Computer Essentials Module 1
45 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a key characteristic of cloud computing as an online storage unit?

  • It requires physical storage devices.
  • It provides access to several resources. (correct)
  • It is not secure for data storage.
  • It limits access to local networks only.
  • Which method allows you to compress files in Windows 7?

  • Right click – send to – compressed archive file. (correct)
  • Drag and drop files into a zip folder.
  • Right click – extract all – to compress files.
  • Select the files and use the keyboard shortcut Ctrl+Z.
  • How can unauthorized access be reduced in a computer network?

  • By using only wireless connections.
  • By requiring username and password authentication. (correct)
  • By using complex algorithms.
  • By allowing open access to all users.
  • What type of connection is characterized by using physical cables like copper or optical fibre?

    <p>Wired connection.</p> Signup and view all the answers

    Which of the following is a risk associated with computer networks?

    <p>Data safety and malware.</p> Signup and view all the answers

    What must be considered before subscribing to an internet service?

    <p>The costs and limitations of the service</p> Signup and view all the answers

    Which connection type is most likely to be faster than others listed?

    <p>4G Connection</p> Signup and view all the answers

    What type of connection uses a modem that transforms digital signals into sounds?

    <p>Analogical connection</p> Signup and view all the answers

    What is a key benefit of WiMax connections compared to other methods?

    <p>Higher speed and broader coverage</p> Signup and view all the answers

    How can unauthorized access risks be minimized on wireless connections?

    <p>By implementing firewalls and strong passwords</p> Signup and view all the answers

    What is one disadvantage of satellite connections?

    <p>They can be costly and are often slow.</p> Signup and view all the answers

    What should be regularly performed to ensure data security?

    <p>Backing up data periodically</p> Signup and view all the answers

    Which of the following is NOT a feature of a firewall?

    <p>Providing access to unprotected networks</p> Signup and view all the answers

    What is the primary function of RAM in a computer?

    <p>Provide temporary storage for active processes</p> Signup and view all the answers

    Which of the following is classified as mass storage memory?

    <p>HDD</p> Signup and view all the answers

    What distinguishes SSDs from HDDs in terms of performance?

    <p>SSDs utilize flash memory for faster access</p> Signup and view all the answers

    Which of the following statements about peripherals is true?

    <p>Peripherals can be integrated or external and serve input and output purposes</p> Signup and view all the answers

    What role does ROM play in a computer system?

    <p>Provides essential information for starting the computer</p> Signup and view all the answers

    Which of the following best describes mass storage memory?

    <p>It saves data permanently unless deleted or damaged</p> Signup and view all the answers

    Which of the following devices is NOT typically considered a peripheral?

    <p>Hard Disk Drive</p> Signup and view all the answers

    In terms of storage capacity, how do smartphones compare to PCs?

    <p>PCs generally offer higher storage capacities than smartphones</p> Signup and view all the answers

    What is the primary purpose of a Uniform Resource Locator (URL)?

    <p>To identify the address of a resource on the internet.</p> Signup and view all the answers

    Which part of the website address represents the organization's name or topic?

    <p>Second Level Domain</p> Signup and view all the answers

    What does the HTTPS protocol do before transmitting data?

    <p>It encrypts the data to ensure security.</p> Signup and view all the answers

    What type of organizations typically use the '.org' domain?

    <p>Non-profit organizations</p> Signup and view all the answers

    What is the purpose of a digital certificate?

    <p>To verify the identity of a website owner or email sender.</p> Signup and view all the answers

    Which of the following is NOT a web browser?

    <p>Digital Certificate</p> Signup and view all the answers

    What can be a consequence of excessive network traffic in a company?

    <p>Slower internet performance for the entire system.</p> Signup and view all the answers

    How can individuals ensure that a website is safe for online transactions?

    <p>By reading client feedback and conducting a website screening.</p> Signup and view all the answers

    What characterizes a client-server network?

    <p>A powerful computer (server) makes its resources available to other devices (clients).</p> Signup and view all the answers

    Which type of network is specifically designed for a few computers in a limited area?

    <p>LAN (Local Area Network)</p> Signup and view all the answers

    What is the main function of a VPN (Virtual Private Network)?

    <p>To encrypt data while using a public infrastructure.</p> Signup and view all the answers

    Which of the following best describes the World Wide Web?

    <p>A set of interconnected files and web resources accessed through hyperlinks.</p> Signup and view all the answers

    Which type of network is used for short-range wireless communication between personal devices?

    <p>WPAN (Wireless Personal Area Network)</p> Signup and view all the answers

    What distinguishes an asymmetric connection like ADSL?

    <p>It features high download velocity paired with slow upload velocity.</p> Signup and view all the answers

    What role does an ISP play in internet connectivity?

    <p>Sells access to internet services to customers.</p> Signup and view all the answers

    Which of the following best defines a MAN (Metropolitan Area Network)?

    <p>A network connecting devices across multiple cities.</p> Signup and view all the answers

    Which type of port allows for a rapid transfer of data up to 600 Mb per second?

    <p>USB</p> Signup and view all the answers

    What is the primary role of the kernel in an operating system?

    <p>To perform basic activities and control hardware</p> Signup and view all the answers

    Which of the following is NOT classified as a main operating system for computers?

    <p>iOS</p> Signup and view all the answers

    What does EULA stand for and describe?

    <p>End-user license agreement, outlining use limitations and warranties</p> Signup and view all the answers

    Which type of software license allows users to edit and use the software without restrictions?

    <p>Open Source Software</p> Signup and view all the answers

    In the context of operating systems, what function does the SCHEDULER serve?

    <p>Enabling multitasking by managing task execution</p> Signup and view all the answers

    Which of the following is an example of an application software?

    <p>Word processor</p> Signup and view all the answers

    What is a key characteristic of a proprietary license for software?

    <p>Users must purchase the software and have no rights to alter it</p> Signup and view all the answers

    Study Notes

    Module 1: Computer Essentials

    • ICT (Information and Communication Technology): The study of methods for storing, processing, and sharing information using computer science.
    • Hardware: The physical components of an ICT device, like keyboards, screens, and mice.
    • Computer Types: Desktop PCs, laptops, tablets, phablets, smartphones, media players, and digital cameras.
    • Processor (CPU): The central processing unit that performs calculations, controls internal processes, and manages peripherals.
    • ALU (Arithmetic Logic Unit): Executes logical and mathematical operations.
    • CU (Control Unit): Coordinates processing tasks.
    • Cache Memory: Fast temporary memory for the ALU to store data.
    • Processor Register: Stores addresses, instructions, and values.
    • Bus: Facilitates communication between internal and external computer components.
    • Processor Speed: Measured in Hertz (Hz), representing the number of operations per second (e.g., 3 GHz is 3 billion cycles per second).
    • RAM (Random Access Memory): A quick-access, volatile memory that temporarily stores data. Data is lost when the computer is switched off.
    • Mass Storage: Permanent storage for data and programs (including hard disks, pen drives, memory cards, CDs, DVDs).
    • Peripherals: Devices that connect to the computer for input (e.g., keyboard, mouse) and output (e.g., monitor, printer).
    • Integrated Devices: Multi-functional devices often built into the computer.
    • Input Devices: Keyboard, mouse, touchpad, scanner, webcam, microphone, trackball, touchscreen
    • Output Devices: Screen/monitor (LCD or CRT), printer, speakers, docking station, touchscreen

    Module 2: Online Essentials

    • Internet: A global interconnected network of computer networks.
    • Hyperlink (Link): A reference from one part of a digital document to another.
    • World Wide Web (WWW): A system of interconnected documents accessible through a browser.
    • URL (Uniform Resource Locator): A unique identifier for a resource on the internet.
    • Website: A collection of web pages hosted on a server.
    • IP Address: A unique numerical label assigned to each device connected to the internet.
    • Domain Name System (DNS): Links domain names (e.g., example.com) to their IP addresses.
    • Website Address: Consists of a First Level Domain (e.g., .com) and a Second Level Domain (e.g., example).
    • Browser: Application used to access and view information on the web.
    • HTTPS Protocol: A secure version of the HTTP protocol for transmitting data over the internet.
    • Digital Certificate: Proof of the identity of a website or email sender.
    • Online Communities: Groups of people interacting through internet services (e.g., forums, social networks).
    • Privacy in Online Communities: Be mindful of who you interact with and share your information with. Setting appropriate privacy settings is important.
    • Sharing Contents Online: Be aware of copyright laws when sharing online.

    Module 3: Word Processing

    • Saving Documents: Options to save files as different document types (.doc, .docx, .pdf, etc.).
    • Viewing Documents: Different document displays (layout, reading, web), offering different viewing experiences.
    • Formatting: Tools for formatting text, paragraphing, character appearance, etc.
    • Inserting Symbols: Adding special characters to your documents.
    • Finding and Replacing Text: Searching within your document for specific words or phrases.
    • Adding Links and Documents: Connecting to other web pages or documents through hyperlinks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    ECDL Handout 2020-2021 PDF

    Description

    Dive into the fundamentals of Computer Essentials in this Module 1 quiz. Explore key concepts including ICT methods, hardware components, and processor functions. Test your understanding of critical terms such as CPU, ALU, and cache memory.

    More Like This

    Essential Components of PC Assembly Quiz
    10 questions
    Composants Essentiels d'un Ordinateur
    20 questions
    Programming Essentials - 1
    43 questions
    Use Quizgecko on...
    Browser
    Browser