Professional Documents
Culture Documents
Which of the following statements describes a good approach to information security for an organisation? No procedures for reporting security lapses Staff passwords are not changed regularly Sensitive data is available to everyone Computer systems are backed up on a regular basis
Which of the following is a good password policy for an organisation? All passwords are changed regularly All passwords are never changed All passwords are made up of less than four characters All passwords are made up of less than four numbers
What is the best way of preventing your computer from being infected with a virus? Only virus-check e-mail attachments Have updateable anti-virus software running on your computer Have anti-virus software running on your computer Never open e-mail attachments
Which of the following statements describes shareware? Shareware is software without copyright protection Shareware is free software Shareware is software you may pay for after an initial time period of use Shareware is software you can use in any way
There are rules governing the storage and supply of computer-based information. What are these rules called? Data Privacy Policy Data Management Act Data Protection Act Data Publicity Law
Which of the following would be considered a portable computer? Workstation Mainframe Laptop Desktop Computer
Which of the following would improve computer performance? Using a larger monitor Increasing the number of applications running Using a faster printer Increasing the RAM size
Which of the following is NOT a function of the Central Processing Unit? Executing program instructions Ensuring program instructions are executed in the correct sequence Sending an e-mail Carrying out calculations
Which of the following is both an input and output device? Touch screen Keyboard Printer Scanner
10
Disk formatting is used to: Find files on a disk Lock a disk Unlock a disk Prepare a disk to store files
11
Which of the following is an operating system? Lotus 123 PowerPoint 2000 Windows XP Netscape
12
Which of the following four activities is normally carried out last as part of a Systems Development process? Design Programming Testing Analysis
13
Which of the following statements about the Internet is TRUE? The Internet is a global network that links many computer networks together The Internet is a private company network The Internet is a visual representation of linked documents The Internet is a network operating system
14
What is an ISP? Integrated Standard Provider Integrated Services Protocol Internet Service Provider Internet Services Protocol
15
What type of computer application would be used in a hospital to maintain patient medical details? A desktop publishing application A database application An accounting application A presentation application
16
Which of the following is a use of the Internet in the home? Managing household accounts Formatting a disk Electronic mail (e-mail) Creating a database
17
If you were working from home, what software application could be used to communicate directly with colleagues and customers? Presentation Electronic mail (e-mail) Database Spreadsheet
18
Which of the following practises helps create a good ergonomic working environment? Protecting computer monitors from reflections and glare by correct positioning Taking infrequent breaks away from the computer Keeping the office cold and using low overhead lighting Use of non-adjustable chairs when working with computers
19
Why is it necessary for an organisation to adopt a good password policy? To allow easy sharing of files across the company network To make it easier for the computer to connect to a network To protect files against unauthorised use To make it easier to find files on a computer
20
Which of the following can be an advantage of electronic documents? They can never be lost They can always be e-mailed regardless of size They can reduce the usage of paper They can never be copied
21
Which of the following devices is suitable for backing up data from a networked file server? Modem Hard Drive Plotter Scanner
22
Which of the following activities could lead to the spread of a computer virus? Using floppy disks from unknown sources to exchange data Using a standalone computer to output a hard copy letter Using retail software that has been checked for viruses Using a Graphical User Interface (GUI)
23
An End User Licence Agreement: Is a form of advertising between a software application author or publisher and the user Gives the user the exclusive right to copy and sell the software to other potential users Grants ownership of the software to the user of the software Is a legal contract between a software application author or publisher and the user with regard to terms of distribution, resale and restricted used
24
What is the second stage of systems development? Analysis Testing Programming Design
25
Which of the following components is found inside the CPU? CM (Compact Memory) ALT (Alignment Lever Techniques) CRT (Current Resistor Transmitter) ALU (Arithmetic Logic Unit)
26
Which of the following printers the least expensive in the long run? Dot Matrix Laser Printer Inkjet Printer