Quiz: Fundamentals Of Information Technology! Trivia

20 Questions | Total Attempts: 174

SettingsSettingsSettings
Please wait...
Quiz: Fundamentals Of Information Technology! Trivia

.


Questions and Answers
  • 1. 
    Which one of the following file types is a music file?
    • A. 

      .zip

    • B. 

      .png

    • C. 

      .odt

    • D. 

      .mp3

  • 2. 
    Which one of the following best describes the type of file system structure being shown below?
    • A. 

      Flat File.

    • B. 

      Sequential.

    • C. 

      Hierarchical.

    • D. 

      Random.

  • 3. 
    Which one of the following is a result of compressing a file?
    • A. 

      The file is deleted.

    • B. 

      The file size is smaller.

    • C. 

      The 3 character extension is hidden.

    • D. 

      All file properties are lost.

  • 4. 
    Which one of the following is a benefit of online file storage?
    • A. 

      Files can be shared safely with friends and family with Internet access.

    • B. 

      Only text files can be stored online.

    • C. 

      The data is publicly available to anyone with Internet access.

    • D. 

      Only you can access files you have stored on line.

  • 5. 
    Which one of the following is an appropriate routine to shut down a non-responding application?
    • A. 

      Close all open documents and press the power button until the computer automatically switches off.

    • B. 

      Press Ctrl + Alt + Delete, select the application in the Task Manager window and click End Task.

    • C. 

      Pull out the power cable from the back of the computer.

    • D. 

      Click Shut Down on the Start menu and choose Shut down from the Shut Down Windows drop-down list.

  • 6. 
    Which one of the following shows file size from smallest to largest?
    • A. 

      Gigabyte, Megabyte, Kilobyte, Byte.

    • B. 

      Megabyte, Gigabyte, Kilobyte, Byte.

    • C. 

      Byte, Kilobyte, Megabyte, Gigabyte.

    • D. 

      Byte, Megabyte, Kilobyte, Gigabyte.

  • 7. 
    Which one of the following statements about computer viruses isTRUE?
    • A. 

      Files can be damaged by computer viruses.

    • B. 

      Text files are the only files to be corrupted by viruses.

    • C. 

      Files are always permanently damaged by viruses.

    • D. 

      Compressed files can never be damaged by viruses.

  • 8. 
    Which one of the following file names complies with good practice in naming a file containing trading figures for the Greenway company for the third quarter of 2008?
    • A. 

      Company 456C.xls

    • B. 

      Greenway figures.xls

    • C. 

      Q3 Trading.xls

    • D. 

      Greenway 2008Q3 Trading.xls

  • 9. 
    Which one of the following is safe to post on a social networking website?
    • A. 

      A personal telephone number.

    • B. 

      Hobbies.

    • C. 

      A home address.

    • D. 

      A school or work-place address.

  • 10. 
    Which one of the following is most likely to cause repetitive strain injury (RSI)?
    • A. 

      Viewing a monitor that has a lot of glare and reflections.

    • B. 

      Working where there is inadequate lighting and ventilation.

    • C. 

      Typing for a long period of time without breaks.

    • D. 

      Using a chair without arms.

  • 11. 
    Which one of the following statements about software copyright is TRUE?
    • A. 

      Copyright promotes the illegal use of software.

    • B. 

      Copyright is the exclusive legal right of software authors to produce copies of their own software.

    • C. 

      Copyright is designed to protect a disk against computer viruses.

    • D. 

      Copyright will prevent a CD-ROM from being duplicated.

  • 12. 
    Which one of the following best describes the purpose of Data protection legislation?
    • A. 

      To give computer owners the right to protect themselves against computer fraud.

    • B. 

      To give software owners the right to promote software copyright.

    • C. 

      To give governments the right to control data access on the Internet.

    • D. 

      To give a right to individuals to establish the existence of personal data.

  • 13. 
    Which one of the following tasks could you perform in order to improvethe performance of your computer?
    • A. 

      Add a password to your user account.

    • B. 

      Set up parental controls.

    • C. 

      Turn off your firewall.

    • D. 

      Defragment the file system.

  • 14. 
    Which one of the following commands will NOT open the taskmanager?
    • A. 

      Press Ctrl + Shift + Esc.

    • B. 

      Right click the start icon.

    • C. 

      Right click an empty area on the taskbar and select from the menu.

    • D. 

      Press Ctrl + Alt + Delete and select from the menu.

  • 15. 
    Which one of the following actions is the most appropriate step toresolve a lost network connection?
    • A. 

      Check the router and modem are turned on.

    • B. 

      Check the printer is turned on.

    • C. 

      Update the device drivers.

    • D. 

      Defragment the hard drive.

  • 16. 
    Which one of the following is NOT appropriate within an organisation?
    • A. 

      Going to lunch with a colleague.

    • B. 

      Sharing files.

    • C. 

      Sharing your user name and password.

    • D. 

      Sharing your calendar.

  • 17. 
    Which of these images is a Folder?
    • A. 

      1st image

    • B. 

      2nd image

    • C. 

      3rd image

    • D. 

      4th image

  • 18. 
    Find and open the ecdltest folder on your Learner Drive.Use the most suitable tool to search for ALL files that have a namebeginning with the letters FA in the ecdltest folder and subfolders.Enter the number of files as your answer.
  • 19. 
    Use the most suitable tool to search for ALL files with the extension .rtfin the ecdltest folder and subfolders.Enter the number of files as your answer
  • 20. 
    Organise the files in decending order of size (largest to the top, smallest to the bottom)How big is the largest file?Write your answer by typing the number, then the size group. follow the example below."123 GB"