SlideShare una empresa de Scribd logo
1 de 156
IT Exercises
Which  one  of these is computer hardware?   ,[object Object],[object Object],[object Object],[object Object],A CPU.
Mouse   Monitor System Case Hard Disk Hard Disk System Case Monitor Mouse   Data storage Containing CPU Output Device Input Device
Which  one  of the following dose  not  influence the Performance of a computer? ,[object Object],[object Object],[object Object],[object Object]
The speed of a computer CPU can be measured in: ,[object Object],[object Object],[object Object],[object Object],Gigahertz
Which two of the following devices can be used to input data to a computer ? 1- Joystick  2- printer 3- speaker 4- standard monitor 5- keyboard Joystick keyboard
Which one of these devices can be used to output data from a computer? 1- Joystick  2- printer 3- Mouse 4- Scanner printer
Which one of these devices can be used to input and output data ? 1- Scanner  2- Microphone 3- Touch screen 4- Light pen Touch screen
Which  one  of these statements about formatting Computer storage media is  true ? ,[object Object],[object Object],[object Object],[object Object]
Which  one  of these statements correctly completes the  following sentence?  A computer’s operating system: ,[object Object],[object Object],[object Object],[object Object]
A web browser Word processing A multimedia application A spreadsheet Application An Accounting Application A web browser Word processing A multimedia application An Accounting Application A spreadsheet Application To view web pages Produce a catalogue containing graphics Create interactive learning material Payroll and stock control Produce charts and graphs
Which of following best describes a graphical user  interface (GUI):   ,[object Object],[object Object],[object Object],[object Object]
Which one of these stages of software development is the last stage to be finally completed? ,[object Object],[object Object],[object Object],[object Object],Testing
Which  two  statement about local area networks (LAN) are  true ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Which  one  of the following best describes an intranet? ,[object Object],[object Object],[object Object],[object Object]
Which  one  of the following best describes an extranet? ,[object Object],[object Object],[object Object],[object Object]
Drag two of the statements that describe the World Wide Web into the box. The World Wide Web A Vast collection of linked documents held on computers all over the world A global network of computers linked together using communications equipment A Vast collection of linked documents held on computers all over the world Can be accessed using a browser The world-wide e-mail system A network that grew out of the American military Can be accessed using a browser
Which  one  of these statement about the speed of connecting to the internet is  true ? ,[object Object],[object Object],[object Object],[object Object]
For which  one  of these tasks would a computerized solution be  more  appropriate? ,[object Object],[object Object],[object Object],[object Object],Calculating payroll of staff
Online banking Insurance claim processing Airline booking Business administration Insurance claim processing Airline booking Business administration Online banking Large-scale computer applications are increasingly used in business. Check policy details. Analyse statistics to estimate premiums. Provide quotes for premiums Check an account. Transfer funds. Apply for loans. Administer Employee payrolls. Process orders. Track invoices. Check timetables. Check ticket availability.
Public information systems Public record systems Administration systems Public information systems Administration systems Public record systems Large-scale computer applications are increasingly used in government. Policy documents. Public health warnings. Income tax Payment form. Television license Payment form. Census records. Vehicle registration listing.
For which  two  of the following tasks in hospitals and health care would large-scale computer applications be most appropriate? ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Computer based education Student registration systems Provide student counseling  Distance learning Researching homework on the internet  Coaching of slower students Provide student counseling  Coaching of slower students Student registration systems Distance learning Researching homework on the internet  Uses traditional methods
What is the meaning of the letter  e  in the word  e-mail ? ,[object Object],[object Object],[object Object],[object Object],Electronic.
Which  two  of the following contribute to a good working environment for a computer operator? ,[object Object],[object Object],[object Object],[object Object],[object Object]
You can reduce the risk of repetitive strain injury by  one  of the following actions: ,[object Object],[object Object],[object Object],[object Object]
Which  one  of these actions demonstrate poor health and safety practice? ,[object Object],[object Object],[object Object],[object Object]
Which statement about computers and the environment is  true ? ,[object Object],[object Object],[object Object],[object Object]
[object Object],ID Should be changed regularly Must be unique on the network Identifies a specific user on a network Not confidential Ensures that the person logging on is who they say they are Should be changed regularly Must be unique on the network Identifies a specific user on a network Not confidential Ensures that the person logging on is who they say they are Password
Which one of the following statement describes the process of backup? ,[object Object],[object Object],[object Object],[object Object]
A PDA which has been backed up - but not password protected - has been stolen. Which one of the following consequences may result? ,[object Object],[object Object],[object Object],[object Object]
A mobile phone which has been insured but not password protected has been stolen. Which  one  of the following consequences may result? ,[object Object],[object Object],[object Object],[object Object]
A laptop which has been password protected, but not backed up, has been stolen. Which one of the following consequences may result? ,[object Object],[object Object],[object Object],[object Object]
Anti-virus software can disable a virus on your computer. This action is called: ,[object Object],[object Object],[object Object],[object Object],Disinfecting
Good Anti-virus practice  Opening e-mail from unknown sources Deleting e-mail from unknown sources Putting a virus-checked disk in a floppy drive Downloading and running free software from the web  Opening e-mail from unknown sources Deleting e-mail from unknown sources Putting a virus-checked disk in a floppy drive Downloading and running free software from the web  Poor Anti-virus practice
Which  one  of the following statements about copyright is  true ? ,[object Object],[object Object],[object Object],[object Object]
Shareware is the term that is applied to: ,[object Object],[object Object],[object Object],[object Object]
An important purpose of data protection legislation is to: ,[object Object],[object Object],[object Object],[object Object]
Which  one  of these is application software? ,[object Object],[object Object],[object Object],[object Object],Word processor
Which one of these computer types is the most powerful? ,[object Object],[object Object],[object Object],[object Object],Mainframe Computer
Which one of the following statement is true about ROM (read-only memory): ,[object Object],[object Object],[object Object],[object Object],It cannot be modified by the user.
Bit Kilobyte Gigabyte Megabyte Byte smallest Largest Bit Byte Kilobyte Megabyte Gigabyte
Which two of the following devices can be used to input data to a computer ? 1- Mouse  2- printer 3- speaker 4- Plotter 5- Light pen Mouse Light pen
Which one of these devices can be used to output data from a computer? 1- Keyboard  2- Microphone 3- Plotter 4- Scanner Plotter
Which one of these types of storage provides the fastest access to data? 1- Zip disk  2- Floppy diskette 3- Hard disk 4- CD-Rom Hard disk
Which  two  of the following statements about access rights are  true ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Desktop Publishing Word processing A multimedia application A spreadsheet Application A Database Application A Database Application Desktop Publishing A spreadsheet Application A Multimedia Application Word Processing Creating a list of contact details. Producing complex magazine layouts.  Working out budgets.  Creating interactive training materials. Creating letters and business documents.
Which one of these stages of software development is the first stage to be completed? ,[object Object],[object Object],[object Object],[object Object],Analysis .
Which  one  of these is the type of network that links computers in different cities or countries? ,[object Object],[object Object],[object Object],[object Object],WAN
Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resources Printers Printers Disk Space Disk Space Monitors Applications Keyboards Applications
The term ADSL stands for: ,[object Object],[object Object],[object Object],[object Object],Asymmetric Digital Subscriber Line
For which  two  of these tasks  would a computerized solution be most appropriate? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Public information systems Public record systems Administration systems Public information systems Administration systems Public record systems Large-scale computer applications are increasingly used in government. Store census information. Store passport details. Handle social welfare payments  Collect television license fees. Announce policy documents online. Notify citizens of government decisions.
For which  one  of the following tasks in hospitals and health care would large-scale computer applications be most appropriate? ,[object Object],[object Object],[object Object],[object Object],Running life-support systems
Which  one  of the following statements about teleworking is  true ? ,[object Object],[object Object],[object Object],[object Object]
Which  two  of the following statements about purchasing on line are  true ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Which  one  of the following contribute to a good working environment for a computer operator? ,[object Object],[object Object],[object Object],[object Object],Elbow and wrist support
You can reduce the risk of eye-strain by  one  of   the   following actions: ,[object Object],[object Object],[object Object],[object Object],using an anti-glare filter on your monitor
Are best printed  Help for a software application Guarantees E-mail messages  Contacts Help for a software application Guarantees Contacts  E-mail messages  Electronic documents help to save paper , while other documents distribution. Are suitable for electronic distribution
Which  one  of   the   following statements about an organization’s information security policy is  true ? ,[object Object],[object Object],[object Object],[object Object]
Which  one  of the following statements about Anti virus software  is  true ? ,[object Object],[object Object],[object Object],[object Object]
Good Anti-virus practice  Updating anti-virus software once a year Scheduling virus checks to run once a day  Deleting e-mail from unknown sources Opening unknown e-mail attachments  Updating anti-virus software once a year Deleting e-mail from unknown sources Scheduling virus checks to run once a day   Opening unknown e-mail attachments   Poor Anti-virus practice
Which  one  of   the   following statements about copyright is  true ? ,[object Object],[object Object],[object Object],[object Object]
Which  one  of   the   following statements about copyright is  true ? ,[object Object],[object Object],[object Object],[object Object]
Freeware is the term that is applied to: ,[object Object],[object Object],[object Object],[object Object]
Which two of the following have a significant influence on the speed at which a computer performs? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Good Anti-virus practice  Updating anti-virus software once a year Scheduling virus checks to run once a day  Deleting e-mail from unknown sources Opening unknown e-mail attachments  Updating anti-virus software once a year Deleting e-mail from unknown sources Scheduling virus checks to run once a day   Opening unknown e-mail attachments   Poor Anti-virus practice
RAM   The contents of this are fixed during the manufacture of the PC The Operating system is loaded into this when the PC is switched on. The contents of this disappear when the PC is switched off. You cannot write to this type of memory. The contents of this change constantly as the PC is used. The Operating system is loaded into this when the PC is switched on. The contents of this disappear when the PC is switched off. The contents of this are fixed during the manufacture of the PC The contents of this change constantly as the PC is used. You cannot write to this type of memory. ROM
Backing up 1.8GB of files you are currently working on. 1.44 MB Floppy  Disk 2GB Back-up Tape 2GB Hard Disk 1.44 MB Floppy  Disk 2GB Back-up Tape 2GB Hard Disk Very cheap means of backing up 1 MB of text files  Archiving 1.8GB of graphic files that are not currently needed.
An operating System You can run more than one at the same time Sets up the look and feel of your computer interface  Controls the hardware and software of your computer  This can be used to edit data files You can run more than one at the same time This can be used to edit data files Sets up the look and feel of your computer interface  Controls the hardware and software of your computer  A Software Application
Which two of these are operating systems? ,[object Object],[object Object],[object Object],[object Object],[object Object],Windows . Linux
Which one of these statements about the internet is false? ,[object Object],[object Object],[object Object],[object Object]
Drag just the two of the statements that describe the internet into the box. Internet A global network of computers linked together using communications equipment A Vast collection of linked documents held on computers all over the world The world-wide e-mail system A network that grew out of the American military Can be accessed using a browser A global network of computers linked together using communications equipment A network that grew out of the American military
Which one of these types of computer memory is permanent and unchanging? ,[object Object],[object Object],[object Object],[object Object],Read-Only Memory.
Which one of the following isn’t operating system? ,[object Object],[object Object],[object Object],[object Object],Ms Word
Which  one  of the following descriptions of an extranet is true? ,[object Object],[object Object],[object Object],[object Object]
E-mail stands for: ,[object Object],[object Object],[object Object],[object Object],Electronic mail
Which one of the following operating system does not have a GUI? ,[object Object],[object Object],[object Object],[object Object],Microsoft DOS
Microsoft Windows is a (an): ,[object Object],[object Object],[object Object],[object Object],Operating system
Which of the following is the first stage in the standard sequence of software development? ,[object Object],[object Object],[object Object],[object Object],Analysis
What type of computer application would be used in a hospital to maintain patient medical details? ,[object Object],[object Object],[object Object],[object Object],A database application
Which one of these statements about computer application is true? ,[object Object],[object Object],[object Object],[object Object]
Which one of the following activities is best suited for e-mail? ,[object Object],[object Object],[object Object],[object Object]
Which one of the following statements about copyright is true? ,[object Object],[object Object],[object Object],[object Object]
Unauthorized access to computer files can be prevented by using: ,[object Object],[object Object],[object Object],[object Object],Password
Which Preventative measure can be used to stop computer system becoming infected with a virus? ,[object Object],[object Object],[object Object],[object Object],A virus-checking program
Which of the following precautions would prevent virus-infected software being used on computer? ,[object Object],[object Object],[object Object],[object Object],Install a virus protection system.
Electronic commerce is best described as: ,[object Object],[object Object],[object Object],[object Object]
Which of the following can be used to restore programs or data after being altered by a malicious program? ,[object Object],[object Object],[object Object],[object Object],Back-up copies
Which of the following provides an example of a good working environment? ,[object Object],[object Object],[object Object],[object Object],Adequate lighting
A company needs all it’s 30 office staff to use a spreadsheet application, It should: ,[object Object],[object Object],[object Object],[object Object],Purchase a multi-user license
What name is given to software, which under development? ,[object Object],[object Object],[object Object],[object Object],Beta software
Which of the following is the name given to software, which can legally be copied without a license? ,[object Object],[object Object],[object Object],[object Object],Freeware
Which of the following best describes teleworking? ,[object Object],[object Object],[object Object],[object Object]
An End User License Agreement ,[object Object],[object Object],[object Object],[object Object]
Which of the following is a good password policy for an organization? ,[object Object],[object Object],[object Object],[object Object],All passwords are changed regularly
Which of the following is not a function of the CPU? ,[object Object],[object Object],[object Object],[object Object],Sending e-mail
What is ISDN? ,[object Object],[object Object],[object Object],[object Object],Integrated Services Digital Network
Large Organization often use a computer system to run the company typically it is most likely to be: ,[object Object],[object Object],[object Object],[object Object],A Mainframe Computer
Scanner can be described as:   ,[object Object],[object Object],[object Object],[object Object],An input device only
From an output devices: ,[object Object],[object Object],[object Object],[object Object],Plotter
Which of the following statement is true?   ,[object Object],[object Object],[object Object],[object Object]
The data stored on CD-Rom are   ,[object Object],[object Object],[object Object],[object Object],Non Volatile and read only data
Which is the most appropriate application to store census information?   ,[object Object],[object Object],[object Object],[object Object],Database Application.
A GUI is used to:   ,[object Object],[object Object],[object Object],[object Object],Provide an easy way to use computer.
The range of voice, computer messages and other services provided by:   ,[object Object],[object Object],[object Object],[object Object],ISDN
Which one of the following is not an input device?   ,[object Object],[object Object],[object Object],[object Object],Monitor
The location of information on the internet can be obtained by using a database:   ,[object Object],[object Object],[object Object],[object Object],Search engine
Which  two  of the following is considered as input devices?   ,[object Object],[object Object],[object Object],[object Object],[object Object],Microphone Keyboard
Which one have the fastest access to data? ,[object Object],[object Object],[object Object],[object Object],Hard Disk
Which one of these memory can not be changed? ,[object Object],[object Object],[object Object],[object Object],Read Only Memory.
Which  one  of the following is considered as input devices? ,[object Object],[object Object],[object Object],[object Object],Web camera.
An equipment that attached to computer to stop large volts of electricity:  ,[object Object],[object Object],[object Object],[object Object],Surge suppressor.
The baud rate can tell how fast:  ,[object Object],[object Object],[object Object],[object Object],The MODEM can send and revive data.
Where the computer is appropriate more than people?   ,[object Object],[object Object],[object Object],[object Object],In dangerous situation.
A computer virus is a program that   ,[object Object],[object Object],[object Object],[object Object],Always spotted by antivirus.
Which one is more appropriate about Shareware software?   ,[object Object],[object Object],[object Object],[object Object],Any software you try for free time and pay for keeping it.
Which one of the following is not related to the operating system?   ,[object Object],[object Object],[object Object],[object Object]
Which one is not true about RAM?   ,[object Object],[object Object],[object Object],[object Object]
Which one of the following devices connect to the system unit externally and controlled by the central processing unit? ,[object Object],[object Object],[object Object],[object Object]
Which  one  of these is a computer software? ,[object Object],[object Object],[object Object],[object Object]
A Gigabyte is approximately: ,[object Object],[object Object],[object Object],[object Object]
Which two of these are operating systems? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Stage 3 Analysis Design Programming Drag each of the stages of development into logical order. Testing Programming Design Testing Analysis Stage 1 Stage 2 Stage 4
Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resources Files Files Disk Storage Disk Storage Monitors Applications Keyboards Applications
The internet is the name that is given to: ,[object Object],[object Object],[object Object],[object Object]
Which  one  of the following statements about the use of e-commerce is  true ? ,[object Object],[object Object],[object Object],[object Object]
Which  two  of the following statements about passwords are  true ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Which two of these statements could each be used to complete the following sentence? A computer virus is a program that: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Which  one  of the following statements about copyright is  true ? ,[object Object],[object Object],[object Object],[object Object]
E-commerce is the term used to describe business that: ,[object Object],[object Object],[object Object],[object Object]
Which  one  of the following statements about purchasing online is  true ? ,[object Object],[object Object],[object Object],[object Object]
You can reduce the risk of neck, back and shoulder pain, by  one  of the following actions: ,[object Object],[object Object],[object Object],[object Object]
Which  one  of these actions demonstrate poor health and safety practice in the use of computers? ,[object Object],[object Object],[object Object],[object Object]
Which  one  of these statements best describes computer backup? ,[object Object],[object Object],[object Object],[object Object]
Which  one  of the following statements about copyright is  true ? ,[object Object],[object Object],[object Object],[object Object]
Which  two  of the following statements about data protection legislation are  true ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Which  one  of the following is the a digital line, used for both voice and data?  ,[object Object],[object Object],[object Object],[object Object],ISDN.
The device that links computers to telephone networks by converting digital and analog signals is called a: ,[object Object],[object Object],[object Object],[object Object],MODEM
Which  one  of the following statements about formatting computer storage media is  true ? ,[object Object],[object Object],[object Object],[object Object]
Sort these units of data by increasing order of size. Terabyte Kilobyte Gigabyte Megabyte Byte Byte Kilobyte Megabyte Gigabyte Terabyte
Which  one  of the following statements applies to PSTN? ,[object Object],[object Object],[object Object],[object Object]
Which  one  of the following options describe the effects of teleworking? ,[object Object],[object Object],[object Object],[object Object]
Which  two  of the following statements about purchasing on line are  true ? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Which  two  of the following help to create a good working environment for computer users? ,[object Object],[object Object],[object Object],[object Object],[object Object]
You can reduce the risk of eye-strain by one of the following: ,[object Object],[object Object],[object Object],[object Object]
Three of the following are examples of computer uses in education. Match the statements with the correct boxes. Computer based education Organizing student timetables Using the Web for research Distance learning Coaching students with learning difficulties Helping students with career advice Coaching students with learning difficulties Helping students with career advice Organizing student timetables Distance learning Using the Web for research Uses traditional methods
Should be printed Staff announcements Documents that need careful proof-reading Working drafts of lengthy report Contacts Staff announcements Documents that need careful proof-reading Contacts  Working drafts of lengthy report Electronic documents help to save paper , while other documents are best printed out. Can be distributed electronically
Drag these statements into the correct boxes.  True Formatting is the process of saving data onto a floppy disk A used floppy disk cannot be reformatted You cannot purchase pre-formatted disks Full disk formatting completely erases the previous contents of a disk  All disks need to be formatted before they can store files  Formatting is the process of saving data onto a floppy disk You cannot purchase pre-formatted disks Full disk formatting completely erases the previous contents of a disk   All disks need to be formatted before they can store files   A used floppy disk cannot be reformatted False
Desktop Publishing Word processing A presentation Application A spreadsheet Application A Database Application Word Processing A spreadsheet Application A presentation Application A Database Application Desktop Publishing Creating letters, faxes or memos etc. Make financial projections. Create overhead projection or slides. Sorting large amounts of information. Producing a newspaper with complex page layouts
These items contain sensitive data Contact details for sales enquiries Research on new products Training materials Management accounts Research on new products Contact details for sales enquiries Management accounts Training materials Which two of the following documents contain sensitive data and need protection? These items do not need protection
Should be printed Help for a software application Planning application Documents that are regularly updated Academic certificates Help for a software application Planning application Academic certificates Documents that are regularly updated Electronic documents help to save paper , while other documents are best printed out. Can be distributed electronically
Helps to avoid the risk of spreading a computer virus Scanning all unfamiliar disks with anti-virus software Virus scanning all application before loading them onto your hard disk Only copying applications from your close friends Write-protecting all copies of application disks once they have been checked Rebooting your PC if you find a file that is infected Only copying applications from your close friends Rebooting your PC if you find a file that is infected Scanning all unfamiliar disks with anti-virus software Write-protecting all copies of application disks once they have been checked Virus scanning all application before loading them onto your hard disk Doesn’t help to avoid the risk of spreading a computer virus
For which  two  of the following tasks in hospitals and healthcare would large-scale computer applications be most appropriate? ,[object Object],[object Object],[object Object],[object Object],[object Object]
For which  two  of these tasks would people be more appropriate than computers? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Which of the following statements about safety precautions when using computers? ,[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

Similar a It Exercises

ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
 
امتحان المديول الأول ICT من كورس ICDL v5
امتحان المديول الأول ICT من كورس ICDL v5امتحان المديول الأول ICT من كورس ICDL v5
امتحان المديول الأول ICT من كورس ICDL v5um_adeveloper
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe. ShohanaakterKakon
 
Electronic surveying
Electronic surveyingElectronic surveying
Electronic surveyingifmrcmf
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET Journal
 
Gr 9 ete3 notes - copy
Gr 9 ete3 notes - copyGr 9 ete3 notes - copy
Gr 9 ete3 notes - copyNuraHayat
 
Executive SummaryThis report addresses four major concerns that .docx
Executive SummaryThis report addresses four major concerns that .docxExecutive SummaryThis report addresses four major concerns that .docx
Executive SummaryThis report addresses four major concerns that .docxrhetttrevannion
 
Micro Processors Present Technology and Up gradations Required
Micro Processors Present Technology and Up gradations RequiredMicro Processors Present Technology and Up gradations Required
Micro Processors Present Technology and Up gradations Requiredijtsrd
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxAdrianVANTOPINA
 
Which of the following would be a description of a system unitA c.pdf
Which of the following would be a description of a system unitA c.pdfWhich of the following would be a description of a system unitA c.pdf
Which of the following would be a description of a system unitA c.pdfKUNALHARCHANDANI1
 
Introduction to computer and hardware software
Introduction to computer and hardware softwareIntroduction to computer and hardware software
Introduction to computer and hardware softwarezdkhan187
 
Lecture 1 - Introduction of Software engineering .pdf
Lecture 1 - Introduction of Software engineering .pdfLecture 1 - Introduction of Software engineering .pdf
Lecture 1 - Introduction of Software engineering .pdfalishoman555
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentalsJames Macalalad
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1MuhammedTalha7
 
Technology Update: The More Things Change, the More Fun It Gets
Technology Update: The More Things Change, the More Fun It GetsTechnology Update: The More Things Change, the More Fun It Gets
Technology Update: The More Things Change, the More Fun It GetsMichael Carnell
 
Marquee13 presentation it_essentials
Marquee13 presentation it_essentialsMarquee13 presentation it_essentials
Marquee13 presentation it_essentialsSherri Jackson
 
Web design and_development
Web design and_developmentWeb design and_development
Web design and_developmentchaxubzxreid
 
Fa13 7718-ch2-mayers
Fa13 7718-ch2-mayersFa13 7718-ch2-mayers
Fa13 7718-ch2-mayersMary-Jo Apigo
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerZunair Aslam
 

Similar a It Exercises (20)

ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
امتحان المديول الأول ICT من كورس ICDL v5
امتحان المديول الأول ICT من كورس ICDL v5امتحان المديول الأول ICT من كورس ICDL v5
امتحان المديول الأول ICT من كورس ICDL v5
 
computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
Electronic surveying
Electronic surveyingElectronic surveying
Electronic surveying
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
Lanlogic IT White Paper
Lanlogic IT White PaperLanlogic IT White Paper
Lanlogic IT White Paper
 
Gr 9 ete3 notes - copy
Gr 9 ete3 notes - copyGr 9 ete3 notes - copy
Gr 9 ete3 notes - copy
 
Executive SummaryThis report addresses four major concerns that .docx
Executive SummaryThis report addresses four major concerns that .docxExecutive SummaryThis report addresses four major concerns that .docx
Executive SummaryThis report addresses four major concerns that .docx
 
Micro Processors Present Technology and Up gradations Required
Micro Processors Present Technology and Up gradations RequiredMicro Processors Present Technology and Up gradations Required
Micro Processors Present Technology and Up gradations Required
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptx
 
Which of the following would be a description of a system unitA c.pdf
Which of the following would be a description of a system unitA c.pdfWhich of the following would be a description of a system unitA c.pdf
Which of the following would be a description of a system unitA c.pdf
 
Introduction to computer and hardware software
Introduction to computer and hardware softwareIntroduction to computer and hardware software
Introduction to computer and hardware software
 
Lecture 1 - Introduction of Software engineering .pdf
Lecture 1 - Introduction of Software engineering .pdfLecture 1 - Introduction of Software engineering .pdf
Lecture 1 - Introduction of Software engineering .pdf
 
Basic computer fundamentals
Basic computer fundamentalsBasic computer fundamentals
Basic computer fundamentals
 
Discovering Computer Chapter 1
Discovering Computer Chapter 1Discovering Computer Chapter 1
Discovering Computer Chapter 1
 
Technology Update: The More Things Change, the More Fun It Gets
Technology Update: The More Things Change, the More Fun It GetsTechnology Update: The More Things Change, the More Fun It Gets
Technology Update: The More Things Change, the More Fun It Gets
 
Marquee13 presentation it_essentials
Marquee13 presentation it_essentialsMarquee13 presentation it_essentials
Marquee13 presentation it_essentials
 
Web design and_development
Web design and_developmentWeb design and_development
Web design and_development
 
Fa13 7718-ch2-mayers
Fa13 7718-ch2-mayersFa13 7718-ch2-mayers
Fa13 7718-ch2-mayers
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 

It Exercises

  • 2.
  • 3. Mouse Monitor System Case Hard Disk Hard Disk System Case Monitor Mouse Data storage Containing CPU Output Device Input Device
  • 4.
  • 5.
  • 6. Which two of the following devices can be used to input data to a computer ? 1- Joystick 2- printer 3- speaker 4- standard monitor 5- keyboard Joystick keyboard
  • 7. Which one of these devices can be used to output data from a computer? 1- Joystick 2- printer 3- Mouse 4- Scanner printer
  • 8. Which one of these devices can be used to input and output data ? 1- Scanner 2- Microphone 3- Touch screen 4- Light pen Touch screen
  • 9.
  • 10.
  • 11. A web browser Word processing A multimedia application A spreadsheet Application An Accounting Application A web browser Word processing A multimedia application An Accounting Application A spreadsheet Application To view web pages Produce a catalogue containing graphics Create interactive learning material Payroll and stock control Produce charts and graphs
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Drag two of the statements that describe the World Wide Web into the box. The World Wide Web A Vast collection of linked documents held on computers all over the world A global network of computers linked together using communications equipment A Vast collection of linked documents held on computers all over the world Can be accessed using a browser The world-wide e-mail system A network that grew out of the American military Can be accessed using a browser
  • 18.
  • 19.
  • 20. Online banking Insurance claim processing Airline booking Business administration Insurance claim processing Airline booking Business administration Online banking Large-scale computer applications are increasingly used in business. Check policy details. Analyse statistics to estimate premiums. Provide quotes for premiums Check an account. Transfer funds. Apply for loans. Administer Employee payrolls. Process orders. Track invoices. Check timetables. Check ticket availability.
  • 21. Public information systems Public record systems Administration systems Public information systems Administration systems Public record systems Large-scale computer applications are increasingly used in government. Policy documents. Public health warnings. Income tax Payment form. Television license Payment form. Census records. Vehicle registration listing.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Good Anti-virus practice Opening e-mail from unknown sources Deleting e-mail from unknown sources Putting a virus-checked disk in a floppy drive Downloading and running free software from the web Opening e-mail from unknown sources Deleting e-mail from unknown sources Putting a virus-checked disk in a floppy drive Downloading and running free software from the web Poor Anti-virus practice
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Bit Kilobyte Gigabyte Megabyte Byte smallest Largest Bit Byte Kilobyte Megabyte Gigabyte
  • 43. Which two of the following devices can be used to input data to a computer ? 1- Mouse 2- printer 3- speaker 4- Plotter 5- Light pen Mouse Light pen
  • 44. Which one of these devices can be used to output data from a computer? 1- Keyboard 2- Microphone 3- Plotter 4- Scanner Plotter
  • 45. Which one of these types of storage provides the fastest access to data? 1- Zip disk 2- Floppy diskette 3- Hard disk 4- CD-Rom Hard disk
  • 46.
  • 47. Desktop Publishing Word processing A multimedia application A spreadsheet Application A Database Application A Database Application Desktop Publishing A spreadsheet Application A Multimedia Application Word Processing Creating a list of contact details. Producing complex magazine layouts. Working out budgets. Creating interactive training materials. Creating letters and business documents.
  • 48.
  • 49.
  • 50. Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resources Printers Printers Disk Space Disk Space Monitors Applications Keyboards Applications
  • 51.
  • 52.
  • 53. Public information systems Public record systems Administration systems Public information systems Administration systems Public record systems Large-scale computer applications are increasingly used in government. Store census information. Store passport details. Handle social welfare payments Collect television license fees. Announce policy documents online. Notify citizens of government decisions.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59. Are best printed Help for a software application Guarantees E-mail messages Contacts Help for a software application Guarantees Contacts E-mail messages Electronic documents help to save paper , while other documents distribution. Are suitable for electronic distribution
  • 60.
  • 61.
  • 62. Good Anti-virus practice Updating anti-virus software once a year Scheduling virus checks to run once a day Deleting e-mail from unknown sources Opening unknown e-mail attachments Updating anti-virus software once a year Deleting e-mail from unknown sources Scheduling virus checks to run once a day Opening unknown e-mail attachments Poor Anti-virus practice
  • 63.
  • 64.
  • 65.
  • 66.
  • 67. Good Anti-virus practice Updating anti-virus software once a year Scheduling virus checks to run once a day Deleting e-mail from unknown sources Opening unknown e-mail attachments Updating anti-virus software once a year Deleting e-mail from unknown sources Scheduling virus checks to run once a day Opening unknown e-mail attachments Poor Anti-virus practice
  • 68. RAM The contents of this are fixed during the manufacture of the PC The Operating system is loaded into this when the PC is switched on. The contents of this disappear when the PC is switched off. You cannot write to this type of memory. The contents of this change constantly as the PC is used. The Operating system is loaded into this when the PC is switched on. The contents of this disappear when the PC is switched off. The contents of this are fixed during the manufacture of the PC The contents of this change constantly as the PC is used. You cannot write to this type of memory. ROM
  • 69. Backing up 1.8GB of files you are currently working on. 1.44 MB Floppy Disk 2GB Back-up Tape 2GB Hard Disk 1.44 MB Floppy Disk 2GB Back-up Tape 2GB Hard Disk Very cheap means of backing up 1 MB of text files Archiving 1.8GB of graphic files that are not currently needed.
  • 70. An operating System You can run more than one at the same time Sets up the look and feel of your computer interface Controls the hardware and software of your computer This can be used to edit data files You can run more than one at the same time This can be used to edit data files Sets up the look and feel of your computer interface Controls the hardware and software of your computer A Software Application
  • 71.
  • 72.
  • 73. Drag just the two of the statements that describe the internet into the box. Internet A global network of computers linked together using communications equipment A Vast collection of linked documents held on computers all over the world The world-wide e-mail system A network that grew out of the American military Can be accessed using a browser A global network of computers linked together using communications equipment A network that grew out of the American military
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124. Stage 3 Analysis Design Programming Drag each of the stages of development into logical order. Testing Programming Design Testing Analysis Stage 1 Stage 2 Stage 4
  • 125. Computer workgroups allow which three of these resources to be shared between multiple users at same time? Sharable Resources Files Files Disk Storage Disk Storage Monitors Applications Keyboards Applications
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 134.
  • 135.
  • 136.
  • 137.
  • 138.
  • 139.
  • 140.
  • 141. Sort these units of data by increasing order of size. Terabyte Kilobyte Gigabyte Megabyte Byte Byte Kilobyte Megabyte Gigabyte Terabyte
  • 142.
  • 143.
  • 144.
  • 145.
  • 146.
  • 147. Three of the following are examples of computer uses in education. Match the statements with the correct boxes. Computer based education Organizing student timetables Using the Web for research Distance learning Coaching students with learning difficulties Helping students with career advice Coaching students with learning difficulties Helping students with career advice Organizing student timetables Distance learning Using the Web for research Uses traditional methods
  • 148. Should be printed Staff announcements Documents that need careful proof-reading Working drafts of lengthy report Contacts Staff announcements Documents that need careful proof-reading Contacts Working drafts of lengthy report Electronic documents help to save paper , while other documents are best printed out. Can be distributed electronically
  • 149. Drag these statements into the correct boxes. True Formatting is the process of saving data onto a floppy disk A used floppy disk cannot be reformatted You cannot purchase pre-formatted disks Full disk formatting completely erases the previous contents of a disk All disks need to be formatted before they can store files Formatting is the process of saving data onto a floppy disk You cannot purchase pre-formatted disks Full disk formatting completely erases the previous contents of a disk All disks need to be formatted before they can store files A used floppy disk cannot be reformatted False
  • 150. Desktop Publishing Word processing A presentation Application A spreadsheet Application A Database Application Word Processing A spreadsheet Application A presentation Application A Database Application Desktop Publishing Creating letters, faxes or memos etc. Make financial projections. Create overhead projection or slides. Sorting large amounts of information. Producing a newspaper with complex page layouts
  • 151. These items contain sensitive data Contact details for sales enquiries Research on new products Training materials Management accounts Research on new products Contact details for sales enquiries Management accounts Training materials Which two of the following documents contain sensitive data and need protection? These items do not need protection
  • 152. Should be printed Help for a software application Planning application Documents that are regularly updated Academic certificates Help for a software application Planning application Academic certificates Documents that are regularly updated Electronic documents help to save paper , while other documents are best printed out. Can be distributed electronically
  • 153. Helps to avoid the risk of spreading a computer virus Scanning all unfamiliar disks with anti-virus software Virus scanning all application before loading them onto your hard disk Only copying applications from your close friends Write-protecting all copies of application disks once they have been checked Rebooting your PC if you find a file that is infected Only copying applications from your close friends Rebooting your PC if you find a file that is infected Scanning all unfamiliar disks with anti-virus software Write-protecting all copies of application disks once they have been checked Virus scanning all application before loading them onto your hard disk Doesn’t help to avoid the risk of spreading a computer virus
  • 154.
  • 155.
  • 156.