ICDL exam - ICT EXAMS
أمتحانات ICDL - أمتحانات ICT
أمتحانات ICT مع الحل (الامتحان الثانى)
1)
Which one of the
following would be described as software?
a. Internet
browser.
b. Printer.
c. Monitor.
d. Keyboard.
2)
Which one of the
following would be most used by someone who travels by train to work in various
locations?
a. Scanner.
b. Printer.
c. Laptop.
d. Desktop.
3)
A laptop is most likely
to have which one of the following input devices fitted as standard?
a. Scanner.
b. Joystick.
c. Mouse.
d. Touchpad.
4)
Which one of the
following is the CPU in a computer?
a. Calculating
Process Unit.
b. Control Program
Unit.
c. Control Process
Unit.
d. Central
Processing Unit.
5)
Which one of the
following is most likely to improve the performance of the computer?
a. Increasing the
number of applications running simultaneously.
b. Increasing the
size of the computer monitor being used.
c. Increasing
the amount of RAM being used.
d. Attaching a
bigger printer.
6)
Which one of the
following statements about Read Only Memory is true?
a. Application
programs can write data to ROM.
b. The
contents of ROM are not deleted when the computer is switched off.
c. Internet pages
are stored in ROM while they are being loaded.
d. The contents of
ROM are deleted when the computer is switched off.
7)
Which one of the
following describes Instant Messaging (IM)?
a. A Web feed format
used to publish frequently updated news headlines, in a standardized format.
b. Technology that
enables the delivery of telephone conversations over the Internet.
c. Real-time
text-based communication between two or more people over the Internet.
d. A frequently
updated journal or diary often hosted by a third party on the Internet.
8)
Which one of the
following describes uploading files?
a. Transferring
data from a personal computer to a web server.
b. Copying a free
image from a web page.
c. Transferring data
from a web server to a personal computer.
d. Saving a Webpage
from the Internet to a personal computer.
9)
Which one of the
following describes Windows 7?
a. A database
application.
b. An anti-virus
scanner.
c. A backup utility.
d. An
operating system.
10)
Which one of the
following is a software application that helps users with a physical disability
to enter characters on a PC?
a. A screen reader.
b. An
on-screen keyboard.
c. A screen
magnifier.
d. A screen saver.
11)
Which one of the
following can be used to both input and output information?
a. Touchscreen.
b. Monitor.
c. Keyboard.
d. Mouse.
12)
Which one of the
following is a kilobyte?
a. 1,000,000 bytes.
b. 1000 bytes.
c. 1024 bits.
d. 1024
bytes.
13)
Which one of the
following is a storage medium?
a. CPU.
b. USB
Flash Drive.
c. Trackball.
d. Stylus.
14)
Which one of the
following government services would most likely be provided over the Internet?
a. Waste Collection.
b. Online
Tax enquiries.
c. Prison Service.
d. Marriage
Registration.
15)
Which type of
software controls the allocation of resources and software on the computer?
a. Operating
system software.
b. Utility software.
c. Browser software.
d. Security software.
16)
Which one of the
following would require the use of a database application?
a. Design a cover
for a new magazine.
b. Compose a
standard letter for a mail shot.
c. Record
details of staff training courses.
d. Calculate a
budget for a new project.
17)
Which one of the
following describes an audio or video recording posted on a website that can be
downloaded and played later?
a. An RSS
feed.
b. A
broadcast.
c. A web
log.
d. A
podcast.
18)
Which one of the
following would be a typical file size for a 2-paged word processed letter?
a. 30 bits
b. 100 bytes
c. 30
kilobytes
d. 1 megabyte
19)
Which one of the
following is the delivery of training or education programs by electronic means?
a.
E-learning.
b. E-college.
c. E-teaching.
d. E-school.
20)
Which one of the
following virtual communities normally allows sharing of photos and video clips?
a. Internet chat
rooms.
b. Internet forums.
c. Social
networking websites.
d. Online computer
games.
21)
Which one of the
following statements about Internet connection services is true?
a. Dial-up
connections are always-on while your computer is switched on.
b. Dial-up
connections do not stop you from using your telephone line to make calls.
c. Broadband
services allow you to share a single connection with more than one computer.
d. Broadband
services usually are slower than dial-up connections.
22)
Which one of the
following is safe to post on a social networking website?
a. A personal
telephone number.
b. A home address.
c. Hobbies.
d. A school or
work-place address.
23)
Which one of the
following is commonly used to connect computers in the Italian and English
offices of a multinational company?
a. The World Wide
Web.
b. A local area network.
c. A
wide area network.
d. A wireless local
area network.
24)
Which one of the
following terms commonly refers to a network where one computer provides shared
resources to other computers?
a.
Server / Client.
b.
Client / User.
c. Client
/ Server.
d. Server / Provider.
25)
Which one of the
following describes RSS (Really Simple Syndication)?
a. A radio program
posted on a website that can be downloaded and played later.
b. A
Web feed format used to publish frequently updated content such as blog entries,
news headlines or podcasts.
c. An online journal
where an author posts comments and observations in chronological order.
d. Real-time
text-based communication between two or more people over a network such as the
Internet.
26)
Which one of the following
commonly describes an Intranet?
a. a network of a
maximum of 3 computers.
b. a
private company network.
c. only used in the
home.
d. a worldwide
network of computers.
27)
Which one of the
following is an advantage of teleworking?
a. More emphasis on teamwork.
b. Allows only fixed
working hours.
c. Allows
flexible working hours.
d. Never a need to
use a computer or telephone.
28)
Which one of the
following usually causes RSI?
a. Viewing a monitor
that has a lot of glare and reflections.
b. Working where
there is inadequate lighting and ventilation.
c. Using a chair
without arms.
d. Typing
for a long period of time without breaks.
29)
Which one of the
following can help maintain a good posture when sitting in front of a computer?
a. Using a low level
of lighting.
b. Sitting close to
the computer monitor.
c. Correctly
positioning the computer, desk and seat.
d. Recycling printer
cartridges.
30)
Which one of the
following is a harmful software program that can generate copies of it and
spread throughout a computer system?
a. An operating
system.
b. An application
system.
c. A
computer virus.
d. A web log.
31)
Which one of the
following activities could lead to the spread of a computer virus?
a. Using only software
that has been checked for viruses.
b. Maintaining
regularly updated antivirus software.
c. Opening only virus-checked
file attachments from known sources.
d.
Using a CD from an unknown source to exchange data.
32)
Which one of the
following is a feature of software copyright?
a. It denies the
rights of the software author.
b. It
recognises the rights of the software author.
c. It makes software
freeware.
d. It encourages
software piracy.
33)
How does copyright
relate to stories downloaded from a national newspaper’s web site?
a. Copyright never
applies to stories downloaded.
b. Full
copyright applies to stories downloaded.
c. Copyright applies
for one month from download date.
d. Only part of
copyright applies to stories downloaded.
34)
What is the best way
to protect a computer against data loss?
a. Lock the computer
when it is not being used.
b. Change your
password regularly.
c. Delete archive
files each month.
d. Make
regular backups of data to a removable storage device.
35)
Which one of the
following is the reason that users should log on with a username and password?
a. To be aware of
who is in the building.
b. To check up on
the time-keeping of users.
c. To
protect computers on a network against unauthorized use.
d. To enable a
personalized greeting for each user.
36)
Which one of the
following best describes the purpose of Data protection legislation?
a. To give computer
owners the right to protect themselves against computer fraud.
b. To give software
owners the right to promote software copyright.
c. To give
governments the right to control data access on the Internet.
d. To
give a right to individuals to establish the existence of personal data.
0 comments:
Post a Comment