You are on page 1of 5

ECDL-tests.

com ECDL Module 1 Sample Test

The following sample test for Module 1, Concepts of Information and Communication
Technology (ICT), contains 36 multiple-choice questions. Attempt each of the 36 questions.
Each question has one correct answer.
Enter A, B, C, or D in answer.doc in the space for question number.

1. Which one of the following measures the speed of the CPU?


a. Gigahertz (GHz).
b. Bits per second (Bps).
c. Gigabytes (GB).
d. Megabytes (MB).

2. Which one of the following describes a computer’s operating system?


a. Software that can retrieve information from a database.
b. Hardware that can scan and convert photographs into digital files.
c. Software that controls the allocation and usage of hardware.
d. Hardware that can record and send images across the Internet.

3. Which one of the following describes spam?


a. Gathering information about a person or organisation without their knowledge.
b. Performing an unauthorised, usually malicious, action such as erasing files.
c. Putting unnecessary load on the network by making copies of files.
d. Sending unwanted bulk messages.

4. Which one of the following could lead to the spread of a malicious program?
a. Using only software that has been checked for viruses.
b. Maintaining regularly updated anti-virus software.
c. Opening only virus-checked file attachments from known sources.
d. Using a USB Flash Drive from an unknown source to exchange data.

5. Which one of the following protects a computer from the risk of malicious programs?
a. PC diagnostic software.
b. Web tracking software.
c. Anti-spam software.
d. Anti-spyware software.

6. Which one of the following describes why it is important to update antivirus software
regularly?
a. To ensure the software identifies old viruses.
b. To protect your computer from all known viruses.
c. To protect your computer from unwanted bulk messages.
d. To prevent the spread of malicious programs on the Internet.

7. Which one of the following is a term for an audio or video recording posted on a web site
that can be downloaded and played later?
a. Podcast.
b. Blog.
c. VoIP.
d. RSS Feed.

8. Which one of the following types of software would you most likely use to create a letter?
a. Web browsing software.
ECDL-tests.com ECDL Module 1 Sample Test

b. Spreadsheet software.
c. Accounting software.
d. Word processing software.

9. Which one of the following describes a computer hacker?


a. A skilled programmer who uses authorised access to exploit information
available on a computer.
b. A skilled programmer who secretly invades computers without authorisation.
c. A skilled programmer who writes programs to train new employees.
d. A skilled programmer who helps in the installation of new software for an
organisation.

10. The computers in your office building are connected together so staff can share files and
printers. What is this arrangement of computers called?
a. The Internet.
b. A Local Area Network.
c. The World Wide Web.
d. A network port.

11. Which of the following systems will help to improve communications within the company?
a. Excel
b. Powerpoint
c. Email
d. Solitaire

12. Which of the following is NOT an input device?


a. Monitor
b. Mouse
c. Keyboard
d. Scanner

13. Which one of the following is a private network that allows specified external users
access?
a. Intranet.
b. WorldNets.
c. Internet.
d. Extranet.

14. Which one of the following is a software application that assists users who are visually
impaired to identify and interpret what is displayed on screen?
a. A screen calendar.
b. A word processor.
c. A screen reader.
d. A web log.

15. Which one of the following describes why firewalls are used?
a. To prevent unauthorised access by incoming transmissions.
b. To prevent destruction of a computer in the event of a fire.
c. To enable easy downloading of data from web sites.
d. To detect and disable viruses already on a computer.

16. Which one of the following is MOST likely to be a hoax?


ECDL-tests.com ECDL Module 1 Sample Test

a. An email from a friend you have not seen recently.


b. An email with an attachment sent by a colleague using their personal email
address.
c. An email asking you to go to a website for a free computer scan.
d. An email advertisement from a local shop you subscribe to.

17. Which one of the following is NOT a feature of electronic commerce?


a. Goods can be advertised and prices compared.
b. There is physical contact between buyer and seller.
c. Transactions can be processed quickly.
d. Services are available 24 hours a day.

18. Which one of the following is the reason that users should log on with a username and
password?
a. To be aware of who is in the building.
b. To check up on the time-keeping of users.
c. To protect computers against unauthorised use.
d. To enable a personalised greeting for each user.

19. Which one of the following statements about a password is TRUE?


a. It must be changed only if it is compromised.
b. It cannot contain special character symbols.
c. It should be changed regularly.
d. It must be registered with the system administrator.

20. Which one of the following statements describes a good approach to information security
for an organisation?
a. There are no procedures for reporting security lapses.
b. Staff passwords are not changed regularly.
c. Sensitive data is available to everyone that requests it.
d. Keeping an off-site backup of all files.

21. Which one of the following is the best way to protect a computer against computer
viruses?
a. Only virus-check e-mail attachments.
b. pdate antivirus software on a regular basis.
c. Always make sure that the operating system is up to date.
d. UOnly download files from the Internet during business hours.

22. Which one of the following would be considered the BEST way to store a PIN number?
a. Keep a written note of it with you bank cards.
b. Store it on your computer.
c. Memorise it.
d. Keep a written note of it in your office drawer.

23. Which one of the following describes why users should lock their computer when leaving
their desk?
a. To prevent a waste of electricity.
b. To prevent unauthorised access to data.
c. To prevent data from getting corrupted.
d. To prevent the computer from malfunctioning.
ECDL-tests.com ECDL Module 1 Sample Test

24. There are rules governing the rights of a data subject and the responsibilities of a data
controller. What are these rules called?
a. Data Privacy Policy.
b. Data Management Act.
c. Data Protection legislation or conventions.
d. Data Publicity Law.

25. Which one of the following is an example of an operating system


a. iTunes.
b. PowerPoint.
c. Windows.
d. Netscape.

26. Which one of the following is unsafe online activity?


a. Giving your home address to someone you met in a chat room.
b. Using a screen name or nick name that cannot identify you.
c. Meeting someone you met online face-to-face in the company of your parents.
d. Keeping your social network profile private.

27. Which one of the following describes how confidential information should be sent using
an unsecured network?
a. In an unsigned email.
b. In an attachment.
c. In a compressed format.
d. In an encrypted format.

28. Which one of the following statements about the Internet is TRUE? [1 Mark]
a. The Internet is a global network that links many computer networks together.
b. The Internet is a private company network.
c. The Internet is a visual representation of linked documents.
d. The Internet is a network operating system.

29. Which one of the following is an input/output port?


a. Linear.
b. Radial.
c. Lateral.
d. FireWire.

30. Which one of the following describes Bluetooth?


a. Short-range wired protocol for exchanging data.
b. Short-range wireless protocol for exchanging data.
c. Long-range wireless protocol for exchanging data.
d. Long-range wired protocol for exchanging data.

31. Which one of the following describes why Bluetooth device settings should be adjusted?
a. To increase the range of the device.
b. To improve the quality of reception.
c. To prevent the risk of unauthorised access.
d. To reduce interference from other devices.
ECDL-tests.com ECDL Module 1 Sample Test

32. Which one of the following would result in the loss of contact details if it were stolen?
a. Printer.
b. Mobile Phone.
c. Modem.
d. MP3.

33. Which one of the following is a characteristic of broadband?


a. Completely safe from intruders.
b. It has a dial up connection.
c. High speed.
d. Cost can vary from day to day.

34. Which one of the following is a text-based communication between two or more people
over the Internet?
a. Podcasting.
b. Really Simple Syndication.
c. Voice over Internet Protocol.
d. Instant Messaging.

35. Which one of the following describes how a breach in IT security should be reported?
a. Using the telephone.
b. By emailing to the IT Manager.
c. Using the method listed in the organisation’s security policy.
d. Using any means of communication.

36. Which one of the following describes why it is important to have a secure off-site backup
copy of files?
a. To improve accessible of files from other locations.
b. To speed up the process of accessing the files at any time.
c. To prevent the loss of data in the event of a fire.
d. To reduce the possibility of data theft.

You might also like