SlideShare a Scribd company logo
1 of 5
Download to read offline
ECDL-tests.com

ECDL Module 1 Sample Test

The following sample test for Module 1, Concepts of Information and Communication
Technology (ICT), contains 36 multiple-choice questions. Attempt each of the 36 questions.
Each question has one correct answer.
Enter A, B, C, or D in answer.doc in the space for question number.
1. Which one of the following measures the speed of the CPU?
a. Gigahertz (GHz).
b. Bits per second (Bps).
c. Gigabytes (GB).
d. Megabytes (MB).
2. Which one of the following describes a computer’s operating system?
a. Software that can retrieve information from a database.
b. Hardware that can scan and convert photographs into digital files.
c. Software that controls the allocation and usage of hardware.
d. Hardware that can record and send images across the Internet.
3. Which one of the following describes spam?
a. Gathering information about a person or organisation without their knowledge.
b. Performing an unauthorised, usually malicious, action such as erasing files.
c. Putting unnecessary load on the network by making copies of files.
d. Sending unwanted bulk messages.
4. Which one of the following could lead to the spread of a malicious program?
a. Using only software that has been checked for viruses.
b. Maintaining regularly updated anti-virus software.
c. Opening only virus-checked file attachments from known sources.
d. Using a USB Flash Drive from an unknown source to exchange data.
5. Which one of the following protects a computer from the risk of malicious programs?
a. PC diagnostic software.
b. Web tracking software.
c. Anti-spam software.
d. Anti-spyware software.
6. Which one of the following describes why it is important to update antivirus software
regularly?
a. To ensure the software identifies old viruses.
b. To protect your computer from all known viruses.
c. To protect your computer from unwanted bulk messages.
d. To prevent the spread of malicious programs on the Internet.
7. Which one of the following is a term for an audio or video recording posted on a web site
that can be downloaded and played later?
a. Podcast.
b. Blog.
c. VoIP.
d. RSS Feed.
8. Which one of the following types of software would you most likely use to create a letter?
a. Web browsing software.
ECDL-tests.com

ECDL Module 1 Sample Test

b. Spreadsheet software.
c. Accounting software.
d. Word processing software.
9. Which one of the following describes a computer hacker?
a. A skilled programmer who uses authorised access to exploit information
available on a computer.
b. A skilled programmer who secretly invades computers without authorisation.
c. A skilled programmer who writes programs to train new employees.
d. A skilled programmer who helps in the installation of new software for an
organisation.
10. The computers in your office building are connected together so staff can share files and
printers. What is this arrangement of computers called?
a. The Internet.
b. A Local Area Network.
c. The World Wide Web.
d. A network port.
11. Which of the following systems will help to improve communications within the company?
a. Excel
b. Powerpoint
c. Email
d. Solitaire
12. Which of the following is NOT an input device?
a.
b.
c.
d.

Monitor
Mouse
Keyboard
Scanner

13. Which one of the following is a private network that allows specified external users
access?
a. Intranet.
b. WorldNets.
c. Internet.
d. Extranet.
14. Which one of the following is a software application that assists users who are visually
impaired to identify and interpret what is displayed on screen?
a. A screen calendar.
b. A word processor.
c. A screen reader.
d. A web log.
15. Which one of the following describes why firewalls are used?
a. To prevent unauthorised access by incoming transmissions.
b. To prevent destruction of a computer in the event of a fire.
c. To enable easy downloading of data from web sites.
d. To detect and disable viruses already on a computer.
16. Which one of the following is MOST likely to be a hoax?
ECDL-tests.com

ECDL Module 1 Sample Test

a. An email from a friend you have not seen recently.
b. An email with an attachment sent by a colleague using their personal email
address.
c. An email asking you to go to a website for a free computer scan.
d. An email advertisement from a local shop you subscribe to.
17. Which one of the following is NOT a feature of electronic commerce?
a. Goods can be advertised and prices compared.
b. There is physical contact between buyer and seller.
c. Transactions can be processed quickly.
d. Services are available 24 hours a day.
18. Which one of the following is the reason that users should log on with a username and
password?
a. To be aware of who is in the building.
b. To check up on the time-keeping of users.
c. To protect computers against unauthorised use.
d. To enable a personalised greeting for each user.
19. Which one of the following statements about a password is TRUE?
a. It must be changed only if it is compromised.
b. It cannot contain special character symbols.
c. It should be changed regularly.
d. It must be registered with the system administrator.
20. Which one of the following statements describes a good approach to information security
for an organisation?
a. There are no procedures for reporting security lapses.
b. Staff passwords are not changed regularly.
c. Sensitive data is available to everyone that requests it.
d. Keeping an off-site backup of all files.
21. Which one of the following is the best way to protect a computer against computer
viruses?
a. Only virus-check e-mail attachments.
b. pdate antivirus software on a regular basis.
c. Always make sure that the operating system is up to date.
d. UOnly download files from the Internet during business hours.
22. Which one of the following would be considered the BEST way to store a PIN number?
a. Keep a written note of it with you bank cards.
b. Store it on your computer.
c. Memorise it.
d. Keep a written note of it in your office drawer.
23. Which one of the following describes why users should lock their computer when leaving
their desk?
a. To prevent a waste of electricity.
b. To prevent unauthorised access to data.
c. To prevent data from getting corrupted.
d. To prevent the computer from malfunctioning.
ECDL-tests.com

ECDL Module 1 Sample Test

24. There are rules governing the rights of a data subject and the responsibilities of a data
controller. What are these rules called?
a. Data Privacy Policy.
b. Data Management Act.
c. Data Protection legislation or conventions.
d. Data Publicity Law.
25. Which one of the following is an example of an operating system
a. iTunes.
b. PowerPoint.
c. Windows.
d. Netscape.
26. Which one of the following is unsafe online activity?
a. Giving your home address to someone you met in a chat room.
b. Using a screen name or nick name that cannot identify you.
c. Meeting someone you met online face-to-face in the company of your parents.
d. Keeping your social network profile private.
27. Which one of the following describes how confidential information should be sent using
an unsecured network?
a. In an unsigned email.
b. In an attachment.
c. In a compressed format.
d. In an encrypted format.
28. Which one of the following statements about the Internet is TRUE? [1 Mark]
a. The Internet is a global network that links many computer networks together.
b. The Internet is a private company network.
c. The Internet is a visual representation of linked documents.
d. The Internet is a network operating system.
29. Which one of the following is an input/output port?
a. Linear.
b. Radial.
c. Lateral.
d. FireWire.
30. Which one of the following describes Bluetooth?
a. Short-range wired protocol for exchanging data.
b. Short-range wireless protocol for exchanging data.
c. Long-range wireless protocol for exchanging data.
d. Long-range wired protocol for exchanging data.
31. Which one of the following describes why Bluetooth device settings should be adjusted?
a. To increase the range of the device.
b. To improve the quality of reception.
c. To prevent the risk of unauthorised access.
d. To reduce interference from other devices.
ECDL-tests.com

ECDL Module 1 Sample Test

32. Which one of the following would result in the loss of contact details if it were stolen?
a. Printer.
b. Mobile Phone.
c. Modem.
d. MP3.
33. Which one of the following is a characteristic of broadband?
a. Completely safe from intruders.
b. It has a dial up connection.
c. High speed.
d. Cost can vary from day to day.
34. Which one of the following is a text-based communication between two or more people
over the Internet?
a. Podcasting.
b. Really Simple Syndication.
c. Voice over Internet Protocol.
d. Instant Messaging.
35. Which one of the following describes how a breach in IT security should be reported?
a. Using the telephone.
b. By emailing to the IT Manager.
c. Using the method listed in the organisation’s security policy.
d. Using any means of communication.
36. Which one of the following describes why it is important to have a secure off-site backup
copy of files?
a. To improve accessible of files from other locations.
b. To speed up the process of accessing the files at any time.
c. To prevent the loss of data in the event of a fire.
d. To reduce the possibility of data theft.

More Related Content

What's hot

Format, Partition, Install OS
Format, Partition, Install OSFormat, Partition, Install OS
Format, Partition, Install OSSef Cambaliza
 
Google chrome operating system
Google chrome operating systemGoogle chrome operating system
Google chrome operating systemAmit sundaray
 
Computer Literacy Lesson 5
Computer Literacy Lesson 5Computer Literacy Lesson 5
Computer Literacy Lesson 5cpashke
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenanceFitaAyalew
 
CIS Project - Computer Parts vs. Human Body Parts PowerPoint.pptx
CIS Project - Computer Parts vs. Human Body Parts PowerPoint.pptxCIS Project - Computer Parts vs. Human Body Parts PowerPoint.pptx
CIS Project - Computer Parts vs. Human Body Parts PowerPoint.pptxMAWILICLEMENTJONRAYV
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingNatan Mesfin
 
DTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersDTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersJan Fisher
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshootingChristian Macatangay
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ictodalyfer
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerZunair Aslam
 
Presentation on computer data storage
Presentation on computer data storage Presentation on computer data storage
Presentation on computer data storage GLG
 
Introduction to Computer Engineering
Introduction to Computer EngineeringIntroduction to Computer Engineering
Introduction to Computer EngineeringBESOR ACADEMY
 
Units of storage in computer
Units of storage in computerUnits of storage in computer
Units of storage in computerakorede2000
 
Coc 4 backup and restore
Coc 4 backup and restoreCoc 4 backup and restore
Coc 4 backup and restoreDanilo Anos
 
Memory modules
Memory modulesMemory modules
Memory modulesSana Sini
 

What's hot (20)

Format, Partition, Install OS
Format, Partition, Install OSFormat, Partition, Install OS
Format, Partition, Install OS
 
Green computing ppt
Green computing pptGreen computing ppt
Green computing ppt
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Google chrome operating system
Google chrome operating systemGoogle chrome operating system
Google chrome operating system
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Computer Literacy Lesson 5
Computer Literacy Lesson 5Computer Literacy Lesson 5
Computer Literacy Lesson 5
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenance
 
CIS Project - Computer Parts vs. Human Body Parts PowerPoint.pptx
CIS Project - Computer Parts vs. Human Body Parts PowerPoint.pptxCIS Project - Computer Parts vs. Human Body Parts PowerPoint.pptx
CIS Project - Computer Parts vs. Human Body Parts PowerPoint.pptx
 
Advanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and TroubleshootingAdvanced PC Maintenance and Troubleshooting
Advanced PC Maintenance and Troubleshooting
 
DTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersDTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to Computers
 
Preventive maintenance and troubleshooting
Preventive maintenance and troubleshootingPreventive maintenance and troubleshooting
Preventive maintenance and troubleshooting
 
The effects of using ict
The effects of using ictThe effects of using ict
The effects of using ict
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Presentation on computer data storage
Presentation on computer data storage Presentation on computer data storage
Presentation on computer data storage
 
Introduction to Computer Engineering
Introduction to Computer EngineeringIntroduction to Computer Engineering
Introduction to Computer Engineering
 
Units of storage in computer
Units of storage in computerUnits of storage in computer
Units of storage in computer
 
Computer career
Computer careerComputer career
Computer career
 
Coc 4 backup and restore
Coc 4 backup and restoreCoc 4 backup and restore
Coc 4 backup and restore
 
Memory modules
Memory modulesMemory modules
Memory modules
 
Uses of Computers
Uses of ComputersUses of Computers
Uses of Computers
 

Similar to Modul 1-sample-test

Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxsleeperharwell
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docxcorbing9ttj
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docxambersalomon88660
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxJeanmarieColbert3
 
Question 1 of 205.0 PointsWhat is the primary limitation o.docx
Question 1 of 205.0 PointsWhat is the primary limitation o.docxQuestion 1 of 205.0 PointsWhat is the primary limitation o.docx
Question 1 of 205.0 PointsWhat is the primary limitation o.docxIRESH3
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_keythinkict
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfANJUMOHANANU
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
1) Which of the following are Penetration testing methodology .docx
1) Which of the following are Penetration testing methodology  .docx1) Which of the following are Penetration testing methodology  .docx
1) Which of the following are Penetration testing methodology .docxSONU61709
 
INTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfINTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfoscardarius
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Yazeed Khalid
 
Questions 1 to 20 Select the best answer to each question. Note t.docx
Questions 1 to 20 Select the best answer to each question. Note t.docxQuestions 1 to 20 Select the best answer to each question. Note t.docx
Questions 1 to 20 Select the best answer to each question. Note t.docxrudybinks
 
COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4kefyalew013
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3enersivard
 

Similar to Modul 1-sample-test (20)

Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docx
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx
 
1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx1. The sale of sensitive or confidential company information to a .docx
1. The sale of sensitive or confidential company information to a .docx
 
Security (IP)
Security (IP)Security (IP)
Security (IP)
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
 
Question 1 of 205.0 PointsWhat is the primary limitation o.docx
Question 1 of 205.0 PointsWhat is the primary limitation o.docxQuestion 1 of 205.0 PointsWhat is the primary limitation o.docx
Question 1 of 205.0 PointsWhat is the primary limitation o.docx
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
Mod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdfMod3-LITE-Micarandayo.pdf
Mod3-LITE-Micarandayo.pdf
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
1) Which of the following are Penetration testing methodology .docx
1) Which of the following are Penetration testing methodology  .docx1) Which of the following are Penetration testing methodology  .docx
1) Which of the following are Penetration testing methodology .docx
 
Security (FE)
Security (FE)Security (FE)
Security (FE)
 
Wa
WaWa
Wa
 
INTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdfINTRODUCTION TO COMPUTING.pdf
INTRODUCTION TO COMPUTING.pdf
 
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
 
Bit%20 ch02
Bit%20 ch02Bit%20 ch02
Bit%20 ch02
 
Questions 1 to 20 Select the best answer to each question. Note t.docx
Questions 1 to 20 Select the best answer to each question. Note t.docxQuestions 1 to 20 Select the best answer to each question. Note t.docx
Questions 1 to 20 Select the best answer to each question. Note t.docx
 
COC Level_3 and Level_4
COC Level_3 and Level_4COC Level_3 and Level_4
COC Level_3 and Level_4
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Modul 1-sample-test

  • 1. ECDL-tests.com ECDL Module 1 Sample Test The following sample test for Module 1, Concepts of Information and Communication Technology (ICT), contains 36 multiple-choice questions. Attempt each of the 36 questions. Each question has one correct answer. Enter A, B, C, or D in answer.doc in the space for question number. 1. Which one of the following measures the speed of the CPU? a. Gigahertz (GHz). b. Bits per second (Bps). c. Gigabytes (GB). d. Megabytes (MB). 2. Which one of the following describes a computer’s operating system? a. Software that can retrieve information from a database. b. Hardware that can scan and convert photographs into digital files. c. Software that controls the allocation and usage of hardware. d. Hardware that can record and send images across the Internet. 3. Which one of the following describes spam? a. Gathering information about a person or organisation without their knowledge. b. Performing an unauthorised, usually malicious, action such as erasing files. c. Putting unnecessary load on the network by making copies of files. d. Sending unwanted bulk messages. 4. Which one of the following could lead to the spread of a malicious program? a. Using only software that has been checked for viruses. b. Maintaining regularly updated anti-virus software. c. Opening only virus-checked file attachments from known sources. d. Using a USB Flash Drive from an unknown source to exchange data. 5. Which one of the following protects a computer from the risk of malicious programs? a. PC diagnostic software. b. Web tracking software. c. Anti-spam software. d. Anti-spyware software. 6. Which one of the following describes why it is important to update antivirus software regularly? a. To ensure the software identifies old viruses. b. To protect your computer from all known viruses. c. To protect your computer from unwanted bulk messages. d. To prevent the spread of malicious programs on the Internet. 7. Which one of the following is a term for an audio or video recording posted on a web site that can be downloaded and played later? a. Podcast. b. Blog. c. VoIP. d. RSS Feed. 8. Which one of the following types of software would you most likely use to create a letter? a. Web browsing software.
  • 2. ECDL-tests.com ECDL Module 1 Sample Test b. Spreadsheet software. c. Accounting software. d. Word processing software. 9. Which one of the following describes a computer hacker? a. A skilled programmer who uses authorised access to exploit information available on a computer. b. A skilled programmer who secretly invades computers without authorisation. c. A skilled programmer who writes programs to train new employees. d. A skilled programmer who helps in the installation of new software for an organisation. 10. The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called? a. The Internet. b. A Local Area Network. c. The World Wide Web. d. A network port. 11. Which of the following systems will help to improve communications within the company? a. Excel b. Powerpoint c. Email d. Solitaire 12. Which of the following is NOT an input device? a. b. c. d. Monitor Mouse Keyboard Scanner 13. Which one of the following is a private network that allows specified external users access? a. Intranet. b. WorldNets. c. Internet. d. Extranet. 14. Which one of the following is a software application that assists users who are visually impaired to identify and interpret what is displayed on screen? a. A screen calendar. b. A word processor. c. A screen reader. d. A web log. 15. Which one of the following describes why firewalls are used? a. To prevent unauthorised access by incoming transmissions. b. To prevent destruction of a computer in the event of a fire. c. To enable easy downloading of data from web sites. d. To detect and disable viruses already on a computer. 16. Which one of the following is MOST likely to be a hoax?
  • 3. ECDL-tests.com ECDL Module 1 Sample Test a. An email from a friend you have not seen recently. b. An email with an attachment sent by a colleague using their personal email address. c. An email asking you to go to a website for a free computer scan. d. An email advertisement from a local shop you subscribe to. 17. Which one of the following is NOT a feature of electronic commerce? a. Goods can be advertised and prices compared. b. There is physical contact between buyer and seller. c. Transactions can be processed quickly. d. Services are available 24 hours a day. 18. Which one of the following is the reason that users should log on with a username and password? a. To be aware of who is in the building. b. To check up on the time-keeping of users. c. To protect computers against unauthorised use. d. To enable a personalised greeting for each user. 19. Which one of the following statements about a password is TRUE? a. It must be changed only if it is compromised. b. It cannot contain special character symbols. c. It should be changed regularly. d. It must be registered with the system administrator. 20. Which one of the following statements describes a good approach to information security for an organisation? a. There are no procedures for reporting security lapses. b. Staff passwords are not changed regularly. c. Sensitive data is available to everyone that requests it. d. Keeping an off-site backup of all files. 21. Which one of the following is the best way to protect a computer against computer viruses? a. Only virus-check e-mail attachments. b. pdate antivirus software on a regular basis. c. Always make sure that the operating system is up to date. d. UOnly download files from the Internet during business hours. 22. Which one of the following would be considered the BEST way to store a PIN number? a. Keep a written note of it with you bank cards. b. Store it on your computer. c. Memorise it. d. Keep a written note of it in your office drawer. 23. Which one of the following describes why users should lock their computer when leaving their desk? a. To prevent a waste of electricity. b. To prevent unauthorised access to data. c. To prevent data from getting corrupted. d. To prevent the computer from malfunctioning.
  • 4. ECDL-tests.com ECDL Module 1 Sample Test 24. There are rules governing the rights of a data subject and the responsibilities of a data controller. What are these rules called? a. Data Privacy Policy. b. Data Management Act. c. Data Protection legislation or conventions. d. Data Publicity Law. 25. Which one of the following is an example of an operating system a. iTunes. b. PowerPoint. c. Windows. d. Netscape. 26. Which one of the following is unsafe online activity? a. Giving your home address to someone you met in a chat room. b. Using a screen name or nick name that cannot identify you. c. Meeting someone you met online face-to-face in the company of your parents. d. Keeping your social network profile private. 27. Which one of the following describes how confidential information should be sent using an unsecured network? a. In an unsigned email. b. In an attachment. c. In a compressed format. d. In an encrypted format. 28. Which one of the following statements about the Internet is TRUE? [1 Mark] a. The Internet is a global network that links many computer networks together. b. The Internet is a private company network. c. The Internet is a visual representation of linked documents. d. The Internet is a network operating system. 29. Which one of the following is an input/output port? a. Linear. b. Radial. c. Lateral. d. FireWire. 30. Which one of the following describes Bluetooth? a. Short-range wired protocol for exchanging data. b. Short-range wireless protocol for exchanging data. c. Long-range wireless protocol for exchanging data. d. Long-range wired protocol for exchanging data. 31. Which one of the following describes why Bluetooth device settings should be adjusted? a. To increase the range of the device. b. To improve the quality of reception. c. To prevent the risk of unauthorised access. d. To reduce interference from other devices.
  • 5. ECDL-tests.com ECDL Module 1 Sample Test 32. Which one of the following would result in the loss of contact details if it were stolen? a. Printer. b. Mobile Phone. c. Modem. d. MP3. 33. Which one of the following is a characteristic of broadband? a. Completely safe from intruders. b. It has a dial up connection. c. High speed. d. Cost can vary from day to day. 34. Which one of the following is a text-based communication between two or more people over the Internet? a. Podcasting. b. Really Simple Syndication. c. Voice over Internet Protocol. d. Instant Messaging. 35. Which one of the following describes how a breach in IT security should be reported? a. Using the telephone. b. By emailing to the IT Manager. c. Using the method listed in the organisation’s security policy. d. Using any means of communication. 36. Which one of the following describes why it is important to have a secure off-site backup copy of files? a. To improve accessible of files from other locations. b. To speed up the process of accessing the files at any time. c. To prevent the loss of data in the event of a fire. d. To reduce the possibility of data theft.