Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

PART I – Computer Literacy and Internet Security (30 points)

1. Which is the function of the mouse?


A. Erases words on the monitor
B. To type symbols on the monitor
C. To point at icons on the monitor
D. Deletes an object on the monitor

2. The ESC button on the keyboard is used for


A. To type words C. To cancel an action
B. To enlarge the words or D. To open a program
pictures

3. This keyboard key erases the letters to the left of the cursor.
A. Space bar C. Enter
B. Backspace D. Left Arrow

4. You use this key to capitalize a letter, one at a time.


A. Caps lock C. Shift
B. Up Arrow D. Esc

5. The Start Menu and clock are found on the


A. Title bar C. Tool bar
B. Task bar D. Scroll bar

6. The brain of the computer is the CPU. This acronym stands for
A. Central Processing Unit C. Central Progress Unit
B. Central Programming D. Central Peripheral Unit
Unit

7. This key capitalizes all letters of the encoded words in just one press.
A. Shift C. Caps Lock
B. Enter D. Number Lock

8. These keys allow you to move your cursor up, down, right, or left.
A. Backspace C. Page Up
B. Page Down D. Arrow Keys
9. This is like a backdrop of your desktop, which can be changed according
to your visual preference.
A. Icon C. Wallpaper
B. Windows D. Start Menu

10. This is a small picture on your desktop that links to a file or program
that you can click to open.
A. Start Menu C. Icon
B. Tool bar D. Key

11. This is an internet feature that has something to do with protecting and
keeping things like files and programs secure.
A. Security C. File keeping
B. Networking D. Browsing

12. Which of the following information is incorrect?


A. Strangers who get your information on your computer are called
hackers.
B. Hackers can use your webcam to watch you even without your
permission.
C. Hackers cannot listen to your conversations without your permission.
D. A stranger, friend, neighbor or relative can be a hacker.

13. A program that can infect other programs by modifying them; the
modification includes a copy of the program, which can go on to infect
other programs.
A. Worm C. Zombie
B. Virus D. Trap doors

14. Which of the following statement is true?


I. A worm mails a copy of itself to other systems.
II. A worm executes a copy of itself on another system.

A. I only C. Both I and II


B. II only D. Neither I nor II

15. This is a code embedded in some legitimate computer program that is


set to explode when certain conditions are met.
A. Trap doors C. Logic Bomb
B. Trojan horse D. Virus

PART II – Coding via Codementum (70 points)

You might also like