Halfway quizz
E-commerce
E-zine
E-learning
Hardware
Freeware
Software
Courseware
Microphone
Plotter
Scanner
Stylus
Cost
Volume
Speed
Temperature
Plotter
Monitor
Printer
Scanner
A gigabyte is less than a megabyte.
A kilobyte is greater than a megabyte.
A byte is less than a bit.
A terabyte is greater than a gigabyte.
Scanner
Touchpad
Joystick
Printer
USB flash drive
DVD
CD ROM
Internal Hard Disk
Information and Communication Technology.
Internet and Control Technology.
Internet and Computer Technology.
Information and Control Technology.
Giving your home address to someone you met in a chat room.
Meeting someone you met online face-to-face in the company of your friends.
Using a screen name or nick name that cannot identify you.
Keeping your social network profile private.
Reducing the light level in the area around the computer.
Taking frequent breaks away from the computer.
Sitting in a comfortable armchair when using the computer.
Positioning the keyboard below wrist level on the desk.
Disable virus-scanning software when downloading files.
Open all unrecognised e-mail messages.
Enable virus scanning software and download files from secure sites only.
Download files from Internet bulletin boards.
Using only software that has been checked for viruses.
Maintaining regularly updated antivirus software.
Opening only virus-checked file attachments from known sources.
Using a USB Flash Drive from an unknown source to exchange data.
A virus
A germ
A bug
A macro
Dataguard
Firewall
Fireguard
Datashield
Shareware
Freeware
Open Source software
Software bundle
Sensitive data is available to everyone.
Computer systems are backed up on a regular basis.
There are no procedures for reporting security lapses.
Staff passwords are never changed.
Apply settings to automatically power down the screen/monitor when not in regular use.
Update your screen saver.
Change the screen/monitor background design.
Leave the computer on continuously to avoid re-booting the system.
Copyright will prevent a CD-ROM from being duplicated.
Copyright is designed to protect a disk against computer viruses.
Copyright is the exclusive legal right of software authors to produce copies of their own software.
Copyright promotes the illegal use of software.
Printer
Monitor
Keyboard
Internet browser
Calculating Process Unit.
Central Processing Unit.
Control Process Unit.
Control Program Unit.
Touchpad
Mouse
Joystick
Scanner
Desktop
Laptop
Printer
Scanner
CPU
USB Flash Drive - Flash Pen
Trackball
Stylus
1024 bytes.
1024 bits.
1000 bytes.
1,000,000 bytes.
Mouse
Keyboard
Monitor
Touchscreen
Using a low level of lighting.
Sitting close to the computer monitor.
Correctly positioning the computer, desk and seat.
Recycling printer cartridges.
Typing for a long period of time without breaks.
Using a chair without arms.
Working where there is inadequate lighting and ventilation.
Viewing a monitor that has a lot of glare and reflections.
More emphasis on teamwork.
Allows only fixed working hours.
Allows flexible working hours.
Never a need to use a computer or telephone.
To give computer owners the right to protect themselves against computer fraud.
To give software owners the right to promote software copyright.
To give governments the right to control data access on the Internet.
To give a right to individuals to establish the existence of personal data.
To enable a personalized greeting for each user.
To protect computers on a network against unauthorised use.
To check up on the time-keeping of users.
To be aware of who is in the building.
Lock the computer when it is not being used.
Change your password regularly.
Delete archive files each month.
Make regular backups of data to a removable storage device.
Copyright never applies to stories downloaded.
Full copyright applies to stories downloaded.
Copyright applies for one month from download date.
Only part of copyright applies to stories downloaded.
It encourages software piracy.
It makes software freeware.
It recognises the rights of the software author.
It denies the rights of the software author.
Using a CD from an unknown source to exchange data.
Opening only virus-checked file attachments from known sources.
Maintaining regularly updated antivirus software.
Using only software that has been checked for viruses.
A web log.
A computer virus.
An application system.
An operating system.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.