devices can be used to output data from a computer? 1- Keyboard 2- Microphone 3- Plotter 4- Scanner Plotter

Which one of these types of storage provides the fastest access to data? 1- Zip disk 2- Floppy diskette 3- Hard disk 4- CD-Rom Hard disk

Which two of the following statements about access rights are true? O Are intended to protect a company’s intellectual property. O Decide who can work in a building outside office hours. O Determine which files individuals can read or change on a network. O Are the same for all users on single network. O Depend on which computer you are using to access the network

Creating a list of contact details. Producing complex magazine layouts. Working out budgets. Creating interactive training materials. Creating letters and business documents. Desktop Publishing Word processing A multimedia application A spreadsheet Application A Database Application Desktop Publishing A spreadsheet Application A Multimedia Application Word Processing

Which one of these stages of software development is the first stage to be completed? O Design. O Analysis. O Programming. O Testing. Analysis.

Which one of these is the type of network that links computers in different cities or countries? O LAN. O Ethernet. O PSTN. O WAN. WAN

Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resources Printers Disk Space Monitors Applications Keyboards Applications

The term ADSL stands for: O Anonymous Digital Service Line. O Asymmetric Digital Subscriber Line. O Analog Digital Service Line. O Advanced Data Service Link. Asymmetric Digital Subscriber Line

For which two of these tasks would a computerized solution be most appropriate? O Assessing employee performance. O Enforcing rules and regulations. O Generating invoices. O Carrying out stock control. O Providing a customer support helpline.

Store census information. Store passport details. Handle social welfare payments Collect television license fees. Announce policy documents online. Notify citizens of government decisions. Public information systems Public record systems Administration systems Public information systems Administration systems Public record systems Large-scale computer applications are increasingly used in government.

For which one of the following tasks in hospitals and health care would large-scale computer applications be most appropriate? O Running life-support systems. O Diagnosis Patient. O Comforting patients. O Guiding support groups. Running life-support systems

Which one of the following statements about teleworking is true? O More human contact with the team. O Increased company space requirements. O Greater ability to focus on one task. O Inflexible schedules.

Which two of the following statements about purchasing on line are true? O The consumers rights of the supplier’s country apply. O E-commerce offers access to goods around the clock. O The supplier covers the cost of shipping. O All e-commerce transactions are safe. O The supplier covers the cost of returning goods.

Which one of the following contribute to a good working environment for a computer operator? O Locating the PC close to a printer. O Elbow and wrist support. O High level of contrast between the screen brightness and other lighting. O Direct light shining on the monitor. Elbow and wrist support

You can reduce the risk of eye-strain by one of the following actions: O increase the contrast between screen and room lighting. O using an anti-glare filter on your monitor. O reducing your monitor’s colour depth setting. O positioning the screen with a window behind it. using an anti-glare filter on your monitor

Are best printed Are suitable for electronic distribution Help for a software application Guarantees messages Contracts Help for a software application Guarantees Contracts messages Electronic documents help to save paper, while other documents distribution.

Which one of the following statements about an organization’s information security policy is true? O Applies to the employee, not the employer. O Deals with the handling confidential data. O Deals only with data held on computers. O Covers the licensing of operating system software.

Which one of the following statements about Anti virus software is true? O Before accessing the internet, you need to run a virus check. O Deleting an infected file will eliminate the virus. O Anti-virus software can detect all known viruses. O Anti-virus software can disinfect applications as well as files.

Good Anti-virus practice Poor Anti-virus practice Updating anti-virus software once a year Scheduling virus checks to run once a day Deleting from unknown sources Opening unknown e- mail attachments Updating anti-virus software once a year Deleting from unknown sources Scheduling virus checks to run once a day Opening unknown e- mail attachments

Which one of the following statements about copyright is true? O Text on a web page can be freely copied and re-used. O Graphics published on the web are subjected to copyright. O When you buy software, the copyright transfer to you. O It is legal to share any audio files on the internet.

Which one of the following statements about copyright is true? O The paper license that comes with software on CD transfers the copyright to you. O You can make a backup CD of software bought for your own use. O Software purchased on the web and copied to CD-ROM can be shared with friends. O Copying text, images, audio, or video from disk is always illegal.

Freeware is the term that is applied to: O software that you can try free of charge before buying. O software that you don’t have to pay for. O old versions of commercial software that are out of date. O software that will run under any operating system

Which two of the following have a significant influence on the speed at which a computer performs? O Installing new applications. O Clearing all the unwanted files off a hard disk. O Installing a smaller monitor. O Increasing the amount of RAM. O Adding a CD-ROM drive.

Good Anti-virus practice Poor Anti-virus practice Updating anti-virus software once a year Scheduling virus checks to run once a day Deleting from unknown sources Opening unknown e- mail attachments Updating anti-virus software once a year Deleting from unknown sources Scheduling virus checks to run once a day Opening unknown e- mail attachments

RAM ROM The contents of this are fixed during the manufacture of the PC The Operating system is loaded into this when the PC is switched on. The contents of this disappear when the PC is switched off. You cannot write to this type of memory. The contents of this change constantly as the PC is used. The Operating system is loaded into this when the PC is switched on. The contents of this disappear when the PC is switched off. The contents of this are fixed during the manufacture of the PC The contents of this change constantly as the PC is used. You cannot write to this type of memory.

Very cheap means of backing up 1 MB of text files Backing up 1.8GB of files you are currently working on. Archiving 1.8GB of graphic files that are not currently needed MB Floppy Disk 2GB Back-up Tape 2GB Hard Disk 1.44 MB Floppy Disk 2GB Back-up Tape 2GB Hard Disk

An operating System A Software Application You can run more than one at the same time Sets up the look and feel of your computer interface Controls the hardware and software of your computer This can be used to edit data files You can run more than one at the same time This can be used to edit data files Sets up the look and feel of your computer interface Controls the hardware and software of your computer

Which two of these are operating systems? o Windows. o Netscape Navigator. o Yahoo! o Linux. o Outlook. Windows. Linux

Which one of these statements about the internet is false? O It enables computer with different operating systems to exchange data. O It is not controlled by any single organization. O You need a license to publish material on the internet. O It allows computers to share data over large distance.

Drag just the two of the statements that describe the internet into the box. Internet A global network of computers linked together using communications equipment A Vast collection of linked documents held on computers all over the world The world-wide system A network that grew out of the American military Can be accessed using a browser A global network of computers linked together using communications equipment A network that grew out of the American military

Which one of these types of computer memory is permanent and unchanging? O Random Access Memory. O Working Memory. O Virtual Memory. O Read-Only Memory. Read-Only Memory.

Which one of the following isn’t operating system? A. Unix. B. Windows. C. Ms Word. D. Ms-Dos. Ms Word

Which one of the following descriptions of an extranet is true? O A world-wide collection of files connected by links. O A very large intranet within an organization. O An extra-fast intranet for web and . O Shares data between two or more organizations.

stands for: A. Electric mail. B. Electronic mail. C. Efficient mail. D. Express mail. Electronic mail

Which one of the following operating system does not have a GUI? A. UNIX. B. Microsoft Windows. C. MAC OS X. D. Microsoft DOS. Microsoft DOS

Microsoft Windows is a (an): A. Database program. B. Operating system. C. Word processing program. D. Graphics program. Operating system

Which of the following is the first stage in the standard sequence of software development? A. Testing. B. Analysis. C. Programming. D. Design. Analysis

What type of computer application would be used in a hospital to maintain patient medical details? A. A desktop publishing application. B. A database application. C. A accounting application. D. A presentation engine. A database application

Which one of these statements about computer application is true? A. The same version of an application will work on any type of computer. B. They control devices such as printers and scanners that are attached to the PC. C. They enable users to carry out specific tasks such as word processing. D. They are the only programs that you need to use PC.

Which one of the following activities is best suited for ? A. Performing calculations. B. Sharing very large video files, such as movie trailers. C. Sharing files between workers at different locations. D. Transmitting credit card details.

Which one of the following statements about copyright is true? A. Publishing digital work on disk requires permission of the copyright holder. B. When you purchase software in CD the copyright transfer to you. C. Any material which is published on disk is subjected to copyright. D. You can reuse graphics from the web on CD- Rom.

Unauthorized access to computer files can be prevented by using: A. Password. B. Anti-virus software. C. Uninterruptible power supply. D. Secure backup copies. Password

Which Preventative measure can be used to stop computer system becoming infected with a virus? A. Install physical security measures. B. Password protect the start-up process. C. Disable the floppy disk drive. D. A virus-checking program. A virus-checking program

Which of the following precautions would prevent virus-infected software being used on computer? A. Install a virus protection system. B. Install software to prevent hacking. C. Install password security to the system. D. Take regular backups. Install a virus protection system.

Electronic commerce is best described as: A. Requesting information from companies selling electronic equipment. B. The buying of electronic equipments from a high street shop. C. Advertising electronic goods on the internet. D. The buying of goods and services and paying for them on-line.

Which of the following can be used to restore programs or data after being altered by a malicious program? A. Anti-virus software. B. Password. C. Back-up copies. D. Hacking. Back-up copies

Which of the following provides an example of a good working environment? A. Adequate lighting. B. Energy-saving hardware. C. New computer hardware every two years. D. Staff welfare benefits. Adequate lighting

A company needs all it’s 30 office staff to use a spreadsheet application, It should: A. Copy the spreadsheet application onto each individual PC. B. Purchase a multi-user license. C. Use the spreadsheet application regardless of the numbers of users. D. Purchase a single-user license for each PC. Purchase a multi-user license

What name is given to software, which under development? A. Beta software. B. Demonstration software. C. Freeware. D. Shareware. Beta software

Which of the following is the name given to software, which can legally be copied without a license? A. Beta software. B. Retail software. C. Freeware. D. Protected software. Freeware

Which of the following best describes teleworking? A. Working for a television. B. Working for a telesales company. C. Designing teletext pages. D. Working at home using electronic communications.

An End User License Agreement A. Is a form of advertising between a software application author and the user. B. Gives the user the exclusive right to copy and sell the software to other potential users. C. Grants ownership of the software to the user. D. Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, release and restricted use.

Which of the following is a good password policy for an organization? A. All passwords are changed regularly. B. All passwords are never changed. C. All passwords are made up of less than four characters. D. All passwords are made up of less than four numbers. All passwords are changed regularly

Which of the following is not a function of the CPU? A. Executing program instruction. B. Ensuring program instructions are executed in the right sequence. C. Sending . D. Carrying out calculations. Sending

What is ISDN? A. Integrated Standard Digital Networks. B. Integrated Services Digital Network. C. Interactive Standard Dynamic Networks. D. Internet Services Data Network. Integrated Services Digital Network

Large Organization often use a computer system to run the company typically it is most likely to be: A. A Personal Computer. B. A PDA. C. A Mini Computer. D. A Mainframe Computer. A Mainframe Computer

Scanner can be described as: A. An output device only B. An input device only C. An input and output device D. Storage device An input device only

From an output devices: A. Mouse. B. Keyboard. C. Plotter. D. Light Pen. Plotter

Which of the following statement is true? A. The CPU is an input devices. B. The CPU is an output devices. C. The CPU is used to process program instructions and data. D. The CPU is used as non volatile storage media.

The data stored on CD-Rom are A. Volatile and read only data. B. Non Volatile and read only data. C. Non Volatile and read/write data. D. Volatile and read/write data. Non Volatile and read only data

Which is the most appropriate application to store census information? A. Data Logging Application. B. CAD Application. C. Database Application. D. Word Processor Application. Database Application.

A GUI is used to: A. Draw graphs and drawing. B. Provide the interface between two peripherals. C. Provide an easy way to use computer. D. Store graphics image as file. Provide an easy way to use computer.

The range of voice, computer messages and other services provided by: A. ISBN. B. PSBX. C. ISDN. D. PSDN. ISDN

Which one of the following is not an input device? A. Web camera. B. Scanner. C. Touch pad. D. Monitor. Monitor

The location of information on the internet can be obtained by using a database: A. Web editor application. B. Search engine. C. Spreadsheet application. D. Word perfect. Search engine

Which two of the following is considered as input devices? A. Printers. B. Monitor. C. Microphone. D. Plotter. E. Keyboard. Microphone Keyboard

Which one have the fastest access to data? A. DVD drive. B. Floppy disk. C. Zip disk. D. Hard Disk. Hard Disk

Which one of these memory can not be changed? A. Random Access Memory. B. Storing Memory. C. Read Only Memory. D. Virtual Memory. Read Only Memory.

Which one of the following is considered as input devices? A. Plotter. B. Monitor. C. Web camera. D. Charger. Web camera.

An equipment that attached to computer to stop large volts of electricity: A. UPS. B. Battery. C. Charger. D. Surge suppressor. Surge suppressor.

The baud rate can tell how fast: A. The hard disk send and revive data. B. The MODEM can send and revive data. C. The CPU send and revive data. D. The RAM send and revive data. The MODEM can send and revive data.

Where the computer is appropriate more than people? A. In interpreting. B. In recognizing. C. In dangerous situation. D. In completing. In dangerous situation.

A computer virus is a program that A. Always spotted by antivirus. B. Make your hard disk unusable. C. The only way for infection is internet. D. Can be avoid by regular backup. Always spotted by antivirus.

Which one is more appropriate about Shareware software? A. Any software used by a group of people in the same time. B. Any application you borrow from your friend. C. Any application downloaded from internet. D. Any software you try for free time and pay for keeping it. Any software you try for free time and pay for keeping it.

Which one of the following is not related to the operating system? A. GUI. B. The program that you can use when the system has been loaded. C. Allow you to use computer without learn about how hardware work. D. Special program that run automatically when you start the computer.

Which one is not true about RAM? A. The data stored on it is volatile. B. Information is lost when you switch off the computer. C. The data held on it cannot be saved on your hard disk. D. The operating system is copied on it when you switch on computer.

Which one of the following devices connect to the system unit externally and controlled by the central processing unit? A. Additional devices. B. Storage Units. C. Input devices. D. Peripheral devices.

Which one of these is a computer software? A. Monitor. B. Windows. C. System Case. D. Scanner.

A Gigabyte is approximately: A. 1,000 bytes. B. 100 kilobytes. C. 1,000 kilobytes. D. 1,000 Megabytes.

Which two of these are operating systems? A. Linux. B. Mac OS. C. Internet explorer. D. Outlook. E. Google.

Stage 1 Stage 3 Stage 2 Analysis Design Programming Drag each of the stages of development into logical order. Stage 4 Testing Programming Design Testing Analysis

Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resources Files Disk Storage Monitors Applications Keyboards Applications

The internet is the name that is given to: A. The physical equipment used to connect computer systems all over the world. B. All the linked documents that are held on a global network of computer systems. C. Linked computer systems that form a vast global network. D. The dedicated telephone lines that permanently connect commercial networks on distant sites.

Which one of the following statements about the use of e-commerce is true? A. An internet connection is optional for e-commerce. B. Transaction can occur anywhere in the world. C. Customers can only pay by ing credit card details. D. Customers give up the right return unsatisfactory goods.

Which two of the following statements about passwords are true? A. You should use the same password for everything. B. You should write down your password and keep it in a convenient place. C. Passwords should contain both letters and numbers. D. Once you create a password, you can’t change it. E. A Password should be known only to the user.

Which two of these statements could each be used to complete the following sentence? A computer virus is a program that: A. Cannot infect a stand alone PC. B. Disappears once it has displayed a message. C. Can usually be detected by anti-virus software. D. Can be introduced when new software is installed. E. Can enter a computer system if hardware such as a new mouse added.

Which one of the following statements about copyright is true? A. You give up your copyright to text that you publish on the internet. B. You can re-use downloaded graphics in any way. C. Scanned images are subject to copyright. D. When you purchase software, the copyright transfer to you.

E-commerce is the term used to describe business that: A. uses computers to carry out its work. B. is carried out using electronic funds transfer. C. involves the import and export of electronic equipment. D. buys or sells goods and services online.

Which one of the following statements about purchasing online is true? A. Purchases are only processed during business hours. B. Shipping of purchases is normally free. C. The consumer rights of your country apply. D. You are at risk from insecure payment method.

You can reduce the risk of neck, back and shoulder pain, by one of the following actions: A. Using a larger monitor with sharper resolution. B. Using a wireless mouse. C. Keeping the keyboard close to the front of the disk. D. Using a fully adjustable operator’s chair.

Which one of these actions demonstrate poor health and safety practice in the use of computers? A. Touching internal parts of the PC. B. Running several application at the same time. C. Only using a single power socket for each PC. D. Using out-of-date software.

Which one of these statements best describes computer backup? A. Reverting to the previously saved version of an electronic file. B. Keeping a copy of computer files on a separate storage device. C. Storing paper printout from your computer files. D. Storing computer files on a Variety of separate storage device.

Which one of the following statements about copyright is true? A. You can use downloaded graphics in any way. B. You are allowed to re-use text you copy from the web. C. When you purchase software, the copyright transfer to you. D. Audio files on the internet are subject to copyright.

Which two of the following statements about data protection legislation are true? A. Deals with industrial espionage between competing companies. B. Can result in litigation if personal data is not adequately protected. C. Means that personal data must be stored for certain period of time. D. Ensures that laws about data security are the same in every country. E. Obliges organizations to protect confidential data within their control.

Which one of the following is the a digital line, used for both voice and data? A. ISDN. B. FTP. C. PSTN. D. HTTP. ISDN.

The device that links computers to telephone networks by converting digital and analog signals is called a: A. Transcoder. B. Digitiser. C. MODEM. D. Translator Unit. MODEM

Which one of the following statements about formatting computer storage media is true? A. All operating systems format disks in the same way. B. You can’t format a disk if it had been formatted already. C. A pre-formatted disk can be used immediately to store data. D. You should regularly format floppy disks.

Sort these units of data by increasing order of size. Terabyte Kilobyte Gigabyte Megabyte Byte Kilobyte Megabyte Gigabyte Terabyte

Which one of the following statements applies to PSTN? A. A network designed to transmit high-speed digital data. B. It’s the Internet system. C. It’s a form of satellite communication. D. The Public Analog Telephone network.

Which one of the following options describe the effects of teleworking? A. Reduced cost of equipments. B. Harder to socially interact with team members. C. Greater use of transport. D. Inflexible working hours.

Which two of the following statements about purchasing on line are true? A. Initial shipping of goods is free. B. The supplier covers the cost of returning goods. C. The consumers rights of the supplier’s country apply. D. It’s more difficult to return goods purchased online than goods bought in a shop. E. Online purchases are free of customs duties.

Which two of the following help to create a good working environment for computer users? A. Bright fluorescent lighting. B. Use a mouse of mat with wrist support. C. Turning up screen contrast. D. Use of monitor filter to reduce glare. E. Sitting as close as possible to the monitor.

You can reduce the risk of eye-strain by one of the following: A. Using the brightest possible screen setting. B. Setting the screen facing a window. C. Sitting approximately 12" from your monitor. D. Having your eyes level with the top of your monitor.

Three of the following are examples of computer uses in education. Match the statements with the correct boxes. Computer based education Uses traditional methods Organizing student timetables Using the Web for research Distance learning Coaching students with learning difficulties Helping students with career advice Coaching students with learning difficulties Helping students with career advice Organizing student timetables Distance learning Using the Web for research

Should be printed Can be distributed electronically Staff announcements Documents that need careful proof-reading Working drafts of lengthy report Conrtacts Staff announcements Documents that need careful proof-reading Contracts Working drafts of lengthy report Electronic documents help to save paper, while other documents are best printed out.

Drag these statements into the correct boxes. True False Formatting is the process of saving data onto a floppy disk A used floppy disk cannot be reformatted You cannot purchase pre-formatted disks Full disk formatting completely erases the previous contents of a disk All disks need to be formatted before they can store files Formatting is the process of saving data onto a floppy disk You cannot purchase pre-formatted disks Full disk formatting completely erases the previous contents of a disk All disks need to be formatted before they can store files A used floppy disk cannot be reformatted

Creating letters, faxes or memos etc. Make financial projections. Create overhead projection or slides. Sorting large amounts of information. Producing a newspaper with complex page layouts Desktop Publishing Word processing A presentation Application A spreadsheet Application A Database Application Word Processing A spreadsheet Application A presentation Application A Database Application Desktop Publishing

These items contain sensitive data These items do not need protection Contact details for sales enquiries Research on new products Training materials Management accounts Research on new products Contact details for sales enquiries Management accounts Training materials Which two of the following documents contain sensitive data and need protection?

Should be printed Can be distributed electronically Help for a software application Planning application Documents that are regularly updated Academic certificates Help for a software application Planning application Academic certificates Documents that are regularly updated Electronic documents help to save paper, while other documents are best printed out.

Helps to avoid the risk of spreading a computer virus Doesn’t help to avoid the risk of spreading a computer virus Scanning all unfamiliar disks with anti-virus software Virus scanning all application before loading them onto your hard disk Only copying applications from your close friends Write-protecting all copies of application disks once they have been checked Rebooting your PC if you find a file that is infected Only copying applications from your close friends Rebooting your PC if you find a file that is infected Scanning all unfamiliar disks with anti-virus software Write-protecting all copies of application disks once they have been checked Virus scanning all application before loading them onto your hard disk

For which two of the following tasks in hospitals and healthcare would large-scale computer applications be most appropriate? A. Establishing bed availability. B. Providing information to relatives. C. Informing a patient of a diagnosis. D. Treating mental health issues. E. Tracking patient medical history.

For which two of these tasks would people be more appropriate than computers? A. Calculating payroll for staff. B. Motivating staff. C. Storing a list of staff contact details. D. Providing a customer support helpline. E. Maintaining a list of every item in the company’s inventory of goods.

Which of the following statements about safety precautions when using computers? A. Faulty cables should be repaired using insulating tape. B. You should shut down your PC by unplugging it from electricity supply. C. There no safe way to run cables across open areas. D. More than one computer should not use the same power socket.