Module 1 Assessment Test

By Michelle Xuereb
Michelle Xuereb, Computer science
As a computing teacher in Malta, Michelle strives to inspire students with a passion for technology and provide them with essential digital skills for a brighter future.
Quizzes Created: 3 | Total Attempts: 1,703
, Computer science
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
Questions: 18 | Attempts: 623

SettingsSettingsSettings
Module Quizzes & Trivia

Questions and Answers
  • 1. 

    Which type of computer is used to operate large corporate systems and databases

    • A.

      Desktop computer

    • B.

      Personal Digital Assistant (PDA)

    • C.

      Mainframe

    • D.

      Laptop

    Correct Answer
    C. Mainframe
    Explanation
    Mainframe computers are used to operate large corporate systems and databases due to their ability to handle massive amounts of data and perform complex calculations. They are designed to support multiple users and run critical applications simultaneously. Mainframes offer high processing power, storage capacity, and reliability, making them ideal for organizations that require a centralized and secure computing environment. They are often used in industries such as banking, healthcare, and government, where large-scale data processing and transaction handling are essential.

    Rate this question:

  • 2. 

    Which of the following describes the essential components of Information Technology?

    • A.

      Primary, secondary and cache memory

    • B.

      RAM and ROM

    • C.

      Hardware, software and communications technologies

    • D.

      Hardware and shareware

    Correct Answer
    C. Hardware, software and communications technologies
    Explanation
    The essential components of Information Technology are hardware, software, and communications technologies. Hardware refers to the physical components of a computer system, such as the computer itself, peripherals, and storage devices. Software includes the programs and applications that run on the hardware, enabling it to perform various tasks. Communications technologies involve the networks and protocols that allow computers to connect and communicate with each other. These three components work together to support the functioning and utilization of Information Technology.

    Rate this question:

  • 3. 

    The speed of the CPU is measured in:

    • A.

      Gigahertz (GHz)

    • B.

      Bits per second (Bps)

    • C.

      Gigabytes (GB)

    • D.

      Megabytes (MB)

    Correct Answer
    A. Gigahertz (GHz)
    Explanation
    The speed of the CPU is measured in Gigahertz (GHz). Gigahertz is a unit of measurement that represents one billion cycles per second. It indicates the speed at which the CPU can execute instructions and process data. A higher GHz value generally indicates a faster CPU and better performance.

    Rate this question:

  • 4. 

    Which of the following statements about formatting a floppy disk for the first time is true?

    • A.

      Formatting prepares a floppy disk to store data

    • B.

      Formatting backs up data onto a floppy disk

    • C.

      Formatting copies a floppy disk

    • D.

      Formatting unlocks a floppy disk

    Correct Answer
    A. Formatting prepares a floppy disk to store data
    Explanation
    Formatting a floppy disk for the first time is true as it prepares the disk to store data. Formatting involves creating a file system on the disk, which allows the operating system to organize and manage the data stored on it. This process erases any existing data on the disk and sets it up for use by allocating storage space and creating necessary data structures. By formatting the disk, it becomes ready to store new data and can be accessed by the computer to read from or write to it.

    Rate this question:

  • 5. 

    Which of the following tasks is a function of the operating system?

    • A.

      Adding data to a spreadsheet

    • B.

      Producing a database report

    • C.

      File management

    • D.

      Producing a presentation

    Correct Answer
    C. File management
    Explanation
    File management is a function of the operating system as it involves organizing, storing, and retrieving files on a computer. The operating system provides a file system that allows users to create, delete, rename, and move files and directories. It also handles file permissions, ensuring that only authorized users can access or modify certain files. Additionally, the operating system manages disk space allocation, ensuring efficient storage and retrieval of files. Overall, file management is a crucial task performed by the operating system to ensure the efficient and secure handling of files on a computer system.

    Rate this question:

  • 6. 

    Which of the following tasks is a function of the operating system?

    • A.

      Producing a presentation

    • B.

      File management

    • C.

      Producing a database report

    • D.

      Adding data to a spreadsheet

    Correct Answer
    B. File management
    Explanation
    The correct answer is file management. The operating system is responsible for managing files and directories on a computer system. This includes tasks such as creating, deleting, moving, and organizing files and folders. The operating system provides a file system that allows users to store and retrieve data efficiently. It also controls access to files, ensuring that only authorized users can read, write, or modify them. File management is an essential function of the operating system that helps users organize and maintain their files effectively.

    Rate this question:

  • 7. 

    Which software would you use to create a mailshot letter?

    • A.

      Web browsing software

    • B.

      Spreadsheet software

    • C.

      Accounting software

    • D.

      Word processing software

    Correct Answer
    D. Word processing software
    Explanation
    Word processing software is the correct answer because it is specifically designed for creating and editing documents, including letters. It provides features such as formatting options, spell check, and the ability to insert images and tables, which are essential for creating a professional mailshot letter. Web browsing software is used for accessing and navigating the internet, spreadsheet software is used for organizing and analyzing data, and accounting software is used for managing financial transactions, none of which are suitable for creating a mailshot letter.

    Rate this question:

  • 8. 

    The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called?

    • A.

      FTP

    • B.

      LAN

    • C.

      WWW

    • D.

      HTTP

    Correct Answer
    B. LAN
    Explanation
    A LAN (Local Area Network) is the correct answer because it refers to a network arrangement where computers in a specific location, such as an office building, are connected together to share files and printers. FTP (File Transfer Protocol), WWW (World Wide Web), and HTTP (Hypertext Transfer Protocol) are not the correct answers as they refer to specific protocols or technologies used for different purposes on the internet.

    Rate this question:

  • 9. 

    An intranet is:

    • A.

      A network operating system

    • B.

      A network filing system

    • C.

      A private company network

    • D.

      A private company network that includes external specified users

    Correct Answer
    C. A private company network
    Explanation
    The correct answer is "A private company network." An intranet refers to a private network that is only accessible to the members of a specific organization, such as employees or authorized users. It is used to share information, collaborate, and communicate within the organization. Unlike the internet, which is a public network, an intranet is restricted to internal users, ensuring privacy and security for the company's data and resources.

    Rate this question:

  • 10. 

    Which of the following devices do you need to be able to communicate with other computers using the telephone network?

    • A.

      CD-ROM

    • B.

      Modem

    • C.

      Plotter

    • D.

      Speakers

    Correct Answer
    B. Modem
    Explanation
    A modem is needed to communicate with other computers using the telephone network. A modem is a device that allows computers to transmit data over telephone lines. It converts digital signals from the computer into analog signals that can be transmitted over the telephone lines, and vice versa. This enables communication between computers over long distances using the existing telephone infrastructure. CD-ROM, plotter, and speakers are not directly involved in communication over the telephone network.

    Rate this question:

  • 11. 

    Which of the following tasks would be more suited to a person rather than a computer?

    • A.

      Tasks that are repetitive

    • B.

      Tasks that require speed

    • C.

      Tasks that require complex mathematical processing

    • D.

      Tasks that require imagination

    Correct Answer
    D. Tasks that require imagination
    Explanation
    Tasks that require imagination would be more suited to a person rather than a computer because imagination is a human cognitive ability that involves creativity, originality, and the ability to think outside the box. Computers are not capable of generating new ideas or thinking creatively like humans can. They are designed to perform tasks that can be programmed and follow a set of instructions. Therefore, tasks that require imagination, such as brainstorming ideas, creating art, or writing stories, are better suited for humans who can use their creativity and unique perspectives.

    Rate this question:

  • 12. 

    Which of the following is NOT a use of computer applications in a school?

    • A.

      Class timetabling

    • B.

      Student registration

    • C.

      Computer based training

    • D.

      Stock Control

    Correct Answer
    D. Stock Control
    Explanation
    Stock control is not a use of computer applications in a school because it is not directly related to the educational activities or administrative tasks typically performed in a school setting. Class timetabling, student registration, and computer-based training are all common uses of computer applications in schools to manage schedules, enroll students, and deliver educational content. However, stock control, which involves managing inventory and tracking supplies, is more commonly associated with businesses or organizations that deal with physical goods rather than educational institutions.

    Rate this question:

  • 13. 

    Which of the following is NOT a feature of electronic commerce?

    • A.

      Goods can be advertised and prices compared

    • B.

      There is physical contact between buyer and seller

    • C.

      Transactions can be processed quickly

    • D.

      Services are available 24 hours a day

    Correct Answer
    B. There is physical contact between buyer and seller
    Explanation
    Electronic commerce, or e-commerce, refers to the buying and selling of goods and services over the internet. It eliminates the need for physical contact between the buyer and seller, as all transactions are conducted online. This allows for goods to be advertised and prices compared easily, transactions to be processed quickly, and services to be available 24 hours a day. Therefore, the statement "There is physical contact between buyer and seller" is not a feature of electronic commerce.

    Rate this question:

  • 14. 

    Computer use can cause repetitive strain injury (RSI). Which of the following NOT is the best way to avoid this?

    • A.

      Ensure your computer is in a well-lit area

    • B.

      Use the computer sitting on an armchair

    • C.

      Place your monitor at the correct height

    • D.

      Work with your wrists level with the keyboard

    Correct Answer
    B. Use the computer sitting on an armchair
    Explanation
    Using the computer sitting on an armchair is not the best way to avoid repetitive strain injury (RSI). Sitting on an armchair may not provide proper support and posture for the body, leading to strain on the neck, back, and wrists. It is important to have an ergonomic setup, including a comfortable chair with proper back support and adjustable height, as well as positioning the monitor at the correct height and keeping the wrists level with the keyboard to avoid RSI. Additionally, ensuring the computer is in a well-lit area is important for eye health and reducing strain.

    Rate this question:

  • 15. 

    Which of the following is a good password policy for an organisation?

    • A.

      All passwords are changed regularly

    • B.

      All passwords are never changed

    • C.

      All passwords are made up of less than four characters

    • D.

      All passwords are made up of less than four numbers

    Correct Answer
    A. All passwords are changed regularly
    Explanation
    A good password policy for an organization is to ensure that all passwords are changed regularly. This practice helps to enhance security by reducing the risk of passwords being compromised or guessed over time. Regularly changing passwords ensures that even if one password is compromised, it will not remain valid for an extended period, making it harder for unauthorized access to occur.

    Rate this question:

  • 16. 

    What is the best way of preventing your computer from being infected with a virus?

    • A.

      Only virus-check e-mail attachments

    • B.

      Have updateable anti-virus software running on your computer

    • C.

      Have anti-virus software running on your computer

    • D.

      Never open any e-mail attachments

    Correct Answer
    B. Have updateable anti-virus software running on your computer
    Explanation
    Having updateable anti-virus software running on your computer is the best way to prevent your computer from being infected with a virus. This is because anti-virus software is specifically designed to detect and remove viruses from your computer. By keeping the software up to date, you ensure that it has the latest virus definitions and can effectively protect your computer against new and emerging threats. Simply virus-checking email attachments or never opening any email attachments may not be sufficient as viruses can be spread through various other means, such as malicious websites or infected files downloaded from the internet.

    Rate this question:

  • 17. 

    Which of the following statements describes shareware?

    • A.

      Shareware is software without copyright protection

    • B.

      Shareware is free software

    • C.

      Shareware is software you may pay for after an initial time period of use

    • D.

      Shareware is software you can use in any way

    Correct Answer
    C. Shareware is software you may pay for after an initial time period of use
    Explanation
    Shareware refers to software that is initially provided to users for free, allowing them to use it for a limited time period. After this trial period, users are expected to pay a fee or purchase a license to continue using the software. This model allows users to try out the software before committing to a purchase, providing them with an opportunity to evaluate its features and functionality. Therefore, the statement "Shareware is software you may pay for after an initial time period of use" accurately describes the concept of shareware.

    Rate this question:

  • 18. 

    There are rules governing the storage and supply of computer-based information. What are these rules called?

    • A.

      Data Privacy Policy

    • B.

      Data Management Act

    • C.

      Data Protection Act

    • D.

      Data Publicity Law

    Correct Answer
    C. Data Protection Act
    Explanation
    The correct answer is Data Protection Act. The Data Protection Act refers to a set of rules and regulations that govern the storage and supply of computer-based information. It is designed to protect individuals' personal data and ensure that it is processed and handled securely. The act outlines principles for the fair and lawful use of personal data, the rights of individuals to access and control their data, and the responsibilities of organizations that handle personal data. It aims to prevent unauthorized access, loss, or misuse of personal information and promote transparency and accountability in data handling practices.

    Rate this question:

Michelle Xuereb |Computer science
As a computing teacher in Malta, Michelle strives to inspire students with a passion for technology and provide them with essential digital skills for a brighter future.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 18, 2013
    Quiz Created by
    Michelle Xuereb
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.