1.
Which type of computer is used to operate large corporate systems and databases
Correct Answer
C. Mainframe
Explanation
Mainframe computers are used to operate large corporate systems and databases due to their ability to handle massive amounts of data and perform complex calculations. They are designed to support multiple users and run critical applications simultaneously. Mainframes offer high processing power, storage capacity, and reliability, making them ideal for organizations that require a centralized and secure computing environment. They are often used in industries such as banking, healthcare, and government, where large-scale data processing and transaction handling are essential.
2.
Which of the following describes the essential components of Information Technology?
Correct Answer
C. Hardware, software and communications technologies
Explanation
The essential components of Information Technology are hardware, software, and communications technologies. Hardware refers to the physical components of a computer system, such as the computer itself, peripherals, and storage devices. Software includes the programs and applications that run on the hardware, enabling it to perform various tasks. Communications technologies involve the networks and protocols that allow computers to connect and communicate with each other. These three components work together to support the functioning and utilization of Information Technology.
3.
The speed of the CPU is measured in:
Correct Answer
A. Gigahertz (GHz)
Explanation
The speed of the CPU is measured in Gigahertz (GHz). Gigahertz is a unit of measurement that represents one billion cycles per second. It indicates the speed at which the CPU can execute instructions and process data. A higher GHz value generally indicates a faster CPU and better performance.
4.
Which of the following statements about formatting a floppy disk for the first time is true?
Correct Answer
A. Formatting prepares a floppy disk to store data
Explanation
Formatting a floppy disk for the first time is true as it prepares the disk to store data. Formatting involves creating a file system on the disk, which allows the operating system to organize and manage the data stored on it. This process erases any existing data on the disk and sets it up for use by allocating storage space and creating necessary data structures. By formatting the disk, it becomes ready to store new data and can be accessed by the computer to read from or write to it.
5.
Which of the following tasks is a function of the operating system?
Correct Answer
C. File management
Explanation
File management is a function of the operating system as it involves organizing, storing, and retrieving files on a computer. The operating system provides a file system that allows users to create, delete, rename, and move files and directories. It also handles file permissions, ensuring that only authorized users can access or modify certain files. Additionally, the operating system manages disk space allocation, ensuring efficient storage and retrieval of files. Overall, file management is a crucial task performed by the operating system to ensure the efficient and secure handling of files on a computer system.
6.
Which of the following tasks is a function of the operating system?
Correct Answer
B. File management
Explanation
The correct answer is file management. The operating system is responsible for managing files and directories on a computer system. This includes tasks such as creating, deleting, moving, and organizing files and folders. The operating system provides a file system that allows users to store and retrieve data efficiently. It also controls access to files, ensuring that only authorized users can read, write, or modify them. File management is an essential function of the operating system that helps users organize and maintain their files effectively.
7.
Which software would you use to create a mailshot letter?
Correct Answer
D. Word processing software
Explanation
Word processing software is the correct answer because it is specifically designed for creating and editing documents, including letters. It provides features such as formatting options, spell check, and the ability to insert images and tables, which are essential for creating a professional mailshot letter. Web browsing software is used for accessing and navigating the internet, spreadsheet software is used for organizing and analyzing data, and accounting software is used for managing financial transactions, none of which are suitable for creating a mailshot letter.
8.
The computers in your office building are connected together so staff can share files and printers. What is this arrangement of computers called?
Correct Answer
B. LAN
Explanation
A LAN (Local Area Network) is the correct answer because it refers to a network arrangement where computers in a specific location, such as an office building, are connected together to share files and printers. FTP (File Transfer Protocol), WWW (World Wide Web), and HTTP (Hypertext Transfer Protocol) are not the correct answers as they refer to specific protocols or technologies used for different purposes on the internet.
9.
An intranet is:
Correct Answer
C. A private company network
Explanation
The correct answer is "A private company network." An intranet refers to a private network that is only accessible to the members of a specific organization, such as employees or authorized users. It is used to share information, collaborate, and communicate within the organization. Unlike the internet, which is a public network, an intranet is restricted to internal users, ensuring privacy and security for the company's data and resources.
10.
Which of the following devices do you need to be able to communicate with other computers using the telephone network?
Correct Answer
B. Modem
Explanation
A modem is needed to communicate with other computers using the telephone network. A modem is a device that allows computers to transmit data over telephone lines. It converts digital signals from the computer into analog signals that can be transmitted over the telephone lines, and vice versa. This enables communication between computers over long distances using the existing telephone infrastructure. CD-ROM, plotter, and speakers are not directly involved in communication over the telephone network.
11.
Which of the following tasks would be more suited to a person rather than a computer?
Correct Answer
D. Tasks that require imagination
Explanation
Tasks that require imagination would be more suited to a person rather than a computer because imagination is a human cognitive ability that involves creativity, originality, and the ability to think outside the box. Computers are not capable of generating new ideas or thinking creatively like humans can. They are designed to perform tasks that can be programmed and follow a set of instructions. Therefore, tasks that require imagination, such as brainstorming ideas, creating art, or writing stories, are better suited for humans who can use their creativity and unique perspectives.
12.
Which of the following is NOT a use of computer applications in a school?
Correct Answer
D. Stock Control
Explanation
Stock control is not a use of computer applications in a school because it is not directly related to the educational activities or administrative tasks typically performed in a school setting. Class timetabling, student registration, and computer-based training are all common uses of computer applications in schools to manage schedules, enroll students, and deliver educational content. However, stock control, which involves managing inventory and tracking supplies, is more commonly associated with businesses or organizations that deal with physical goods rather than educational institutions.
13.
Which of the following is NOT a feature of electronic commerce?
Correct Answer
B. There is pHysical contact between buyer and seller
Explanation
Electronic commerce, or e-commerce, refers to the buying and selling of goods and services over the internet. It eliminates the need for physical contact between the buyer and seller, as all transactions are conducted online. This allows for goods to be advertised and prices compared easily, transactions to be processed quickly, and services to be available 24 hours a day. Therefore, the statement "There is physical contact between buyer and seller" is not a feature of electronic commerce.
14.
Computer use can cause repetitive strain injury (RSI). Which of the following NOT is the best way to avoid this?
Correct Answer
B. Use the computer sitting on an armchair
Explanation
Using the computer sitting on an armchair is not the best way to avoid repetitive strain injury (RSI). Sitting on an armchair may not provide proper support and posture for the body, leading to strain on the neck, back, and wrists. It is important to have an ergonomic setup, including a comfortable chair with proper back support and adjustable height, as well as positioning the monitor at the correct height and keeping the wrists level with the keyboard to avoid RSI. Additionally, ensuring the computer is in a well-lit area is important for eye health and reducing strain.
15.
Which of the following is a good password policy for an organisation?
Correct Answer
A. All passwords are changed regularly
Explanation
A good password policy for an organization is to ensure that all passwords are changed regularly. This practice helps to enhance security by reducing the risk of passwords being compromised or guessed over time. Regularly changing passwords ensures that even if one password is compromised, it will not remain valid for an extended period, making it harder for unauthorized access to occur.
16.
What is the best way of preventing your computer from being infected with a virus?
Correct Answer
B. Have updateable anti-virus software running on your computer
Explanation
Having updateable anti-virus software running on your computer is the best way to prevent your computer from being infected with a virus. This is because anti-virus software is specifically designed to detect and remove viruses from your computer. By keeping the software up to date, you ensure that it has the latest virus definitions and can effectively protect your computer against new and emerging threats. Simply virus-checking email attachments or never opening any email attachments may not be sufficient as viruses can be spread through various other means, such as malicious websites or infected files downloaded from the internet.
17.
Which of the following statements describes shareware?
Correct Answer
C. Shareware is software you may pay for after an initial time period of use
Explanation
Shareware refers to software that is initially provided to users for free, allowing them to use it for a limited time period. After this trial period, users are expected to pay a fee or purchase a license to continue using the software. This model allows users to try out the software before committing to a purchase, providing them with an opportunity to evaluate its features and functionality. Therefore, the statement "Shareware is software you may pay for after an initial time period of use" accurately describes the concept of shareware.
18.
There are rules governing the storage and supply of computer-based information. What are these rules called?
Correct Answer
C. Data Protection Act
Explanation
The correct answer is Data Protection Act. The Data Protection Act refers to a set of rules and regulations that govern the storage and supply of computer-based information. It is designed to protect individuals' personal data and ensure that it is processed and handled securely. The act outlines principles for the fair and lawful use of personal data, the rights of individuals to access and control their data, and the responsibilities of organizations that handle personal data. It aims to prevent unauthorized access, loss, or misuse of personal information and promote transparency and accountability in data handling practices.