SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
BCS IT User – Syllabus Version 1.0 – Sample Test


                             Security for IT Users - Level 1
                          Version SampleMQTB/1.0/SI1/v1.1


                               SAMPLE TEST
There are 36 questions in this test.
Each question has only one correct answer: A, B, C or D.
You have 45 minutes to complete them.



       Tasks.                                                                       Marks.

       On your Learner Drive, find and open the answerfile.doc document.
       Enter your name in the space provided.
       Use this document to record your answers to the relevant questions.

1.     Which one of the following describes spam?                                   [1 Mark].
                A. Gathering information about a person or organisation without
                   their knowledge.
                B. Performing an unauthorised, usually malicious, action such
                   as erasing files.
                C. Putting unnecessary load on the network by making copies
                   of files.
                D. Sending unwanted bulk messages.
       Enter A, B, C, or D in answerfile.doc in the space for question 1.

2.     Which one of the following can protect a computer from the risk of           [1 Mark].
       unwanted emails?
                A. Anti-spam software.
                B. Anti-virus software.
                C. Anti-spyware software.
                D. PC diagnostic software.
       Enter A, B, C, or D in answerfile.doc in the space for question 2.



SampleMQTB/1.0/SI1/v1.1                   SAMPLE TEST                             Page 1 of 10
© British Computer Society
3.     Which one of the following could lead to the spread of a malicious           [1 Mark].
       program?
             A. Using only software that has been checked for viruses.
             B. Maintaining regularly updated anti-virus software.
             C. Opening only virus-checked file attachments from known
                sources.
             D. Using a USB Flash Drive from an unknown source to
                exchange data.
       Enter A, B, C, or D in answerfile.doc in the space for question 3.

4.     Which one of the following protects a computer from the risk of              [1 Mark].
       malicious programs?
             A. PC diagnostic software.
             B. Web tracking software.
             C. Anti-spam software.
             D. Anti-spyware software.
       Enter A, B, C, or D in answerfile.doc in the space for question 4.

5.     Which one of the following describes why it is important to update anti-     [1 Mark].
       virus software regularly?
             A. To ensure the software identifies old viruses.
             B. To protect your computer from all known viruses.
             C. To protect your computer from unwanted bulk messages.
             D. To prevent the spread of malicious programs on the Internet.
       Enter A, B, C, or D in answerfile.doc in the space for question 5.
       Save your document keeping the same filename answerfile.doc.

6.     Which one of the following describes what you should do if you receive       [1 Mark].
       a chain letter email?
             A. Forward the email.
             B. Download it onto your system.
             C. Delete the email.
             D. Send a read receipt.
       Enter A, B, C, or D in answerfile.doc in the space for question 6.




SampleMQTB/1.0/SI1/v1.1                 SAMPLE TEST                               Page 2 of 10
© British Computer Society
7.     Which one of the following describes a computer hacker?                      [1 Mark].
             A. A skilled programmer who uses authorised access to exploit
                information available on a computer.
             B. A skilled programmer who secretly invades computers
                without authorisation.
             C. A skilled programmer who writes programs to train new
                employees.
             D. A skilled programmer who helps in the installation of new
                software for an organisation.
       Enter A, B, C, or D in answerfile.doc in the space for question 7.

8.     Which one of the following describes why firewalls are used?                 [1 Mark].
             A. To prevent unauthorised access by incoming transmissions.
             B. To prevent destruction of a computer in the event of a fire.
             C. To enable easy downloading of data from web sites.
             D. To detect and disable viruses already on a computer.
       Enter A, B, C, or D in answerfile.doc in the space for question 8.

9.     Which one of the following is MOST likely to be a hoax?                      [1 Mark].
             A. An email from a friend you have not seen recently.
             B. An email with an attachment sent by a colleague using their
                personal email address.
             C. An email asking you to go to a website for a free computer
                scan.
             D. An email advertisement from a local shop you subscribe to.
       Enter A, B, C, or D in answerfile.doc in the space for question 9.

10.    Which one of the following is the reason that users should log on with a     [1 Mark].
       username and password?
             A. To be aware of who is in the building.
             B. To check up on the time-keeping of users.
             C. To protect computers against unauthorised use.
             D. To enable a personalised greeting for each user.
       Enter A, B, C, or D in answerfile.doc in the space for question 10.
       Save your document keeping the same filename answerfile.doc.




SampleMQTB/1.0/SI1/v1.1                 SAMPLE TEST                               Page 3 of 10
© British Computer Society
11.    Which one of the following statements about a password is TRUE?          [1 Mark].
             A. It must be changed only if it is compromised.
             B. It cannot contain special character symbols.
             C. It should be changed regularly.
             D. It must be registered with the system administrator.
       Enter A, B, C, or D in answerfile.doc in the space for question 11.

12.    Which one of the following should be used to change your password?       [1 Mark].
             A. Internet Explorer.
             B. Anti-virus software.
             C. Control Panel
             D. Windows Firewall.
       Enter A, B, C, or D in answerfile.doc in the space for question 12.

13.    Which one of the following would be considered the BEST way to store     [1 Mark].
       a PIN number?
             A. Keep a written note of it with you bank cards.
             B. Store it on your computer.
             C. Memorise it.
             D. Keep a written note of it in your office drawer.
       Enter A, B, C, or D in answerfile.doc in the space for question 13.

14.    Which one of the following shows respect for confidentiality of          [1 Mark].
       information?
             A. Discussing confidential information over the telephone.
             B. Uploading confidential information to a shared web site.
             C. Emailing confidential information to a colleague.
             D. Disclosing confidential information only to authorised
                individuals.
       Enter A, B, C, or D in answerfile.doc in the space for question 14.




SampleMQTB/1.0/SI1/v1.1                 SAMPLE TEST                           Page 4 of 10
© British Computer Society
15.    Which one of the following describes why users should lock their             [1 Mark].
       computer when leaving their desk?
             A. To prevent a waste of electricity.
             B. To prevent unauthorised access to data.
             C. To prevent data from getting corrupted.
             D. To prevent the computer from malfunctioning.
       Enter A, B, C, or D in answerfile.doc in the space for question 15.
       Save your document keeping the same filename answerfile.doc.

16.    Which one of the following is an example of phishing?                        [1 Mark].
             A. An email warning the recipient of a computer virus threat.
             B. An email directing the recipient to forward the email to
                friends.
             C. An email directing the recipient to enter personal details on a
                fake website.
             D. An email directing the recipient to download an attachment.
       Enter A, B, C, or D in answerfile.doc in the space for question 16.

17.    Which one of the following is unsafe online activity?                        [1 Mark].
             A. Giving your home address to someone you met in a chat
                room.
             B. Using a screen name or nick name that cannot identify you.
             C. Meeting someone you met online face-to-face in the
                company of your parents.
             D. Keeping your social network profile private.
       Enter A, B, C, or D in answerfile.doc in the space for question 17.

18.    Which one of the following describes a public network?                       [1 Mark].
             A. A network where devices outside the network cannot see or
                communicate directly with computers on the network.
             B. A network where devices outside the network can see but
                cannot communicate directly with computers on the network.
             C. A network where devices outside the network can see and
                communicate directly with computers on the network.
             D. A network where devices outside the network cannot see but
                can communicate directly with computers on the network.
       Enter A, B, C, or D in answerfile.doc in the space for question 18.



SampleMQTB/1.0/SI1/v1.1                 SAMPLE TEST                               Page 5 of 10
© British Computer Society
19.    Which one of the following describes how confidential information       [1 Mark].
       should be sent using an unsecured network?
             A. In an unsigned email.
             B. In an attachment.
             C. In a compressed format.
             D. In an encrypted format.
       Enter A, B, C, or D in answerfile.doc in the space for question 19.

20.    Which one of the following statements about wireless networks is        [1 Mark].
       TRUE?
             A. They cannot be intercepted by unknown users.
             B. They limit accessibility to other users.
             C. They limit visibility to other users.
             D. They can be accessible to other users.
       Enter A, B, C, or D in answerfile.doc in the space for question 20.
       Save your document keeping the same filename answerfile.doc.

21.    Which one of the following is the recommended action to prevent the     [1 Mark].
       risk of access to a network by other users?
             A. Disconnect the computer from the network.
             B. Complain to the System Administrator.
             C. Change the computer login password frequently.
             D. Adjust the Internet security settings.
       Enter A, B, C, or D in answerfile.doc in the space for question 21.

22.    Which one of the following describes Bluetooth?                         [1 Mark].
             A. Short-range wired protocol for exchanging data.
             B. Short-range wireless protocol for exchanging data.
             C. Long-range wireless protocol for exchanging data.
             D. Long-range wired protocol for exchanging data.
       Enter A, B, C, or D in answerfile.doc in the space for question 22.




SampleMQTB/1.0/SI1/v1.1                  SAMPLE TEST                         Page 6 of 10
© British Computer Society
23.    Which one of the following describes why Bluetooth device settings          [1 Mark].
       should be adjusted?
              A. To increase the range of the device.
              B. To improve the quality of reception.
              C. To prevent the risk of unauthorised access.
              D. To reduce interference from other devices.
       Enter A, B, C, or D in answerfile.doc in the space for question 23.

24.    Which one of the following would result in the loss of contact details if it [1 Mark].
       were stolen?
              A. Printer.
              B. Mobile Phone.
              C. Modem.
              D. MP3.
       Enter A, B, C, or D in answerfile.doc in the space for question 24.

25.    Which one of the following should you do to ensure that your USB            [1 Mark].
       storage device is kept safe and secure?
              A. Only use it in private surroundings.
              B. Do not access it using a Bluetooth device.
              C. Use firewall software.
              D. Never leave it unattended.
       Enter A, B, C, or D in answerfile.doc in the space for question 25.
       Save your document keeping the same filename answerfile.doc.

26.    Which one of the following departments would usually hold guidelines        [1 Mark].
       and procedures for the secure use of IT within an organisation?
              A. The Marketing Department.
              B. The IT Department.
              C. The Sales Department.
              D. The Finance Department.
       Enter A, B, C, or D in answerfile.doc in the space for question 26.




SampleMQTB/1.0/SI1/v1.1                   SAMPLE TEST                            Page 7 of 10
© British Computer Society
27.    Which one of the following describes why you should follow guidelines       [1 Mark].
       and procedures while using IT resources in an organisation?
             A. To ensure easy access to information on your computer.
             B. To ensure the secure use of IT resources.
             C. To ensure the IT Department is able to monitor all activity.
             D. To ensure the Finance Department is able to monitor the
                costs of IT resources.
       Enter A, B, C, or D in answerfile.doc in the space for question 27.

28.    Which one of the following should you approach if you are unsure of         [1 Mark].
       the IT security procedure to follow when uninstalling an application on
       your computer?
             A. A technically well-informed team member.
             B. The Systems Administrator.
             C. A senior colleague in the Finance Department.
             D. The Maintenance Department.
       Enter A, B, C, or D in answerfile.doc in the space for question 28.

29.    Which one of the following describes how a breach in IT security            [1 Mark].
       should be reported?
             A. Using the telephone.
             B. By emailing to the IT Manager.
             C. Using the method listed in the organisation’s security policy.
             D. Using any means of communication.
       Enter A, B, C, or D in answerfile.doc in the space for question 29.

30.    Which one of the following describes how to find out about an               [1 Mark].
       organisation’s privacy policy?
             A. By reading the office newsletter.
             B. By speaking to the Finance Department.
             C. By speaking to the Sales Department.
             D. By reading the policy in the organisation’s policy manual.
       Enter A, B, C, or D in answerfile.doc in the space for question 30.
       Save your document keeping the same filename answerfile.doc.




SampleMQTB/1.0/SI1/v1.1                 SAMPLE TEST                              Page 8 of 10
© British Computer Society
31.    Which one of the following would prevent the theft of a laptop?          [1 Mark].
             A. Anti-virus software.
             B. A webcam.
             C. Spyware.
             D. A security cable.
       Enter A, B, C, or D in answerfile.doc in the space for question 31.

32.    Which one of the following could be the unexpected outcome of            [1 Mark].
       deleting a large group of files?
             A. The files would be hidden.
             B. An important file may be accidentally deleted.
             C. The files would become read-only.
             D. A delete file confirmation window may appear.
       Enter A, B, C, or D in answerfile.doc in the space for question 32.

33.    Which one of the following would NOT happen if a computer suddenly       [1 Mark].
       malfunctions?
             A. The operating system will fail.
             B. Files saved on the hard drive will be lost.
             C. All off-site backups will be lost.
             D. Some software may have to be reinstalled.
       Enter A, B, C, or D in answerfile.doc in the space for question 33.

34.    Which one of the following should you use to backup personal data?       [1 Mark].
             A. A labelled CD.
             B. A printout.
             C. A website offering a file sharing service.
             D. A friend’s computer.
       Enter A, B, C, or D in answerfile.doc in the space for question 34.

35.    Which one of the following describes why it is important to have a       [1 Mark].
       secure off-site backup copy of files?
             A. To improve accessible of files from other locations.
             B. To speed up the process of accessing the files at any time.
             C. To prevent the loss of data in the event of a fire.
             D. To reduce the possibility of data theft.
       Enter A, B, C, or D in answerfile.doc in the space for question 35.
SampleMQTB/1.0/SI1/v1.1                  SAMPLE TEST                          Page 9 of 10
© British Computer Society
36.    Which one of the following describes how software can be stored          [1 Mark].
       safely?
             A. Storing it in a place free of magnetic fields.
             B. Storing it in a cupboard.
             C. Storing backups of the software.
             D. Storing it in its original packing.
       Enter A, B, C, or D in answerfile.doc in the space for question 36.
       Save and close your document keeping the same filename
       answerfile.doc.
       Close ALL open files and folders.

                                                                  Total Marks       36




                                This is the end of the test.
                   If you have time, check the work you have done.




SampleMQTB/1.0/SI1/v1.1                  SAMPLE TEST                         Page 10 of 10
© British Computer Society

Más contenido relacionado

La actualidad más candente

Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework WorksheetBiscette InfoTech
 
computer-systems-servicing-dll.docx
computer-systems-servicing-dll.docxcomputer-systems-servicing-dll.docx
computer-systems-servicing-dll.docxrochelleogatis1
 
Regional Diagnostic Test ICT-CSS-10.pptx
Regional Diagnostic Test ICT-CSS-10.pptxRegional Diagnostic Test ICT-CSS-10.pptx
Regional Diagnostic Test ICT-CSS-10.pptxMarkJosephFrancisco3
 
أسئلة كمبيوتر جديدة لمسابقة المعلمين ال 30 ألف
أسئلة كمبيوتر جديدة لمسابقة المعلمين ال 30 ألفأسئلة كمبيوتر جديدة لمسابقة المعلمين ال 30 ألف
أسئلة كمبيوتر جديدة لمسابقة المعلمين ال 30 ألفأمنية وجدى
 
جميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصارجميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصارislamtics default
 
Css grade 11 week 3
Css grade 11 week 3Css grade 11 week 3
Css grade 11 week 3Danilo Anos
 
470سؤال حقيقى فى الحاسب الآلى للجميع (1)
470سؤال حقيقى فى الحاسب الآلى للجميع (1)470سؤال حقيقى فى الحاسب الآلى للجميع (1)
470سؤال حقيقى فى الحاسب الآلى للجميع (1)Mohammad Alsaba
 
أسئلة الحاسب-الآلي فى مسابقة المعلمين
أسئلة الحاسب-الآلي فى مسابقة المعلمين أسئلة الحاسب-الآلي فى مسابقة المعلمين
أسئلة الحاسب-الآلي فى مسابقة المعلمين أمنية وجدى
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICTJazzyNF
 
Procedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceProcedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceAlvin Gabejan
 
CSS Basic Competencies
CSS Basic CompetenciesCSS Basic Competencies
CSS Basic CompetenciesJean_SHS DepEd
 
Input output and storage devices activity
Input output and storage devices activityInput output and storage devices activity
Input output and storage devices activityshidabahri
 
Computer literacy
Computer literacyComputer literacy
Computer literacyPaulyn Go
 
GRADE 10 TLE CSS 2nd Quarter.docx
GRADE 10 TLE CSS 2nd Quarter.docxGRADE 10 TLE CSS 2nd Quarter.docx
GRADE 10 TLE CSS 2nd Quarter.docxJeremiahvmacaraeg
 
Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1abbas mohd
 

La actualidad más candente (20)

Output Devices Homework Worksheet
Output Devices Homework WorksheetOutput Devices Homework Worksheet
Output Devices Homework Worksheet
 
confession and anointing
 confession and anointing confession and anointing
confession and anointing
 
computer-systems-servicing-dll.docx
computer-systems-servicing-dll.docxcomputer-systems-servicing-dll.docx
computer-systems-servicing-dll.docx
 
Regional Diagnostic Test ICT-CSS-10.pptx
Regional Diagnostic Test ICT-CSS-10.pptxRegional Diagnostic Test ICT-CSS-10.pptx
Regional Diagnostic Test ICT-CSS-10.pptx
 
أسئلة كمبيوتر جديدة لمسابقة المعلمين ال 30 ألف
أسئلة كمبيوتر جديدة لمسابقة المعلمين ال 30 ألفأسئلة كمبيوتر جديدة لمسابقة المعلمين ال 30 ألف
أسئلة كمبيوتر جديدة لمسابقة المعلمين ال 30 ألف
 
جميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصارجميع اختصارات لوحة المفاتيح 92 اختصار
جميع اختصارات لوحة المفاتيح 92 اختصار
 
Css grade 11 week 3
Css grade 11 week 3Css grade 11 week 3
Css grade 11 week 3
 
Apply quality standared lecture note by aragaw g medhin +251911080316
Apply quality standared  lecture note by aragaw g medhin +251911080316Apply quality standared  lecture note by aragaw g medhin +251911080316
Apply quality standared lecture note by aragaw g medhin +251911080316
 
470سؤال حقيقى فى الحاسب الآلى للجميع (1)
470سؤال حقيقى فى الحاسب الآلى للجميع (1)470سؤال حقيقى فى الحاسب الآلى للجميع (1)
470سؤال حقيقى فى الحاسب الآلى للجميع (1)
 
أسئلة الحاسب-الآلي فى مسابقة المعلمين
أسئلة الحاسب-الآلي فى مسابقة المعلمين أسئلة الحاسب-الآلي فى مسابقة المعلمين
أسئلة الحاسب-الآلي فى مسابقة المعلمين
 
The lord supper
The lord supperThe lord supper
The lord supper
 
computer exam2
computer exam2computer exam2
computer exam2
 
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
[EMPOWERMENT TECHNOLOGIES] - INTRODUCTION TO ICT
 
OHS in CSS Grade 10
OHS in CSS Grade 10OHS in CSS Grade 10
OHS in CSS Grade 10
 
Procedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceProcedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting Maintenance
 
CSS Basic Competencies
CSS Basic CompetenciesCSS Basic Competencies
CSS Basic Competencies
 
Input output and storage devices activity
Input output and storage devices activityInput output and storage devices activity
Input output and storage devices activity
 
Computer literacy
Computer literacyComputer literacy
Computer literacy
 
GRADE 10 TLE CSS 2nd Quarter.docx
GRADE 10 TLE CSS 2nd Quarter.docxGRADE 10 TLE CSS 2nd Quarter.docx
GRADE 10 TLE CSS 2nd Quarter.docx
 
Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1Computer maintenance 1 lesson 1
Computer maintenance 1 lesson 1
 

Similar a Unit 1 sample test

Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_keythinkict
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comVirendra Kumar Dubey
 
Intro To Information Systems
Intro To Information SystemsIntro To Information Systems
Intro To Information SystemsLisa Brown
 
BAM information management unit 31.Sobig.F and MyDoom.A ar.docx
BAM information management unit 31.Sobig.F and MyDoom.A ar.docxBAM information management unit 31.Sobig.F and MyDoom.A ar.docx
BAM information management unit 31.Sobig.F and MyDoom.A ar.docxlascellesjaimie
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)Ejiro Ndifereke
 
CMIT 321 FINAL EXAM
CMIT 321 FINAL EXAMCMIT 321 FINAL EXAM
CMIT 321 FINAL EXAMHamesKellor
 
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxREVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxjoellemurphey
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Siti Salmiah
 
438334418-2nd-Quarter-g12-Css.docx
438334418-2nd-Quarter-g12-Css.docx438334418-2nd-Quarter-g12-Css.docx
438334418-2nd-Quarter-g12-Css.docxJeremiahvmacaraeg
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examgiquickly
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exambubyslyke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final examginistays
 
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Bis 220 final exam  university of phoenix final exams study guide  1 two info...Bis 220 final exam  university of phoenix final exams study guide  1 two info...
Bis 220 final exam university of phoenix final exams study guide 1 two info...Ninna Basley
 
資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)逸 張
 
Revision week
Revision weekRevision week
Revision weekfizahPhd
 
PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxMarkCesarVillanueva
 
Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxsleeperharwell
 

Similar a Unit 1 sample test (20)

Wa
WaWa
Wa
 
Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.comSample paper-po-computer-awareness-2010-www.bankpoclerk.com
Sample paper-po-computer-awareness-2010-www.bankpoclerk.com
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
Intro To Information Systems
Intro To Information SystemsIntro To Information Systems
Intro To Information Systems
 
BAM information management unit 31.Sobig.F and MyDoom.A ar.docx
BAM information management unit 31.Sobig.F and MyDoom.A ar.docxBAM information management unit 31.Sobig.F and MyDoom.A ar.docx
BAM information management unit 31.Sobig.F and MyDoom.A ar.docx
 
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
JSS3 COMPUTER STUDIES EXAMINATION (FIRST TERM)
 
CMIT 321 FINAL EXAM
CMIT 321 FINAL EXAMCMIT 321 FINAL EXAM
CMIT 321 FINAL EXAM
 
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxREVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
 
Set6 ict-question
Set6 ict-questionSet6 ict-question
Set6 ict-question
 
Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3Soalan ict-form-4-midterm-2011-3
Soalan ict-form-4-midterm-2011-3
 
438334418-2nd-Quarter-g12-Css.docx
438334418-2nd-Quarter-g12-Css.docx438334418-2nd-Quarter-g12-Css.docx
438334418-2nd-Quarter-g12-Css.docx
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Bis 220 final exam  university of phoenix final exams study guide  1 two info...Bis 220 final exam  university of phoenix final exams study guide  1 two info...
Bis 220 final exam university of phoenix final exams study guide 1 two info...
 
資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)
 
Revision week
Revision weekRevision week
Revision week
 
PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docx
 
Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docx
 

Último

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 

Último (20)

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 

Unit 1 sample test

  • 1. BCS IT User – Syllabus Version 1.0 – Sample Test Security for IT Users - Level 1 Version SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST There are 36 questions in this test. Each question has only one correct answer: A, B, C or D. You have 45 minutes to complete them. Tasks. Marks. On your Learner Drive, find and open the answerfile.doc document. Enter your name in the space provided. Use this document to record your answers to the relevant questions. 1. Which one of the following describes spam? [1 Mark]. A. Gathering information about a person or organisation without their knowledge. B. Performing an unauthorised, usually malicious, action such as erasing files. C. Putting unnecessary load on the network by making copies of files. D. Sending unwanted bulk messages. Enter A, B, C, or D in answerfile.doc in the space for question 1. 2. Which one of the following can protect a computer from the risk of [1 Mark]. unwanted emails? A. Anti-spam software. B. Anti-virus software. C. Anti-spyware software. D. PC diagnostic software. Enter A, B, C, or D in answerfile.doc in the space for question 2. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 1 of 10 © British Computer Society
  • 2. 3. Which one of the following could lead to the spread of a malicious [1 Mark]. program? A. Using only software that has been checked for viruses. B. Maintaining regularly updated anti-virus software. C. Opening only virus-checked file attachments from known sources. D. Using a USB Flash Drive from an unknown source to exchange data. Enter A, B, C, or D in answerfile.doc in the space for question 3. 4. Which one of the following protects a computer from the risk of [1 Mark]. malicious programs? A. PC diagnostic software. B. Web tracking software. C. Anti-spam software. D. Anti-spyware software. Enter A, B, C, or D in answerfile.doc in the space for question 4. 5. Which one of the following describes why it is important to update anti- [1 Mark]. virus software regularly? A. To ensure the software identifies old viruses. B. To protect your computer from all known viruses. C. To protect your computer from unwanted bulk messages. D. To prevent the spread of malicious programs on the Internet. Enter A, B, C, or D in answerfile.doc in the space for question 5. Save your document keeping the same filename answerfile.doc. 6. Which one of the following describes what you should do if you receive [1 Mark]. a chain letter email? A. Forward the email. B. Download it onto your system. C. Delete the email. D. Send a read receipt. Enter A, B, C, or D in answerfile.doc in the space for question 6. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 2 of 10 © British Computer Society
  • 3. 7. Which one of the following describes a computer hacker? [1 Mark]. A. A skilled programmer who uses authorised access to exploit information available on a computer. B. A skilled programmer who secretly invades computers without authorisation. C. A skilled programmer who writes programs to train new employees. D. A skilled programmer who helps in the installation of new software for an organisation. Enter A, B, C, or D in answerfile.doc in the space for question 7. 8. Which one of the following describes why firewalls are used? [1 Mark]. A. To prevent unauthorised access by incoming transmissions. B. To prevent destruction of a computer in the event of a fire. C. To enable easy downloading of data from web sites. D. To detect and disable viruses already on a computer. Enter A, B, C, or D in answerfile.doc in the space for question 8. 9. Which one of the following is MOST likely to be a hoax? [1 Mark]. A. An email from a friend you have not seen recently. B. An email with an attachment sent by a colleague using their personal email address. C. An email asking you to go to a website for a free computer scan. D. An email advertisement from a local shop you subscribe to. Enter A, B, C, or D in answerfile.doc in the space for question 9. 10. Which one of the following is the reason that users should log on with a [1 Mark]. username and password? A. To be aware of who is in the building. B. To check up on the time-keeping of users. C. To protect computers against unauthorised use. D. To enable a personalised greeting for each user. Enter A, B, C, or D in answerfile.doc in the space for question 10. Save your document keeping the same filename answerfile.doc. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 3 of 10 © British Computer Society
  • 4. 11. Which one of the following statements about a password is TRUE? [1 Mark]. A. It must be changed only if it is compromised. B. It cannot contain special character symbols. C. It should be changed regularly. D. It must be registered with the system administrator. Enter A, B, C, or D in answerfile.doc in the space for question 11. 12. Which one of the following should be used to change your password? [1 Mark]. A. Internet Explorer. B. Anti-virus software. C. Control Panel D. Windows Firewall. Enter A, B, C, or D in answerfile.doc in the space for question 12. 13. Which one of the following would be considered the BEST way to store [1 Mark]. a PIN number? A. Keep a written note of it with you bank cards. B. Store it on your computer. C. Memorise it. D. Keep a written note of it in your office drawer. Enter A, B, C, or D in answerfile.doc in the space for question 13. 14. Which one of the following shows respect for confidentiality of [1 Mark]. information? A. Discussing confidential information over the telephone. B. Uploading confidential information to a shared web site. C. Emailing confidential information to a colleague. D. Disclosing confidential information only to authorised individuals. Enter A, B, C, or D in answerfile.doc in the space for question 14. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 4 of 10 © British Computer Society
  • 5. 15. Which one of the following describes why users should lock their [1 Mark]. computer when leaving their desk? A. To prevent a waste of electricity. B. To prevent unauthorised access to data. C. To prevent data from getting corrupted. D. To prevent the computer from malfunctioning. Enter A, B, C, or D in answerfile.doc in the space for question 15. Save your document keeping the same filename answerfile.doc. 16. Which one of the following is an example of phishing? [1 Mark]. A. An email warning the recipient of a computer virus threat. B. An email directing the recipient to forward the email to friends. C. An email directing the recipient to enter personal details on a fake website. D. An email directing the recipient to download an attachment. Enter A, B, C, or D in answerfile.doc in the space for question 16. 17. Which one of the following is unsafe online activity? [1 Mark]. A. Giving your home address to someone you met in a chat room. B. Using a screen name or nick name that cannot identify you. C. Meeting someone you met online face-to-face in the company of your parents. D. Keeping your social network profile private. Enter A, B, C, or D in answerfile.doc in the space for question 17. 18. Which one of the following describes a public network? [1 Mark]. A. A network where devices outside the network cannot see or communicate directly with computers on the network. B. A network where devices outside the network can see but cannot communicate directly with computers on the network. C. A network where devices outside the network can see and communicate directly with computers on the network. D. A network where devices outside the network cannot see but can communicate directly with computers on the network. Enter A, B, C, or D in answerfile.doc in the space for question 18. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 5 of 10 © British Computer Society
  • 6. 19. Which one of the following describes how confidential information [1 Mark]. should be sent using an unsecured network? A. In an unsigned email. B. In an attachment. C. In a compressed format. D. In an encrypted format. Enter A, B, C, or D in answerfile.doc in the space for question 19. 20. Which one of the following statements about wireless networks is [1 Mark]. TRUE? A. They cannot be intercepted by unknown users. B. They limit accessibility to other users. C. They limit visibility to other users. D. They can be accessible to other users. Enter A, B, C, or D in answerfile.doc in the space for question 20. Save your document keeping the same filename answerfile.doc. 21. Which one of the following is the recommended action to prevent the [1 Mark]. risk of access to a network by other users? A. Disconnect the computer from the network. B. Complain to the System Administrator. C. Change the computer login password frequently. D. Adjust the Internet security settings. Enter A, B, C, or D in answerfile.doc in the space for question 21. 22. Which one of the following describes Bluetooth? [1 Mark]. A. Short-range wired protocol for exchanging data. B. Short-range wireless protocol for exchanging data. C. Long-range wireless protocol for exchanging data. D. Long-range wired protocol for exchanging data. Enter A, B, C, or D in answerfile.doc in the space for question 22. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 6 of 10 © British Computer Society
  • 7. 23. Which one of the following describes why Bluetooth device settings [1 Mark]. should be adjusted? A. To increase the range of the device. B. To improve the quality of reception. C. To prevent the risk of unauthorised access. D. To reduce interference from other devices. Enter A, B, C, or D in answerfile.doc in the space for question 23. 24. Which one of the following would result in the loss of contact details if it [1 Mark]. were stolen? A. Printer. B. Mobile Phone. C. Modem. D. MP3. Enter A, B, C, or D in answerfile.doc in the space for question 24. 25. Which one of the following should you do to ensure that your USB [1 Mark]. storage device is kept safe and secure? A. Only use it in private surroundings. B. Do not access it using a Bluetooth device. C. Use firewall software. D. Never leave it unattended. Enter A, B, C, or D in answerfile.doc in the space for question 25. Save your document keeping the same filename answerfile.doc. 26. Which one of the following departments would usually hold guidelines [1 Mark]. and procedures for the secure use of IT within an organisation? A. The Marketing Department. B. The IT Department. C. The Sales Department. D. The Finance Department. Enter A, B, C, or D in answerfile.doc in the space for question 26. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 7 of 10 © British Computer Society
  • 8. 27. Which one of the following describes why you should follow guidelines [1 Mark]. and procedures while using IT resources in an organisation? A. To ensure easy access to information on your computer. B. To ensure the secure use of IT resources. C. To ensure the IT Department is able to monitor all activity. D. To ensure the Finance Department is able to monitor the costs of IT resources. Enter A, B, C, or D in answerfile.doc in the space for question 27. 28. Which one of the following should you approach if you are unsure of [1 Mark]. the IT security procedure to follow when uninstalling an application on your computer? A. A technically well-informed team member. B. The Systems Administrator. C. A senior colleague in the Finance Department. D. The Maintenance Department. Enter A, B, C, or D in answerfile.doc in the space for question 28. 29. Which one of the following describes how a breach in IT security [1 Mark]. should be reported? A. Using the telephone. B. By emailing to the IT Manager. C. Using the method listed in the organisation’s security policy. D. Using any means of communication. Enter A, B, C, or D in answerfile.doc in the space for question 29. 30. Which one of the following describes how to find out about an [1 Mark]. organisation’s privacy policy? A. By reading the office newsletter. B. By speaking to the Finance Department. C. By speaking to the Sales Department. D. By reading the policy in the organisation’s policy manual. Enter A, B, C, or D in answerfile.doc in the space for question 30. Save your document keeping the same filename answerfile.doc. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 8 of 10 © British Computer Society
  • 9. 31. Which one of the following would prevent the theft of a laptop? [1 Mark]. A. Anti-virus software. B. A webcam. C. Spyware. D. A security cable. Enter A, B, C, or D in answerfile.doc in the space for question 31. 32. Which one of the following could be the unexpected outcome of [1 Mark]. deleting a large group of files? A. The files would be hidden. B. An important file may be accidentally deleted. C. The files would become read-only. D. A delete file confirmation window may appear. Enter A, B, C, or D in answerfile.doc in the space for question 32. 33. Which one of the following would NOT happen if a computer suddenly [1 Mark]. malfunctions? A. The operating system will fail. B. Files saved on the hard drive will be lost. C. All off-site backups will be lost. D. Some software may have to be reinstalled. Enter A, B, C, or D in answerfile.doc in the space for question 33. 34. Which one of the following should you use to backup personal data? [1 Mark]. A. A labelled CD. B. A printout. C. A website offering a file sharing service. D. A friend’s computer. Enter A, B, C, or D in answerfile.doc in the space for question 34. 35. Which one of the following describes why it is important to have a [1 Mark]. secure off-site backup copy of files? A. To improve accessible of files from other locations. B. To speed up the process of accessing the files at any time. C. To prevent the loss of data in the event of a fire. D. To reduce the possibility of data theft. Enter A, B, C, or D in answerfile.doc in the space for question 35. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 9 of 10 © British Computer Society
  • 10. 36. Which one of the following describes how software can be stored [1 Mark]. safely? A. Storing it in a place free of magnetic fields. B. Storing it in a cupboard. C. Storing backups of the software. D. Storing it in its original packing. Enter A, B, C, or D in answerfile.doc in the space for question 36. Save and close your document keeping the same filename answerfile.doc. Close ALL open files and folders. Total Marks 36 This is the end of the test. If you have time, check the work you have done. SampleMQTB/1.0/SI1/v1.1 SAMPLE TEST Page 10 of 10 © British Computer Society