[go: up one dir, main page]

0% found this document useful (0 votes)
33 views3 pages

Category 1 Mock Test

The document contains a quiz about basic computer literacy and internet security concepts. It asks multiple choice questions about the functions of common computer components like the mouse, keyboard keys, and parts of the desktop interface. It also contains questions that test understanding of computer hardware like the CPU and networking/security concepts like hackers, viruses, worms, and logic bombs. The quiz aims to assess foundational knowledge of how computers work and risks posed by online threats.

Uploaded by

Wim Pixl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views3 pages

Category 1 Mock Test

The document contains a quiz about basic computer literacy and internet security concepts. It asks multiple choice questions about the functions of common computer components like the mouse, keyboard keys, and parts of the desktop interface. It also contains questions that test understanding of computer hardware like the CPU and networking/security concepts like hackers, viruses, worms, and logic bombs. The quiz aims to assess foundational knowledge of how computers work and risks posed by online threats.

Uploaded by

Wim Pixl
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

PART I – Computer Literacy and Internet Security (30 points)

1. Which is the function of the mouse?


A. Erases words on the monitor
B. To type symbols on the monitor
C. To point at icons on the monitor
D. Deletes an object on the monitor

2. The ESC button on the keyboard is used for


A. To type words C. To cancel an action
B. To enlarge the words or D. To open a program
pictures

3. This keyboard key erases the letters to the left of the cursor.
A. Space bar C. Enter
B. Backspace D. Left Arrow

4. You use this key to capitalize a letter, one at a time.


A. Caps lock C. Shift
B. Up Arrow D. Esc

5. The Start Menu and clock are found on the


A. Title bar C. Tool bar
B. Task bar D. Scroll bar

6. The brain of the computer is the CPU. This acronym stands for
A. Central Processing Unit C. Central Progress Unit
B. Central Programming D. Central Peripheral Unit
Unit

7. This key capitalizes all letters of the encoded words in just one press.
A. Shift C. Caps Lock
B. Enter D. Number Lock

8. These keys allow you to move your cursor up, down, right, or left.
A. Backspace C. Page Up
B. Page Down D. Arrow Keys
9. This is like a backdrop of your desktop, which can be changed according
to your visual preference.
A. Icon C. Wallpaper
B. Windows D. Start Menu

10. This is a small picture on your desktop that links to a file or program
that you can click to open.
A. Start Menu C. Icon
B. Tool bar D. Key

11. This is an internet feature that has something to do with protecting and
keeping things like files and programs secure.
A. Security C. File keeping
B. Networking D. Browsing

12. Which of the following information is incorrect?


A. Strangers who get your information on your computer are called
hackers.
B. Hackers can use your webcam to watch you even without your
permission.
C. Hackers cannot listen to your conversations without your permission.
D. A stranger, friend, neighbor or relative can be a hacker.

13. A program that can infect other programs by modifying them; the
modification includes a copy of the program, which can go on to infect
other programs.
A. Worm C. Zombie
B. Virus D. Trap doors

14. Which of the following statement is true?


I. A worm mails a copy of itself to other systems.
II. A worm executes a copy of itself on another system.

A. I only C. Both I and II


B. II only D. Neither I nor II

15. This is a code embedded in some legitimate computer program that is


set to explode when certain conditions are met.
A. Trap doors C. Logic Bomb
B. Trojan horse D. Virus

PART II – Coding via Codementum (70 points)

You might also like