Search Header Logo

IICDL Computer & Online Essentials 4

Authored by Tracy Treacher

Computers

Professional Development

Used 19+ times

IICDL Computer & Online Essentials 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the following is described as a portable device that can be used to call, text, take photographs and browse the Internet?

Docking station

Desktop

Media Player

Smartphone

Answer explanation

A smartphone is a portable device that allows users to call, text, take photographs, and browse the Internet, making it the correct choice. The other options do not offer all these functionalities.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the government services would most likely be provided over the internet?

Prison service

Online tax inquiries

waste collection

Marriage registration

Answer explanation

Online tax inquiries can be efficiently handled over the internet, allowing users to access information and services remotely. In contrast, services like prison management, waste collection, and marriage registration typically require in-person interaction.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the following is most likely used by a mobile media device when accessing the Internet?

Intranet

Cable

Satellite

Wi-fi

Answer explanation

Wi-fi is the most common method for mobile media devices to access the Internet, providing wireless connectivity. In contrast, intranet is a private network, cable is typically for wired connections, and satellite is less common for mobile use.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the following may allow malware to enter a computer?

Using anti-virus software to scan a computer.

Scheduling a backup to a remote site

Searching for files on the hard drive.

Downloading software from the Internet

Answer explanation

Downloading software from the Internet can introduce malware if the source is untrustworthy. Unlike scanning or backing up, which are protective measures, downloading can directly expose a computer to harmful software.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the following best describes malware?

Software that is used to schedule anti-virus scans on your computer system.

Software that is used to infiltrate a computer system without the owner's consent.

Software that is used without a licence

Software that is used to control your firewall settings

Answer explanation

Malware is defined as software designed to infiltrate or damage a computer system without the owner's consent. The correct choice highlights this unauthorized access, distinguishing it from legitimate software functions.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the following passwords is an example of good practice?

12061985

password1

w1g_w@ms

access

Answer explanation

The password 'w1g_w@ms' is a good practice as it combines letters, numbers, and special characters, making it complex and harder to guess. In contrast, the other options are either too simple or easily guessable.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which one of the following will help with data recovery in the event of data loss from a computer?

Internet usage policy


Internet filtering software

Access control policy

A backup procedure

Answer explanation

A backup procedure is essential for data recovery, as it involves creating copies of data that can be restored in case of loss. The other options do not provide a means to recover lost data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?