You are on page 1of 38

ECDL / ICDL SYLLABUS v5.

0 - LEVEL 1 OFFICE 2010 TRAINING MANUAL

TERMS OF USE:
LEARN-NEW-SKILLS-FROM-HOME 2009. Please note that no part of this document may be copied for multi-use without written permission from us. All reasonable precautions have been made in the preparation of this document, including both technical and non-technical proofing; we work to the highest quality and if you find any discrepancies in this user document, please do not hesitate to contact us at: enquires@learn-new-skills-from-home.com.

FREE SAMPLE FULL VERSION 81 PAGES

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

TABLE OF CONTENTS
OVERVIEW About ...................................................................................................................................... 2 SYLLABUS v5.0 CHANGES - 2010 About ...................................................................................................................................... 4 HOW TO USE THIS MANUAL About ......................................................................................................................................5 MODULE 1 IT SECURITY About ...................................................................................................................................... 6 Test Questions (Full version available on purchase).......................................................... 7 Test Answers (Full version available on purchase) .......................................................... 17 MODULE 2 - IT USER FUNDAMENTALS About ................................................................................................................................... 19 Test Questions (Full version available on purchase)....................................................... 20 Test Answers (Full version available on purchase) .......................................................... 26 MODULE 7- USING EMAIL AND THE INTERNET About ................................................................................................................................... 28 Test Questions (Full version available on purchase)........................................................ 29 Test Answers (Full version available on purchase) .......................................................... 35 GLOSSARY A Z Glossary (Full version available on purchase) .......................................................... 37

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

OVERVIEW
The ECDL Foundation is the certifying authority of leading ICT computer certifications. The Foundation offers globally recognised computer qualifications which many business have adopted as a prerequisite for their employees including, IBM, IKEA, Tongaat-Hulett Group, Ministry of Defence, Post Office, Bank of England, Shell and Pfizer. The quality and reputation of the Foundation has been built on over a decade of experience in successfully delivering Information Communication Technology (ICT) certification to over 9 million people, in 41 languages, covering 148 countries around the world. The Foundation offers various ability levels (1, 2 and 3), making it flexible and cost-effective for both home learners and employer's. The ECDL (European Computer Driving License) qualification was established in 1997 and due to its success the ICDL (International Computer Driving Licence) was established shortly after in 1999. They are both global recognised qualifications and have the same syllabus and test structure the only difference being the ECDL is designated for European (ECDL) countries the ICDL for regions outside Europe. For further information including the ECDL Foundations latest news, please visit their official website at www.ecdl.org. ECDL/ICDL MODULES Level 1 modules (IT Security, IT Fundamentals and Internet & Email) are designed for learners whose skills are at a beginner (novice) level in ICT and wish to gain a recognised certification to prove their competence. The level 1 qualification is recognised as GCSE grade D-G equivalent in the UK and generally set to a level 1 standard internationally. OUR LEARNING STYLE Our beginner ICT training materials cover level 1 of the ECDL & ICDL v5.0 SYLLABUS (phased in during 2010) and are formed in three parts:

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

OVERVIEW CONTINUED
APPROACH Many learners have expressed, that they have some basic/intermediate ICT skills but were unable to identify those areas of strength and weakness, when relating to the ECDL/ICDL syllabus. We therefore developed a more direct learning approach, whereby leaners asses their current ICT skills from the outset by completing their desired ICT module/s within this training manual then cross-referencing them with the supplied answers. Learners can then retry the supplied tests using the provided glossary and online members area to help reinforce their knowledge. When they feel confident with their ICT skills, learners can apply for testing at a convenient date at their local ECDL or ICDL exam centre. APPLICATION Many businesses and personal users update their ICT applications software at different stages of release, usually due to convenience and financial reasons, so we have created manuals that cover 99% of currently globally used (Microsoft Office 2003, 2007 and 2010) business applications. INTERACTION Learners have expressed when purchasing information sources (eBooks, PDF, books) they have no interaction with other learners experiences. To alleviate this we have supplied an online members area whereby learners can discuss with other candidates (worldwide), ECDL, ICDL, ITQ and ICT subjects, covering practice test questions, answers, syllabuses and general ICT topics. The online area is mediated and monitored by administrators, who also participate in answering ICT related questions.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

IMPORTANT - SYLLABUS CHANGES


Since the ECDL (1997) - ICDL (1999) started the course syllabus has continually evolved to reflect changes in technology and its use. The v4.5 syllabus was reviewed in 2007 in order to ensure that it reflected ongoing advances in technologies and relevant practices. This resulted in the completion of the ECDL- ICDL syllabus v5 which was phased in during 2009. Due to the above mentioned v5.0 overhaul Module 1 has now been adapted in v5.0 from Concepts of Information Technology to IT Security. We have catered for syllabus changes by entering question and answers relating to both modules. The marking structure of Module 1 is still the same in v4.5 and v5.0 with 36 questions. The required pass mark is 27 (75%) and you have 45 minutes to complete it. It is recommended that you attempt both syllabus versions as there is some cross compatibility between them. Also due to the above mentioned v5.0 overhaul Module 2 has now been adapted in v5.0 from Using the Computer and Managing Files to IT User Fundamentals, making the module more suitable for modern day IT. We have catered for syllabus changes by entering question and answers relating to both modules. The marking structure of Module 2 is still the same in v4.5 and v5.0 with the required pass mark of 24 (75%) and you have 45 minutes to complete the test.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

HOW TO USE THE MANUAL


FILES All the required files needed for this ICT level 1 training manual are supplied within the 2010-LEVEL-1-SAMPLE folder previously downloaded. MODULE ORDER If you have limited skills then select a module you feel most comfortable with or most relevant to your needs. Remember you can take any module exam at a testing centre in any order you like, so if for instance you would like to start with Internet/Email, as it would help you at home and work then select the Using Email and the Internet module. USE GLOSSARY We have supplied a glossary of information that will help reinforce your knowledge with certain modules (IT Security, IT User Fundamentals and Using E-mail and Internet). These modules particularly IT Security have a large amount of multiple-choice questions that may require research to complete correctly. MARKING SCHEMES Once you have completed a test printout the relevant marking scheme which is located in the Marking Scheme folder. Cross-reference your answers with the answers provided in this manual, write in the comments section if your answer was correct or incorrect. Remember some questions may be awarded half marks (except multiple-choice) if partially completed or correct but it is best to only mark completely correct answers as right as learning centres may differ in their decision making when awarding partial points. KEY SYMBOLS Where this symbol is displayed Exam Tips will be shown. Where this symbol is displayed Underpinning Knowledge will be shown. Where this symbol is displayed Shortcut Tips will be shown. Where this symbol is displayed Learners can return to the contents page.

Answer File Marking schemes

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

MODULE 1 IT SECURITY
The IT Security module enables candidates to gain an understanding of different types of security issues facing the modern day IT environment, including connectivity, network types, viruses, email and malicious programs. This particular module is predominately multiple-choice questions and therefore can cover a wider scope than other modules.

TEST STRUCTURE:
The IT Security module test requires a pass mark of 27 (75%) out of the possible 36 marks available. Learners have 45 minutes to complete the test and can complete the test questions in any order but it recommended that you attempt them in sequence (1, 2, 3, etc...) as it will be easier to keep track of your progress. Learners are advised not to spend too long on each question and if unsure of a particular answer to move onto the next question available and return to the original question, time permitting. Generally test centres wont let candidates collect printouts while the test is in progress. The test invigilator will either collect printouts for candidates or candidates will be allowed to collect them at the end of the exam. This can be an advantage to candidates as it saves precious time in waiting for the printing process. The test centre invigilator will inform you of the rules and requirements of the test prior to the exam start. It is recommended that use the system clock, located at the bottom right corner of the monitor to time their progress, as this facility will be available in the test environment.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

MODULE 1 IT SECURITY

TEST

Q.1

Open the Answer File word document located in the Module 1 folder. Enter your candidate identification (ID) into the Q1. Answer section. If you dont have an ID number then your name will suffice. Once your ID is added, answer the following test questions in there relevant number fields by selecting either the a), b), c) or d) answer.

Q. 2

What application protects a computer from malicious programs? a) Firewall b) Web tracking software c) Anti-virus software d) Anti-spam software

Q. 3

What is a Firewall? a) E-mail program b) Application designed to block unauthorized access while permitting authorized communications c) PC diagnostic software d) Anti-spam software

Q. 4

What is does it mean to SPAM (E-mail) people? a) Send messages using a mobile phone b) Block unauthorized access while permitting authorized communications c) Send a colleague a message d) Send unsolicited bulk e-mail messages indiscriminately.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

Q.. 5 Q 5

Whiich off tthe ffollllowiing acttiiviittiies coulld llead tto tthe sprread off a computterr viirrus? Wh ch o he o ow ng ac v es cou d ead o he sp ead o a compu e v us? a)) Usiing USB memorry sttiicks ffrrom unknown sourrces tto exchange datta a Us ng USB memo y s cks om unknown sou ces o exchange da a b)) Usiing a sttandallone computterr tto outtputt a harrd copy lletttterr b Us ng a s anda one compu e o ou pu a ha d copy e e c)) Usiing rrettaiill soffttwarre tthatt has been checked fforr viirruses c Us ng e a so wa e ha has been checked o v uses d)) Usiing a Grraphiicall Userr IIntterrfface ((GUII)) d Us ng a G aph ca Use n e ace GU

Q.. 6 Q 6

Whatt iis tthe name off tthe actt tthatt coverrs hackiing? Wha s he name o he ac ha cove s hack ng? a)) Computterr Hackerrs Actt a Compu e Hacke s Ac b)) Computterr Userrs Prrottecttiion Actt b Compu e Use s P o ec on Ac c)) Computterr Miisuse Actt c Compu e M suse Ac d)) Computterr Prrottecttiion Actt d Compu e P o ec on Ac

Q.. 7 Q 7

Why iitt iis iimporrttantt tto updatte anttiiviirrus soffttwarre rregullarrlly? Why s mpo an o upda e an v us so wa e egu a y? a)) To prrottectt yourr computterr ffrrom SPAM a To p o ec you compu e om SPAM b)) To ensurre olld viirruses arre rremoved b To ensu e o d v uses a e emoved c)) To ensurre tthe soffttwarre can prrottectt agaiinstt allll known viirruses c To ensu e he so wa e can p o ec aga ns a known v uses d)) To prreventt tthe sprread off mallwarre prrogrrams on tthe IIntterrnett d To p even he sp ead o ma wa e p og ams on he n e ne

Q.. 8 Q 8

Whatt iis Mallwarre? Wha s Ma wa e? a)) An e--maiill prrogrram a An e ma p og am b)) Soffttwarre develloped fforr tthe purrpose off causiing harrm tto a computterr systtem b So wa e deve oped o he pu pose o caus ng ha m o a compu e sys em c)) Anttiiviirrus soffttwarre c An v us so wa e d)) Applliicattiion desiigned tto bllock unautthorriized access whiille perrmiittttiing autthorriized d App ca on des gned o b ock unau ho zed access wh e pe m ng au ho zed communiicattiions commun ca ons

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

Q.. 9 Q 9

Whatt iis a computterr hackerr? Wha s a compu e hacke ? a)) A computterr engiineerr tthatt ffiixes computterrs and nettworrks a A compu e eng nee ha xes compu e s and ne wo ks b)) Prrogrrammerr who uses autthorriised access tto explloiitt iinfforrmattiion b P og amme who uses au ho sed access o exp o n o ma on c)) Prrogrrammerr who secrrettlly iinvades computterrs wiitthoutt autthorriisattiion c P og amme who sec e y nvades compu e s w hou au ho sa on d)) A soffttwarre ttrraiinerr d A so wa e a ne

Q.. 10 Whatt coulld llead tto tthe sprread off mallwarre? Q 10 Wha cou d ead o he sp ead o ma wa e? a)) Usiing a sttandallone computterr tto outtputt a harrd copy off a sprreadsheett a Us ng a s anda one compu e o ou pu a ha d copy o a sp eadshee b)) Usiing a Grraphiicall Userr IIntterrfface ((GUII)) b Us ng a G aph ca Use n e ace GU c)) Usiing a Flloppy diisk tto exchange datta c Us ng a F oppy d sk o exchange da a d)) Usiing Anttii--spam soffttwarre d Us ng An spam so wa e Q.. 11 Why shoulld computterr userrs llog on wiitth botth a userrname and passworrd? Q 11 Why shou d compu e use s og on w h bo h a use name and passwo d? a)) To know who iis llogged iin a To know who s ogged n b)) To prrottectt yourr computterr agaiinstt unautthorriised access b To p o ec you compu e aga ns unau ho sed access c)) To keep ttiime--keepiing rrecorrds c To keep me keep ng eco ds d)) So you can access tthe iintterrnett d So you can access he n e ne Q.. 12 Whatt shoulld you do iiff you rreceiive an e--maiill wiitth an attttachmentt ffrrom an unknown userr? Q 12 Wha shou d you do you ece ve an e ma w h an a achmen om an unknown use ? a)) Read tthe e--maiill and open tthe attttachmentt a Read he e ma and open he a achmen b)) Dellette tthe emaiill b De e e he ema c)) Forrwarrd tthe emaiill c Fo wa d he ema d)) Downlload tthe attttachmentt ontto yourr deskttop d Down oad he a achmen on o you desk op

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

Q.. 13 Whiich one off tthe ffollllowiing iis sttrrongestt vallue fforr a passworrd? Q 13 Wh ch one o he o ow ng s s onges va ue o a passwo d? a)) Allll charractterrs a A cha ac e s b)) Yourr datte off biirrtth b You da e o b h c)) Yourr mottherrs maiiden name c You mo he s ma den name d)) Combiinattiion off rrandom charractterrs and numberrs d Comb na on o andom cha ac e s and numbe s Q.. 14 Whatt woulld you use tto change yourr userr passworrd? Q 14 Wha wou d you use o change you use passwo d? a)) IIntterrnett Expllorrerr a n e ne Exp o e b)) Fiirreffox b F e ox c)) Conttrroll Panell c Con o Pane d)) BIIOS d B OS Q.. 15 Why shoulld you llock yourr computterr when away ffrrom iitt,, iin a worrk enviirronmentt? Q 15 Why shou d you ock you compu e when away om n a wo k env onmen ? a)) So tthe scrreen saverr iis acttiivatted a So he sc een save s ac va ed b)) Economiicall rreasons b Econom ca easons c)) To prreventt unautthorriised access off yourr iinfforrmattiion c To p even unau ho sed access o you n o ma on d)) To sttop yourr worrk ((datta)) gettttiing llostt d To s op you wo k da a ge ng os Q.. 16 You ttellll yourr ffrriiends some conffiidenttiiall iinfforrmattiion you have access tto att worrk.. Whiich llaw arre you Q 16 You e you ends some con den a n o ma on you have access o a wo k Wh ch aw a e you brreakiing? b eak ng? a)) Computterr Miisuse Actt 1990 a Compu e M suse Ac 1990 b)) Datta Prrottecttiion Actt 1998 b Da a P o ec on Ac 1998 c)) Custtomerr Crrediitt Actt 1974 c Cus ome C ed Ac 1974 d)) Diisabiilliitty Diiscrriimiinattiion Actt 2000 d D sab y D sc m na on Ac 2000

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

10

Q.. 17 Whatt iis phiishiing? Q 17 Wha s ph sh ng? a)) Sendiing an e--maiill,, diisguiised as an offffiiciiall e--maiill ffrrom a ((ffiicttiionall)) bank a Send ng an e ma d sgu sed as an o c a e ma om a c ona bank b)) An emaiill warrniing tthe rreciipiientt off a computterr viirrus tthrreatt b An ema wa n ng he ec p en o a compu e v us h ea c)) Sendiing an e--maiill wiitth a genuiine jjob offfferr c Send ng an e ma w h a genu ne ob o e d)) Sendiing an emaiill conttaiiniing an attttachmentt d Send ng an ema con a n ng an a achmen Q.. 18 Whiich off tthe ffollllowiing coulld make you vullnerrablle tto ffrraud whiille onlliine? Q 18 Wh ch o he o ow ng cou d make you vu ne ab e o aud wh e on ne? a)) Usiing a scrreen name orr niick name tthatt cannott iidenttiiffy you a Us ng a sc een name o n ck name ha canno den y you b)) Giiviing someone unknown iin a chatt rroom yourr perrsonall dettaiills b G v ng someone unknown n a cha oom you pe sona de a s c)) Keepiing yourr sociiall nettworrk prroffiille prriivatte c Keep ng you soc a ne wo k p o e p va e d)) Usiing a Fiirrewallll d Us ng a F ewa Q.. 19 Whiich one off tthe ffollllowiing bestt descrriibes Blluettootth? Q 19 Wh ch one o he o ow ng bes desc bes B ue oo h? a)) Open wiirrelless prrottocoll fforr exchangiing datta overr shorrtt rrange diisttances ffrrom ffiixed and mobiille deviices a Open w e ess p o oco o exchang ng da a ove sho ange d s ances om xed and mob e dev ces b)) Long--rrange wiirred prrottocoll fforr exchangiing datta ffrrom ffiixed and mobiille deviices b Long ange w ed p o oco o exchang ng da a om xed and mob e dev ces c)) Shorrtt--rrange wiirred prrottocoll fforr exchangiing datta c Sho ange w ed p o oco o exchang ng da a d)) Open llong--rrange wiirrelless prrottocoll fforr exchangiing datta d Open ong ange w e ess p o oco o exchang ng da a Q.. 20 How shoulld you rreporrtt a brreach iin IIT securriitty att worrk? Q 20 How shou d you epo a b each n T secu y a wo k? a)) Emaiill yourr boss a Ema you boss b)) Use tthe metthod as lliistted iin tthe companys securriitty polliicy b Use he me hod as s ed n he company s secu y po cy c)) Riing a colllleague c R ng a co eague d)) Usiing any means off communiicattiion d Us ng any means o commun ca on

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

11

Q.. 21 Whatt iis a Wii--Fii ((wiirrelless)) nettworrk? Q 21 Wha s a W F w e ess ne wo k? a)) A nettworrk tthatt can have a maxiimum off 10 userr a A ne wo k ha can have a max mum o 10 use b)) A nettworrk tthatt cannott be iintterrceptted by ottherr userrs b A ne wo k ha canno be n e cep ed by o he use s c)) A nettworrk tthatt cannott be hacked c A ne wo k ha canno be hacked d)) A nettworrk tthatt can be accessed by ottherr userrs d A ne wo k ha can be accessed by o he use s Q.. 22 Why shoulld you ffollllow guiidelliines and prrocedurres whiille usiing IIT rresourrces iin an orrganiisattiion? Q 22 Why shou d you o ow gu de nes and p ocedu es wh e us ng T esou ces n an o gan sa on? a)) To keep ttrrack off emplloyees worrk a To keep ack o emp oyees wo k b)) To enablle easiierr access tto tthe orrganiisattiions nettworrk b To enab e eas e access o he o gan sa ons ne wo k c)) To ensurre tthe securre use off tthe orrganiisattiions IIT rresourrces c To ensu e he secu e use o he o gan sa ons T esou ces d)) To keep ttrrack off IIT rresourrces d To keep ack o T esou ces Q.. 23 How can you keep yourr USB sttorrage deviice saffe and securre? Q 23 How can you keep you USB s o age dev ce sa e and secu e? a)) Do nott access iitt usiing a Wii--Fii deviice a Do no access us ng a W F dev ce b)) Onlly use iitt att home b On y use a home c)) Dontt lleave iitt unattttended c Don eave una ended d)) Do nott access iitt usiing a Blluettootth deviice d Do no access us ng a B ue oo h dev ce Q.. 24 IIn a company orrganiisattiions sttrructturre whatt deparrttmentt woulld holld tthe guiidelliines and prrocedurres fforr tthe Q 24 n a company o gan sa ons s uc u e wha depa men wou d ho d he gu de nes and p ocedu es o he securre use off IIT wiitthiin tthe orrganiisattiions? secu e use o T w h n he o gan sa ons? a)) Perrsonnell Deparrttmentt a Pe sonne Depa men b)) Admiiniisttrrattiion Deparrttmentt b Adm n s a on Depa men c)) Fiinance Deparrttmentt c F nance Depa men d)) IIT Deparrttmentt d T Depa men

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

12

Q.. 25 IIff sttollen whiich one off tthe ffollllowiing deviices woulld rresulltt iin tthe lloss off conttactt dettaiills? Q 25 s o en wh ch one o he o ow ng dev ces wou d esu n he oss o con ac de a s? a)) Modem a Modem b)) Prriintterr b P ne c)) Mobiille Phone c Mob e Phone d)) Moniittorr d Mon o Q.. 26 Whatt woulld prreventt tthe tthefftt off IIT equiipmentt ((ii..e.. PC,, llapttop,, prriintterrs ettc))? Q 26 Wha wou d p even he he o T equ pmen e PC ap op p n e s e c ? a)) Securriitty cablle a Secu y cab e b)) Webcam b Webcam c)) Securriitty soffttwarre c Secu y so wa e d)) Spywarre d Spywa e Q.. 27 How can you sttorre memorry carrds saffelly? Q 27 How can you s o e memo y ca ds sa e y? a)) Securre iin a drraw a Secu e n a d aw b)) Pllace carrds away ffrrom magnettiic ffiiellds b P ace ca ds away om magne c e ds c)) Keep iitt iin iitts orriigiinall packagiing c Keep n s o g na packag ng d)) Keep backups d Keep backups Q.. 28 Whiich one off tthe ffollllowiing iis bestt way tto backup yourr datta? Q 28 Wh ch one o he o ow ng s bes way o backup you da a? a)) Uplload tto tthe iintterrnett a Up oad o he n e ne b)) Fllash drriive b F ash d ve c)) Labelllled CD orr DVD c Labe ed CD o DVD d)) Save ontto yourr harrd drriive iin anottherr llocattiion d Save on o you ha d d ve n ano he oca on

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

13

Q.. 29 Why iis so iimporrttantt tto have a securre offff--siitte backup copy off an orrganiisattiions datta? Q 29 Why s so mpo an o have a secu e o s e backup copy o an o gan sa ons da a? a)) IImprrove WAN accessiibiilliitty a mp ove WAN access b y b)) To sttop tthe lloss off datta iin tthe eventt off a ffiirre b To s op he oss o da a n he even o a e c)) To keep datta morre securre c To keep da a mo e secu e d)) Save datta sttorrage space d Save da a s o age space Q.. 30 Why shoulld you change yourr computterr llogiin passworrd ffrrequenttlly? Q 30 Why shou d you change you compu e og n passwo d equen y? a)) IImprroves overrallll accessiibiilliitty a mp oves ove a access b y b)) To prreventt tthe rriisk off access tto a nettworrk by unwantted userrs b To p even he sk o access o a ne wo k by unwan ed use s c)) IImprroves LAN accessiibiilliitty c mp oves LAN access b y d)) Saves datta space d Saves da a space Q.. 31 Whatt iis emaiill spooffiing? Q 31 Wha s ema spoo ng? a)) Non--malliiciious emaiills a Non ma c ous ema s b)) Prriinttiing emaiills b P n ng ema s c)) Frraudullentt emaiill acttiiviitty c F audu en ema ac v y d)) Access morre tthan one emaiill accountt siimullttaneouslly d Access mo e han one ema accoun s mu aneous y Q.. 32 Whatt iis a publliic nettworrk? Q 32 Wha s a pub c ne wo k? a)) A nettworrk tthatt has lliimiitted access a A ne wo k ha has m ed access b)) A nettworrk tthatt can be used by anyone b A ne wo k ha can be used by anyone c)) A nettworrk used by busiinesses onlly c A ne wo k used by bus nesses on y d)) A nettworrk tthatt uses prriivatte IIP addrress space d A ne wo k ha uses p va e P add ess space

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

14

Q.. 33 Whatt does WAN sttand fforr? Q 33 Wha does WAN s and o ? a)) Wiide Access Nettworrk a W de Access Ne wo k b)) Wiide Arrea Nettworrk b W de A ea Ne wo k c)) Wiindows Access Nettworrk c W ndows Access Ne wo k d)) Wiindows Arrea Nettworrk d W ndows A ea Ne wo k Q.. 34 IIn computterr tterrms whatt iis a Trrojjan horrse? Q 34 n compu e e ms wha s a T o an ho se? a)) A llarrge websiitte a A a ge webs e b)) An applliicattiion allllowiing ottherr userrs tto have access tto yourr computterr b An app ca on a ow ng o he use s o have access o you compu e c)) A llarrge nettworrk c A a ge ne wo k d)) An applliicattiion allllowiing userrs tto have access tto allll nettworrk prriintterrs d An app ca on a ow ng use s o have access o a ne wo k p n e s Q.. 35 IIn computterr tterrms whatt iis a Worrm? Q 35 n compu e e ms wha s a Wo m? a)) A nettworrk tthatt can be used by anyone a A ne wo k ha can be used by anyone b)) Non--malliiciious e--maiill b Non ma c ous e ma c)) A desttrructtiive soffttwarre prrogrram c A des uc ve so wa e p og am d)) A ttype off securriitty deviice d A ype o secu y dev ce

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

15

Q.. 36 Whatt iis encrrypttiion? Q 36 Wha s enc yp on? a)) A way off makiing datta harrderr tto access by unwantted userrs a A way o mak ng da a ha de o access by unwan ed use s b)) A desttrructtiive soffttwarre prrogrram b A des uc ve so wa e p og am c)) A way off makiing datta easiierr tto access by unwantted userrs c A way o mak ng da a eas e o access by unwan ed use s d)) A crross compattiiblle brrowserr d A c oss compa b e b owse

THIS IS A FREE SAMPLE, FOR ALL VISIBLE QUESTIONS, ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA, PLEASE VISIT:

www.learn-new-skills-from-home.com

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

16

MODULE 1 IT SECURITY

ANSWERS

A.1

Open the Answer File word document located in the Module 1 folder by double clicking it.

Required location

Required file

Enter your candidate identification (ID) into the Q1. Answer section. If you dont have an ID number then your name will suffice. Once your ID is added, answer the following test questions in there relevant number fields. Candidate Identification number

A. 2

c) Anti-virus software Antivirus or anti-virus software is used to prevent, detect, and remove computer viruses, worms, and Trojan horses. It may also prevent and remove adware, spyware, and other forms of malware. In a 2009 a survey by the Symantec Corporation (largest maker of security software for computers) showed that more than 80% of home users have some kind of anti-virus software installed on their machine.

A. 3

b) Application designed to block unauthorized access while permitting authorized communications A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria. Windows has a built in firewall located in the Security centre.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

17

A. 4

d) Send unsolicited bulk e-mail messages indiscriminately E-mail spam, also known as junk e-mail or unsolicited bulk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail. Spammers collect e-mail addresses from chat-rooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers. They also use a practice known as "e-mail appending" or "epending" in which they use known information about their target (such as a postal address) to search for the target's e-mail address. Much of spam is sent to invalid e-mail addresses. Spam currently averages 78% of all e-mail sent (2010 figures).

THIS IS A FREE SAMPLE, FOR ALL VISIBLE QUESTIONS, ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA, PLEASE VISIT:

www.learn-new-skills-from-home.com

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

18

MODULE 2 - IT USER FUNDAMENTALS


The IT User Fundamentals module enables candidates to gain the knowledge and skills required to understand common functions of a personal computer (PC) and its operating system (Windows Vista). Additional the module addresses how to manage and organize files (Windows Explorer), directories, folders, and how to duplicate, move and delete files and compress and extract files.

TEST STRUCTURE: The IT User Fundamentals module test requires a pass mark of 24 (75%) out of the possible 32 marks available. Learners have 45 minutes to complete the test and can complete test questions in any order but are advised that they attempt them in sequence (1, 2, 3, etc...) as it will be easier to keep track of your progress. Please note operating systems may vary (Windows XP/Vista/7) in examination centres. Although these operating systems GUI (Graphical User Interface) and advanced features may vary, the subject knowledge required for the IT Fundamentals examination (Renaming, Deleting, Copying folders etc) covers the standard features set in all these systems. Learners are advised not to spend too long on each question and if unsure of a particular answer to move onto the next question available and return to the original question, time permitting. Partially completed questions can be awarded half marks, depending on the marking criteria assigned to that particular question; therefore attempting a section of a question is advised. Generally test centres wont let candidates collect printouts while the test is in progress. The test invigilator will either collect printouts for candidates or candidates will be allowed to collect them at the end of the exam. This can be an advantage to candidates as it saves precious time in waiting for the printing process. The test centre invigilator will inform you of the rules and requirements of the test prior to the exam start. It is recommended that use the system clock, located at the bottom right corner of the monitor to time their progress, as this facility will be available in the test environment.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

19

MODULE 2 - IT USER FUNDAMENTALS

TEST

Q1. Q2.

Select the Module 2 folder. Open the Answer File word document contained within it. Enter your Candidate Identification (or your name) in the space provided on row 1 of the table in the Answer File and save the Answer File. Which of the following is the correct name for the screen image shown below? Enter your answer (a, b, c, or d) in the Answer File (Q. 3 space provided). (a) Formatting Bar (b) Scroll Bar (c) Status Bar (d) Quick Access Toolbar

Q3.

Q4.

Which file type below is often used for databases? Enter your answer (a, b, c, or d) in the Answer File (Q. 4 space provided). (a) .mp3 (b) .accdb (c) .zip (d) .gif

Q5.

Which of the following is an advantage of a virus scanning application? Enter your answer (a, b, c, or d) in the Answer File (Q. 5 space provided). (a) It will help to spread viruses on your computer network (b) It will make the computer run faster on the internet (c) It prevents software on your computer being copied (d) It will detect and remove viruses from your computer

Q6.

Locate the file bronze document in the Module 2 folder and rename the file to bronze admin members document.

Q7.. Q7

Crreatte a shorrttcutt iicon fforr tthe Modulle 2 ffollderr wiitthiin tthe Fiilles ffollderr orr on yourr deskttop.. C ea e a sho cu con o he Modu e 2 o de w h n he F es o de o on you desk op

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

20

Q8.. Q8

Locatte tthe Memberrs ffollderr wiitthiin tthe Modulle 2 ffollderr and crreatte tthe ffollllowiing subffollderr sttrructturre as Loca e he Membe s o de w h n he Modu e 2 o de and c ea e he o ow ng sub o de s uc u e as rreprresentted by tthe diiagrram bellow:: ep esen ed by he d ag am be ow

Q9.. Q9

Copy tthe golld admiin memberrs documentt and golld memberr jjpeg iimage ffrrom tthe Modulle 2 ffollderr tto tthe Copy he go d adm n membe s documen and go d membe peg mage om he Modu e 2 o de o he Golld subffollderr.. Go d sub o de

Q10.. Change tthe attttrriibutte off tthe Sttaffff Dettaiills documentt iin tthe Modulle 2 ffollderr tto Read--onlly.. Q10 Change he a bu e o he S a De a s documen n he Modu e 2 o de o Read on y Q11.. Countt tthe numberr off ffiilles ((iinclludiing any ffiilles iin subffollderrs)) conttaiined iin tthe Modulle 2 ffollderr.. Entterr yourr Q11 Coun he numbe o es nc ud ng any es n sub o de s con a ned n he Modu e 2 o de En e you answerr iin tthe Answerr Fiille ((opened iin questtiion one)) and save.. ((Q..11 space prroviided)).. answe n he Answe F e opened n ques on one and save Q 11 space p ov ded Q12.. Whiich one off tthe ffollllowiing iicons shown bellow rreprresentts tthe Wiindows Securriitty Centtrre? Entterr yourr Q12 Wh ch one o he o ow ng cons shown be ow ep esen s he W ndows Secu y Cen e? En e you answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 12 space prroviided)).. answe a b c o d n he Answe F e Q 12 space p ov ded ((a)) a ((b)) b ((c)) c ((d)) d Q13.. Whiich one off tthe ffollllowiing iis tthe corrrrectt prrocedurre tto shutt down a non--rrespondiing applliicattiion? Entterr yourr Q13 Wh ch one o he o ow ng s he co ec p ocedu e o shu down a non espond ng app ca on? En e you answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 13 space prroviided)).. answe a b c o d n he Answe F e Q 13 space p ov ded ((a)) Trry rreopeniing tthe applliicattiion a T y eopen ng he app ca on ((b)) Prress Cttrrll + Alltt + Dellette,, iin tthe Task Managerr wiindow clliick New Task b P ess C + A + De e e n he Task Manage w ndow c ck New Task ((c)) Resttarrtt tthe computterr c Res a he compu e ((d)) Prress Cttrrll + Alltt + Dellette,, iin tthe Task Managerr wiindow sellectt tthe non--rrespondiing d P ess C + A + De e e n he Task Manage w ndow se ec he non espond ng applliicattiion and clliick End Task app ca on and c ck End Task

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

21

Q14.. Whiich one off tthe ffollllowiing Functtiion Keys acttiivattes tthe Hellp opttiion iin wiindows? Entterr yourr answerr ((a,, b,, Q14 Wh ch one o he o ow ng Func on Keys ac va es he He p op on n w ndows? En e you answe a b c,, orr d)) iin tthe Answerr Fiille ((Q.. 14 space prroviided)).. c o d n he Answe F e Q 14 space p ov ded ((a)) F5 a F5 ((b)) F8 b F8 ((c)) F1 c F1 ((d)) F12 d F12 Q15.. IIn Wiindows Viistta whatt iis tthe shorrttcutt opttiion tto perrsonalliize yourr deskttop? Entterr yourr answerr ((a,, b,, c,, orr d)) Q15 n W ndows V s a wha s he sho cu op on o pe sona ze you desk op? En e you answe a b c o d iin tthe Answerr Fiille ((Q.. 15 space prroviided)).. n he Answe F e Q 15 space p ov ded ((a)) Riightt clliick on tthe deskttop and sellectt Perrsonalliize a R gh c ck on he desk op and se ec Pe sona ze ((b)) Sellectt Sttarrtt tthen Nettworrk b Se ec S a hen Ne wo k ((c)) Sellectt Sttarrtt,, Conttrroll Panell tthen Perrsonalliize c Se ec S a Con o Pane hen Pe sona ze ((d)) Riightt clliick on tthe deskttop,, sellectt New tthen Shorrttcutt d R gh c ck on he desk op se ec New hen Sho cu Q16.. How many Megabyttes arre ttherre iin a Giigabytte? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 16 Q16 How many Megaby es a e he e n a G gaby e? En e you answe a b c o d n he Answe F e Q 16 space prroviided)).. space p ov ded ((a)) 10 a 10 ((b)) 100 b 100 ((c)) 1024 c 1024 ((d)) 10000 d 10000 Q17.. Whiich one off tthe ffollllowiing woulld be consiiderred good prracttiice when namiing tthe Excell 2007 ffiille rrellattiing tto Q17 Wh ch one o he o ow ng wou d be cons de ed good p ac ce when nam ng he Exce 2007 e e a ng o Harrrriisons Mediias ttrradiing ffiigurres fforr tthe ffiirrstt quarrtterr off 2009? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Ha sons Med a s ad ng gu es o he s qua e o 2009? En e you answe a b c o d n he Answerr Fiille ((Q.. 17 space prroviided)).. Answe F e Q 17 space p ov ded ((a)) Harrrriisons Trradiing..xllsx--10 a Ha sons T ad ng x sx 10 ((b)) Harrrriisons Mediia Fiigues..xlls b Ha sons Med a F gues x s ((c)) Harrrriisons Mediia 2009 Q1 Trradiing..xllsx c Ha sons Med a 2009 Q1 T ad ng x sx ((d)) HM 2009Q1A Trradiing..xllsx d HM 2009Q1A T ad ng x sx Q18.. Dellette tthe Feedback documentt ffrrom tthe Modulle 2 ffollderr.. Q18 De e e he Feedback documen om he Modu e 2 o de Q19.. Exttrractt tthe ziipped ffiille named Ziipped Fiilles iin tthe Modulle 2 ffollderr.. Save tthe exttrractted ffollderr and ffiilles iintto Q19 Ex ac he z pped e named Z pped F es n he Modu e 2 o de Save he ex ac ed o de and es n o tthe Carrs ffollderr.. he Ca s o de

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

22

Q20.. Why shoulld you change yourr computterr llogiin passworrd ffrrequenttlly? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Q20 Why shou d you change you compu e og n passwo d equen y? En e you answe a b c o d n he Answerr Fiille ((Q.. 20 space prroviided)).. Answe F e Q 20 space p ov ded ((a)) Allllows easiierr access tto tthe iintterrnett a A ows eas e access o he n e ne ((b)) To prreventt tthe rriisk off access tto a nettworrk by unwantted userrs b To p even he sk o access o a ne wo k by unwan ed use s ((c)) IImprroves WAN accessiibiilliitty c mp oves WAN access b y ((d)) Saves morre datta space d Saves mo e da a space Q21.. Whiich off tthe ffollllowiing iis mostt lliikelly tto hellp rregaiin a llostt iintterrnett connecttiion? Entterr yourr answerr ((a,, b,, c,, Q21 Wh ch o he o ow ng s mos ke y o he p ega n a os n e ne connec on? En e you answe a b c orr d)) iin tthe Answerr Fiille ((Q.. 21 space prroviided)).. o d n he Answe F e Q 21 space p ov ded ((a)) Refforrmatte tthe harrd drriive a Re o ma e he ha d d ve ((b)) Check tthe modem and//orr rroutterr connecttiions b Check he modem and o ou e connec ons ((c)) Perrfforrm a viirrus check c Pe o m a v us check ((d)) Open Task Managerr and cllose allll open prrogrrams d Open Task Manage and c ose a open p og ams Q22.. Whiich off tthe ffollllowiing opttiions wiillll allllow you tto change ffrrom tthe currrrentt iinsttalllled prriintterr tto anottherr Q22 Wh ch o he o ow ng op ons w a ow you o change om he cu en ns a ed p n e o ano he iinsttalllled prriintterr? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 3 space prroviided)).. ns a ed p n e ? En e you answe a b c o d n he Answe F e Q 3 space p ov ded ((a)) Sett as Deffaulltt a Se as De au ((b)) Pause Prriinttiing b Pause P n ng ((c)) Add Prriintterr c Add P n e ((d)) Captturre Prriintterr Porrtt d Cap u e P n e Po Q23.. Emptty tthe Recyclle Biin by sellecttiing tthe rrequiirred iicon on tthe deskttop.. Move tthe Recyclle Biin tto tthe upperr Q23 Emp y he Recyc e B n by se ec ng he equ ed con on he desk op Move he Recyc e B n o he uppe rriightt corrnerr off tthe deskttop scrreen.. gh co ne o he desk op sc een Q24.. Whatt arre tthe Wiindows shorrttcutt keys tthatt enablle tthe buiilltt iin searrch ffaciilliitty? Entterr yourr answerr ((a,, b,, c,, orr d)) Q24 Wha a e he W ndows sho cu keys ha enab e he bu n sea ch ac y? En e you answe a b c o d iin tthe Answerr Fiille ((Q.. 24 space prroviided)).. n he Answe F e Q 24 space p ov ded ((a)) Shiifftt + P a Sh + P ((b)) Alltt + F8 b A + F8 ((c)) Cttrrll + Alltt + Dellette c C + A + De e e ((d)) WIINKEY + F d W NKEY + F

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

23

Q25.. Usiing tthe iimage bellow,, whiich one off tthe ffollllowiing ffollderrs woulld be cllasses as a rroott diirrecttorry? Entterr yourr Q25 Us ng he mage be ow wh ch one o he o ow ng o de s wou d be c asses as a oo d ec o y? En e you answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 25 space prroviided)).. answe a b c o d n he Answe F e Q 25 space p ov ded

((a)) Book a Book ((b)) ACER ((C)):: b ACER C ((c)) Logs c Logs ((d)) Prrogrram Fiilles d P og am F es

Q26.. Whiich off tthe ffollllowiing woulld sllow down yourr computterr perrfforrmance? Entterr yourr answerr ((a,, b,, c,, orr d)) iin Q26 Wh ch o he o ow ng wou d s ow down you compu e pe o mance? En e you answe a b c o d n tthe Answerr Fiille ((Q.. 26 space prroviided)).. he Answe F e Q 26 space p ov ded ((a)) Usiing a llarrgerr moniittorr a Us ng a a ge mon o ((b)) Decrreasiing tthe numberr off applliicattiions rrunniing b Dec eas ng he numbe o app ca ons unn ng ((c)) Usiing a ffastterr prriintterr c Us ng a as e p n e ((d)) Decrreasiing tthe RAM siize iin tthe computterr d Dec eas ng he RAM s ze n he compu e Q27.. Captturre a prriintt scrreen iimage off yourr deskttop and pastte iitt iintto tthe Q.. 27 space prroviided iin tthe Answerr Fiille.. Q27 Cap u e a p n sc een mage o you desk op and pas e n o he Q 27 space p ov ded n he Answe F e Q28.. Whatt iis diisk fforrmattttiing used fforr? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 28 space Q28 Wha s d sk o ma ng used o ? En e you answe a b c o d n he Answe F e Q 28 space prroviided)).. p ov ded ((a)) Fiindiing rrequiirred ffiilles on a harrd diisk a F nd ng equ ed es on a ha d d sk ((b)) Lockiing a harrd drriive b Lock ng a ha d d ve ((c)) Accessiing xlls datta ffiilles c Access ng x s da a es ((d)) To prreparre a diisk tto sttorre ffiilles d To p epa e a d sk o s o e es Q29.. Whatt iis tthe speed off a CPU measurred iin? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 29 space Q29 Wha s he speed o a CPU measu ed n? En e you answe a b c o d n he Answe F e Q 29 space prroviided)).. p ov ded ((a)) Giigabyttes ((GB)) a G gaby es GB ((b)) Biitts perr second ((Bps)) b B s pe second Bps ((c)) Megaherrttz ((MHz)) c Megahe z MHz ((d)) Megabyttes ((MB)) d Megaby es MB

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

24

Q30.. Prriintt one copy off tthe Answerr Fiille ((iiff prriintterr avaiillablle)) orr save as a prriintt ffiille tto tthe Modulle 2 ffollderr,, usiing Q30 P n one copy o he Answe F e p n e ava ab e o save as a p n e o he Modu e 2 o de us ng tthe ffiille name Prriintt Fiille.. Save and cllose tthe Answerr Fiille documentt.. he e name P n F e Save and c ose he Answe F e documen

THIS IS A FREE SAMPLE, FOR ALL VISIBLE QUESTIONS, ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA, PLEASE VISIT:

www.learn-new-skills-from-home.com

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

25

MODULE 2 - IT USER FUNDAMENTALS

ANSWERS

A1.

Open the Answer File located in the Module 2 folder by double clicking it (this will open the document directly in your computers word-processing application).

Required location

Answer File

A2.

Enter your Candidate Identification (or your name, if you have no Candidate Identification Number).

Candidate Identification number

A3.

d) Quick Access Toolbar The Quick Access Toolbar is located by default at the top of the Word window and provides quick access to tools that you use frequently. You can customize the Quick Access Toolbar by adding commands to it. Before you start any test questions make sure the Minimize the Ribbon option is deselected on the quick access toolbar otherwise the Office Ribbon will be minimized every time you click on the document page.

A4.

b) .accdb Microsoft Office Access 2007 supports the document format accdb. This format allows users of old versions of Microsoft Access (2000/XP/2003) software which used the .mdb format, to open the document in 2007, but documents that were created in Access 2007 cannot be opened in older versions unless a compatibility program is used.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

26

A5.

d) It will detect and remove viruses from your computer It is advisable to scan and update your computer on a regular basis (daily if possible), using your computer anti-virus software.

A6.

Locate the bronze document located in the Module 2 folder, right click the bronze document and select the Rename option.

Rename option

Change the name of the document to bronze admin members.

New file name

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

27

MODULE 7 - USING EMAIL AND THE INTERNET


The Using Email and the Internet module also known as Web Browsing and Communication are divided into two separate sections. The first section covers web browsing (Microsoft Internet Explorer) and requires candidates to understand some of the concepts and terms associated with using the Internet, and to appreciate some of the security considerations. In the second section, Communication, candidates will learn to understand some of the concepts of electronic mail (Microsoft Outlook), and gain the ability to use email software to send and receive messages, and to attach files to mail messages.

TEST STRUCTURE: The Using Email and the Internet module test requires a pass mark of 24 (75%) out of the possible 32 marks available. Learners have 45 minutes to complete the test and can complete the test questions in any order, but it recommended that they attempt them in sequence (1, 2, 3, etc...) as it will be easier to keep track of their progress. Learners are advised not to spend too long on each question and if unsure of a particular answer to move onto the next question available and return to the original question, time permitting. Generally test centres wont let candidates collect printouts while the test is in progress. The test invigilator will either collect printouts for candidates or candidates will be allowed to collect them at the end of the exam. This can be an advantage to candidates as it saves precious time in waiting for the printing process. The test centre invigilator will inform you of the rules and requirements of the test prior to the exam start. It is recommended that use the system clock, located at the bottom right corner of the monitor to time their progress, as this facility will be available in the test environment.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

28

USING EMAIL AND THE INTERNET

INTERNET SECTION

TEST

Q1.

Select the Module 7 folder. Open the Answer File contained within it. Enter your Candidate Identification (or your name) in the space provided on row 1 of the table in the Answer File. What is HTTP? Enter your answer (a, b, c, or d) in the Answer File (Q. 2 space provided). a) Hyperlink Transfer Protocol b) Hyperlink Transmission Procedure c) Hypertext Transfer Protocol d) Hypertext Transmission Procedure

Q2.

Q3.

What is a Search Engine? Enter your answer (a, b, c, or d) in the Answer File (Q. 3 space provided). a) A program that searches Web pages for viruses b) A program that searches for an Internet connection c) A program that refreshes Web pages d) A program that searches the Internet by key words

Q4.

What is a Web Browser Home Page? Enter your answer in the Answer File (Q. 4 space provided). a) The first page for a set of Web pages in a Web site b) A Web Browser help system c) A hyperlink to a document d) A start page in a Web Browser

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

29

Q5.. Q5

Whatt iis encrrypttiion and why iis iitt used? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q..5 space Wha s enc yp on and why s used? En e you answe a b c o d n he Answe F e Q 5 space prroviided)).. p ov ded a)) Encodiing off datta tto prreventt iinffecttiion by computterr viirruses a Encod ng o da a o p even n ec on by compu e v uses b)) Encodiing off datta tto prreventt datta gettttiing llostt b Encod ng o da a o p even da a ge ng os c)) Encodiing off datta tto prreventt acciidenttall dellettiion c Encod ng o da a o p even acc den a de e on d)) Encodiing off datta tto prreventt unautthorriized access tto datta d Encod ng o da a o p even unau ho zed access o da a

Q6.. Q6

Whatt iis an RSS ffeed? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q..6 space prroviided)).. Wha s an RSS eed? En e you answe a b c o d n he Answe F e Q 6 space p ov ded a)) A fforrmatt used tto publliish ffrrequenttlly updatted conttentt such as news headlliines orr podcastts a A o ma used o pub sh equen y upda ed con en such as news head nes o podcas s b)) A fforrmatt used tto publliish ffrrequenttlly updatted new userrs tto websiittes b A o ma used o pub sh equen y upda ed new use s o webs es c)) A fforrmatt used tto publliish onlly ttextt datta tto websiittes c A o ma used o pub sh on y ex da a o webs es d)) A fforrmatt used tto publliish onlly numerriicall datta tto websiittes d A o ma used o pub sh on y nume ca da a o webs es

Q7.. Q7

Whiich one off tthe ffollllowiing rrefferrs tto tthe domaiin name iin tthe URL:: httttp::////www..llearrn--new--skiilllls--ffrrom-Wh ch one o he o ow ng e e s o he doma n name n he URL h p www ea n new sk s om hom..com.. Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q..7 space prroviided)).. hom com En e you answe a b c o d n he Answe F e Q 7 space p ov ded a)) httttp:://// a h p b)) www.. b www c)) ..com c com d)) llearrn--new--skiilllls--ffrrom--hom d ea n new sk s om hom

Q8.. Q8

Whatt iis phiishiing? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q..8 space prroviided)).. Wha s ph sh ng? En e you answe a b c o d n he Answe F e Q 8 space p ov ded a)) Scheme wherre crriimiinalls send unsolliiciitted emaiill orr pop--up messages tto gett perrsonall and a Scheme whe e c m na s send unso c ed ema o pop up messages o ge pe sona and ffiinanciiall iinfforrmattiion ffrrom unsuspecttiing viicttiims nanc a n o ma on om unsuspec ng v c ms b)) An emaiill warrniing tthe rreciipiientt off a computterr viirrus tthrreatt b An ema wa n ng he ec p en o a compu e v us h ea c)) Sendiing an e--maiill wiitth a genuiine jjob offfferr c Send ng an e ma w h a genu ne ob o e d)) Sendiing an emaiill conttaiiniing an attttachmentt d Send ng an ema con a n ng an a achmen

Q9.. Q9

Open a web brrowsiing applliicattiion ((ii..e.. IIntterrnett Expllorrerr,, Fiirreffox,, Saffarrii ettc)) and go tto tthe ffollllowiing web Open a web b ows ng app ca on e n e ne Exp o e F e ox Sa a e c and go o he o ow ng web page addrress:: httttp::////www..llearrn--new--skiilllls--ffrrom--home..com page add ess h p www ea n new sk s om home com

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

30

Q10.. Sellectt a rrellevantt answerr ((off yourr choiice)) iin tthe Questtiion modulle llocatted on tthe rriightt hand siide off tthe Q10 Se ec a e evan answe o you cho ce n he Ques on modu e oca ed on he gh hand s de o he scrreen sellectt tthe Votte butttton.. sc een se ec he Vo e bu on Q11.. Entterr tthe Fiirrstt Votte dettaiills ((datte,, ttiime ettc)) diispllayed on tthe page iintto tthe Answerr Fiille ((Q.. 11 space Q11 En e he F s Vo e de a s da e me e c d sp ayed on he page n o he Answe F e Q 11 space prroviided)).. p ov ded Q12.. Access a searrch engiine ((ii..e.. Googlle,, MSN,, Yahoo ettc)) and perrfforrm a searrch usiing tthe phrrase whatt iis Q12 Access a sea ch eng ne e Goog e MSN Yahoo e c and pe o m a sea ch us ng he ph ase wha s IICT.. CT Q13.. Sellectt any websiitte tthatt giives iinfforrmattiion aboutt IICT iin tthe worrkpllace ffrrom tthe searrch rresulltts.. Prriintt one Q13 Se ec any webs e ha g ves n o ma on abou CT n he wo kp ace om he sea ch esu s P n one copy off tthe page tto an outtputt prriintterr iiff avaiillablle,, orr as a prriintt ffiille tto tthe Modulle 7 ffollderr.. Use tthe ffiille name copy o he page o an ou pu p n e ava ab e o as a p n e o he Modu e 7 o de Use he e name iictt iiff you arre addiing a prriintt ffiille tto yourr Modulle 7 ffollderr.. c you a e add ng a p n e o you Modu e 7 o de Q14.. Open yourr computterrs web brrowserr ((ii..e.. IIntterrnett Expllorrerr,, Fiirreffox,, Saffarrii ettc)) applliicattiion and go tto tthe Q14 Open you compu e s web b owse e n e ne Exp o e F e ox Sa a e c app ca on and go o he ffollllowiing web page addrress:: httttp::////www..llearrn--new--skiilllls--ffrrom--home..com.. Save tthe websiitte llogo iimage as o ow ng web page add ess h p www ea n new sk s om home com Save he webs e ogo mage as llogo tto tthe Modulle 7 ffollderr.. ogo o he Modu e 7 o de Q15.. Access tthe searrch engiine Googlle and perrfforrm a searrch usiing tthe keyworrd London.. Q15 Access he sea ch eng ne Goog e and pe o m a sea ch us ng he keywo d London Q16.. Sellectt any websiitte tthatt giives iinfforrmattiion aboutt London ffrrom tthe searrch rresulltts and save as London..ttxtt tto Q16 Se ec any webs e ha g ves n o ma on abou London om he sea ch esu s and save as London x o tthe Modulle 7 ffollderr.. he Modu e 7 o de

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

31

EMAIL SECTION

Q17.. Whiich off tthe ffollllowiing iis an advanttage off emaiill? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 17 Q17 Wh ch o he o ow ng s an advan age o ema ? En e you answe a b c o d n he Answe F e Q 17 space prroviided)).. space p ov ded a)) Emaiill messages arre allways easy tto llocatte a Ema messages a e a ways easy o oca e b)) Emaiill iis a llow costt way tto ttrransmiitt messages b Ema s a ow cos way o ansm messages c)) Emaiill iis allways a securre means off sendiing messages c Ema s a ways a secu e means o send ng messages d)) Emaiill elliimiinattes tthe need fforr conventtiionall surrfface maiill d Ema e m na es he need o conven ona su ace ma Q18.. Whatt iis a diigiittall siignatturre? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 18 space prroviided)).. Q18 Wha s a d g a s gna u e? En e you answe a b c o d n he Answe F e Q 18 space p ov ded a)) An ellecttrroniic siignatturre tthatt iis used tto buy goods on tthe IIntterrnett a An e ec on c s gna u e ha s used o buy goods on he n e ne b)) An ellecttrroniic siignatturre tthatt appearrs on allll ffiille attttachmentts b An e ec on c s gna u e ha appea s on a e a achmen s c)) An ellecttrroniic siignatturre tthatt conttaiins tthe addrress fforr an e--maiill c An e ec on c s gna u e ha con a ns he add ess o an e ma d)) An ellecttrroniic siignatturre tthatt iis used tto autthenttiicatte tthe iidenttiitty off tthe senderr off a message d An e ec on c s gna u e ha s used o au hen ca e he den y o he sende o a message Q19.. IIn tthe emaiill addrress iintterrnattiionall@exam..au whiich parrtt off tthe addrress iidenttiiffiies tthe geogrraphiicall arrea? Q19 n he ema add ess n e na ona @exam au wh ch pa o he add ess den es he geog aph ca a ea? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 19 space prroviided)).. En e you answe a b c o d n he Answe F e Q 19 space p ov ded a)) iintterrnattiionall a n e na ona b)) a..u b au c)) exam c exam d)) @ d @ Q20.. Whatt iis tthe name off tthe prrottocoll tthatt allllows emaiill clliientts tto rrettrriieve emaiill ffrrom a rremotte serrverr? Entterr Q20 Wha s he name o he p o oco ha a ows ema c en s o e eve ema om a emo e se ve ? En e yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 20 space prroviided)).. you answe a b c o d n he Answe F e Q 20 space p ov ded a)) IIP a P b)) POP b POP c)) SMS c S MS d)) RSS d RS S

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

32

Q21.. Open yourr emaiill accountt ((ii..e.. Outtllook,, MSN,, Saffe--Maiill,, Googlle ettc)) and crreatte a new maiill message.. Q21 Open you ema accoun e Ou ook MSN Sa e Ma Goog e e c and c ea e a new ma message Q22.. Prreparre a new message wiitth tthe maiill addrress _ _ _ _ @ _ _ _ ..com and entterr Carreerr Change as tthe subjjectt.. Q22 P epa e a new message w h he ma add ess _ _ _ _ @ _ _ _ com and en e Ca ee Change as he sub ec Forr tthe purrpose off tthiis exerrciise eiittherr use yourr own orr a ffrriiends e--maiill addrress.. Allways doublle check yourr Fo he pu pose o h s exe c se e he use you own o a ends e ma add ess A ways doub e check you e--maiill addrresses as iitt iis easy tto make a siimplle miisttake.. Entterr tthe ffollllowiing shorrtt ttextt iin tthe body off tthe e ma add esses as s easy o make a s mp e m s ake En e he o ow ng sho ex n he body o he maiill message.. ma message

Q23.. IInserrtt tthe ffiille Enhance yourr carreerr prrospectts..doc ffrrom tthe Modulle 7 ffollderr as an attttachmentt tto tthe Carreerr Q23 nse he e Enhance you ca ee p ospec s doc om he Modu e 7 o de as an a achmen o he Ca ee Change message.. Change message Q24.. Send tthe Carreerr Change message wiitth hiigh prriiorriitty.. Q24 Send he Ca ee Change message w h h gh p o y Q25.. Prreparre a new message wiitth tthe maiill addrress _ _ _ _ @ _ _ _ ..com ((off yourr choiice)) and entterr Meettiing as Q25 P epa e a new message w h he ma add ess _ _ _ _ @ _ _ _ com o you cho ce and en e Mee ng as tthe subjjectt.. Type tthe ttextt bellow iintto tthe body arrea off tthe e--maiill.. he sub ec Type he ex be ow n o he body a ea o he e ma

Q26.. Q26 Q27.. Q27 Q28.. Q28

Send tthe Meettiing message wiitth llow prriiorriitty.. Send he Mee ng message w h ow p o y Open tthe Carreerr Change message ffrrom tthe Sentt iittems box.. Open he Ca ee Change message om he Sen ems box Prriintt one copy off tthe Carreerr Change message tto an outtputt prriintterr iiff avaiillablle,, orr as a prriintt ffiille tto tthe P n one copy o he Ca ee Change message o an ou pu p n e ava ab e o as a p n e o he Modulle 7 ffollderr.. Use tthe ffiille name carreerrchange iiff you arre addiing a prriintt ffiille tto yourr Modulle 7 ffollderr.. Modu e 7 o de Use he e name ca ee change you a e add ng a p n e o you Modu e 7 o de

Q29.. Whatt arre HTTPS connecttiions maiinlly used fforr? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 29 Q29 Wha a e HTTPS connec ons ma n y used o ? En e you answe a b c o d n he Answe F e Q 29 space prroviided)).. space p ov ded a)) IIncrreasiing brroadband capabiilliitty a nc eas ng b oadband capab y b)) Sensiittiive and paymentt ttrransacttiions b Sens ve and paymen ansac ons c)) Searrchiing fforr websiittes c Sea ch ng o webs es d)) Dellettiing ffiilles d De e ng es
www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

33

Q30.. Whatt does IISP sttand fforr? Entterr yourr answerr ((a,, b,, c,, orr d)) iin tthe Answerr Fiille ((Q.. 30 space prroviided)).. Q30 Wha does SP s and o ? En e you answe a b c o d n he Answe F e Q 30 space p ov ded a)) a b)) b c)) c d)) d IIntterrnett Serrviice Prrocedurre n e ne Se v ce P ocedu e IIntterrnett Securriitty Prrottocoll n e ne Secu y P o oco IIntterrnett Saffe Prroviiderr n e ne Sa e P ov de IIntterrnett Serrviice Prroviiderr n e ne Se v ce P ov de

THIS IS A FREE SAMPLE, FOR ALL VISIBLE QUESTIONS, ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA, PLEASE VISIT:

www.learn-new-skills-from-home.com

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

34

USING EMAIL AND THE INTERNET

INTERNET SECTION

ANSWERS

A1.

Open the Module 7 folder. Double click the Answer File document (this will open the document directly in your computers word-processing application).

Required location

Required file

A2.

c) Hypertext Transfer Protocol Hypertext Transfer Protocol (HTTP) is basically a network protocol used to deliver virtually all files and other data on the World Wide Web (WWW). This includes webpages, image files, query results etc

A3.

d) A program that searches the internet by key words Web search engines (Google, Bing and Yahoo etc) are designed to search for information on the World Wide Web (WWW) via given data initially keyed into the search engine. The search results are generally shown in order of relevance to the entered data. Search engines use complicated algorithms to calculate the displayed results. Search results can consist of web pages, images, information and other types of files.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

35

A4.

d) A start page in a Web Browser The home page is the main or first page of a web site. The page is typically set with all the required hyperlinks to access other web pages within the website.

THIS IS A FREE SAMPLE, FOR ALL VISIBLE QUESTIONS, ANSWER PROCESSES AND ACCESS TO THE MEMBERS AREA, PLEASE VISIT:

www.learn-new-skills-from-home.com

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

36

GLOSSARY A-Z

Access (Microsoft Office) Access, is a popular (home and commercial) database management system from Microsoft. The database combines the relational Microsoft Jet Database Engine with a graphical user interface (GUI) and software development tools. It is a member of the Microsoft Office suite of applications and is included in the Professional and higher versions for Windows and also sold separately. Anti-virus Anti-Virus (Antivirus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware in which no signature exists yet. To counter such so called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses for looking for known malicious code (or slight variations of such code) in files. Anti- Virus software should be updated regularly. Bandwidth Bandwidth refers to how much data you can send through a network or modem connection. It is usually measured in bits per second, or "bps.", the higher the bandwidth the more computer data information can be transferred within a given amount of time. BCC BCC (Blind Carbon Copy) is an email field that supplies hidden notification; recipients listed in the BCC field receive a copy of the message but are not shown on any other recipient's copy including other BCC recipients. Browser A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in resources enable users to easily navigate their browsers to related resources. Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by web servers in private networks or files in file systems. The major web browsers are Windows Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, and Opera.

www.learn-new-skills-from-home.com 2010 OFFICE 2010 VERSION

37

You might also like