Вы находитесь на странице: 1из 8

ECDL Module 1 Quiz 04

Which of the following statements describes a good approach to information security for an organisation? No procedures for reporting security lapses Staff passwords are not changed regularly Sensitive data is available to everyone Computer systems are backed up on a regular basis

Which of the following is a good password policy for an organisation? All passwords are changed regularly All passwords are never changed All passwords are made up of less than four characters All passwords are made up of less than four numbers

What is the best way of preventing your computer from being infected with a virus? Only virus-check e-mail attachments Have updateable anti-virus software running on your computer Have anti-virus software running on your computer Never open e-mail attachments

Which of the following statements describes shareware? Shareware is software without copyright protection Shareware is free software Shareware is software you may pay for after an initial time period of use Shareware is software you can use in any way

There are rules governing the storage and supply of computer-based information. What are these rules called? Data Privacy Policy Data Management Act Data Protection Act Data Publicity Law

Which of the following would be considered a portable computer? Workstation Mainframe Laptop Desktop Computer

Which of the following would improve computer performance? Using a larger monitor Increasing the number of applications running Using a faster printer Increasing the RAM size

Which of the following is NOT a function of the Central Processing Unit? Executing program instructions Ensuring program instructions are executed in the correct sequence Sending an e-mail Carrying out calculations

Which of the following is both an input and output device? Touch screen Keyboard Printer Scanner

10

Disk formatting is used to: Find files on a disk Lock a disk Unlock a disk Prepare a disk to store files

11

Which of the following is an operating system? Lotus 123 PowerPoint 2000 Windows XP Netscape

12

Which of the following four activities is normally carried out last as part of a Systems Development process? Design Programming Testing Analysis

13

Which of the following statements about the Internet is TRUE? The Internet is a global network that links many computer networks together The Internet is a private company network The Internet is a visual representation of linked documents The Internet is a network operating system

14

What is an ISP? Integrated Standard Provider Integrated Services Protocol Internet Service Provider Internet Services Protocol

15

What type of computer application would be used in a hospital to maintain patient medical details? A desktop publishing application A database application An accounting application A presentation application

16

Which of the following is a use of the Internet in the home? Managing household accounts Formatting a disk Electronic mail (e-mail) Creating a database

17

If you were working from home, what software application could be used to communicate directly with colleagues and customers? Presentation Electronic mail (e-mail) Database Spreadsheet

18

Which of the following practises helps create a good ergonomic working environment? Protecting computer monitors from reflections and glare by correct positioning Taking infrequent breaks away from the computer Keeping the office cold and using low overhead lighting Use of non-adjustable chairs when working with computers

19

Why is it necessary for an organisation to adopt a good password policy? To allow easy sharing of files across the company network To make it easier for the computer to connect to a network To protect files against unauthorised use To make it easier to find files on a computer

20

Which of the following can be an advantage of electronic documents? They can never be lost They can always be e-mailed regardless of size They can reduce the usage of paper They can never be copied

21

Which of the following devices is suitable for backing up data from a networked file server? Modem Hard Drive Plotter Scanner

22

Which of the following activities could lead to the spread of a computer virus? Using floppy disks from unknown sources to exchange data Using a standalone computer to output a hard copy letter Using retail software that has been checked for viruses Using a Graphical User Interface (GUI)

23

An End User Licence Agreement: Is a form of advertising between a software application author or publisher and the user Gives the user the exclusive right to copy and sell the software to other potential users Grants ownership of the software to the user of the software Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, resale and restricted used

24

What is the second stage of systems development? Analysis Testing Programming Design

25

Which of the following components is found inside the CPU? CM (Compact Memory) ALT (Alignment Lever Techniques) CRT (Current Resistor Transmitter) ALU (Arithmetic Logic Unit)

26

Which of the following printers the least expensive in the long run? Dot Matrix Laser Printer Inkjet Printer

Вам также может понравиться