t. 0161 848 9173 f. 0161 872 9480
e. secretary@stantonyscentre.org.uk
Home > Training for Schools – Old > IT Fundamentals Quiz 1

IT Fundamentals Quiz

Results

#1. What do these icons represent?

The are icons for popular APPS (for use on mobile devices).  They are Pinterest, WhatsApp call, Facebook and Instagram.

#2. A website used to search for pages on the internet is called a

A search engine is used to search for pages on the internet.  Examples of search engines are GOOGLE, Microsoft Bing, Yahoo! and Ask.com.  A web browser is the software used to view pages on the internet, including search engines and the results from a search engine.

#3. What does GUI stand for?

GUI means Graphical User Interface.  A GUI is a form of user interface (what the user sees on the screen) that enables the user to interact with the software and devices through graphical and visual indicators rather than just text.  Most computer devices have GUIs whereby the user clicks on icons or other visual functions (e.g. menus) rather than typing of all the instructions into a command line prompt.  Windows is an example of a GUI as the user uses a mouse to click on icons to make functions happen rather than typing instructions into a command line prompt.

#4. What is malware?

Malware is a type of computer virus. Malware usually has the potential to damage or disrupt the computer in some way, e.g. by removing data, or accessing data stored on the computer and secretly sending that data to someone else

#5. Which of these icons would you select to access the settings of a device?

#6. Which of the following would you use to create a slide presentation?

You would use Microsoft POWERPOINT to create a slide presentation.

Microsoft EXCEL is spreadsheet software, Microsoft WORD is a word processing program and Adobe Photoshop is for creating and editing images.

#7. Which is these is not a type of computer memory?

The CPU (Central Processing Unit) of a computer is not a type of memory.  The CPU is the ‘brains’ of any computer and uses different types of memory to keep the computer and its software functioning.  ROM (Read Only Memory), RAM (Random Access Memory) and SSD (Sold State Drive) are types of memory used in computers.

#8. Which of the following best describes the term 'digital literacy'?

Digital Literacy is not to do with reading or writing about computers or digital devices.  It is the ability to use digital devices in different ways, effectively and safely, knowing how to navigate, evaluate and create information effectively.

#9. What does this icon usual represent?

The icon is used for TOOLS.

#10. Which of these is the icon for a number of files compressed to a smaller size in a folder?

When a number of files are compressed (made smaller to save storage space), they can be ZIPPED to a special folder.  This folder is shown using a folder with a ZIP across it.

#11. When using the internet, what does VPN stand for?

VPN means Virtual Private Network.

#12. What is a device driver?

A device driver is software installed as part of the computer’s operating system which manages communication to/from and the functions of a specific device on a computer system.  All devices attached to a computer, e.g. mouse, keyboard, printer, camera, have drivers which tell the computer how they operate.  Different makes and models of device have different drivers.

#13. What is a web browser?

A web browser is software on a device (including mobile devices) that enables the user to look at pages from different websites.  Web browsers interpret the code of the website and display the text, images, video and other features on the screen, formatting everything in the right place.  Examples of web browsers include Microsoft Edge, Google Chrome and Safari (usually on Apple devices).

#14. What is the function of an operating system?

#15. What is phishing?

Phishing is an attempt to obtain sensitive information from a user by pretending to be a trustworthy entity, e.g. a bank or reputable company.  Someone who is phishing might send an email to someone (or a number of people) pretending to be from the person’s bank.  The email might ask for information such as account number, internet banking details or PIN, or might have a link to an untrustworthy website which looks very similar to a real company website.

#16. Which of the following is an example of an INPUT device?

#17. What is Cloud storage?

Cloud Storage is data stored on an internet server in a different place rather than a local computer or server.

#18. What do the numbers followed by KB show in this file list?

KB means Kilobytes.  This number shows the size of the file in Kilobytes.

#19. What is the purpose of a database?

A Database enables the user to create, store and manage structured data.  Many of the world’s computer systems and software used by companies are database programs, handling large amounts of data, mainly about people.

#20. What is the purpose of a FIREWALL in a computer network?

A FIREWALL is a piece of software which monitors the traffic or data entering a network and allow or blocks content according to the rules which have been set.  This is called filtering.  For example, a firewall can stop people outside the network from accessing the network and can stop certain types of content (e.g. harmful content) from being access and displayed by users of the network.

Finish