Modul 1 Sample Test
Modul 1 Sample Test
Modul 1 Sample Test
The following sample test for Module 1, Concepts of Information and Communication
Technology (ICT), contains 36 multiple-choice questions. Attempt each of the 36 questions.
Each question has one correct answer.
Enter A, B, C, or D in answer.doc in the space for question number.
4. Which one of the following could lead to the spread of a malicious program?
a. Using only software that has been checked for viruses.
b. Maintaining regularly updated anti-virus software.
c. Opening only virus-checked file attachments from known sources.
d. Using a USB Flash Drive from an unknown source to exchange data.
5. Which one of the following protects a computer from the risk of malicious programs?
a. PC diagnostic software.
b. Web tracking software.
c. Anti-spam software.
d. Anti-spyware software.
6. Which one of the following describes why it is important to update antivirus software
regularly?
a. To ensure the software identifies old viruses.
b. To protect your computer from all known viruses.
c. To protect your computer from unwanted bulk messages.
d. To prevent the spread of malicious programs on the Internet.
7. Which one of the following is a term for an audio or video recording posted on a web site
that can be downloaded and played later?
a. Podcast.
b. Blog.
c. VoIP.
d. RSS Feed.
8. Which one of the following types of software would you most likely use to create a letter?
a. Web browsing software.
ECDL-tests.com ECDL Module 1 Sample Test
b. Spreadsheet software.
c. Accounting software.
d. Word processing software.
10. The computers in your office building are connected together so staff can share files and
printers. What is this arrangement of computers called?
a. The Internet.
b. A Local Area Network.
c. The World Wide Web.
d. A network port.
11. Which of the following systems will help to improve communications within the company?
a. Excel
b. Powerpoint
c. Email
d. Solitaire
13. Which one of the following is a private network that allows specified external users
access?
a. Intranet.
b. WorldNets.
c. Internet.
d. Extranet.
14. Which one of the following is a software application that assists users who are visually
impaired to identify and interpret what is displayed on screen?
a. A screen calendar.
b. A word processor.
c. A screen reader.
d. A web log.
15. Which one of the following describes why firewalls are used?
a. To prevent unauthorised access by incoming transmissions.
b. To prevent destruction of a computer in the event of a fire.
c. To enable easy downloading of data from web sites.
d. To detect and disable viruses already on a computer.
18. Which one of the following is the reason that users should log on with a username and
password?
a. To be aware of who is in the building.
b. To check up on the time-keeping of users.
c. To protect computers against unauthorised use.
d. To enable a personalised greeting for each user.
20. Which one of the following statements describes a good approach to information security
for an organisation?
a. There are no procedures for reporting security lapses.
b. Staff passwords are not changed regularly.
c. Sensitive data is available to everyone that requests it.
d. Keeping an off-site backup of all files.
21. Which one of the following is the best way to protect a computer against computer
viruses?
a. Only virus-check e-mail attachments.
b. pdate antivirus software on a regular basis.
c. Always make sure that the operating system is up to date.
d. UOnly download files from the Internet during business hours.
22. Which one of the following would be considered the BEST way to store a PIN number?
a. Keep a written note of it with you bank cards.
b. Store it on your computer.
c. Memorise it.
d. Keep a written note of it in your office drawer.
23. Which one of the following describes why users should lock their computer when leaving
their desk?
a. To prevent a waste of electricity.
b. To prevent unauthorised access to data.
c. To prevent data from getting corrupted.
d. To prevent the computer from malfunctioning.
ECDL-tests.com ECDL Module 1 Sample Test
24. There are rules governing the rights of a data subject and the responsibilities of a data
controller. What are these rules called?
a. Data Privacy Policy.
b. Data Management Act.
c. Data Protection legislation or conventions.
d. Data Publicity Law.
27. Which one of the following describes how confidential information should be sent using
an unsecured network?
a. In an unsigned email.
b. In an attachment.
c. In a compressed format.
d. In an encrypted format.
28. Which one of the following statements about the Internet is TRUE? [1 Mark]
a. The Internet is a global network that links many computer networks together.
b. The Internet is a private company network.
c. The Internet is a visual representation of linked documents.
d. The Internet is a network operating system.
31. Which one of the following describes why Bluetooth device settings should be adjusted?
a. To increase the range of the device.
b. To improve the quality of reception.
c. To prevent the risk of unauthorised access.
d. To reduce interference from other devices.
ECDL-tests.com ECDL Module 1 Sample Test
32. Which one of the following would result in the loss of contact details if it were stolen?
a. Printer.
b. Mobile Phone.
c. Modem.
d. MP3.
34. Which one of the following is a text-based communication between two or more people
over the Internet?
a. Podcasting.
b. Really Simple Syndication.
c. Voice over Internet Protocol.
d. Instant Messaging.
35. Which one of the following describes how a breach in IT security should be reported?
a. Using the telephone.
b. By emailing to the IT Manager.
c. Using the method listed in the organisation’s security policy.
d. Using any means of communication.
36. Which one of the following describes why it is important to have a secure off-site backup
copy of files?
a. To improve accessible of files from other locations.
b. To speed up the process of accessing the files at any time.
c. To prevent the loss of data in the event of a fire.
d. To reduce the possibility of data theft.