Quotations about Computers

A picture is worth a thousand words but it takes 3,000 times the disk space. ~Author Unknown

Quotations about Computers

Treat your password like your toothbrush. Don't let anybody else use it, and get a new one every six months. ~Clifford Stoll

Quotations about Computers

Computing is not about computers any more. It is about living. ~Nicholas Negroponte

Quotations about Computers

Computers have lots of memory but no imagination. ~Author Unknown

Quotations about Computers

Hardware: the parts of a computer that can be kicked. ~Jeff Pesis

Showing posts with label Exam. Show all posts
Showing posts with label Exam. Show all posts

Thursday, October 24, 2013

ICDL exam - ICT EXAM 3

ICDL exam - ICT EXAMS



أمتحانات ICDL  - أمتحانات ICT


ICDL exam - ICT EXAMS,أمتحانات ICDL  - أمتحانات ICT

أمتحانات ICT  بدون الحل 
1-Which one of the following types of computer is most likely to be used by a travelling salesman?


A.    A desktop computer.
B.     A tablet PC.
C.     A server.
D.    A laptop.
2-Which one of the following is a term for systems used to store, retrieve, process and transmit data?
A.    Internet & Communication Technologies.
B.     Internet & Information technologies.
C.     Information & Communication technologies.
D.    Information & Computer technologies.
3-Which one of the following measures the speed of the CPU?
A.    Gigahertz (GHz).
B.     Bits per second (Bps).
C.     Gigabytes (GB).
D.    Megabytes (MB).
4-Which one of the following is a term for an audio or video recording posted on a web site that can be downloaded and played later?
A.    Podcast.
B.     Blog.
C.     VoIP.
D.    RSS Feed.
5-Which one of the following describes a computer's operating system?
A.    Software that can retrieve information from a database.
B.     Hardware that can scan and convert photographs into digital files.
C.     Software that controls the allocation and usage of hardware.
D.    Hardware that can record and send images across the Internet.
6-Which one of the following types of software would you most likely use to
create a letter?



A.    Web browsing software.
B.     Spreadsheet software.
C.     Accounting software.
D.    Word processing software.
7-The computers in your office building are connected together so staff can
share files and printers. What is this arrangement of computers called?

The Internet.

A.    A Local Area Network.
B.     The World Wide Web.
C.     A network port.
8-Which one of the following is a private network that allows specified external user's access?
A.    Intranet.
B.     WorldNets.
C.     Internet.
D.    Extranet.
9-Which one of the following devices do you need to be able to communicate
with other computers using the telephone network?

A.    CD-ROM.
B.     Modem.
C.     Printer.
D.    Speakers
10-Which one of the following is a software application that assists users who are visually impaired to identify and interpret what is displayed on screen?
A.    A screen calendar.
B.     A word processor.
C.     A screen reader.
D.    A web log.
11-Which one of the following is a common feature of e-learning?
A.    Always requires physical class attendance.
B.     Cannot download documents for later reading.
C.     Learning is self-paced.
D.    Travel time and costs are very high.
12-Which one of the following is NOT a feature of electronic commerce?
A.    Goods can be advertised and prices compared.
B.     There is physical contact between buyer and seller.
C.     Transactions can be processed quickly.
D.    Services are available 24 hours a day.
13-Which one of the following is the best way to maintain a good posture?
A.    Ensure your computer is in a well-lit area
B.     Make sure that there are no cables on the floor
C.     Make sure that your computer is using a fast processor.
D.    Make sure that your computer; desk and chair are positioned correctly.
14-Which one of the following statements describes a good approach to
information security for an organisation?

A.    There are no procedures for reporting security lapses.
B.     Staff passwords are not changed regularly.
C.     Sensitive data is available to everyone that requests it.
D.    Keeping an off-site backup of all files.
15-Which one of the following is a good password policy for an organisation?
A.    All passwords are changed regularly.
B.     All passwords are never changed.
C.     All passwords are made up of less than four characters.
D.    All passwords are made up of less than four numbers.
16-Which one of the following is the best way to protect a computer against computer viruses?
A.    Only virus-check e-mail attachments.
B.     Update antivirus software on a regular basis.
C.     Always make sure that the operating system is up to date.
D.    Only download files from the Internet during business hours.
17-Which one of the following statements describes shareware?
A.    Totally free software that is available only on the Internet.
B.     Commercial based software that must be paid for.
C.     Software available for free on a trial basis after which payment will be required.
D.    Copyright free software that allows unlimited copies and distribution.
There are rules governing the rights of a data subject and the responsibilities of a data controller. 18-What are these rules called?
A.    Data Privacy Policy.
B.     Data Management Act.
C.     Data Protection legislation or conventions.
D.    Data Publicity Law.
19-Which one of the following is an example of hardware?
A.    An antivirus program.
B.     A spreadsheet application.
C.     A mouse.
D.    The World Wide Web.
20-Which one of the following would improve computer performance?
A.    Using a larger monitor.
B.     Increasing the number of applications running.
C.     Using a faster printer.
D.    Increasing the size of RAM.
21-Which one of the following is NOT a function of the Central Processing Unit?
A.    Executing program instructions.
B.     Ensuring program instructions are executed in the correct sequence.
C.     Sending e-mail.
D.    Carrying out calculations.
22-Which one of the following is both an input and output device?
A.    Touchscreen.
B.     Keyboard.
C.     Printer.
D.    Scanner
23-Which one of the following is a method of publishing frequently updated content such as news headlines online?
A.    A Blog.
B.     RSS.
C.     A Podcast.
D.    Instant messaging
24-Which one of the following is an example of an operating system?
A.    iTunes.
B.     PowerPoint.
C.     Windows.
D.    Netscape.
25-Which one of the following is considered good environmental practice?
A.    Using a slow computer.
B.     Printing on both sides of a page.
C.     Using up to date software.
D.    Backing up data on a regular basis.
26-Which one of the following statements about the Internet is TRUE?
A.    The Internet is a global network that links many computer networks together.
B.     The Internet is a private company network.
C.     The Internet is a visual representation of linked documents.
D.    The Internet is a network operating system.
27-Which one of the following is an input/output port?
A.    Linear.
B.     Radial.
C.     Lateral.
D.    FireWire.
28-Which one of the following is an advantage of teleworking?
A.    Long commuting times.
B.     Flexible schedules.
C.     Less emphasis on teamwork.
D.    Lack of human contact.
29-Which one of the following is a characteristic of broadband?
A.    Completely safe from intruders.
B.     It has a dial up connection.
C.     High speed.
D.    Cost can vary from day to day.
30-Which one of the following is a text-based communication between two or more people over the Internet?
A.    Podcasting.
B.     Really Simple Syndication.
C.     Voice over Internet Protocol.
D.    Instant Messaging.
31-Which one of the following practices helps create a good ergonomic working environment?
A.    Protecting computer monitors from reflections and glare by correct positioning.
B.     Taking very few breaks away from the computer.
C.     Keeping the office cold and using low overhead lighting.
D.    Use of non-adjustable chairs when working with computers.
32-Why is it necessary for an organisation to adopt a good password policy?
A.    To allow easy sharing of files across the company network.
B.     To make it easier for the computer to connect to a network.
C.     To protect files against unauthorized use.
D.    To make it easier to find files on a computer
33-Which one of the following is a way to prevent the theft of data from a computer?
A.    Use an up to date anti-virus program.
B.     Back up data on a regular basis.
C.     Remove the monitor when not in use.
D.    Set up a username and password.
34-Which one of the following should be carried out to safeguard files from loss in case the main copy is damaged?
A.    Backup files to a new location on your computer.
B.     Install password security.
C.     Backup the files regularly and store offsite.
D.    Install a firewall.
35-Which one of the following could allow a virus to enter a computer?
A.    Downloading files from the Internet onto the computer.
B.     Connecting the computer to a new printer.
C.     Running a virus scan on the computer.
D.    Setting the computer monitor to a low resolution.
36-Which one of the following statements about an End User License Agreement is true?
  A.    It gives full ownership of the software to the user of the software.

              B.     It gives the user the exclusive right to copy and sell the software to other potential users.
              C.     It gives the user the right to modify the software.
              D.    It gives the user the right to install and run the software on a specified number of computers.

Sunday, October 6, 2013

ICDL exam - ICT EXAM 2

ICDL exam - ICT EXAMS


أمتحانات ICDL  - أمتحانات ICT


ICDL exam - ICT EXAMS,أمتحانات ICDL  - أمتحانات ICT



أمتحانات ICT  مع الحل (الامتحان الثانى)
1)     Which one of the following would be described as software?     
a. Internet browser.
b. Printer.
c. Monitor.
d. Keyboard.
2)     Which one of the following would be most used by someone who travels by train to work in various locations?     
a. Scanner.
b. Printer.
c. Laptop.
d. Desktop.
3)     A laptop is most likely to have which one of the following input devices fitted as standard?     
a. Scanner.
b. Joystick.
c. Mouse.
d. Touchpad.
4)     Which one of the following is the CPU in a computer?      
a. Calculating Process Unit.
b. Control Program Unit.
c. Control Process Unit.
d. Central Processing Unit.
5)     Which one of the following is most likely to improve the performance of the computer?    
a. Increasing the number of applications running simultaneously.
b. Increasing the size of the computer monitor being used.
c. Increasing the amount of RAM being used.
d. Attaching a bigger printer.
6)     Which one of the following statements about Read Only Memory is true?                  
a. Application programs can write data to ROM.
b. The contents of ROM are not deleted when the computer is switched off.
c. Internet pages are stored in ROM while they are being loaded.
d. The contents of ROM are deleted when the computer is switched off.
7)     Which one of the following describes Instant Messaging (IM)?   
a. A Web feed format used to publish frequently updated news headlines, in a standardized format.
b. Technology that enables the delivery of telephone conversations over the Internet.
c. Real-time text-based communication between two or more people over the Internet.
d. A frequently updated journal or diary often hosted by a third party on the Internet.
8)     Which one of the following describes uploading files?     
a. Transferring data from a personal computer to a web server.
b. Copying a free image from a web page.
c. Transferring data from a web server to a personal computer.
d. Saving a Webpage from the Internet to a personal computer.
9)     Which one of the following describes Windows 7?
a. A database application.
b. An anti-virus scanner.
c. A backup utility.
d. An operating system.
10)  Which one of the following is a software application that helps users with a physical disability to enter characters on a PC?    
a. A screen reader.
b. An on-screen keyboard.
c. A screen magnifier.
d. A screen saver.
11)  Which one of the following can be used to both input and output information?        
a. Touchscreen.
b. Monitor.
c. Keyboard.
d. Mouse.
12)  Which one of the following is a kilobyte?       
a. 1,000,000 bytes.
b. 1000 bytes.
c. 1024 bits.
d. 1024 bytes.
13)  Which one of the following is a storage medium?   
a. CPU.
b. USB Flash Drive.
c. Trackball.
d. Stylus.
14)  Which one of the following government services would most likely be provided over the Internet?           
a. Waste Collection.
b. Online Tax enquiries.
c. Prison Service.
d. Marriage Registration.
15)  Which type of software controls the allocation of resources and software on the computer?    
a. Operating system software.
b. Utility software.
c. Browser software.
d. Security software.
16)  Which one of the following would require the use of a database application?
a. Design a cover for a new magazine.
b. Compose a standard letter for a mail shot.
c. Record details of staff training courses.
d. Calculate a budget for a new project.
17)  Which one of the following describes an audio or video recording posted on a website that can be downloaded and played later?     
a. An RSS feed.
b. A broadcast.
c. A web log.
d. A podcast.
18)  Which one of the following would be a typical file size for a 2-paged word processed letter?     
a. 30 bits
b. 100 bytes
c. 30 kilobytes
d. 1 megabyte
19)  Which one of the following is the delivery of training or education programs by electronic means? 
a. E-learning.
b. E-college.
c. E-teaching.
d. E-school.
20)  Which one of the following virtual communities normally allows sharing of photos and video clips?     
a. Internet chat rooms.
b. Internet forums.
c. Social networking websites.
d. Online computer games.
21)  Which one of the following statements about Internet connection services is true?
a. Dial-up connections are always-on while your computer is switched on.
b. Dial-up connections do not stop you from using your telephone line to make calls.
c. Broadband services allow you to share a single connection with more than one computer.
d. Broadband services usually are slower than dial-up connections.
22)  Which one of the following is safe to post on a social networking website?               
a. A personal telephone number.
b. A home address.
c. Hobbies.
d. A school or work-place address.
23)  Which one of the following is commonly used to connect computers in the Italian and English offices of a multinational company?     
a. The World Wide Web.
b. A local area network.
c. A wide area network.
d. A wireless local area network.
24)  Which one of the following terms commonly refers to a network where one computer provides shared resources to other computers?
a. Server / Client.
b. Client / User.
c. Client / Server.
d. Server / Provider.
25)  Which one of the following describes RSS (Really Simple Syndication)?        
a. A radio program posted on a website that can be downloaded and played later.
b. A Web feed format used to publish frequently updated content such as blog entries, news headlines or podcasts.
c. An online journal where an author posts comments and observations in chronological order.
d. Real-time text-based communication between two or more people over a network such as the Internet.
26)  Which one of the following commonly describes an Intranet?    
a. a network of a maximum of 3 computers.
b. a private company network.
c. only used in the home.
d. a worldwide network of computers.
27)  Which one of the following is an advantage of teleworking?       
a. More emphasis on teamwork.
b. Allows only fixed working hours.
c. Allows flexible working hours.
d. Never a need to use a computer or telephone.
28)  Which one of the following usually causes RSI?     
a. Viewing a monitor that has a lot of glare and reflections.
b. Working where there is inadequate lighting and ventilation.
c. Using a chair without arms.
d. Typing for a long period of time without breaks.
29)  Which one of the following can help maintain a good posture when sitting in front of a computer?       
a. Using a low level of lighting.
b. Sitting close to the computer monitor.
c. Correctly positioning the computer, desk and seat.
d. Recycling printer cartridges.
30)  Which one of the following is a harmful software program that can generate copies of it and spread throughout a computer system?
a. An operating system.
b. An application system.
c. A computer virus.
d. A web log.
31)  Which one of the following activities could lead to the spread of a computer virus?
a. Using only software that has been checked for viruses.
b. Maintaining regularly updated antivirus software.
c. Opening only virus-checked file attachments from known sources.
d. Using a CD from an unknown source to exchange data.
32)  Which one of the following is a feature of software copyright?   
a. It denies the rights of the software author.
b. It recognises the rights of the software author.
c. It makes software freeware.
d. It encourages software piracy.
33)  How does copyright relate to stories downloaded from a national newspaper’s web site?     
a. Copyright never applies to stories downloaded.
b. Full copyright applies to stories downloaded.
c. Copyright applies for one month from download date.
d. Only part of copyright applies to stories downloaded.
34)  What is the best way to protect a computer against data loss?   
a. Lock the computer when it is not being used.
b. Change your password regularly.
c. Delete archive files each month.
d. Make regular backups of data to a removable storage device.
35)  Which one of the following is the reason that users should log on with a username and password?       
a. To be aware of who is in the building.
b. To check up on the time-keeping of users.
c. To protect computers on a network against unauthorized use.
d. To enable a personalized greeting for each user.
36)  Which one of the following best describes the purpose of Data protection legislation?      
a. To give computer owners the right to protect themselves against computer fraud.
b. To give software owners the right to promote software copyright.
c. To give governments the right to control data access on the Internet.
d. To give a right to individuals to establish the existence of personal data.