IT
55- Which one of the following is an online journal where an author posts personal views and observations in a chronological order? A) Podcast. B) RSS feed. C) Blog. D) E-mail.
Blog
35- Moving from one website to another is called: A) Downloading B) Browsing C) Uploading D) Attachment
Browsing
83- Which one of the following would be a typical file size for a 2-paged word processed letter? A) 30 bits B)100 bytes C) 30 kilobytes D) megabyte
) 30 kilobytes
66- Which one of the following is software introduced into a computer without the owner's knowledge to corrupt the computer's operating system or destroy data? A) A virus. B) A germ. C) A bug. D) A macro.
) A virus
94- Which one of the following can help maintain a good posture when sitting in front of a computer? A) Using a low level of lighting. B) Sitting close to the computer monitor. C) Correctly positioning the computer, desk and seat. D) Recycling printer cartridges.
) Correctly positioning the computer, desk and seat.
98- How does copyright relate to stories downloaded from a national newspaper's web site? A) Copyright never applies to stories downloaded. B) Full copyright applies to stories downloaded. C) Copyright applies for one month from download date. D) Only part of copyright applies to stories downloaded.
) Full copyright applies to stories downloaded.
97- Which one of the following is a feature of software copyright? A) It denies the rights of the software author. B) It recognises the rights of the software author. C) It makes software freeware. D) It encourages software piracy.
) It recognises the rights of the software author.
23- Which one of the following is the name commonly given to the buying and selling of goods on the Internet? A) e-mail. B) e-data exchange. C) e-retail. D) e-commerce
.e-commerce
29- The binary equivalent of the decimal number 10 is __________ A) 0010 B) 10 C) 1010 D) 010
1010
6- Which one of the following is a kilobyte? A) 1,000,000 bytes B) 1000 bytes. C) 1024 bits. D) 1024 bytes.
1024 bytes.
27- The value of radix in binary number system is A) 2 B) 8 C) 10 D) 1
2
32- Convert the binary equivalent 10101 to its decimal equivalent. A) 21 B) 12 C) 22 D) 23
21
1- One byte is equivalent to: A) 2 bit B) 8 bit C) 16 bit D) 4 bit
8 bit
95- Which one of the following is a harmful software programme that can generate copies of itself and spread throughout a computer system? A) An operating system. B) An application system. C) A computer virus. D) A web log.
A computer virus
7-Which of the following would be the slowest device for accessing data? A) A floppy disk B) A hard disk C) A tap disk D) A zip disk
A floppy disk
82- Which one of the following describes an audio or video recording posted on a website that can be downloaded and played later? A) An RSS feed. B) A broadcast. C) A web log. D) A podcast.
A podcast
69- Which one of the following allows or denies users the privileges to create, view, change or delete data on a computer system? A) Client rights. B) Access rights. C) Sign on rights. D) Entry rights.
Access rights.
48- Which one of the following is a software application that allows a computer to respond to voice commands? A) A screen reader. B) A screen magnifier. C) A speech recognition utility. D) An on-screen keyboard.
A speech recognition utility.
43- Which one of the following statements is true? A) A gigabyte is less than a megabyte. B) A kilobyte is greater than a megabyte. C) A byte is less than a bit. D) A terabyte is greater than a gigabyte.
A terabyte is greater than a gigabyte
88- Which one of the following is commonly used to connect computers in the Italian and English offices of a multinational company? A) The World Wide Web. B) A local area network. C) A wide area network. D) A wireless local area network.
A wide area network.
67- Which one of the following practices will save energy? A) Apply settings to automatically power down the screen/monitor when not in regular use. B) Update your screen saver. C) Change the screen/monitor background design. D) Leave the computer on continuously to avoid re-booting the system.
A) Apply settings to automatically power down the screen/monitor when not in regular use.
106- Which one of the following statements about Internet connection services is true? A) Broadband connections are always-on while your computer is switched on. B) Dial-up connections are usually faster than broadband connections. C) You cannot use your telephone line to make calls while using a broadband connection. D) Dial-up connections are always-on while your computer is switched on.
A) Broadband connections are always-on while your computer is switched on
61-Which one of the following describes operating system software? A) Software to control the allocation and usage of hardware resources. B) Software to carry out spreadsheet calculations. D) Software to operate virus-scanning procedures. E) Software to manipulate databases.
A) Software to control the allocation and usage of hardware resources
92- Which one of the following is an advantage of teleworking? A) More emphasis on teamwork. B) Allows only fixed working hours. C) Allows flexible working hours. D) Never a need to use a computer or telephone.
Allows flexible working hours.
78- Which one of the following is a software application that helps users with a physical disability to enter characters on a PC? A) A screen reader. B) An on-screen keyboard. C) A screen magnifier. D) A screen saver.
An on-screen keyboard
60- Which one of the following describes Windows XP? A) A database application. B) An anti-virus scanner. C) A backup utility. D) An operating system.
An operating system
102- Which one of these statements is False? A) A network of computer linked within a building is called a LAN B) Databases can be accessed by many users who connected to a LAN. C) A network-linking computer over cities countries is called WAN D) Applications cannot be shared over a LAN.
Applications cannot be shared over a LAN.
18- Which of The Following Can Convert The Computer Signals From Digital To Analog? A) ISDN B) Modem C) DSL D) HDSL
Modem
68- Which one of the following statements describes a good approach to information security for an organisation? A) Sensitive data is available to everyone. B) Computer systems are backed up on a regular basis. C) There are no procedures for reporting security lapses. D) Staff passwords are never changed.
B) Computer systems are backed up on a regular basis.
66- Which one of the following statements about software copyright is true? A) Copyright promotes the illegal use of software. B) Copyright is the exclusive legal right of software authors to produce copies of their own software. C) Copyright is designed to protect a disk against computer viruses. D) Copyright will prevent a CD-ROM from being duplicated.
B) Copyright is the exclusive legal right of software authors to produce copies of their own software
31- Which of the following is a correct format of Email address? A) name@website@info B) [email protected] C) www.nameofebsite.com D) name.website.com
9- Which of the following is a peripheral device? A) Arithmetic logic unit. B) Control unit. C) Immediate access store. D) Backing tape store.
Backing tape store
86- Which one of the following statements about Internet connection services is true? A) Dial-up connections are always-on while your computer is switched on. B) Dial-up connections do not stop you from using your telephone line to make calls. C) Broadband services allow you to share a single connection with more than one computer. D) Broadband services usually are slower than dial-up connections.
Broadband services allow you to share a single connection with more than one computer.
28- A program that is used to view websites is called a A) Browser B) Web viewer C) Spreadsheet D) Word processor
Browser
107- Which one of the following best describes an extranet? A) A worldwide network of servers that store a collection of linked hypertext documents. B) An extension to a network operating system used to monitor and control the flow of data. C) An extension of an intranet using Internet technologies to facilitate communication with specified users outside the intranet. D) An external network filing system for backing up large data files.
C) An extension of an intranet using Internet technologies to facilitate communication with specified users outside the intranet.
47- Which one of the following tasks is best suited to a spreadsheet? A) Composing a standard letter for a mail shot. B) Reserving an airline ticket. C) Presenting sales data to a large audience. D) Calculating a budget and cash flow for a new project.
Calculating a budget and cash flow for a new project.
104- on the Internet that locates all users logged onto a web site. A) The central processing unit (CPU) consists of B) Input, output and processing C) Control unit, primary storage, and secondary storage D) Control unit, arithmetic-logic unit and primary storage E) Control unit, processing, and primary storage
D) Control unit, arithmetic-logic unit and primary storage
63- Which one of the following activities could lead to the spread of a computer virus? A) Using only software that has been checked for viruses. B) Maintaining regularly updated antivirus software. C) Opening only virus-checked file attachments from known sources. D) Using a USB Flash Drive from an unknown source to exchange data.
D) Using a USB Flash Drive from an unknown source to exchange data.
2- Which printer type would MOST likely produce the most noise? A) Dot Matrix. B) Ink Dispersion C) Laser D) Plotter
Dot Matrix.
34- The process of transferring files from a computer on the Internet to your computer is called A) Uploading B) Forwarding C) FTP D) Downloading
Downloading
84- Which one of the following is the delivery of training or education programs by electronic means? A) E-learning B) E-college. C) E-teaching. D) E-school.
E-learning
50- Which one of the following is the delivery of training or education programs by electronic means? A) E-learning. B) E-college. C) E-teaching. D) E-school.
E-learning.
59- Which one of the following is good practice when downloading files? A) Disable virus-scanning software when downloading files. B) Open all unrecognised e-mail messages. C) Enable virus scanning software and download files from secure sites only. D) Download files from Internet bulletin boards.
Enable virus scanning software and download files from secure sites only.
57- Which one of the following is unsafe online activity? A) Giving your home address to someone you met in a chat room. B) Using a screen name or nick name that cannot identify you. C) Meeting someone you met online face-to-face in the company of your friends. D) Keeping your social network profile private.
Giving your home address to someone you met in a chat room
37- Which one of the following terms describes the physical components of a computer system? A) Hardware. B) Freeware. C) Software. D) Courseware.
Hardware
87- Which one of the following is safe to post on a social networking website? A) A personal telephone number. B) A home address. C) Hobbies D) A school or work-place address.
Hobbies
74- Which one of the following is most likely to improve the performance of the computer? A) Increasing the number of applications running simultaneously. B) Increasing the size of the computer monitor being used. C) Increasing the amount of RAM being used. D) Attaching a bigger printer.
Increasing the amount of RAM being used.
52- What does the term 'ICT' stand for? A) Information and Communication Technology. B) Internet and Computer Technology. C) Internet and Control Technology. D) Information and Control Technology.
Information and Communication Technology
46- Which one of the following devices typically has the largest storage capacity? A) USB flash drive B) Internal hard disk. D) DVD. D) CD-ROM.
Internal hard disk.
99- What is the best way to protect a computer against data loss? A) Lock the computer when it is not being used. B) Change your password regularly. C) Delete archive files each month. D) Make regular backups of data to a removable storage device.
Make regular backups of data to a removable storage device.
53- The computers in your local office building are connected together so staff in the building can share files and printers. What is this arrangement of computers called? A) LAN. B) ISDN. C) WAN. D) FTP.
LAN
20-The Speed Of The Central Processing Unit is measured in A) Mege hertz B) Hectares C) Revolutions per minute. D) Bits per second
Mege hertz
8- Which of the following is hardware? A) Database B) Spreadsheet C) Mouse D) An operating System
Mouse
103- Which of the following statements is true? A mainframe computer enables users to share files, printers and other resources. Mainicomputer enables users to share files, printers and other resources. Network computer enables users to share files, printers and other resources.
Network computer enables users to share files, printers and other resources.
79- Which one of the following government services would most likely be provided over the Internet? A) Waste Collection. B) Online Tax enquiries. C) Prison Service. D) Marriage Registration.
Online Tax enquiries
80- Which type of software controls the allocation of resources and software on the computer? A) Operating system software. B) Utility software. C) Browser software. D) Security software.
Operating system software
70- The theft of which one of the following would result in the loss of contact details? A) Printer. B) PDA. C) Modem. D) RAM.
PDA
10- The generic name of the devices, which are connected to, and controlled by, the central processing unit, is: A) Keyboards B) Ram C) Monitors D) Peripherals
Peripherals
38- Which one of the following is a portable digital device? A) Photocopier. B) Desktop computer. C) Personal digital assistant. D) Computer screen.
Personal digital assistant.
45- Which one of the following can output the results of work done on a computer? A) Scanner. B) Touchpad. C) Joystick. D) Printer.
Printer
12- Which type of memory is used to store the current status of a computer application whilst it is being processed? A) EPROM B) PROM C) ROM D) RAM
RAM
3- Which of the following requires power to be on in order to maintain the data it stores? A) ROM B) RAM C) Hard disk D) Floppy disk
RAM
41- Which one of the following statements about RAM is true? A) RAM retains data when the computer shuts down. B) RAM is read and write memory. C) RAM is write-only memory. D) RAM cannot be increased in any computer.
RAM is read and write memory
17- The non-erasable memory, which contains programs, stored at the time of computer manufacture is known as: A) Flash-Rom B) RAM C) ROM
ROM
24-Which of the following statements is TRUE? A) ROM loses information when the computer is powered off. B) ROM chips can be plugged into the motherboard to provide more memory C) ROM can't be written to , it's preprogrammed
ROM can't be written to , it's preprogrammed
39- Which one of the following can slow down the computers performance? A) Running several software applications at the same time. B) Using a small computer monitor. C) Increasing the amount of RAM available in the computer. D) Printing documents at a low resolution
Running several software applications at the same time..
40- Which one of the following is most likely to be used to input a photograph into computer? A) Stylus. B) Microphone. C) Plotter. D) Scanner
Scanner
44- Which one of the following is used as a computer input device? A) Plotter. B) Monitor. C) Printer. D) Scanner.
Scanner
64- What is the name for licensed software that can be used for a trial period after which the user is requested to pay a fee for continued use? A) Shareware. B) Freeware. C) Open Source software. D) Software bundle.
Shareware
85- Which one of the following virtual communities normally allows sharing of photos and video clips? A) Internet chat rooms. B) Internet forums. C) Social networking websites. D) Online computer games.
Social networking websites.
42- Which one of the following properties of a central processing unit (CPU) is measured in gigahertz (GHz)? A) Cost. B) Volume. C) Speed. D) Temperature.
Speed
75- Which one of the following statements about Read Only Memory is true? A) Application programs can write data to ROM. B) The contents of ROM are not deleted when the computer is switched off. C) Internet pages are stored in ROM while they are being loaded. D) The contents of ROM are deleted when the computer is switched off.
The contents of ROM are not deleted when the computer is switched off.
101- Which one of the following best describes the purpose of Data protection legislation? A) To give computer owners the right to protect themselves against computer fraud. B) To give software owners the right to promote software copyright. C) To give governments the right to control data access on the Internet. D) To give a right to individuals to establish the existence of personal data.
To give a right to individuals to establish the existence of personal data.
100- Which one of the following is the reason that users should log on with a username and password? A) To be aware of who is in the building. B) To check up on the time-keeping of users. C) To protect computers on a network against unauthorised use. D) To enable a personalized greeting for each user.
To protect computers on a network against unauthorised use.
72- A laptop is most likely to have which one of the following input devices fitted as standard? A) Scanner. B) Joystick. C) Mouse. D) Touchpad.
Touchpad
15- Which one of the following can be used to both input and output information? A) Touchscreen. B) Monitor. C) Keyboard. D) Mouse.
Touchscreen
49- Which one of the following describes the speed at which data can be moved from one computer to another? A) Line width. B) Cache level. C) Transfer rate. D) Transform time.
Transfer rate.
93- Which one of the following usually causes RSI? A) Viewing a monitor that has a lot of glare and reflections. B) Working where there is inadequate lighting and ventilation. C) Using a chair without arms. D) Typing for a long period of time without breaks.
Typing for a long period of time without breaks.
26- Which one of the following is storage medium? A) CPU. B) USB Flash Drive. C) Trackball. D) Stylus.
USB Flash Drive.
96- Which one of the following activities could lead to the spread of a computer virus? A) Using only software that has been checked for viruses. B) Maintaining regularly updated antivirus software. C) Opening only virus-checked file attachments from known sources. D) Using a CD from an unknown source to exchange data.
Using a CD from an unknown source to exchange data.
91- Which one of the following commonly describes an Intranet? A) a network of a maximum of 3 computers. B) a private company network. C) only used in the home. D) a world wide network of computers.
a private company network.
14- Which one of the following devices is most likely to be used in a games application? A) A joystick B) A touch screen C) A tracker ball D) A touch pad
joystick
36- Which one of the following types of computer is most likely to be used by a travelling salesman? A) A desktop computer. B) A tablet PC. C) A server. D) A laptop
laptop
30- The main purpose of a firewall is to: A) prevent unauthorized users from gaining access to a network B) protect network servers from the risk of fire. C) prevent employees from accessing the Internet during work hours. D) prevent network users from sending and receiving personal e-mail.
prevent unauthorized users from gaining access to a network
105- A search engine is a program on the Internet that locates all users logged onto a web site. A) that helps you to find information located on the internet B) that can be used to find errors in the HTML code for a web page. C) that is used to find the web sites you have most recently visited.
that helps you to find information located on the internet
54- Which one of the following describes RSS (Really Simple Syndication)? A) An audio or video recording posted on a website that can be downloaded and played later. B) A Web feed format used to publish frequently updated content such as blog entries, news headlines or podcasts. C) An online journal where an author posts comments and observations in chronological order. D) Real-time text-based communication between two or more people over a network such as the Internet.
A Web feed format used to publish frequently updated content such as blog entries, news headlines or podcasts
13- Which of the following could be considered typical users of a mainframe computer? A) A bank B) A school C) A doctor's surgery D) A small business
A bank
77- Which one of the following describes uploading files? A) Transferring data from a personal computer to a web server. B) Copying a free image from a web page. C) Transferring data from a web server to a personal computer. D) Saving a Webpage from the Internet to a personal computer.
A) Transferring data from a personal computer to a web server
76- Which one of the following describes Instant Messaging (IM)? A) A Web feed format used to publish frequently updated news headlines, in a standardised format. B) Technology that enables the delivery of telephone conversations over the Internet. C) Real-time text-based communication between two or more people over the Internet. D) A frequently updated journal or diary often hosted by a third party on the Internet.
C) Real-time text-based communication between two or more people over the Internet
16- Which of the following could be used as a reusable-backing store for data? A) CD-ROM B) CD-RW C) RAM D) ROM
CD-RW
73- Which one of the following is the CPU in a computer? A) Calculating Process Unit. B) Control Program Unit. C) Control Process Unit. D) Central Processing Unit.
Central Processing Unit.
89- Which one of the following terms commonly refers to a network where one computer provides shared resources to other computers? A) Server / Client. B) Client / User. C) Client / Server. D) Server / Provider.
Client / Server. 90- Which one of the following describes RSS (Really Simple Syndication)? A) A radio programme posted on a website that can be downloaded and played later. B) A Web feed format used to publish frequently updated content such as blog entries, news headlines or podcasts. C) An online journal where an author posts comments and observations in chronological order. D) Real-time text-based communication between two or more people over a network such as the Internet. A Web feed format used to publish frequently updated content such as blog entries, news headlines or podcasts.
22- Which one of the following statements describes a good approach to information security for an organisation? A) Sensitive data is available to everyone. B) Computer systems are backed up on a regular basis. C) There are no procedures for reporting security lapses. D) Staff passwords are never changed.
Computer systems are backed up on a regular basis
56- Which one of the following monitors incoming network traffic to prevent unauthorized attacks? A) Dataguard. B) Firewall. C) Fireguard. D) Datashield.
Firewall
62- Which one of the following is a type of input/output port? A) Firewall. B) Firewire C) Firmware. D) Linear.
Firewire
25- Which of the following represents billion characters? A) Megabytes B) Kilobytes C) Gigabytes
Gigabytes
71- Which one of the following would be most used by someone who travels by train to work in various locations? A) Scanner. B) Printer. C) Laptop. D) Desktop.
Laptop
5- When working away from the office a sales representative might typically use which type of computer? A) Desktop computer. B) Laptop computer C) An analogue computer D) A mainframe computer
Laptop computer
11- Which of the following printers is the most suitable for a secretary to produce the final copy of a document? A) Dot matrix B) Laser C) Plotter D) none of them
Laser
21- Which one of the following printers uses a toner in printing. A) Laser B) Dot matrix C) Ink jet
Laser
19- The processor speed of the CPU is measured in: A) Bits B) Bits per second C) MHz D) Baud
MHz
4- Which one of these computers is too expensive? A) Minicomputer B) Lap TOP C) Mainframe
Mainframe
81- Which one of the following would require the use of a database application? A) Design a cover for a new magazine. B) Compose a standard letter for a mail shot. C) Record details of staff training courses. D) Calculate a budget for a new project.
Record details of staff training courses
58- Which one of the following is good working practice when using a computer? A) Reducing the light level in the area around the computer. B) Taking frequent breaks away from the computer. C) Sitting in a comfortable armchair when using the computer. D) Positioning the keyboard below wrist level on the desk.
Taking frequent breaks away from the computer.
51- Which one of the following is not application software? A) Word processing software. B) Database software. C) Presentation software. D) Windows XP software
Windows XP software
33- HTML is used to create A) machine language program B) high level program C) web page D) web server
web page