0% found this document useful (0 votes)
27 views

C-An Internet Forum

An internet forum allows users to hold discussions and post messages on specific subjects. Ergonomics refers to the relationship between workers and their working environment. It is important to update anti-virus software regularly to detect new viruses.

Uploaded by

galalatef2018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

C-An Internet Forum

An internet forum allows users to hold discussions and post messages on specific subjects. Ergonomics refers to the relationship between workers and their working environment. It is important to update anti-virus software regularly to detect new viruses.

Uploaded by

galalatef2018
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

1- Which one of the following is considered a virtual community that

allows users to hold discussions and post messages on specific subject

a- An RSS feed

b- A FireWire

c- An internet forum

d- An operating system

2- Which one of the following is not safe to be posted on a social


networking website

a- Your favorite restaurant

b- Your hobbies and interests

c- Your telephone number

d- Your favorite type of music

3- Which of the following refers to the relationship between workers


and the working environment

a- Bionomics

b- Astronomic

c- Genomics

d- Ergonomics
4- Why is adequate lighting important when using a computer

a- it helps avoid neck and back pain

b- It helps prevent eyestrain and headaches

c- It helps avoid radiation hazards

d- It prevents repetitive strain injuries

5- Which one of the following is good practice in saving energy

a- Switch off the PC if it will not be in use for a long time

b- Reboot the PC regularly

c- Update your computer screen saver

d- Change the color of the screen background

6- Which one of the following is needed to identify users when logging


on to a computer

a- Antivirus software

b- User name and password

c- E-mail account

d- Firewall
7- Why is it important to have an off-site backup copy of files

a- To provide a copy of the files in case of data loss

b- To create more free space on the hard disk

c- To remove unwanted files from the hard disk

d- To increase the speed of the computer

8- Which one of the following determines what type of traffic is


allowed to pass in and out of the system

a- Netwall

b- gateway

c- Firewall

d- Firewire
9- Which one of the following is the most likely way for a virus to be
transmitted to a computer?

a- Making backup copy of folders and files

b- Using a secure computer to send e-mail

c- Opening files from unknown sources

d- Restoring files from recycle bin

10- Why should anti-virus software be updated regularly

a- To avoid installing another antivirus software

b- To stop any unauthorized access to the computer

c- To enable the anti-virus software to detect new viruses

d- To register a new license agreement

11- Which one of the following gives the developers of software the
legal protection to publish their work

a- Password authentication

b- Copyright legislation

c- Data protection Act

d- Data encryption
12- Which one of the following is a type of software that you are
allowed to try for a short period before buying it

a- Shareware

b- Freeware

c- Hardware

d- Open source

13- What is the purpose of data protection legislation

a- To protect businesses from computer fraud by employees

b- To allow the authorities to protect records of individuals

c- To give companies the right to publish data about their customers

d- To set out the responsibilities of the data subject

14- The computer components that make up a computer are known


as

a- Freeware

b- Hardware

c- Software

d- Shareware
15- The network that connects computers and equipment wirelessly is
known as

a- WAN

b- WLAN

c- LWAN

d- LAN

16- Which one of the following describes a system of interconnected


computer networks that serves billions of users worldwide

a- intranet

b- internet

c- Extranet

d- World Wide Web

17- Which one of the following allows external users to access an


organization’s Intranet

a- intranet

b- Extranet

c- internet

d- World Wide Web


18- Which one of the following describes the speed with which data is
downloaded and uploaded by your computer

a- Encryption

b- internet connection

c- installation

d- Transfer rate

19- Which one of the following describes the term downloading

a- Connecting several computers with each other

b- Copying files from the computer to the Internet

c- Connecting several computers to the Internet

d- Copying files from the internet to the computer


20- Which one of the following is a common internet connection
option

a- Server

b- Cable

c- VoIP

d- World Wide Web

21- The term for buying and selling goods or services over the Internet
is

a- e-governrnent

b- e-Iearning

c- e-banking

d- e-commerce

22- Which one of the following describes the use of electronic


computers to store, convert and process information

a- Information and Computer Technology

b- Internet and Computer Technology

c- Information and Communication Technology

d- Internet and Control Technology


23- Multimedia learning experience can be gained through

a- e-Iearning

b- e-governrnent

c- e-banking

d- e-commerce

24- The ability to work from home using telephone, fax, and/or
computer technology is known as

a- e-banking

b- Ergonomics

c- Teleworking

d- e-Iearning

25- The fastest way for files to be transferred electronically during


two way text-based communication is

a- Instant Messaging

b- Blog

c- Really Simple Syndication

d- Podcast
26- Which one of the following is a quick and cost effective way to
communicate with your friends across the world

a- Send a letter

b- Send a CD-ROM

c- Send a DVD

d- Send an e-mail

27- Which one of the following terms describes talking to others for
free via programs such as Skype using a headphone

a- Blog

b- RSS

c- IM

d- VoIP

28- A form of syndicated feed which downloads new content to


subscribers' computers as it becomes available is known as

a- Podcast

b- VoIP

c- IM

d- RSS
29- An online diary that contains the user's thoughts, images and
videos to be viewed by other users is known as

a- RSS

b- Podcast

c- IM

d- Web Log (Blog)

30- Which one of the following automatically downloads updated


digital media files constantly to a subscriber's computer

a- RSS

b- Weblog

c- IM

d- Podcast
31- Which one of the following describes a group of people with
similar interests who communicate with each other via internet?

a- Instant Messaging

b- RSS

c- Podcast

d- Virtual Community

32- The computer components that make up a computer are known


as

a- Freeware

b- Hardware

c- Software

d- Shareware
33- Which one of the following allows you to share your thoughts and
upload photos and videos online so other people can interact with
you

a- Posting an entry to your web log

b- Use instant messaging programs

c- Subscribing to RSS feeds

d- Sending an email with the content you want to share

34- Which one of the following is not safe to be posted on internet


forums

a- Hobbies

b- Personal mobile number

c- Favorite movie

d- Favorite food
35- Which one of the following does the term Ergonomics describe

a- The relationship between workers and their managers

b- The relationship between workers and their colleagues

c- The relationship between workers and their environment

d- The relationship between workers and their clients

36- Which one of the following helps in maintaining a good posture

a- The correct positioning of computer, desk and seat

b- A mouse located lower than the keyboard

c- A monitor with a small display screen

d- A rotating monitor without a screen filter

37- Which one of the following should be considered to ensure eye


safety while using a computer

a- The amount and direction of light

b- The type of mouse used

c- The type of computer used during work

d- The type of chair or seat


38- Which one of the following is the benefit of having breaks while
using the computer

a- Relaxing the eyes

b- Preventing data loss

c- Preventing damage in computer components

d- Saving energy

39- Which one of the following is considered best practice to save


energy

a- Changing the computer screen saver

b- Updating the sound card regularly

c- Restarting the computer regularly

d- Putting the computer to sleep

40- Which one of the following helps in protecting the environment

a- Increasing the storage capacity of the computer

b- Recycling paper

c- Upgrading the antivirus software regularly

d- Backing up important files to hard disks


41- Which one of the following explains why a username and
password are needed before logging on to a computer?

a- To enhance the computer performance

b- To enable users to install different applications

c- To identify users when logging onto a computer

d- To backup important files stored in the computer

42- Which one of the following is good practice in preventing a


password from being identified by other users

a- Keeping the same password for a longtime

b- Passwords should have a minimum of eight characters

c- Using short and easy to remember password

d- Consulting your friends for passwords


43- Which one of the following is most likely to be used by a travelling
business person?

a- PDA

b- Server

c- Desktop

d- Network computer

44- Which one of the following is a benefit of having an off-site


backup copy of files

a- To delete unwanted files from the hard disk

b- To increase the capacity of the computer memory

c- To continue your work if data is lost

d- To increase the computer performance


45- Which one of the following is a special piece of hardware or
software designed to protect a computer system from unauthorized
access

a- Firewall

b- Firewire

c- Off-site backup copy

d- Hard disk

46- Changing your username and password regularly is a way to

a- Prevent data theft

b- Update the available applications

c- Protect your computer from viruses

d- Enhance the computer performance


47- Which one of the following is the result of opening files from
unknown sources

a- The transmission of a program update to the computer

b- The transmission of an antivirus program to the computer

c- The transmission of applications to the computer

d- The transmission of a virus to the computer

48- A malicious program that can be transmitted to your computer


through e-mail attachments from unknown sources and corrupting
your files is known as

a- A firewall

b- A blog

c- A virus

d- A password
49- Which one of the following prevents your computer from the
threats of harmful software

a- Upgrading the memory of the computer

b- Upgrading the monitor

c- Updating the anti-virus software regularly

d- Registering new license agreement

50- Which one of the following includes main components of a


computer

a- ROM, Speakers, Screen

b- Hard disk, CPU, RAM

c- CPU , Webcam, Microphone

d- RAM , Scanner, Hard disk

51- Which one of the following protects creative or artistic works from
illegal copying

a- Data protection legislation

b- Digital Signature

c- Copyright

d- Password authentication
52- Which one of the following is a type of software that is available
completely free of any purchase or licensing fee

a- Shareware

b- Freeware

c- Non-freeware

d- Open Source

53- An agreement that requires you to signify acceptance of the terms


and conditions of use of the software is called

a- End-user permission

b- End-user license agreement

c- End-user registry

d- End-user purchasing agreement


54- Which one of the following identifies the main purpose of data
protection conventions

a- To set out the responsibilities of the data controller

b- To protect the rights of the data subject

55- Which one of the following is a version of computer which is small


enough to be held and used in the palm of a hand

a- Server

b- Laptop computer

c- Desktop computer

d- Personal Digital Assistant

56- Which one of the following is a main data protection right for the
data subject

a- To be kept as long as possible

b- To be processed fairly, lawfully and securely

c- To be disclosed for marketing purposes

d- To be processed for any purpose


57- Which one of the following should be done by the data controller

a- Disclosing data to anyone that asks for it

b- Collecting data from any available source

c- Disclosing data for marketing purposes

d- Processing data in illegal manner

58- USB is considered

a- An input/output port

b- A parallel port

c- A network port

d- A serial port

59- Which of the following effects is noticed after adding RAM to a


computer

a- Reduction in number of applications processed

b- Increase in the computer speed

c- Increase in the storage capacity of the computer

d- Increase in the clarity of the screen


60- Which one of the following is measured by the unit MHz

a- Transfer rate

b- Screen resolution

c- RAM size

d- CPU speed

61- Which one of the following is true about RAM (Random Access
Memory)

a- RAM is used to store information on a permanent basis

b- RAM retains information after the power is switched off

c- RAM is a volatile memory

d- RAM is non-volatile memory

62- Which one of the following is a DVD ROM

a- Parallel Port

b- Storage device

c- Serial Port

d- Computer memory
63- Which one of the following does the unit GB measure

a- Storage capacity

b- CPU Speed

c- Speed of graphics card processor

d- Transfer rate

64- Which of the following should be done by the data controller

a- Disclosing data to anyone that asks for it

b- Ensuring that personal data is being erased after being processed

c- Disclosing data for marketing purposes

d- Holding the personal data and disclosing it upon the request of


anyone

65- The term ADSL stands for

a- Asymetric Data Service Line

b- Anonymous Digital Subscriber Link

c- Asymetric Digital Subscriber Line

d- Advanced Digital Secure Link


66- you can know whether contacts are online using

a- RSS

b- Blog

c- IM

d- Podcast

67- The protocol that allows your computer to send and receive voice
based conversations over the internet is called

a- VoIP

b- Internet Protocol

c- Network Protocol

d- Web Log

68- which one of the following is a text-based method of


communication between two or more people

a- Broadcast

b- Broadband

c- Instant Messaging

d- VoIP
69- Which one of the following is an advantage of teleworking

a- Potential feeling of isolation

b- Lack of human contact

c- Reduced or no commuting time

d- Less emphasis on teamwork

70- 1 Terabyte is equal to

a- 1000 megabytes

b- 10000 Megabytes

c- 100000 Megabytes

d- 1000000 Megabytes

71- The Stylus is considered as

a- Output device

b- Input device

c- Input/output device

d- Input/output port
72- Which one of the following is an Input/output device

a- Microphone

b- Speaker

c- Webcam

d- Touchscreen

73- Ubuntu is considered as

a- Application

b- Operating system

c- Input device

d- Storage device

74- To enable users with impairments to input commands to a


computer you can use

a- Screen Magnifier

b- Voice recognition software

c- Screen reader

d- On-screen keyboard
75- The transfer rate is often measured by

a- Mhz

b- Mb

c- Mbps

d- Ms

76- Which one of the following is a disadvantage of e-learning

a- Lack of human interaction

b- Flexible learning location

c- Learn at times convenient to individuals

d- Multimedia learning experience

77- The term ISDN stands for

a- Integrated Services Digital Network

b- International Server Data Network

c- International Secure Digital Network

d- Integrated Selling Data Network


78- Which one of the following is commonly defined as an easy cost
effective way to store, backup, and share all your files from remote
server using the Internet?

a- Hard Disk storage

b- Online storage

c- DVD storage

d- CD storage

79- Which one of the following is the most likely way for a virus to be
transmitted to a computer?

a- Formatting removable drives

b- Restoring files from the recycle bin

c- Deleting unopened email messages

d- Downloading files from untrusted sites

80- Which one of the following would most likely be entered to logon
securely to a computer system or network?

a- Username and password

b- Credit Card number and password.

c- Username and address.

d- Date and time


81- Which one of the following would most likely be the result of
activating a computer virus?

a- Files are saved

b- Files are corrupted

c- Files are printed

d- Files are sorted

82- Which one of the following is commonly described as a small, re-


writable and removable storage device?

a- ROM

b- Trackball

c- Mouse

d- USB Flash Drive

83- Using information technology to provide public services to citizens


is known as

a- E-banking

b- E-learning

c- E-government

d- E-commerce
84- Which of the following statements about broadband is true

a- Broadband is always on

b- Broadband is slower than telephone access

c- The amount you pay each month for broadband depends on the
number of e-mails you send

d- Broadband does not need a firewall to protect the network

85- Which one of the following is used to establish an internet


connection

a- VOIP

b- E-mail

c- Phone line

d- Web browser

86- Which one of the following measures the transfer rate

a- Cycles per seconds

b- Words per second

c- Bits per second

d- Hertz per second


87- Which one of the following would most likely require username
and password for a secure login?

a- Program

b- Internet

c- Computer

d- Mobile

88- Which one of the following describes a computer virus?

a- Program that can't replicate itself and not always harmful

b- Program that infects the computer and prevents it from working

c- Program that detects and removes harmful software

d- Program that is transmitted to computers from trusted sites

89- Which one of the following is a vast physical network that allows
users all over the world to communicate with each other

a- World Wide Web

b- Internet Service Provider

c- Internet

d- Intranet
90- Which one of the following applications allows you to access
information on the internet

a- Spreadsheet application

b- Web browsing application

c- E-mail application

d- Database application

91- Which one of the following manages the system resources on a


computer

a- Browser software

b- Operating system

c- Anti-virus application

d- Database application

92- The generic term for all programs that enable us to easily instruct
the computer is

a- CPU

b- Hardware

c- Software

d- Firewall
93- Which one of the following is an output device

a- Printer

b- Web camera

c- Trackball

d- Scanner

94- Which one of the following is an input device

a- Speakers

b- Screen

c- Touchpad

d- Printers

95- Which one of the following storage types allows you to save your
files on the internet

a- DVD Rom

b- USB flash drive

c- Online file storage

d- Hard disk
96- Which one of the following is a volatile memory

a- EPROM

b- Hard disk

c- RAM

d- ROM

97- Which one of the following is considered a main component of a


computer

a- Microphone

b- Webcam

c- CPU

d- Scanner

98- Which one of the following is an input/output port

a- Firewire

b- Webcam

c- Speakers

d- Touchpad
99- Which one of the following can speed up the performance of a
computer

a- Adding a network printer to a computer

b- Adding RAM to a computer

c- Upgrading the monitor

d- Installing a network card to a computer

100- "What you are" is a method of

a- Authorization

b- Identification

c- Authentication

d- Validation

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy