1-Which of The Following Is True About Organization Information Security Policy?
1-Which of The Following Is True About Organization Information Security Policy?
security policy?
a- Laptop
b- Server
c- Mainframe
d- Personal Computer
a- Megabytes
b- Megahertz
c- Megacycles
d- Megawatts
RAM ROM
5-
a- OS is loaded into it when the PC is switched on
b- Its contents disappear when the PC is switched off
c- Its contents are fixed during the manufacture of PC
d- Its contents change constantly as the PC is used
e- You cant write to this type of memory
RAM: A, B , D
ROM: C , E
6- 1 Gigabyte is approximately:
a- 1000 bytes
b- 1000 bits
c- 1000 kilobytes
d- 1000 megabytes
7- Which one of these devices can be used both to input & output
data in the same time?
a- Printer
b- Microphone
c- Touch screen
d- Light pen
a- Netscape Navigator
b- Linux
c- Outlook
d- Windows
e- Yahoo!
B,D
11- Which one of these is the type of network that links computers in
different cities or countries?
a- LAN
b- Ethernet
c- PSTN
d- WAN
a- Data transfer is slower with a digital line than with an analog line
b- The processor speed of the computer affects the speed of data
transfer on the internet
c- A 14.4 kbps modem transfers data more slowly than a 56.6 kbps
modem
d- The speed of data transfer doesnt vary significantly with the time
of day
C,D
17- For which two of the following tasks in hospitals & healthcare
would large scale computer applications be most appropriate?
a- Bereavement counseling
b- Tracking treatment costs
c- Informing a patient of a diagnosis
d- Providing a medical database
e- Treating mental health issues
B, D
a- Express
b- Electric
c- Electronic
d- Efficient
C, D
A, C
21- Which one of the following demonstrates poor health & safety
practice in the use of computers?
23- Which two of the following statements are true about access
rights?
B,C
B
25- A mobile phone which has been insured but not password
protected has been stolen. Which one of the following consequences
may result?
29- Which two of the following statements are true about data
protection legislation?
C, E
30- For which two of the following tasks in hospitals & healthcare
would large scale computer applications be most appropriate?
A, D
33- Which one of the following is a digital line used for both voice &
data?
a- ISDN
b- FTP
c- HTTP
d- PSTN
B, D
a- Light pen
b- Joystick
c- Speakers
d- Keyboard
a- Does not control devices such as printers that are connected to the
PC
b- Is the hardware the computer uses to run software
c- Is not necessary on some very powerful PCs
d- Enables all the other programs to run
D
41-Which one of these is application software?
a- VGA card
b- Word processing
c- CPU
d- HD
a- Light pen
b- Printer
c- Plotter
d- Mouse
e- Speaker
A, D
44- Which one of these storage devices provides the fastest access to
data?
a- Zip disk
b- Floppy diskette
c- Hard disk
d- CD-ROM
C
a- Windows
b- Mac OS
c- Outlook
d- Internet explorer
e- Google
A, B
a- Testing
b- Design
c- Analysis
d- Programming
a- LAN
b- Internet
c- PSTN
d- WAN
a- Mouse devices
b- Monitors
c- Applications
d- Files
e- Disk storage
C, D, E
B, D
52- You can reduce the risk of eye strain by one of the following
actions
C, E
54-A laptop which has been password protected but not backed up
has been stolen. Which one of the following consequences may result?
a- De-installing
b- Disinfecting
c- Restoring
d- Scanning
57- Software that you can use without the need for any payment is
referred to as:
a- E-ware
b- Freeware
c- Shareware
d- Multi-user software
B
59- You can reduce the risk of RSI by one of the following actions
a- Monitor
b- Windows
c- System case
d- Scanner
A, B
a- Megabyte
b- Terabyte
c- Gigabyte
d- Kilobyte
e- Byte
EDACB
a- Performing calculations
b- Sharing very large video files, such as movie trailers
c- Sharing files between workers at different locations
d- Transmitting credit card details
a- Printers
b- Disk space
c- Monitors
d- Applications
e- Keyboards
A, B, D
B, D
75- A PDA that has been backed up but not password protected has
been stolen. Which one of the following consequences may result?
a- Loss of the right to use the software came with the PDA
b- Time wasted on re-entering all the records in a replacement PDA
c- Misuse of confidential files & telephone numbers
d- Loss of contact details on the stolen PDA
76- The World Wide Web is the name that is given to:
77- You can reduce the risk of eye-strain by one of the following
actions:
a- Transcoder
b- Digitizer
c- Modem
d- Translator Unit
B
82-Which one of the following contributes to a good working
environment for a computer operator?
B
85-
86-
87-
88-
89-
90-
91-
92-
93-
94-
95-
96-
97-
98-
99-
100-
101-
-
102-
104-