Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT Exercises.

Similar presentations


Presentation on theme: "IT Exercises."— Presentation transcript:

1 IT Exercises

2 Which one of these is computer hardware?
O The operating system. O A CPU. O A word processing package. O A spreadsheet. Answer: A CPU.

3

4

5

6

7

8

9

10

11

12

13 The speed of a computer CPU can be measured in:
O Gigabytes. O Gigawatts. O Gigahertz. O Gigacycles. Answer: Gigahertz.

14

15

16 Which one of these stages of software development is the first stage to be completed?
O Design. O Analysis. O Programming. O Testing. Answer: Analysis.

17

18

19

20 Which one of the following operating system does not have a GUI?
A. Microsoft Windows 3.1 B. Microsoft Windows 95. C. Microsoft Windows NT. D. Microsoft Dos . Answer: Microsoft Dos.

21

22 Which of the following is the first stage in the standard sequence of software development?
A. Testing. B. Analysis. C. Programming. D. Design. Answer: Analysis.

23 Which one of these statement about the speed of connecting to the internet is true?
O Data transfer is slower with a digital line than with an analog line. O The processor speed of the computer affects the speed of data transfer on the internet. O A 14.4 Kbps modem transfers data more slowly than a Kbps modem. O The speed of data transfer does not vary significantly with the time of the day. Answer: A 14.4 Kbps modem transfers data more slowly than a 56 Kbps modem.

24 Which one of the following isn’t operating system?
A. Unix. B. Windows. C. Ms Word. D. Ms-Dos. Answer: Ms Word.

25 Which one of these is application software?
O Graphics card. O Word processor. O Central Processing Unit (CPU). O Hard Disk. Answer: Word processor.

26 Which one of these types of computer memory is permanent and unchanging?
O Random Access Memory. O Working Memory. O Virtual Memory. O Read-Only Memory. Answer: Read-Only Memory.

27 Which one of these stages of software development is the last stage to be finally completed?
O Analysis. O Design. O Programming. O Testing. Answer: Testing.

28 Answer: Electronic mail.
stands for: A. Electric mail. B. Electronic mail. C. Efficient mail. D. Express mail. Answer: Electronic mail.

29 Which of the following is system software?
A. A Spreadsheet. B. A Database. C. An operating system. D. A Hard Disk. Answer: An operating system.

30 In the standard sequence of software development which stage follows analysis?
A. Testing. B. Reviewing. C. Programming. D. Design. Answer: Design.

31 Which of the following is the final stage in the standard sequence of software development?
A. Testing. B. Analysis. C. Programming. D. Design. Answer: Testing.

32 Which one of the following is an operating system?
A. Lotus 123. B. PowerPoint 2000. C. Windows XP. D. Netscape Navigator. Answer: Windows XP.

33 What type of computer application would be used in a hospital to maintain patient medical details?
A. A desktop publishing application. B. A database application. C. A accounting application. D. A presentation engine. Answer: A database application.

34 Microsoft Windows is a (an):
A. Database program. B. Operating system. C. Word processing program. D. Graphics program. Answer: Operating system.

35 Which software application would a secretary use to produce a standard letters instead of using a typewriter? A. A Spreadsheet application. B. A CAD application. C. A word processor application. D. A presentation application. Answer: A word processor application.

36 What is the meaning of the letter e in the word e-mail?
O Express. O Electric. O Electronic. O Efficient. Answer: Electronic.

37 Which two of these are operating systems?
O Windows. O Netscape Navigator. O Yahoo! O Linux. O Outlook. Answer:1- Windows. 2-Linux.

38 Which one of these is the type of network that links computers in different cities or countries?
O LAN. O Ethernet. O PSTN. O WAN. Answer: WAN.

39 Anti-virus software can disable a virus on your computer
Anti-virus software can disable a virus on your computer. This action is called: O De-installing. O Disinfecting. O Restoring. O Scanning. Answer: Disinfecting.

40 Which one of the following dose not influence the Performance of a computer?
O The amount of free space on the PC’s hard disk. O The amount of main memory (RAM) that is installed. O The use of trackball rather than a mouse. O The type of graphics card that is installed. Answer: The use of trackball rather than a mouse.

41 Which one of these statements about formatting Computer storage media is true?
O Disks are automatically formatted when you save a file. O A used floppy disk cannot be reformatted. O Unformatted disks need operating system data written to them before they can store files. O A Full format does not erase data from your disk. Answer: Unformatted disks need operating system data written to them before they can store files.

42 Which one of these statements correctly completes the following sentence? A computer’s operating system: O is the last program to load when you start the computer. O does not control devices connected to the PC. O is not necessary on high-powered personal computers. O instructs the screen to display data entered with the keyboard. Answer: instructs the screen to display data entered with the keyboard.

43 Which of following best describes a graphical user interface (GUI):
O using a software application for technical drawing. O using a windows, icons and a mouse to operate a computer. O using a system of typed commands to operate a computer. O using picture rather than words for online help. Answer: using a windows, icons and a mouse to operate a computer.

44 Which two statement about local area networks (LAN) are true?
O Applications cannot be shared over a LAN. O Authorized users can access and use data stored anywhere on a LAN. O Telecommunication services cannot be shared over a LAN. O Large data files can be transferred between computers using a LAN. O It is not possible for users of a LAN share printers. Answer: 1-Authorized users can access and use data stored anywhere on a LAN. 2-Large data files can be transferred between computers using a LAN.

45 Which one of the following best describes an intranet?
O A network which can only be accessed using an ISP. O A world-wide collection of computer files connected by links. O A network, using and web, within a single organization. O A network that is shared between more than one organization. Answer: A network, using and web, within a single organization.

46 Which one of the following best describes an extranet?
O A network, using to share data between organizations. O An extra-fast intranet within a single organizations. O A very large intranet used by the general public. O A network used to share data within a single organization. Answer: A network, using to share data between organizations.

47 O Calculating payroll of staff.
For which one of these tasks would a computerized solution be more appropriate? O Calculating payroll of staff. O Solving staff relations. O Motivating staff. O Selecting new staff. Answer: Calculating payroll of staff.

48

49

50 O Tracking treatment costs. O Informing a patient of a diagnosis.
For which two of the following tasks in hospitals and health care would large-scale computer applications be most appropriate? O Bereavement counseling. O Tracking treatment costs. O Informing a patient of a diagnosis. O Providing a medical database. O Treating mental health issues. Answer: 1-Tracking treatment costs. 2-Providing a medical database.

51

52 Which two of the following contribute to a good working environment for a computer operator?
O Use of a monitor filter to reduce the glare. O Sitting as close as possible to the monitor. O A good level of ventilation in the room. O Plenty disk space in which to move the mouse. O The keyboard positioned close to the front edge of the disk. Answer: 1-Use of a monitor filter to reduce the glare. 2-A good level of ventilation in the room.

53 You can reduce the risk of repetitive strain injury by one of the following actions:
O using an adjustable chair. O sitting with your feet firmly on the ground. O using an anti-glare screen. O taking frequent breaks form your work. Answer: taking frequent breaks form your work.

54 Which one of these actions demonstrate poor health and safety practice?
O Installing too much of software on a computer. O Leaving power cable unsecured. O Turning off the power without first shutting down the PC. O Running several applications at the same time. Answer: Leaving power cable unsecured.

55 Which statement about computers and the environment is true?
O Running an animated screensavers saves power. O Printer toner cartridges can be recycled. O You can’t recycle paper from a laser printer. O Laptops on standby use more electricity than when running normally. Answer: Printer toner cartridges can be recycled.

56

57 Which one of the following statement describes the process of backup?
O Restoring work from an older file. O Copying a file from your C: drive to your desktop. O Keeping copies of data in two locations. O Moving a file to a different folder on a hard drive. Answer: Keeping copies of data in two locations.

58 A PDA which has been backed up - but not password protected - has been stolen. Which one of the following consequences may result? O Loss of the right to use the software that came with PDA. O Time wasted on re-entering all the records in a replacement PDA. O Misuse of confidential files and telephone numbers. O Loss of contact details on the stolen PDA. Answer: Misuse of confidential files and telephone numbers.

59

60 Which one of the following statements about copyright is true?
O If you can copy material from a disk you automatically gain the copyright. O Copyrights provides control over how other people make disk copies of someone’s work. O Graphics published on CD-ROM are not subjected to any form of copyright. O If you create a CD-ROM yourself, you own the copyright to anything you put on it. Answer: Copyrights provides control over how other people make disk copies of someone’s work.

61 Shareware is the term that is applied to:
O an application that is used to track the movement of stocks and share. O software that you try for free but pay for it if you keep it. O any application for which a multi-user license is available. O any software that can be used on a server. Answer: software that you try for free but pay for it if you keep it.

62 An important purpose of data protection legislation is to:
O improve the standards for electronic storage media. O prevent the illegal use of commercial software. O safeguard the privacy of individuals’ personal data. O protect companies from industrial espionage. Answer: safeguard the privacy of individuals’ personal data.

63 Which one of the following statement is true about ROM (read-only memory):
O It is wiped clean when you switch off the computer. O It stores the computer’s operating system. O It cannot be modified by the user. O It is loaded from your hard disk when you switch on the computer. Answer: It cannot be modified by the user.

64 Which two of the following statements about access rights are true?
O Are intended to protect a company’s intellectual property. O Decide who can work in a building outside office hours. O Determine which files individuals can read or change on a network. O Are the same for all users on single network. O Depend on which computer you are using to access the network Answer: 1-Determine which files individuals can read or change on a network. 2-Are the same for all users on single network.

65 The term ADSL stands for:
O Anonymous Digital Service Line. O Asymmetric Digital Subscriber Line. O Analog Digital Service Line. O Advanced Data Service Link. Answer: Asymmetric Digital Subscriber Line.

66 O Enforcing rules and regulations. O Generating invoices.
For which two of these tasks would a computerized solution be most appropriate? O Assessing employee performance. O Enforcing rules and regulations. O Generating invoices. O Carrying out stock control. O Providing a customer support helpline. Answer: 1-Generating invoices. 2- Carrying out stock control.

67

68 For which one of the following tasks in hospitals and health care would large-scale computer applications be most appropriate? O Running life-support systems. O Diagnosis Patient. O Comforting patients. O Guiding support groups. Answer: Running life-support systems

69 Which one of the following statements about teleworking is true?
O More human contact with the team. O Increased company space requirements. O Greater ability to focus on one task. O Inflexible schedules. Answer: Greater ability to focus on one task.

70 Answer: 1- The consumers rights of the supplier’s country apply.
Which two of the following statements about purchasing on line are true? O The consumers rights of the supplier’s country apply. O E-commerce offers access to goods around the clock. O The supplier covers the cost of shipping. O All e-commerce transactions are safe. O The supplier covers the cost of returning goods. Answer: 1- The consumers rights of the supplier’s country apply. 2- E-commerce offers access to goods around the clock.

71 Which one of the following contribute to a good working environment for a computer operator?
O Locating the PC close to a printer. O Elbow and wrist support. O High level of contrast between the screen brightness and other lighting. O Direct light shining on the monitor. Answer: Elbow and wrist support.

72 You can reduce the risk of eye-strain by one of the following actions:
O increase the contrast between screen and room lighting. O using an anti-glare filter on your monitor. O reducing your monitor’s colour depth setting. O positioning the screen with a window behind it. Answer: using an anti-glare filter on your monitor.

73

74 Which one of the following statements about an organization’s information security policy is true?
O Applies to the employee, not the employer. O Deals with the handling confidential data. O Deals only with data held on computers. O Covers the licensing of operating system software. Answer: Deals with the handling confidential data.

75 A laptop which has been password protected, but not backed up, has been stolen. Which one of the following consequences may result? O You will have to change your address. O Confidential files can be Misused. O You will need to change your password. O Work stored on the laptop will be lost. Answer: Work stored on the laptop will be lost.

76 Which one of the following statements about formatting computer media is true?
O Before accessing the internet, you need to run a virus check. O Deleting an infected file will eliminate the virus. O Anti-virus software can detect all known viruses. O Anti-virus software can disinfect applications as well as files. Answer: Anti-virus software can disinfect applications as well as files.

77

78 Which one of the following statements about copyright is true?
O Text on a web page can be freely copied and re-used. O Graphics published on the web are subjected to copyright. O When you buy software, the copyright transfer to you. O It is legal to share any audio files on the internet. Answer: Graphics published on the web are subjected to copyright.

79 Which one of the following statements about copyright is true?
O The paper license that comes with software on CD transfers the copyright to you. O You can make a backup CD of software bought for your own use. O Software purchased on the web and copied to CD-ROM can be shared with friends. O Copying text, images, audio, or video from disk is always illegal. Answer: You can make a backup CD of software bought for your own use.

80 Freeware is the term that is applied to:
O software that you can try free of charge before buying. O software that you don’t have to pay for. O old versions of commercial software that are out of date. O software that will run under any operating system. Answer: software that you don’t have to pay for.

81 Which two of the following have a significant influence on the speed at which a computer performs?
O Installing new applications. O Clearing all the unwanted files off a hard disk. O Installing a smaller monitor. O Increasing the amount of RAM. O Adding a CD-ROM drive. Answer:1- Clearing all the unwanted files off a hard disk. 2- Increasing the amount of RAM.

82

83 Which one of these statements about the internet is false?
O It enables computer with different operating systems to exchange data. O It is not controlled by any single organization. O You need a license to publish material on the internet. O It allows computers to share data over large distance. Answer: You need a license to publish material on the internet.

84 Which one of the following descriptions of an extranet is true?
O A world-wide collection of files connected by links. O A very large intranet within an organization. O An extra-fast intranet for web and . O Shares data between two or more organizations. Answer: Shares data between two or more organizations.

85 The world wide web contains thousands of:
A. Sites. B. Sides. C. Sights. Answer: Sites.

86 The local council wants to design and build a new bridge
The local council wants to design and build a new bridge. Which is most appropriate software to use in the design? A. CAD application. B. CAM application. C. DTP application. D. Drawing application. Answer: CAD application.

87 A home page is most likely to be designed using:
A. A Spreadsheet application. B. A CAD application. C. A web editor application. D. A search engine. Answer: A web editor application.

88 Which one of these statements about computer application is true?
A. The same version of an application will work on any type of computer. B. They control devices such as printers and scanners that are attached to the PC. C. They enable users to carry out specific tasks such as word processing. D. They are the only programs that you need to use PC. Answer: They enable users to carry out specific tasks such as word processing.

89 Which one of the following activities is best suited for e-mail?
A. Performing calculations. B. Sharing very large video files, such as movie trailers. C. Sharing files between workers at different locations. D. Transmitting credit card details. Answer: Sharing files between workers at different locations.

90 Which one of the following statements about copyright is true?
A. Publishing digital work on disk requires permission of the copyright holder. B. When you purchase software in CD the copyright transfer to you. C. Any material which is published on disk is subjected to copyright. D. You can reuse graphics from the web on CD- Rom. Answer: Publishing digital work on disk requires permission of the copyright holder.

91 Unauthorized to computer files can be prevented by using:
A. Password. B. Anti-virus software. C. Uninterruptible power supply. D. Secure backup copies. Answer: Password.

92 Which Preventative measure can be used to stop computer system becoming infected with a virus?
A. Install physical security measures. B. Password protect the start-up process. C. Disable the floppy disk drive. D. A virus-checking program. Answer: A virus-checking program.

93 When buying goods services from a foreign country over the internet you would most likely pay for the product by using: A. Foreign currency. B. A processor card. C. A check . D. A credit card. Answer: A credit card.

94 Answer: Install a virus protection system.
Which of the following precautions would prevent virus-infected software being used on computer? A. Install a virus protection system. B. Install software to prevent hacking. C. Install password security to the system. D. Take regular backups. Answer: Install a virus protection system.

95 Electronic commerce is best described as:
A. Requesting information from companies selling electronic equipment. B. The buying of electronic equipments from a high street shop. C. Advertising electronic goods on the internet. D. The buying of goods and services and paying for them on-line. Answer: The buying of goods and services and paying for them on-line.

96 Which of the following can be used to restore programs or data after being altered by a malicious program? A. Anti-virus software. B. Password. C. Back-up copies. D. Hacking. Answer: Back-up copies.

97 Which of the following provides an example of a good working environment?
A. Adequate lighting. B. Energy-saving hardware. C. New computer hardware every two years. D. Staff welfare benefits. Answer: Adequate lighting.

98 A company needs all it’s 30 office staff to use a spreadsheet application, It should:
A. Copy the spreadsheet application onto each individual PC. B. Purchase a multi-user license. C. Use the spreadsheet application regardless of the numbers of users. D. Purchase a single-user license for each PC. Answer: Purchase a multi-user license.

99 What name is given to software, which under development?
A. Beta software. B. Demonstration software. C. Freeware. D. Shareware. Answer: Beta software.

100 Which of the following is the name given to software, which can legally be copied without a license?
A. Beta software. B. Retail software. C. Freeware. D. Protected software. Answer: Freeware.

101 Which of the following best describes teleworking?
A. Working for a television. B. Working for a telesales company. C. Designing teletext pages. D. Working at home using electronic communications. Answer: Working at home using electronic communications.

102 An End User License Agreement
A. Is a form of advertising between a software application author and the user. B. Gives the user the exclusive right to copy and sell the software to other potential users. C. Grants ownership of the software to the user. D. Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, release and restricted use. Answer: Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, release and restricted use.

103 Which of the following is a good password policy for an organization?
A. All passwords are changed regularly. B. All passwords are never changed. C. All passwords are made up of less than four characters. D. All passwords are made up of less than four numbers. Answer: All passwords are changed regularly.

104 Which of the following is not a function of the CPU?
A. Executing program instruction. B. Ensuring program instructions are executed in the right sequence. C. Sending . D. Carrying out calculations. Answer: Sending .

105 Answer: Integrated Services Digital Network.
What is ISDN? A. Integrated Standard Digital Networks. B. Integrated Services Digital Network. C. Interactive Standard Dynamic Networks. D. Internet Services Data Network. Answer: Integrated Services Digital Network.

106 Answer: A Mainframe Computer.
Large Organization often use a computer system to run the company Typically it is most likely to be: A. personal computer. B. A Microprocessor. C. A mini computer. D. A Mainframe Computer. Answer: A Mainframe Computer.

107 Scanner can be described as:
A. An output device only B. An input device only C. An input and output device D. Storage device E. Touching bad Answer: An input device only.

108 From an output devices:
A. Mouse. B. Keyboard. C. Plotter. D. Light Pen. Answer: Plotter.

109 Which of the following statement is true?
A. The CPU is an input devices. B. The CPU is an output devices. C. The CPU is used to process program instructions and data. D. The CPU is used as non volatile storage media. Answer: The CPU is used to process program instructions and data.

110 The data stored on CD-Rom are
A. Volatile and read only data. B. Non Volatile and read only data. C. Non Volatile and read/write data. D. Volatile and read/write data. Answer: Non Volatile and read only data.

111 Which is the most appropriate application to store census information?
A. Data Logging Application. B. CAD Application. C. Database Application. D. Word Processor Application. Answer: Data Logging Application.

112 Answer: Provide an easy way to use computer.
A GUI is used to: A. Draw graphs and drawing. B. Provide the interface between two peripherals. C. Provide an easy way to use computer. D. Store graphics image as file. Answer: Provide an easy way to use computer.

113 The range of voice, computer messages and other services provided by:
A. ISBN. B. PSBX. C. ISDN. D. PSDN. Answer: ISDN.

114 Which one of the following is not an input device?
A. Web camera. B. Scanner. C. Touch pad. D. Monitor. Answer: Monitor.

115 Answer: Read Only Memory.
ROM is shortcut for: A. Read Only Memory. B. Real Only Memory. C. Random Only Memory. D. Read Only Mind. Answer: Read Only Memory.

116 The location of information on the internet can be obtained by using a database:
A. Web editor application. B. Search engine. C. Spreadsheet application. D. Word perfect. Answer: Search engine.

117 Answer: Issuing library books.
In which situation would a bar code reader the most suitable input device? A. Analysis of blood sample. B. Filling the client details in a bank. C. Issuing library books. D. Stock taking in restaurant . Answer: Issuing library books.

118 Which two of the following is considered as input devices?
A. Printers. B. Monitor. C. Microphone. D. Plotter. E. Keyboard. Answer: 1-Microphone. 2-Keyboard.

119 Special plastic cards containing a processor and memory are used to pay for goods and services, each time the card used the details on the card updated. What is the name of such a card? A. Magnetic card. B. Memory card. C. Smart card. D. Processor card. Answer: Smart card.

120 The device that display computer data to users:
A. Storage device. B. Memory device. C. Input device. D. Output device. Answer: Output device.

121 Answer: Un-interruptible Power Supply.
UPS stands for: A. Universal Puck Station. B. Un-interruptible Power Stand. C. Un-interruptible Power Supply. D. Universal Serial Bus. Answer: Un-interruptible Power Supply.

122 Which one have the fastest access to data?
A. DVD drive. B. Floppy disk. C. Zip disk. D. Hard Disk. Answer: Hard Disk.

123 Which one of these memory can not be changed?
A. Random Access Memory. B. Storing Memory. C. Read Only Memory. D. Virtual Memory. Answer: Read Only Memory.

124 Which one of the following is considered as input devices?
A. Plotter. B. Monitor. C. Web camera. D. Charger. Answer: Web camera.

125 Answer: Surge suppressor.
An equipment that attached to computer to stop large volts of electricity: A. UPS. B. Battery. C. Charger. D. Surge suppressor. Answer: Surge suppressor.

126 Which one from the following held the smallest amount of data?
A. Field. B. File. C. Folder. D. Record. Answer: Field.

127 The baud rate can tell how fast:
A. The hard disk send and revive data. B. The MODEM can send and revive data. C. The CPU send and revive data. D. The RAM send and revive data. Answer: The MODEM can send and revive data.

128 Which two from the following are related to the computer based system?
A. Design. B. Navigation. C. Analysis. D. Shipping. E. Home page. Answer: 1-Design. 2-Analysis.

129 Where the computer is appropriate more than people?
A. In interpreting. B. In recognizing. C. In Dangerous situation. D. In completing. Answer: In Dangerous situation.

130 A computer virus is a program that
A. Always spotted by antivirus. B. Make your hard disk unusable. C. The only way for infection is internet. D. Can be avoid by regular backup. Answer: Make your hard disk unusable.

131 Which one of the following is faster in transferring of data?
A. Radio. B. TV. C. Computer. D. Telephone. Answer: Telephone.

132 Which one is more appropriate about Shareware software?
A. Any software used by a group of people in the same time. B. Any application you borrow from your friend. C. Any application Downloaded from internet. D. Any software you try for free time and pay for keeping it. Answer: Any software you try for free time and pay for keeping it.

133 Which one of the following is not related to the operating system?
A. GUI. B. The program that you can use when the system has been loaded. C. Allow you to use computer without learn about how hardware work. D. Special program that run automatically when you start the computer. Answer: The program that you can use when the system has been loaded.

134 Which one is not true about RAM?
A. The data stored on it is volatile. B. Information is lost when you switch off the computer. C. The data held on it cannot be saved on your hard disk. D. The operating system is copied on it when you switch on computer. Answer: The data held on it cannot be saved on your hard disk.

135 What is RSI? A. Rest strain integer. B. Repetitive strain Injury.
C. Republic Service International. D. Repeat System Information. Answer: Repetitive strain Injury.

136 Which one of the following is not related to the CBT?
A. Computer Hard ware. B. Computer based training. C. Offers a few costs. D. Used for training a large amount of people. Answer: Computer Hardware.

137 Which one of the following is computer do not like?
A. Heat and cold. B. Good ventilation. C. Clean environment. D. Stable vibrations. E. Free surface. Answer: Heat and cold.

138 Which one of the following devices connect to the system unit externally and controlled by the central processing unit? A. Additional devices. B. Storage Units. C. Input devices. D. Peripheral devices. Answer: Peripheral devices.

139 Which one of these is a computer software?
A. Monitor. B. Windows. C. System Case. D. Scanner. Answer: Windows.

140 A Gigabyte is approximately:
A. 1,000 bytes. B. 100 kilobytes. C. 1,000 kilobytes. D. 1,000 Megabytes. Answer: 1,000 Megabytes.

141 Which two of these are operating systems?
A. Linux. B. Mac OS. C. Internet explorer. D. Outlook. E. Google. Answer: 1-Linux. 2-Mac OS.

142

143

144 The internet is the name that is given to:
A. The physical equipment used to connect computer systems all over the world. B. All the linked documents that are held on a global network of computer systems. C. Linked computer systems that form a vast global network. D. The dedicated telephone lines that permanently connect commercial networks on distant sites. Answer: Linked computer systems that form a vast global network.

145 Which one of the following statements about the use of e-commerce is true?
A. An internet connection is optional for e-commerce. B. Transaction can occur anywhere in the world. C. Customers can only pay by ing credit card details. D. Customers give up the right return unsatisfactory goods. Answer: Transaction can occur anywhere in the world.

146 Which two of the following statements about passwords are true?
A. You should use the same password for everything. B. You should write down your password and keep it in a convenient place. C. Passwords should contain both letters and numbers. D. Once you create a password, you can’t change it. E. A Password should be known only to the user. Answer: 1-Passwords should contain both letters and numbers. 2- A Password should be known only to the user.

147 A mobile phone which has been insured but not password protected has been stolen. Which one of the following consequences may result? A. Misuse of confidential numbers. B. Meeting the cost of replacement. C. Paying for calls made after the theft is reported. D. Taking out new insurance on the replacement phone. Answer: Misuse of confidential numbers.

148 Which two of these statements could each be used to complete the following sentence? A computer virus is a program that: A. Cannot infect a stand alone PC. B. Disappears once it has displayed a message. C. Can usually be detected by anti-virus software. D. Can be introduced when new software is installed. E. Can enter a computer system if hardware such as a new mouse added. Answer: 1-Can usually be detected by anti-virus software. 2- Can be introduced when new software is installed .

149 Which one of the following statements about copyright is true?
A. You give up your copyright to text that you publish on the internet. B. You can re-use downloaded graphics in any way. C. Scanned images are subject to copyright. D. When you purchase software, the copyright transfer to you. Answer: Scanned images are subject to copyright.

150 E-commerce is the term used to describe business that:
A. uses computers to carry out its work. B. is carried out using electronic funds transfer. C. involves the import and export of electronic equipment. D. buys or sells goods and services online. Answer: buys or sells goods and services online.

151 Which one of the following statements about purchasing online is true?
A. Purchases are only processed during business hours. B. Shipping of purchases is normally free. C. The consumer rights of your country apply. D. You are at risk from insecure payment method. Answer: You are at risk from insecure payment method.

152 You can reduce the risk of neck, back and shoulder pain, by one of the following actions:
A. Using a larger monitor with sharper resolution. B. Using a wireless mouse. C. Keeping the keyboard close to the front of the disk. D. Using a fully adjustable operator’s chair. Answer: Using a fully adjustable operator’s chair.

153 Which one of these actions demonstrate poor health and safety practice in the use of computers?
A. Touching internal parts of the PC. B. Running several application at the same time. C. Only using a single power socket for each PC. D. Using out-of-date software. Answer: Touching internal parts of the PC.

154 Which one of these statements best describes computer backup?
A. Reverting to the previously saved version of an electronic file. B. Keeping a copy of computer files on a separate storage device. C. Storing paper printout from your computer files. D. Storing computer files on a Variety of separate storage device. Answer: Keeping a copy of computer files on a separate storage device.

155 Which one of these statements best describes computer backup?
A. Reverting to the previously saved version of an electronic file. B. Keeping a copy of computer files on a separate storage device. C. Storing paper printout from your computer files. D. Storing computer files on a Variety of separate storage device. Answer: Keeping a copy of computer files on a separate storage device.

156 Which one of the following statements about copyright is true?
A. You can use downloaded graphics in any way. B. You are allowed to re-use text you copy from the web. C. When you purchase software, the copyright transfer to you. D. Audio files on the internet are subject to copyright Answer: Audio files on the internet are subject to copyright.

157 Which two of the following statements about data protection legislation are true?
A. Deals with industrial espionage between competing companies. B. Can result in litigation if personal data is not adequately protected. C. Means that personal data must be stored for certain period of time. D. Ensures that laws about data security are the same in every country. E. Obliges organizations to protect confidential data within their control. Answer: 1- Can result in litigation if personal data is not adequately protected. 2- Obliges organizations to protect confidential data within their control.

158 Which one of the following is the a digital line, used for both voice and data?
A. ISDN. B. FTP. C. PSTN. D. HTTP. Answer: ISDN.

159 The device that links computers to telephone networks by converting digital and analog signals is called a: A. Transcoder. B. Digitiser. C. MODEM. D. Translator Unit. Answer: MODEM.

160 Which one of the following statements about formatting computer storage media is true?
A. All operating systems format disks in the same way. B. You can’t format a disk if it had been formatted already. C. A pre-formatted disk can be used immediately to store data. D. You should regularly format floppy disks. Answer: 1- A pre-formatted disk can be used immediately to store data.


Download ppt "IT Exercises."

Similar presentations


Ads by Google