1.
Which of the following is an example of utility software?
2.
Which of the following is an example of software piracy?
3.
Which port is commonly used to connect a printer to older PCs?
4.
Which shortcut selects all items in a window?
6.
What is the main role of an ISP?
7.
The World Wide Web is:
8.
Application of 'Save' vs 'Save As' in an exercise: You edited a Word file and want to keep both the original and edited versions. Which should you use?
9.
To rename a file using the keyboard, which key is commonly used after selecting the file?
10.
Which pointing device contains a ball that the user spins?
11.
Which key combination typically closes the active window in Windows?
12.
Which monitor type is the thinnest and most power-efficient?
13.
Which of the following best describes a computer virus?
14.
In text editors, 'Save As' is used to:
15.
Which storage is volatile and loses data when power is off?
16.
. Which software type controls and manages computer hardware?
17.
Email clients like MS Outlook are used to:
18.
Which key is used to go back to the previous lesson in the CPL training environment?
19.
Which of the following is NOT a web browser?
20.
The Recycle Bin is used to:
21.
Which area of the CPL training environment typically lists lesson names and subsections?
22.
Which device is primarily used to cool the processor?
23.
Which of the following is a valid file path example?
24.
Which of the following is true about CD-R (write once) discs?
25.
Device drivers are best described as:
26.
Which printer type prints an entire page at a time using powder ink (toner)?
27.
Which of these is NOT an application software?
28.
Which action would you use to view printer queue and job status?
29.
Which of these is an optical storage medium?
30.
What is the function of the 'Insert' key in text editing?
31.
'Output' from a computer can be:
32.
Which Windows feature helps find files by name or content?
33.
The 'system unit' refers to:
34.
Which device is used to input audio into the computer?
35.
Which of these is a strong preventive measure against unauthorized access?
36.
Which action helps reduce the risk of hardware theft?
37.
What does 'formatting a floppy disk' do?
38.
Double-clicking the left mouse button usually:
39.
In computing terms, 'input' is best defined as:
40.
ROM is characterized by:
41.
An example of soft copy output is:
42.
Which card is necessary to connect a PC to a local area network?
43.
What does the 'Send To > 3½ Floppy' command do?
44.
Which of the following is true about an antivirus program?
45.
What is a key advantage of secondary storage over RAM?
46.
What does 'auto arrange' do for desktop icons?
47.
Which of the following is an example of an input device?
48.
CPL in CS001 stands for:
49.
What is the purpose of performing backups?
50.
A floppy disk becomes write-protected when: