You are on page 1of 16

COMPUTER LITERACY TEST

What is used to point, click, select, or move information on the computer screen?
a. USB Flash Drive
b. Monitor
c. Mouse
d. Scanner
e. Printer

To create a letter or essay, which software program would be the best choice to use?
a. Microsoft PowerPoint
b. Microsoft Access
c. Microsoft Excel
d. Microsoft Word
e. Microsoft Windows XP

Other than CAPS LOCK, which key can you use to insert uppercase/capital letters in a
document?

a. Tab key
b. Ctrl key
c. Alt key
d. Shift key
e. All of the above.
Match the items.
The task is to match the lettered items with the correct numbered items. Appearing below is a list
of lettered items. Following that is a list of numbered items. Each numbered item is followed by
a drop-down. Select the letter in the drop down that best matches the numbered item with the
lettered alternatives.
a.
b.
c.
d.
e.

1. POWERPOINT is a presentation graphics program you can use to create slides shows.
2. INTERNET EXPLORER is a Web Browser that that lets you view web pages on the
Internet.

3. MOZILLA FIREFOX is another Web Browser that that lets you view web pages on the
Internet.

4. EXCEL is a spreadsheet program you can used to calculate, analyze, and chart numerical
data.

5. WORD is a word processing program you can use to create text documents such as letters,
memos, newsletters, and reports.


Match the items.
The task is to match the lettered items with the correct numbered items. Appearing below is a list
of lettered items. Following that is a list of numbered items. Each numbered item is followed by
a drop-down. Select the letter in the drop down that best matches the numbered item with the
lettered alternatives.
a. or Mac
b. or Mac
c. or Mac
d. or Mac

1. The CLOSE button closes the window and ends the active application.
2. The MINIMIZE button decreases the size of the active application or window to an icon on
the Taskbar or Dock (Mac).

3. The MAXIMIZE button (or equivalent ZOOM button on a Mac) expands the active
application or window to fill the whole screen (or fit all the contents).

4. The RESTORE DOWN button makes a window smaller than full screen; it can then be
resized.


Which of the following buttons would you select to attach a file to your e-mail message?
a.
b.
c.
d.
e.

Which of the following is an example of a valid e-mail address?
a. www.bobsmith.google.com
b. bsmith.gmail.com
c. bob.smith@gmail.com
d. http://bsmith@yahoo.com

Match the items.
The task is to match the lettered items with the correct numbered items. Appearing below is a list
of lettered items. Following that is a list of numbered items. Each numbered item is followed by
a drop-down. Select the letter in the drop down that best matches the numbered item with the
lettered alternatives.
a. Help
b. Print
c. Open (a file)
d. Save

1.

2.

3.

4.


You are working on a report on a friend's computer. You want to save the report file and take it
home. Which two electronic storage devices could you use to save the file for later revision on
another computer? (Select TWO.)
a. Printer
b. Speaker
c. Monitor
d. CD
e. USB Flash Drive

Which of the following is NOT an Internet Browser that you could use to go to a Web site?
a. Mozilla Firefox
b. Apple Safari
c. Google Chrome
d. Microsoft Internet Explorer
e. Microsoft Word
When you're connected to the Internet, you are:
a. outline
b. offline
c. online
d. inline
e. out of line

Which of the following is NOT a Search Engine that could help you find information on the
Internet?
a. Google
b. Microsoft PowerPoint
c. Bing
d. Yahoo
e. Ask.com

Which of the following is NOT a valid Web address?
a. www.stevenshenager.edu
b. www@stevenshenager.com
c. http://www.stevenshenager.edu
d. http://www.stevenshenager.edu/business-degree.php


Copying material word for word from the Internet and claiming that it is yours is called:
a. Copy Catter
b. Plagiarism
c. Ethical copying
d. Standard operating procedure
e. Cheater, Cheater, Pumpkin Eater

These steps are in the proper order for sending an e-mail with a file attached:
(1) Click the Attach button
(2) Find and select your document
(3) Click the Send button

True
False


Why should you not type e-mails in ALL CAPS?
a. Typing in all caps may make you look uneducated and lazy to others.
b. Using all upper case letters looks like you're shouting or yelling.
c. Reading all capital letters makes your e-mail harder for others to read.
d. All of the above.


Which of the following would be considered appropriate guidelines for Internet etiquette
("Netiquette").
a. Keep e-mails professional and courteous.
b. Use appropriate language (e.g., correct grammar and spelling).
c. Avoid forwarding SPAM (electronic junk mail) to others.
d. Identify yourself: begin e-mail messages with a greeting and end them with your name
(and contact information).
e. All of the above.




1. How do you open a program such as a Microsoft Word when there are no icons on the
desktop?
A. Right click to reveal all icons.
B. Restart the computer.
C. It is not possible to open program if no icons are on the desktop.
D. Cick the start button and select program from the menu.
2. How do you minimize or maximize a program in Windows?
A. Right click on the mouse.
B. Go to "File" and select minimize or maximize.
C. Top right corner, dash or square.
D. This function can not be done.
3. How do you close a window on your desktop?
A. Go to "File" and select "Close".
B. Press the "Ctrl" key on the keyboard.
C. Use the mouse to press the button with the "X" in it at the top right corner of the screen.
D. Use the mouse to press the button with the _ in it at the top right corner of the screen.
2 comments
4. A word processing file can be attached to an e-mail message?
A. Yes
B. No
C. Depends on what type of file.
D. Only to select email addresses.
5. What does the "Reply to All" e-mail function do?
A. It will generate a reply message to all of the recipients of the message.
B. It will send a reply message to every entry in your address book.
C. It will generate a reply message only to the sender of the message.
D. This function is not possible.
1 comment
6. Which of the following is an example of an e-mail address?
A. www.google.com
B. jeandoe.gmail.com
C. Bob Smith@yahoo.com
D. johndoe@cincinnatilibrary.org
1 comment
7. Which two websites offer free email service?
A. Yahoo and Amazon
B. Yahoo and Google
C. I-Tunes and Twitter
D. Library website and Hotmail
8. "Desktop" is a computer term that refers to?
A. Something that is for the computer programmer only.
B. The part of your work area where the computer monitor sits.
C. The initial screen showing icons for folders, applications and files.
D. The desk that your computer is stationed on.


TECHNICAL SUPPORT TEST
1. Which command will display the assigned IP address of a network adapter installed on a
Windows XP system?
A. Ipadapter/all
B. WinIP
C. Ipconfig
D. Configip
2. What does an assigned IP address 169.254.0.12 indicate?
A. The computer is configured with a static IP address.
B. The computer is using a dial-up modem.
C. The computer is being used as an Internet shared connection host.
D. The computer is configured for DHCP and cannot connect to the DHCP server.
E. The computer has been configured to work with a Linux system.
3. Which two are examples of wireless encryption? (Select two answers)
A. VPN
B. PPP
C. WEP
D. WPA
E. MAC
4. Which item is an example of a physical network address?
A. IP address
B. MAC address
C. Workstation name
D. www.proprofs.com
E. Mrbig@proprofs.com
5. Which are the default settings for a Windows XP computer network adapter?
A. DHCP and configured as part of a workgroup
B. DHCP and configured as a part of a domain
C. Static IP address and configured as part of a workgroup
D. Static IP address and configured as part of a domain
E. There is no default settings for a Windows XP network adapter card
6. What does the term "Map Network Drive" mean?
A. Divide the host HDD into memory locations
B. Create a shortcut to a network location
C. Trace the path to the local area network gateway
D. Send instructions to a user to access the remote local area network
E. A schematic drawing of all network adapter locations on the network system
7. Which is the best example of a secure password?
A. mysecretpassword
B. MySpecialPa$$w0rd
C. Xyz
D. Keep this place private
E. password12345
8. What icon is used to identify a shared folder?
A. An open hand palm up
B. Two folder icons side by side
C. Folder icon in green
D. Folder icon in red
E. You cannot tell if a folder is shared by looking at the icon
9. Which is used to provide a centralize authentication method from remote locations?
A. HTTPS
B. FTP
C. RADIUS
D. DNS
E. DHCP
10. What is the purpose of a DNS server?
A. To resolve MAC addresses to NetBIOS names
B. To resolve domain names to IP addresses
C. To resolve host names to NetBeui names
D. To resolve IP addresses to MAC address
11. What is the default name of the folder used by Windows Vista operating system to share
documents, downloads, music, pictures, videos and recorded TV?
A. Media
B. Private
C. MyShares
D. Public
12. What is the default workgroup name for a computer running Windows XP professional?
A. Microsoft
B. Home
C. Workgroup
D. Netgroup
13. What is another name for a wireless security key?
A. Passphrase
B. Wirelessphrase
C. WAPphrase
D. Hexphrase
14. Which is an example of a MAC address?
A. 192.168.000.001
B. 2001:0:4137:9e50:1418:fe9b
C. 00-1F-E2-57-DD-A6
D. 00010001:01100110:11110000:01010000
15. Which type or connecter is commonly used for CAT6 cable?
A. RJ11
B. RJ45
C. BNC
D. SC
16. In any Active Directory forest there are five Operations Masters roles that must be assigned
to one or more domain controllers. Which of the following answers correctly depicts these
roles?
A. Infrastructure Master, PDC Emulator, Relative ID master, SYSVOL, Root Domain
B. Schema Master, Domain Naming Master, Infrastructure Master, PDC Emulator, Relative
ID master.
C. Root Master, Domain Name Master, Infrastructure Master, PDC Emulator, Relative ID
master
D. Trust Master, Root Master, Infrastructure Master, PDC Emulator, Relative ID master.
17. A hierarchical structure made up of multiple domains that trust each other is called a(n)
_______?
A. Forest
B. Schema
C. Site
D. Organizational Unit
E. Tree
18. As a network administrator you have been requested to move a printer from your company's
Marketing OU to your company's Research OU. After the move you test the printer and find
that the local administrator assigned to the Marketing OU still has access and can remove
print jobs from it. What can you do to change this?
A. Remove the permissions for the local administrator from the printer
B. Remove printer permissions from the local administrator
C. Remove the Everyone group from the printer
D. Delete the printer object
19. You recently been promoted to Network Administrator for DLM Shipping. When you took
over this position the first thing you notice is this Windows 2000 environment using DNS
naming convention, root domain is DIM.COM, with numerous child domains. User accounts
are stored in the child domains. However your supervisor informs you that root domain is
misspelled and should be DLM.COM. He explains this is causing tremendous problems with
the users and customers. He wants you to rename the domain. What will happen if you
rename this root domain server?
A. When you rename the root domain server you will only have to rebuild the user accounts
since the root domain holds the authentication (SAM) database
B. When you rename the root domain server you will simply rename the child domain also
C. When you rename the root domain server you will lose the entire network orphaning the
child domains
D. When you rename the root domain server you will not need to do anything else since
domain names are inherited the child domains will acquire the new domain name
20. You are requested to perform a transfer of the role of relative ID master for a domain within
your company. Where would you begin this transfer?
A. Open the Active Directory Schema snap-in
B. Open the Active Directory Sites and Services console
C. Open the Active Directory Domains and Trusts console
D. Open the Active Directory Users and Computers console
21. Besides a server what is the one requirement that needs to be meet before you can install
Active Directory?
22. Name one difference between a SSL VPN and PPTP VPN
23. What is the standard port for HTTP?
A. 443
B. 80
C. 25
D. 143
24. What is the standard port for HTTPS?
A. 80
B. 443
C. 25
D. 143
25. What is the standard port for SMTP?
A. 443
B. 25
C. 80
D. 143
26. What is the standard port for IMAP?
A. 80
B. 443
C. 143
D. 25

HELPDESK TECHNICAL SUPPORT
1. An IP address is best defined as...
A. An IP Address is a unique number consisting of 4 parts separated by dots (eg:
217.247.84.89) asociated with every system connected to a network
B. Internet Provider Address. The address of a company that provides individuals and other
companies access to the Internet.
C. The location of Internet Packets measured in kilobytes on a network.
D. All of the above.
2. Malware is best defined as...
A. A computer program designed to protect the operating system from viruses.
B. Microsoft Arithmetic LAN software. Software run in the background of any Windows
based computer system used to manage network connections
C. Software designed to infiltrate or damage a computer system without the owner's informed
consent.
D. None of the above.
3. Which one of the following best defines the term Operating System?
A. The software that allows computer users to run applications with the hardware of a specific
system. Microsoft Windows or Apple Computer's OS are examples of operating
systems.
B. The master control program that manages a computer's internal functions and provides a
means of control to the computer's operations and file system.
C. The software that manages the hardware and software interface of a computer.
D. All of the above.
4. Which one is not an output device?
A. Printer
B. Monitor
C. Modem
D. Keyboard
2 comments
5. One MB is equal to...
A. One thousand bytes
B. 1 billion bytes
C. The amount of RAM in every computer
D. 1024KB
6. Select the 3 graphics files from the list below.
A. untitled.nfo
B. untitled.jpg
C. untitled.bmp
D. untitled.ogg
E. untitled.tiff
7. Select the URL from the list below.
A. spiderm0nkey@gmail.com
B. http://www.yahoo.com
C. D:\downloads\standard
D. 192.168.0.1
8. Which of the following programs is not an email client.
A. Microsoft Outlook 2003
B. Windows Live Mail
C. Mozilla Firefox
D. Outlook Express 6
9. A modem is best defined as...
A. A device that allows you to connect your PC to to an internet service.
B. A piece of computer software that is used to browse the web. (eg: internet explorer)
C. An interconnected group of computers.
D. A program that prevents other people on the Internet from accessing your computer and
your files.
10. What is the shortcut for PASTE?
A. Ctrl + P
B. Ctrl + V
C. Ctrl + C
D. Caps Lock + V
1 comment
11. Which is not an operating system?
A. DOS
B. Windows
C. MS-Word
D. LINUX
12. The brain of the computer. This part does the calculation, moving and processing of
information.
A. CPU
B. RAM
C. motherboard
D. hard drive
13. What does "www" stand for?
A. Wide World Web
B. Winding Web World
C. World Wide Web
D. None of the above
14.
What is this computer component?
A. Video Card
B. Sound Card
C. RAM
D. Network Interface Card
15.
What is this computer component?
A. RAM
B. CPU
C. Hard Disk
D. Motherboard
2 comments
16.
What is this computer component?
A. Hard drive
B. CPU
C. Chassis
D. Motherboard
1 comment
17.
What is this device?
A. Modem
B. Wireless Router
C. Video Card
D. Motherboard
18.
What is the function of this device?
A. It performs all the arithmetic, logical operations of computer.
B. It is very high speed short term storage that CPU uses to store information temporarily.
After the computer is turned off, any data stored will be lost.
C. It is used to store large amounts of data in a computer system, data is retained on this
device even when the computer is turned off.
D. It is is used to generate and output images onto the display.
19. This is a measurement of speed over a network.
A. Megabytes
B. Bits
C. Megahertz
D. Megabits per second.
20. Bandwidth
A. The speed at which data can be transferred from the server to the client.
B. A measurement of how much information can be carried in a given time period (usually a
second) over a wired or wireless communications link.
C. A unit of information or computer storage equal to one billion bytes.
D. None of the above.
21. Download
A. A unit of information or computer storage equal to either 1,024 bytes (2 to the 10th power)
or 1,000 bytes (10 to the 3rd power), depending on context
B. When you transmit data from your PC to another computer.
C. A local area network which uses high frequency radio signals to send and receive data over
short distances.
D. When data is received on your PC. This includes, but is not limited to, viewing webpages,
receiving e-mail, watching videos, getting movies, getting music and email attachments.
22. Ping
A. A measurement of data transferred to your local station from a specific network source.
B. A computer network tool used to test whether a particular host is reachable across an IP
network; it is also used to self test the Network Interface Card (NIC) of the computer.
C. A sound used for testing your computer speakers.
D. None of the above.
23. Which operating system was the successor to Windows 98?
A. Windows Vista
B. Windows XP
C. Windows ME
D. Windows CE
1 comment
24. Which of the following is not an internet browser?
A. Safari
B. Firefox
C. Opera
D. Thunderbird
25. The internet was invented by
A. Bill Gates
B. The US Department of Defense
C. Steve Jobs
D. Albert Einstein

You might also like