ICT GENERAL KNOWLEDGE

Question 1 of 29

Medal-premium 1

Why would you use a folder structure to save your files?

Select one or more of the following:

  • It makes finding files easier and is tidy

  • It isn't always that important as long as you can remember what your files are called

Question 2 of 29

Medal-premium 1

You have been asked to work together on a poster with a person from another branch of the company. Using the Internet, what methods could you use to share the document?

Select one or more of the following:

  • Store files online

  • Use web-based software like Google Apps to allow everyone to work together at the same time

  • Use email to send files to each other

  • None of the above, it is not possible

Question 3 of 29

Medal-premium 1

When you work with other people via the Internet the risk of viruses can be a problem.

Select one of the following:

  • True
  • False

Question 4 of 29

Medal-premium 1

What can you do to minimise the risk of computer viruses?

Select one or more of the following:

  • Install anti-virus software and update it regularly

  • Treat unknown email attachments with caution

  • Do not open email attachments

  • Install anti-virus software once but there is no need to update it as this can prove expensive

Question 5 of 29

Medal-premium 1

You need to make back-up copies of important files to avoid losing information.

Select one of the following:

  • True
  • False

Question 6 of 29

Medal-premium 1

If a file is sent to you by a person you do not know, open it as soon as possible to see what it is before deleting it.

Select one of the following:

  • True
  • False

Question 7 of 29

Medal-premium 1

If the date was wrong on your computer, can you change it and, if so, what would you do?

Select one of the following:

  • No you can't change it

  • Yes you can change it. Click on the clock and choose 'Change Date and Time Settings'

Question 8 of 29

Medal-premium 1

It important to back up files to somewhere other than your computer.

Select one of the following:

  • True
  • False

Question 9 of 29

Medal-premium 1

If an email is sent to you containing someone’s personal information, why is it wrong to forward it to other people?

Select one of the following:

  • It isn't wrong, once information is in an email it becomes general information

  • You need to consider the information before forwarding it on to others in case it is personal or sensitive and may also be covered by Data Protection laws

Question 10 of 29

Medal-premium 1

If you were making a PowerPoint presentation about wild animals what would you need to do to make it more appealing to children?

Select one of the following:

  • Add audio

  • Add pictures

  • Add colour

  • Add animations

  • Use simple text and short sentences

  • All of the above

  • None of the above, it doesn't really make that much difference

Question 11 of 29

Medal-premium 1

What digital content can be stored on an iPod?

Select one or more of the following:

  • Audio

  • Images

  • Videos

  • Only music

Question 12 of 29

Medal-premium 1

How could you send an email to a group of people keeping each person in the group’s email address private?

Select one of the following:

  • You can't do this

  • Use BCC

  • Send the email to each person individually

Question 13 of 29

Medal-premium 1

What effects would the Trojan horse have on your computer?

Select one of the following:

  • Slows down the computer, allows or causes pop-ups, it can copy key strokes and steal passwords.

  • None really. These aren't actually that serious.

Question 14 of 29

Medal-premium 1

If a USB memory stick had been infected with a virus, could you make it safe to use again?

Select one of the following:

  • No, you would need to throw it away

  • Yes, copy all the files onto a PC or another USB stick

  • Yes, run anti-virus software on the USB stick to clean the virus

Question 15 of 29

Medal-premium 1

What happens when you right click on the mouse?

Select one of the following:

  • Nothing

  • Copy and Paste become available

  • A short, relevant menu, appears

Question 16 of 29

Medal-premium 1

Choose the input devices.

Select one or more of the following:

  • Mouse

  • Printer

  • Standard Monitor

  • Microphone

  • Keyboard

  • Speakers

  • Digital camera

  • Projector

  • Touch Screen

Question 17 of 29

Medal-premium 1

Which of the following is a file extension?

Select one of the following:

  • www.

  • .jpeg

  • candidate@C&G.com

  • App

Question 18 of 29

Medal-premium 1

A Mail Merge is a function in Word which allows you to use the same information, such as a letter, to send to many different addresses.

Select one of the following:

  • True
  • False

Question 19 of 29

Medal-premium 1

You can use any picture you find on the internet for anything you want.

Select one of the following:

  • True
  • False

Question 20 of 29

Medal-premium 1

When looking at information on the Internet, it important to think who has written it and if the information you are reading is correct.

Select one of the following:

  • True
  • False

Question 21 of 29

Medal-premium 1

It a good idea to store confidential information on a memory stick.

Select one of the following:

  • True
  • False

Question 22 of 29

Medal-premium 1

Which of the following is a website address (URL)?

Select one of the following:

  • chris@cgpbooks.co.uk

  • santa.jpeg

  • www.bbc.co.uk/news

  • cgpbooks.html

Question 23 of 29

Medal-premium 1

If your emails aren't being sent or you can't access the internet you need to check the network settings on your computer.

Select one of the following:

  • True
  • False

Question 24 of 29

Medal-premium 1

Choose the output devices.

Select one or more of the following:

  • Projector

  • Keyboard

  • Mouse

  • Speakers

  • Printer

  • Touch screen

  • Scanner

Question 25 of 29

Medal-premium 1

It is important to defragment your hard disk from time to time.

Select one of the following:

  • True
  • False

Question 26 of 29

Medal-premium 1

Which one of the following passwords is the strongest?

Select one of the following:

  • England

  • 12345678

  • J0$hua*Y17

  • farmer111

Question 27 of 29

Medal-premium 1

What is a firewall used for?

Select one of the following:

  • To clear internet history

  • To block unwanted downloads

  • To change screen resolution

  • To make the computer run faster

Question 28 of 29

Medal-premium 1

Which one of the following could a scanner be used for?

Select one of the following:

  • To take a photograph of someone

  • To create a digital copy of a document (picture, text, photo etc.)

  • To correct formulas and functions

  • To record a piece of electronic music

Question 29 of 29

Medal-premium 1

Which one of the following is the symbol for a wild card search?

Select one of the following:

  • >=

  • <=

  • *

  • $

Icon_fullscreen

ICT GENERAL KNOWLEDGE

Liz Riggs
Quiz by , created over 1 year ago

ICT general knowledge questions related to ICT Functional Skills exams Levels 1 and 2.

Eye 269
Pin 10
Balloon-left 0
Tags No tags specified
Liz Riggs
Created by Liz Riggs over 1 year ago
Close