A quiz to help those preparing for the ECDL Essentials unit 1 test.
A. The battery will leak.
B. The phone’s memory will be erased.
C. Your landline will receive mobile interference.
D. The device will be stolen.
Rate this question:
A. It compresses data contained on a computer.
B. It duplicates information being stored on a computer.
C. It protects information on a computer from risk of unauthorised access.
D. It encrypts information being stored on a computer.
Rate this question:
A. It should be changed regularly.
B. It cannot contain special character symbols.
C. It should only contain capital letters.
D. Only you and your manager should know it.
Rate this question:
A. The Sales Department.
B. The Cleaning Department.
C. The Admin Department.
D. The IT Department.
Rate this question:
A. Installing anti-spam software.
B. Paying for the latest version of Windows.
C. Updating the anti-virus software regularly.
D. Restricting computer access to known users.
Rate this question:
A. By telephoning your manager.
B. By gossiping with co-workers.
C. Using the channel identified in the organisation’s security policy.
D. By sending an anonymous fax.
Rate this question:
A. The battery will go dead.
B. Your bag will corrode.
C. The PDA will be stolen.
D. You will receive text messages from strangers.
Rate this question:
A. Enter in in your mobile phone.
B. Write it down on a piece of paper.
C. Tell your work colleague.
D. Memorise it.
Rate this question:
A. Swap the network cables in hub cabinet.
B. Adjust the Internet security settings.
C. Complain to the System Administrator.
D. Hide your computer under your desk.
Rate this question:
A. Communicate only with secretaries.
B. Consult the Legal Department or policy manual when in doubt.
C. Copy all departments on all emails.
D. Communicate only with managers.
Rate this question:
A. To ensure the secure use of IT resources.
B. To allow sales reps to track selling patterns.
C. To allow managers to track your work effects.
D. To ensure easy access to information on your computer.
Rate this question:
A. In a text only file.
B. In an encrypted format.
C. In a compressed format.
D. With your name typed at the end of the email.
Rate this question:
A. By downloading files from unknown websites.
B. By deleting e-mails from known senders.
C. By forwarding email attachments from unknown sources.
D. By installing new Windows updates.
Rate this question:
A. Malware.
B. Spyware.
C. Viruses.
D. Spam.
Rate this question:
A. Compressed using a data compression tool.
B. Digitally signed to confirm its authenticity.
C. Only send confidential information in the post.
D. Encrypted, so that only a person with a key can decrypt it.
Rate this question:
A. Anti-virus software.
B. Anti-phishing software.
C. Changing your web based email password.
D. Anti-spam software.
Rate this question:
A. Installed software application licences can be stolen.
B. Confidential information can be accessed.
C. Shareware services will be stopped.
D. Your system administrator will lose access to your computer.
Rate this question:
A. A skilled programmer who is able to gain authorised access into a system.
B. A skilled programmer who repairs hardware faults on computers.
C. A skilled programmer who helps in the installation of new software for an organisation.
D. A skilled programmer who is able to gain unauthorised access into a system.
Rate this question:
A. Information will be accessible to others.
B. Information will be only be available during office hours.
C. Information will be lost.
D. Information will be corrupted.
Rate this question:
A. To reduce downtime caused by file loss in case of a disaster.
B. To allow you time to disable the office Firewall.
C. To stop viruses from attacking the network.
D. To transfer spam on the backup server.
Rate this question:
A. The checks listed in the organisation’s security policy.
B. The checks listed in an help forum.
C. The checks listed in the device manual.
D. The checks sugguested by a colleague.
Rate this question:
A. Increased spam.
B. Theft of identity.
C. Corrupted data.
D. Data loss.
Rate this question:
A. Marking emails with attachments from unknown senders as junk mail.
B. Allowing everyone access to a computer.
C. Removing login passwords.
D. Installing software received in emails from unknown users.
Rate this question:
A. By activating a firewall.
B. By installing anti-virus software.
C. By locking it in a drawer.
D. By storing documents in a folder.
Rate this question:
A. An email containing a trojan via a file attachment.
B. An email asking you to forward it on to ten people in your address book.
C. An email directing the recipient to a website to verify credit card details.
D. An email warning the recipient of a computer virus threat.
Rate this question:
A. Backdoor entry into a computer.
B. Fraudulent acquisition of personal information.
C. Chain emails forwarded to you.
D. Fake virus warnings.
Rate this question:
A. Using anti-spam software.
B. Using anti-Bluetooth software.
C. Using anti-virus software.
D. Using anti-trojan software.
Rate this question:
A. Increased spam.
B. Disabled Firewall.
C. Slow speed of connection.
D. Low resistance to hackers.
Rate this question:
A. Restricting access to locations where confidential information is stored.
B. Disclosing sensitive information only to authorised individuals.
C. Locking the pc that contains sensitive information when you leave your workstation.
D. Disclosing sensitive information to colleagues.
Rate this question:
A. Lunch breaks only taken in the office.
B. A security cable.
C. Taking the battery out of the laptop.
D. Installing anti-theft software.
Rate this question:
A. Any files saved only on the hard disk of the computer will be lost.
B. The operating system will automatically save all files and shutdown.
C. External USB device backup will be lost.
D. The Firewall settings will be turned down.
Rate this question:
A. On the computer.
B. On a shared USB storage device.
C. On a friend's laptop.
D. On a labelled CD.
Rate this question:
A. Encrypted USB drives.
B. Expired passwords.
C. Software incompatibility.
D. Application of software patches
Rate this question:
A. Internet blogging software.
B. An Internet connection filter.
C. A phone socket filter.
D. Anti-malware software.
Rate this question:
A. Backing up the software applications.
B. Storing it in a place free of magnetic fields.
C. Placing it close to the computer.
D. Downloading illegal updates of the software.
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.