ECDL Recap 2

36 Questions | Attempts: 335
Share

SettingsSettingsSettings
ECDL Quizzes & Trivia

Halfway quizz


Questions and Answers
  • 1. 

    Which one of the following is the name commonly given to the buying and selling of goods on the Internet?         

    • A.

      E-mail

    • B.

      E-commerce

    • C.

      E-zine

    • D.

      E-learning

    Correct Answer
    B. E-commerce
  • 2. 

    Which one of the following terms describes the physical components of a computer system?  

    • A.

      Hardware

    • B.

      Freeware

    • C.

      Software

    • D.

      Courseware

    Correct Answer
    A. Hardware
  • 3. 

    Which one of the following is most likely to be used to input a photograph into a computer?     

    • A.

      Microphone

    • B.

      Plotter

    • C.

      Scanner

    • D.

      Stylus

    Correct Answer
    C. Scanner
  • 4. 

    Which one of the following properties of a central processing unit (CPU) is measured in gigahertz (GHz)?                                                              

    • A.

      Cost

    • B.

      Volume

    • C.

      Speed

    • D.

      Temperature

    Correct Answer
    C. Speed
  • 5. 

    Which one of the following is used as a computer input device?

    • A.

      Plotter

    • B.

      Monitor

    • C.

      Printer

    • D.

      Scanner

    Correct Answer
    D. Scanner
  • 6. 

    Which one of the following statements is true?                      

    • A.

      A gigabyte is less than a megabyte.

    • B.

      A kilobyte is greater than a megabyte.

    • C.

      A byte is less than a bit.

    • D.

      A terabyte is greater than a gigabyte.

    Correct Answer
    D. A terabyte is greater than a gigabyte.
  • 7. 

    Which one of the following can output the results of work done on a computer? 

    • A.

      Scanner

    • B.

      Touchpad

    • C.

      Joystick

    • D.

      Printer

    Correct Answer
    D. Printer
  • 8. 

    Which one of the following devices typically has the largest storage capacity? 

    • A.

      USB flash drive

    • B.

      DVD

    • C.

      CD ROM

    • D.

      Internal Hard Disk

    Correct Answer
    D. Internal Hard Disk
  • 9. 

    What does the term ‘ICT’ stand for?                     

    • A.

      Information and Communication Technology.

    • B.

      Internet and Control Technology.

    • C.

      Internet and Computer Technology.

    • D.

      Information and Control Technology.

    Correct Answer
    A. Information and Communication Technology.
  • 10. 

    Which one of the following is unsafe online activity?         

    • A.

      Giving your home address to someone you met in a chat room.

    • B.

      Meeting someone you met online face-to-face in the company of your friends.

    • C.

      Using a screen name or nick name that cannot identify you.

    • D.

      Keeping your social network profile private.

    Correct Answer
    A. Giving your home address to someone you met in a chat room.
  • 11. 

    Which one of the following is good working practice when using a computer? 

    • A.

      Reducing the light level in the area around the computer.

    • B.

      Taking frequent breaks away from the computer.

    • C.

      Sitting in a comfortable armchair when using the computer.

    • D.

      Positioning the keyboard below wrist level on the desk.

    Correct Answer
    B. Taking frequent breaks away from the computer.
  • 12. 

    Which one of the following is good practice when downloading files?     

    • A.

      Disable virus-scanning software when downloading files.

    • B.

      Open all unrecognised e-mail messages.

    • C.

      Enable virus scanning software and download files from secure sites only.

    • D.

      Download files from Internet bulletin boards.

    Correct Answer
    C. Enable virus scanning software and download files from secure sites only.
  • 13. 

    Which one of the following activities could lead to the spread of a computer virus?     

    • A.

      Using only software that has been checked for viruses.

    • B.

      Maintaining regularly updated antivirus software.

    • C.

      Opening only virus-checked file attachments from known sources.

    • D.

      Using a USB Flash Drive from an unknown source to exchange data.

    Correct Answer
    D. Using a USB Flash Drive from an unknown source to exchange data.
  • 14. 

    Which one of the following is software introduced into a computer without the owner’s knowledge to corrupt the computer’s operating system or destroy data?                    

    • A.

      A virus

    • B.

      A germ

    • C.

      A bug

    • D.

      A macro

    Correct Answer
    A. A virus
  • 15. 

    Which one of the following monitors incoming network traffic to prevent unauthorized attacks? 

    • A.

      Dataguard

    • B.

      Firewall

    • C.

      Fireguard

    • D.

      Datashield

    Correct Answer
    B. Firewall
  • 16. 

    What is the name for licensed software that can be used for a trial period after which the user is requested to pay a fee for continued use?                                              

    • A.

      Shareware

    • B.

      Freeware

    • C.

      Open Source software

    • D.

      Software bundle

    Correct Answer
    A. Shareware
  • 17. 

    Which one of the following statements describes a good approach to information security for an organisation?          

    • A.

      Sensitive data is available to everyone.

    • B.

      Computer systems are backed up on a regular basis.

    • C.

      There are no procedures for reporting security lapses.

    • D.

      Staff passwords are never changed.

    Correct Answer
    B. Computer systems are backed up on a regular basis.
  • 18. 

    Which one of the following practices will save energy?  

    • A.

      Apply settings to automatically power down the screen/monitor when not in regular use.

    • B.

      Update your screen saver.

    • C.

      Change the screen/monitor background design.

    • D.

      Leave the computer on continuously to avoid re-booting the system.

    Correct Answer
    A. Apply settings to automatically power down the screen/monitor when not in regular use.
  • 19. 

    Which one of the following statements about software copyright is true?    

    • A.

      Copyright will prevent a CD-ROM from being duplicated.

    • B.

      Copyright is designed to protect a disk against computer viruses.

    • C.

      Copyright is the exclusive legal right of software authors to produce copies of their own software.

    • D.

      Copyright promotes the illegal use of software.

    Correct Answer
    C. Copyright is the exclusive legal right of software authors to produce copies of their own software.
  • 20. 

    Which one of the following would be described as software?    

    • A.

      Printer

    • B.

      Monitor

    • C.

      Keyboard

    • D.

      Internet browser

    Correct Answer
    D. Internet browser
  • 21. 

    Which one of the following is the CPU in a computer?              

    • A.

      Calculating Process Unit.

    • B.

      Central Processing Unit.

    • C.

      Control Process Unit.

    • D.

      Control Program Unit.

    Correct Answer
    B. Central Processing Unit.
  • 22. 

    A laptop is most likely to have which one of the following input devices fitted as standard?  

    • A.

      Touchpad

    • B.

      Mouse

    • C.

      Joystick

    • D.

      Scanner

    Correct Answer
    A. Touchpad
  • 23. 

    Which one of the following would be most used by someone who travels by train to work in various locations?        

    • A.

      Desktop

    • B.

      Laptop

    • C.

      Printer

    • D.

      Scanner

    Correct Answer
    B. Laptop
  • 24. 

    Which one of the following is a storage medium?  

    • A.

      CPU

    • B.

      USB Flash Drive - Flash Pen

    • C.

      Trackball

    • D.

      Stylus

    Correct Answer
    B. USB Flash Drive - Flash Pen
  • 25. 

    Which one of the following is a kilobyte?          

    • A.

      1024 bytes.

    • B.

      1024 bits.

    • C.

      1000 bytes.

    • D.

      1,000,000 bytes.

    Correct Answer
    A. 1024 bytes.
  • 26. 

    Which one of the following can be used to both input and output information?   

    • A.

      Mouse

    • B.

      Keyboard

    • C.

      Monitor

    • D.

      Touchscreen

    Correct Answer
    D. Touchscreen
  • 27. 

    Which one of the following can help maintain a good posture when sitting in front of a computer?  

    • A.

      Using a low level of lighting.

    • B.

      Sitting close to the computer monitor.

    • C.

      Correctly positioning the computer, desk and seat.

    • D.

      Recycling printer cartridges.

    Correct Answer
    C. Correctly positioning the computer, desk and seat.
  • 28. 

    Which one of the following usually causes RSI?

    • A.

      Typing for a long period of time without breaks.

    • B.

      Using a chair without arms.

    • C.

      Working where there is inadequate lighting and ventilation.

    • D.

      Viewing a monitor that has a lot of glare and reflections.

    Correct Answer
    A. Typing for a long period of time without breaks.
  • 29. 

    Which one of the following is an advantage of teleworking?    

    • A.

      More emphasis on teamwork.

    • B.

      Allows only fixed working hours.

    • C.

      Allows flexible working hours.

    • D.

      Never a need to use a computer or telephone.

    Correct Answer
    C. Allows flexible working hours.
  • 30. 

    Which one of the following best describes the purpose of Data protection legislation?

    • A.

      To give computer owners the right to protect themselves against computer fraud.

    • B.

      To give software owners the right to promote software copyright.

    • C.

      To give governments the right to control data access on the Internet.

    • D.

      To give a right to individuals to establish the existence of personal data.

    Correct Answer
    D. To give a right to individuals to establish the existence of personal data.
  • 31. 

    Which one of the following is the reason that users should log on with a username and password?

    • A.

      To enable a personalized greeting for each user.

    • B.

      To protect computers on a network against unauthorised use.

    • C.

      To check up on the time-keeping of users.

    • D.

      To be aware of who is in the building.

    Correct Answer
    B. To protect computers on a network against unauthorised use.
  • 32. 

    What is the best way to protect a computer against data loss?    

    • A.

      Lock the computer when it is not being used.

    • B.

      Change your password regularly.

    • C.

      Delete archive files each month.

    • D.

      Make regular backups of data to a removable storage device.

    Correct Answer
    D. Make regular backups of data to a removable storage device.
  • 33. 

    How does copyright relate to stories downloaded from a national newspaper’s web site?

    • A.

      Copyright never applies to stories downloaded.

    • B.

      Full copyright applies to stories downloaded.

    • C.

      Copyright applies for one month from download date.

    • D.

      Only part of copyright applies to stories downloaded.

    Correct Answer
    B. Full copyright applies to stories downloaded.
  • 34. 

    Which one of the following is a feature of software copyright? 

    • A.

      It encourages software piracy.

    • B.

      It makes software freeware.

    • C.

      It recognises the rights of the software author.

    • D.

      It denies the rights of the software author.

    Correct Answer
    C. It recognises the rights of the software author.
  • 35. 

    Which one of the following activities could lead to the spread of a computer virus?

    • A.

      Using a CD from an unknown source to exchange data.

    • B.

      Opening only virus-checked file attachments from known sources.

    • C.

      Maintaining regularly updated antivirus software.

    • D.

      Using only software that has been checked for viruses.

    Correct Answer
    A. Using a CD from an unknown source to exchange data.
  • 36. 

    Which one of the following is a harmful software programme that can generate copies of itself and spread throughout a computer system?                                           

    • A.

      A web log.

    • B.

      A computer virus.

    • C.

      An application system.

    • D.

      An operating system.

    Correct Answer
    B. A computer virus.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 11, 2011
    Quiz Created by
    Felicityenglish

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.