-
Which of the following tasks is a function of the operating system?
-
Which software would you use to search for information in the internet?
-
The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called?
-
An intranet is:
-
Which of the following devices do you need to be able to communicate with other computers using the telephone network?
-
Which of the following tasks would be more suited to a person rather than a computer?
-
Which of the following is NOT a use of computer applications in a school?
-
Computer use can cause repetitive strain injury (RSI). Which of the following is the best way to avoid this?
-
Which of the following statements describes a good approach to information security for an organisation?
-
What is the best way of preventing your computer from being infected with a virus?
-
There are rules governing the storage and supply of computer-based information. What are these rules called?
-
Which of the following would be considered a portable computer?
-
Disk formatting is used to:
-
Which of the following is an operating system?
-
Which of the following four activities is normally carried out last as part of a Systems Development process?
-
What is ISDN?
-
What type of computer application would be used in a hospital to maintain patient medical details?
-
Which of the following is a use of the Internet in the home?
-
If you were working from home, what software application could be used to communicate directly with colleagues and customers?
-
Which of the following practises helps create a good ergonomic working environment?
-
Which of the following can be an advantage of electronic documents?
-
Which of the following devices is suitable for backing up data from a networked file server?
-
Which of the following activities could lead to the spread of a computer virus?
-
An End User License Agreement:
-
Which one of the following describes spam?
-
Which one of the following can protect a computer from the risk of unwanted emails?
-
Which one of the following could lead to the spread of a malicious program?
-
Which one of the following protects a computer from the risk of malicious programs?
-
Which one of the following describes why it is important to update antivirus software regularly?
-
Which one of the following describes what you should do if you receive a chain letter email?
-
Which one of the following describes a computer hacker?
-
Which one of the following describes why firewalls are used?
-
Which one of the following is the reason that users should log on with a username and password?
-
Which one of the following statements about a password is TRUE?
-
Which one of the following should be used to change your password in your computer?
-
Which one of the following shows respect for confidentiality of information?
-
Which one of the following describes why users should lock their computer when leaving their desk?
-
Which one of the following is an example of phishing?
-
Which one of the following is unsafe online activity?
-
Which one of the following describes a public network?
-
Which one of the following describes how confidential information should be sent using an unsecured network?
-
Which one of the following statements about wireless networks is TRUE?
-
Which one of the following is the recommended action to prevent the risk of access to a network by other users?
-
Which one of the following describes Bluetooth?
-
Which one of the following describes why Bluetooth device settings should be adjusted?
-
Which one of the following would result in the loss of contact details if it were stolen?
-
Which one of the following should you do to ensure that your USB storage device is kept safe and secure?
-
Which one of the following departments would usually hold guidelines and procedures for the secure use of IT within an organisation?
-
Which one of the following describes why you should follow guidelines and procedures while using IT resources in an organisation?
-
Which one of the following should you approach if you are unsure of the IT security procedure to follow when uninstalling an application on your computer?
ICDL MODULE 01 Assignment
Subscribe to:
Posts (Atom)