Module 1 Assessment Test

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Michelle Xuereb
Michelle Xuereb, Computer science
As a computing teacher in Malta, Michelle strives to inspire students with a passion for technology and provide them with essential digital skills for a brighter future.
Quizzes Created: 3 | Total Attempts: 1,771
| Attempts: 644 | Questions: 18
Please wait...
Question 1 / 18
0 %
0/100
Score 0/100
1. The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called?

Explanation

A LAN (Local Area Network) is the correct answer because it refers to a network arrangement where computers in a specific location, such as an office building, are connected together to share files and printers. FTP (File Transfer Protocol), WWW (World Wide Web), and HTTP (Hypertext Transfer Protocol) are not the correct answers as they refer to specific protocols or technologies used for different purposes on the internet.

Submit
Please wait...
About This Quiz
Systems Quizzes & Trivia

Module 1 Assessment test evaluates foundational knowledge in Information Technology, covering mainframes, IT components, CPU speed, disk formatting, and OS functions. It assesses essential skills for managing corporate... see moresystems and databases, crucial for IT professionals. see less

2. Which of the following is a good password policy for an organisation?

Explanation

A good password policy for an organization is to ensure that all passwords are changed regularly. This practice helps to enhance security by reducing the risk of passwords being compromised or guessed over time. Regularly changing passwords ensures that even if one password is compromised, it will not remain valid for an extended period, making it harder for unauthorized access to occur.

Submit
3. Which of the following tasks is a function of the operating system?

Explanation

The correct answer is file management. The operating system is responsible for managing files and directories on a computer system. This includes tasks such as creating, deleting, moving, and organizing files and folders. The operating system provides a file system that allows users to store and retrieve data efficiently. It also controls access to files, ensuring that only authorized users can read, write, or modify them. File management is an essential function of the operating system that helps users organize and maintain their files effectively.

Submit
4. Which of the following is NOT a use of computer applications in a school?

Explanation

Stock control is not a use of computer applications in a school because it is not directly related to the educational activities or administrative tasks typically performed in a school setting. Class timetabling, student registration, and computer-based training are all common uses of computer applications in schools to manage schedules, enroll students, and deliver educational content. However, stock control, which involves managing inventory and tracking supplies, is more commonly associated with businesses or organizations that deal with physical goods rather than educational institutions.

Submit
5. Which of the following describes the essential components of Information Technology?

Explanation

The essential components of Information Technology are hardware, software, and communications technologies. Hardware refers to the physical components of a computer system, such as the computer itself, peripherals, and storage devices. Software includes the programs and applications that run on the hardware, enabling it to perform various tasks. Communications technologies involve the networks and protocols that allow computers to connect and communicate with each other. These three components work together to support the functioning and utilization of Information Technology.

Submit
6. Which of the following tasks is a function of the operating system?

Explanation

File management is a function of the operating system as it involves organizing, storing, and retrieving files on a computer. The operating system provides a file system that allows users to create, delete, rename, and move files and directories. It also handles file permissions, ensuring that only authorized users can access or modify certain files. Additionally, the operating system manages disk space allocation, ensuring efficient storage and retrieval of files. Overall, file management is a crucial task performed by the operating system to ensure the efficient and secure handling of files on a computer system.

Submit
7. Which of the following devices do you need to be able to communicate with other computers using the telephone network?

Explanation

A modem is needed to communicate with other computers using the telephone network. A modem is a device that allows computers to transmit data over telephone lines. It converts digital signals from the computer into analog signals that can be transmitted over the telephone lines, and vice versa. This enables communication between computers over long distances using the existing telephone infrastructure. CD-ROM, plotter, and speakers are not directly involved in communication over the telephone network.

Submit
8. Which of the following is NOT a feature of electronic commerce?

Explanation

Electronic commerce, or e-commerce, refers to the buying and selling of goods and services over the internet. It eliminates the need for physical contact between the buyer and seller, as all transactions are conducted online. This allows for goods to be advertised and prices compared easily, transactions to be processed quickly, and services to be available 24 hours a day. Therefore, the statement "There is physical contact between buyer and seller" is not a feature of electronic commerce.

Submit
9. The speed of the CPU is measured in:

Explanation

The speed of the CPU is measured in Gigahertz (GHz). Gigahertz is a unit of measurement that represents one billion cycles per second. It indicates the speed at which the CPU can execute instructions and process data. A higher GHz value generally indicates a faster CPU and better performance.

Submit
10. What is the best way of preventing your computer from being infected with a virus?

Explanation

Having updateable anti-virus software running on your computer is the best way to prevent your computer from being infected with a virus. This is because anti-virus software is specifically designed to detect and remove viruses from your computer. By keeping the software up to date, you ensure that it has the latest virus definitions and can effectively protect your computer against new and emerging threats. Simply virus-checking email attachments or never opening any email attachments may not be sufficient as viruses can be spread through various other means, such as malicious websites or infected files downloaded from the internet.

Submit
11. Which of the following statements about formatting a floppy disk for the first time is true?

Explanation

Formatting a floppy disk for the first time is true as it prepares the disk to store data. Formatting involves creating a file system on the disk, which allows the operating system to organize and manage the data stored on it. This process erases any existing data on the disk and sets it up for use by allocating storage space and creating necessary data structures. By formatting the disk, it becomes ready to store new data and can be accessed by the computer to read from or write to it.

Submit
12. Which of the following tasks would be more suited to a person rather than a computer?

Explanation

Tasks that require imagination would be more suited to a person rather than a computer because imagination is a human cognitive ability that involves creativity, originality, and the ability to think outside the box. Computers are not capable of generating new ideas or thinking creatively like humans can. They are designed to perform tasks that can be programmed and follow a set of instructions. Therefore, tasks that require imagination, such as brainstorming ideas, creating art, or writing stories, are better suited for humans who can use their creativity and unique perspectives.

Submit
13. Which type of computer is used to operate large corporate systems and databases

Explanation

Mainframe computers are used to operate large corporate systems and databases due to their ability to handle massive amounts of data and perform complex calculations. They are designed to support multiple users and run critical applications simultaneously. Mainframes offer high processing power, storage capacity, and reliability, making them ideal for organizations that require a centralized and secure computing environment. They are often used in industries such as banking, healthcare, and government, where large-scale data processing and transaction handling are essential.

Submit
14. Which software would you use to create a mailshot letter?

Explanation

Word processing software is the correct answer because it is specifically designed for creating and editing documents, including letters. It provides features such as formatting options, spell check, and the ability to insert images and tables, which are essential for creating a professional mailshot letter. Web browsing software is used for accessing and navigating the internet, spreadsheet software is used for organizing and analyzing data, and accounting software is used for managing financial transactions, none of which are suitable for creating a mailshot letter.

Submit
15. Computer use can cause repetitive strain injury (RSI). Which of the following NOT is the best way to avoid this?

Explanation

Using the computer sitting on an armchair is not the best way to avoid repetitive strain injury (RSI). Sitting on an armchair may not provide proper support and posture for the body, leading to strain on the neck, back, and wrists. It is important to have an ergonomic setup, including a comfortable chair with proper back support and adjustable height, as well as positioning the monitor at the correct height and keeping the wrists level with the keyboard to avoid RSI. Additionally, ensuring the computer is in a well-lit area is important for eye health and reducing strain.

Submit
16. An intranet is:

Explanation

The correct answer is "A private company network." An intranet refers to a private network that is only accessible to the members of a specific organization, such as employees or authorized users. It is used to share information, collaborate, and communicate within the organization. Unlike the internet, which is a public network, an intranet is restricted to internal users, ensuring privacy and security for the company's data and resources.

Submit
17. Which of the following statements describes shareware?

Explanation

Shareware refers to software that is initially provided to users for free, allowing them to use it for a limited time period. After this trial period, users are expected to pay a fee or purchase a license to continue using the software. This model allows users to try out the software before committing to a purchase, providing them with an opportunity to evaluate its features and functionality. Therefore, the statement "Shareware is software you may pay for after an initial time period of use" accurately describes the concept of shareware.

Submit
18. There are rules governing the storage and supply of computer-based information. What are these rules called?

Explanation

The correct answer is Data Protection Act. The Data Protection Act refers to a set of rules and regulations that govern the storage and supply of computer-based information. It is designed to protect individuals' personal data and ensure that it is processed and handled securely. The act outlines principles for the fair and lawful use of personal data, the rights of individuals to access and control their data, and the responsibilities of organizations that handle personal data. It aims to prevent unauthorized access, loss, or misuse of personal information and promote transparency and accountability in data handling practices.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 18, 2013
    Quiz Created by
    Michelle Xuereb
Cancel
  • All
    All (18)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The computers in your office building are connected together so staff...
Which of the following is a good password policy for an organisation?
Which of the following tasks is a function of the operating system?
Which of the following is NOT a use of computer applications in a...
Which of the following describes the essential components of...
Which of the following tasks is a function of the operating system?
Which of the following devices do you need to be able to communicate...
Which of the following is NOT a feature of electronic commerce?
The speed of the CPU is measured in:
What is the best way of preventing your computer from being infected...
Which of the following statements about formatting a floppy disk for...
Which of the following tasks would be more suited to a person rather...
Which type of computer is used to operate large corporate systems and...
Which software would you use to create a mailshot letter?
Computer use can cause repetitive strain injury (RSI). Which of the...
An intranet is:
Which of the following statements describes shareware?
There are rules governing the storage and supply of computer-based...
Alert!

Advertisement