Monday, 16 March 2015

Introduction to Computer applications Quiz

As users of visual display units (VDUs) please observe the following safety and health tips:
  • Use anti-glare screens
  • Limit amount of time you sit in front of the screen
  • Proper ventilation in the computer room
  • Comfortable seats:- relatively firm and upright
  • Rotation of duties among employees
  • Proper lighting
  • Careful wiring during installation



Tick (   ) the correct answer

1.  Which of the following is a good password policy for an organisation?



    All passwords are changed regularly



    All passwords are never changed



    All passwords are made up of less than four characters



    All passwords are made up of less than four numbers



2.  Which of the following statements describes shareware?



    Shareware is software without copyright protection



    Shareware is free software



    Shareware is software you may pay for after an initial time period of use



    Shareware is software you can use in any way



3.  There are rules governing the storage and supply of computer-based information. What are these rules called?



    Data Privacy Policy



    Data Management Act



    Data Protection Act



    Data Publicity Law



4.  Why is it necessary for an organisation to adopt a good password policy?



    To allow easy sharing of files across the company network



    To make it easier for the computer to connect to a network



    To protect files against unauthorized use



    To make it easier to find files on a computer



5.  An End User License Agreement:



Is a form of advertising between a software application author or publisher and the user



Gives the user the exclusive right to copy and sell the software to other potential users



Grants ownership of the software to the user of the software



Is a legal contract between a software application author or publisher and the user  with regard to terms of distribution, resale, and restricted use

6.  Which is the best way of protecting a computer system from unauthorised use?



    Ensuring all users have passwords



    Locking the office



    Using a screen saver



    Maintaining an audit trail




7.  The Data Protection Act is designed to



    Make personal data freely available



    Create a permanent store for personal data



    Regulate the use of personal data



    Enforce deletion of personal data



8.  What is controlled by software copyright regulations?



    Making back ups of the software



    Number of copies sold



    Type of computer used for the software



    Illegal distribution of software



9.  Which type of software can you use without having to pay a fee?



    Freeware



    Shareware



    Operating system



    Application software



10. Laws governing the use of software prevent people making illegal copies of software. Which of the following is the best way to prevent this from happening?



    Labelling the software



    Using a code to unlock the software



    Sending offenders to prison



    Requiring passwords for copying



11. Which of the following statements is NOT TRUE in relation to the Data Protection Act? The data user must ensure that the information



    Is obtained fairly and accurately



    Is stored with proper security



    Is accurate and up to date



    Can be sent abroad at any time



12. You want all users to be able to view data in a computer system and selected users to be able to enter and change the data.  How can you achieve this?



    Allow unrestricted access to the system



    Give authorized users a password



    Set access rights for different groups of users



    Allocate keys to authorised users



13. Which one of the following best describes the purpose of Data protection legislation?



    To give computer owners the right to protect themselves against computer fraud.

     To give software owners the right to promote software copyright.




     To give governments the right to control data access on the Internet.

     To give a right to individuals to establish the existence of personal data.



14. Which one of the following is the reason that users should log on with a username and password?



    To be aware of who is in the building



    To check up on the time-keeping of users



    To protect computers on a network against unauthorised use



    To enable a personalized greeting for each user



15. Which one of the following is a feature of software copyright?



    It denies the rights of the software author.



    It recognises the rights of the software author.



    It makes software freeware.



    It encourages software piracy.



16. Which one of the following can help maintain a good posture when sitting in front of a computer?



    Using a low level of lighting.



    Sitting close to the computer monitor.



    Correctly positioning the computer, desk and seat.



    Recycling printer cartridges.



17. Which one of the following describes RSS (Really Simple Syndication)?



 A radio programme posted on a website that can be downloaded and played later.



 A Web feed format used to publish frequently updated content such as blog entries, news headlines or podcasts.

 An online journal where an author posts comments and observations in chronological order.



    Real-time text-based communication between two or more people over a network such as the Internet.



18. Which one of the following is safe to post on a social networking website?



    A personal telephone number



    A home address



    Hobbies



    A school or work-place address.



19. Which one of the following virtual communities normally allows sharing of photos and video clips?



    Internet chat rooms



    Internet forums



    Social networking websites



    Online computer games

20. Which one of the following describes an audio or video recording posted on a website that can be downloaded and played later?



    An RSS feed.



    A broadcast.



    A web log.



    A podcast.



21. Which one of the following is a software application that allows a computer to respond to voice commands?



    A screen reader.



    A screen magnifier.



    A speech recognition utility.



    An on-screen keyboard.



22. Which one of the following statements about Internet connection services is true?



    Broadband connections are always-on while your computer is switched on.



    Dial-up connections are usually faster than broadband connections.



    You cannot use your telephone line to make calls while using a broadband connection.



    Dial-up connections are always-on while your computer is switched on.



23. Which one of the following is an online journal where an author posts personal views and observations in a chronological order?



    Podcast



    RSS feed.



    Blog.



    E-mail



24. Which one of the following is unsafe online activity?



    Giving your home address to someone you met in a chat room.



    Using a screen name or nick name that cannot identify you.



    Meeting someone you met online face-to-face in the company of your friends.



    Keeping your social network profile private.



25. Which one of the following is good working practice when using a computer?



    Reducing the light level in the area around the computer



    Taking frequent breaks away from the computer



    Sitting in a comfortable armchair when using the computer



    Positioning the keyboard below wrist level on the desk



26. Which one of the following is a type of input/output port?



    Firewall



    Firewire



    Firmware








    Linear







27. Which one of the following monitors incoming network traffic to prevent unauthorized attacks?







    Dataguard







    Firewall







    Fireguard







    Datashield







28. Which one of the following statements about software copyright is true?







    Copyright promotes the illegal use of software.







    Copyright is the exclusive legal right of software authors to produce copies of their own software.







    Copyright is designed to protect a disk against computer viruses.







    Copyright will prevent a CD-ROM from being duplicated.







29. Which one of the following allows or denies users the privileges to create, view, change or delete data on a computer system?







    Client rights







    Access rights







    Sign on rights







    Entry rights







30. The theft of which one of the following would result in the loss of contact details?







    Printer







    PDA







    Modem







    RAM







31. Which one of the following describes Instant Messaging (IM)?







    A Web feed format used to publish frequently updated news headlines, in a standardised format.







    Technology that enables the delivery of telephone conversations over the Internet







    Real-time text-based communication between two or more people over the Internet







    A frequently updated journal or diary often hosted by a third party on the Internet.







32. Which one of the following describes uploading files?







    Transferring data from a personal computer to a web server







    Copying a free image from a web page







    Transferring data from a web server to a personal computer







    Saving a Webpage from the Internet to a personal computer







33. Which one of the following is a software application that helps users with a physical disability to enter characters on a PC?







    A screen reader







    An on-screen keyboard.



                  A screen magnifier



    A screen saver







34. Which one of the following virtual communities normally allows sharing of photos and video clips?







    Internet chat rooms







    Internet forums







    Social networking websites







    Online computer games







35. Which one of the following statements about Internet connection services is true?







    Dial-up connections are always-on while your computer is switched on.







    Dial-up connections do not stop you from using your telephone line to make calls.







    Broadband services allow you to share a single connection with more than one computer.







    Broadband services usually are slower than dial-up connections.







36. Which one of the following is safe to post on a social networking website?







    A personal telephone number







    A home address







    Hobbies







    A school or work-place address







37. How does copyright relate to stories downloaded from a national newspaper’s web site?







    Copyright never applies to stories downloaded.







    Full copyright applies to stories downloaded.







    Copyright applies for one month from download date.







    Only part of copyright applies to stories downloaded.








Propellerads