It Objektif
It Objektif
It Objektif
1. Tina creates a business proposal on her home computer. She wants to use a storage device to save the proposal and take
it to her office.
Which of the following devices will Tina use to store the files?
A. Microphone
B. Speakers
C. CD-R (Correct Answer)
D. Modem
2. Apurva needs to connect a printer to his computer. He asks you about the parts of a computer that he can use to connect
the printer.
What will you tell Apurva? Select two.
A. Graphics card
B. Modem
C. Sound card
D. Parallel port (Correct Answer)
E. Universal serial bus (USB) port (Correct Answer)
3. You want to create a document on your computer.
In what order will you perform the following steps when you start creating the document?
Arrange the steps in the following list in the order in which you will perform them. Place the first step at the top of the list.
Steps:
1.
Log on to the computer.
2.
Create the document.
3.
Turn on the computer.
4.
Save the changes.
5.
Start the program.
Steps in Correct Order:
C. Turn on the computer.
A. Log on to the computer.
E. Start the program.
B. Create the document.
D. Save the changes.
4. Your friend wants to view your live image while you chat with her online.
Which of the following devices installed on your computer will help her do this?
A. Web cam (Correct Answer)
B. Printer
C. Scanner
D. Microphone
5. Alexander needs to prepare the transcript for an audio file saved on his office computer. He wants to listen to the audio
without disturbing his colleagues sitting nearby.
Which of the following hardware devices will Alexander use?
A. Headphone (Correct Answer)
B. Speaker
C. Microphone
D. Web cam
6. Niraj wants to use his office computer. To log on to the computer, he needs to enter his logon details.
Which of the following options does Niraj need in order to log on to the computer? ^ Select two.
A. User name (Correct Answer)
B. Home address
C. Office name
D. Password (Correct Answer)
E. Office address
7. Markus uses his computer to calculate the money he spent on transportation costs in the last two months.
Which part of his computer will perform the calculations?
A. Monitor
B. Central processing unit (CPU) (Correct Answer)
C. DVD
D. Hard disk
Internet and the World Wide Web
Lesson 1: The Internet
22. You connect your computer to the Internet to find some information.
Which of the following terms describes a computer that is connected to the Internet?
A. Online (Correct Answer)
B. Offline
C. Stand by
D. Logged off
23. Your sister travels to another country for an on-site business project. You want to tell her about your new job by
sending her an e-mail message from your computer.
Which of the following devices will you use to connect your computer to the Internet?
A. Printer
B. Scanner
C. Modem (Correct Answer)
D. Sound card
24. Morten wants to play a game online. He hears modem tones every time his computer sends a request to the Internet
service provider (ISP) to establish the Internet connection.
What type of Internet connection does Morten use?
A. Dial-up (Correct Answer)
B. Broadband
C. WiFi
D. Dedicated
Lesson 2: The World Wide Web
25. Your friend publishes some photographs on his Web site. You want to view these photographs.
After connecting your computer to the Internet, which of the following programs will you start to access your friend's Web
site and view the photographs?
A. Web browser (Correct Answer)
B. Word processor
C. E-mail client
D. Antivirus
26. You want to know more about active volcanoes in the world. You connect your computer to the Internet to find
information based on the keyword "active volcanoes."
Which of the following features of the World Wide Web (WWW) will you use?
A. Search engine (Correct Answer)
B. Plug-in
C. Uniform Resource Locator (URL)
D. E-mail
27. Chris wants to send an e-mail message to his friends. He has a modem connected to his desktop computer.
What else does Chris need to send the e-mail message?
A. Personal digital assistant (PDA)
B. Internet connection (Correct Answer)
C. Web cam
D. Printer
28. Susan helps her son prepare for a computer exam. While describing the World Wide Web (WWW), she explains that he
can access a Web site by using a unique alphanumeric address.
To which of the following terms is Susan referring?
A. Uniform Resource Locator (URL) (Correct Answer)
B. Web browser
C. Internet service provider (ISP)
D. World Wide Web (WWW)
Computer Security and Privacy
Lesson 1: Introduction to Computer Security and Privacy
53. Paul receives an e-mail message from his friend Karen that asks for his passport details. Paul doubts that Karen actually
sent him the message. He calls Karen and discovers that she did not send any such message.
Which of the following terms refers to the kind of attack described in this scenario?
A. Spoofing (Correct Answer)
B. Tracking
C. Decoding
D. Redirection
54. Kate receives an e-mail message from an online computer store offering her a new laptop at a very low price. She clicks
the hyperlink in the message to open the Web page. The page requests her credit card details, and she enters her credit
card number. After a few days, Kate finds that more money has been drawn on her credit card than she specified and that
she did not receive the laptop. Kate realizes that she has been tricked by someone who created a site that looks like the
actual computer store, but is not the official site for the computer store.
Which one of the following terms refers to the type of attack described in this scenario?
A. Decoding
B. Encryption
C. Phishing (Correct Answer)
D. Spying
55. Susan accidentally deletes her company's inventory report from her computer.
What is this type of computer threat called?
A. Human error (Correct Answer)
B. Spoofing
C. Phishing
D. Software piracy
56. The office of A. Datum Corporation is located in an earthquake-prone area. The corporation wants to protect its critical
data that is stored on computers.
Which one of the following actions will help the corporation protect the critical data in case of an earthquake?
A. Installing a virus protection program
B. Backing up the data and storing it at another location (Correct Answer)
C. Using spyware-fighting software
D. Installing a firewall to prevent hacking
Lesson 2: Protecting Your Computer
57. Brian installs a new program on his computer. One day, his friend Jason visits him and notices the program. Jason
informs Brian that this particular program can send sensitive information to a malicious recipient.
Which of the following programs can help Brian detect and prevent such malicious activities on his computer?
A. Worm
B. Trojan horse
C. Spyware-fighting software (Correct Answer)
D. Ethernet
58. You store sensitive data on your computer. Therefore, you need to restrict access to this data by others who use your
computer.
What will you do to restrict access?
A. Install Microsoft
Windows