TLE
TLE
3. When searching for a file on the internet, which of the following would be the best
action?
A) Type the file name into a search engine
4. What do you need to do before sending an e-mail to ensure it reaches the right recipient?
B) Add the correct recipient’s email address in the "To" field
9. When you want to store an e-mail you received, what should you do?
B) Reply
10. You are installing a new software program. After launching the installer, you are
presented with multiple options such as agreement, installation location, and feature
selection. What is the correct order of steps to complete the installation?
C) License agreement, installation location, feature selection
11. While using a search engine, you receive thousands of search results. What strategy can
you use to refine your search to make it more specific?
C) Apply filters such as file type and date
12. You want to send an email to a group of people. Which option should you choose to send
the email to multiple recipients at once without disclosing their email addresses to each
other?
A) Use the "Bcc" field
13. When you search for a file and find multiple documents with similar names, what method
would help you find the correct file?
C) Check the file’s creation date
14. After sending an email, you realize you forgot to include an important document. What
should you do next?
B) Send another email with the attachment and mention the previous mistake
15. During the installation process, you are given the option to install additional toolbars.
What should you consider before installing these toolbars?
D) Whether they are from a trusted source
16. You are installing an application, but you notice that it is asking for permission to access
your contacts and camera. What should you do?
C) Review why the application needs these permissions
17. You search for a file by typing the file name in a search engine but can't find the file.
What could be a possible solution?
A) Try searching for a similar keyword or description
18. After receiving an e-mail with an important message, you realize the sender made a
mistake. You want to clarify the information but also keep the original message for
reference. What would be the best course of action?
B) Respond with your clarification and keep the original email as part of the
conversation
19. You are installing a program that requires you to set up an account and log in. During the
installation, you encounter a network error. What steps would you take to troubleshoot
and successfully install the program?
B) Check your internet connection and ensure it's stable, then retry the installation
20. When shutting down a computer, which of the following should you do first?
B) Close all open programs and files
23. How are viruses and worms similar, and how are they different?
A) Both replicate themselves, but worms spread without user interaction
24. A company plans to protect its network from malware and unauthorized access. Which
combination of practices will provide the most comprehensive protection?
B) Installing antivirus software, enabling the firewall, and avoiding questionable
websites
25. Design a strategy for a small business to protect its computers and sensitive data from
malware attacks. Consider the following factors: cost-effectiveness, ease of
implementation, and employee awareness. Which steps would you prioritize?
B) Use free antivirus software, conduct employee training on safe browsing
practices, enable firewalls, and ensure systems are updated regularly
26. Which of the following is the first step in organizing files on a computer?
C) Creating new folders for organization
27. Which of the following actions can be performed when managing files on a computer?
A) Move files, rename files, delete files
28. How would you organize a folder containing a variety of file types such as text
documents, images, and spreadsheets?
C) Create subfolders for each type of file and move them accordingly
29. You are managing a shared folder for a group project. How would you ensure efficient
file organization and access?
C) Create a clear folder structure with specific roles for each subfolder (e.g.,
documentation, images, presentations), and set access permissions for security
30. Which of the following file formats would most likely be used for a presentation in your
project folder?
C) .pptx
32. What does the "Root Directory" represent in a computer's file system?
B) The highest-level directory on a disk
38. If you want to recover a file that was mistakenly deleted from the desktop, where
should you look first?
B) The Recycle Bin
39. Which is the correct way to retrieve a file from the Recycle Bin in Windows?
A) Right-click the file and click "Restore"
40. What should you do to search for a file using File Explorer in Windows?
A) Type part of the file name in the search bar
41. Which of these options helps you quickly navigate to a file or folder from the desktop?
A) Taskbar search icon
42. What does the "Send to" option do when zipping a folder?
B) Compresses the folder into a single zipped file
45. You are managing a folder structure on your computer. If you have a folder inside
another folder and you need to change the location of the parent folder, what happens
to the subfolder?
B) The subfolder moves with the parent folder
46. You accidentally delete a file that wasn't in the Recycle Bin, and there are no backups
available. How would you recover it, and what are the possible limitations of your
recovery options?
A) You cannot recover it without a backup, and it is permanently lost
47. You are trying to install a new application on your computer. You have downloaded an
installer file. What should you do next to begin the installation?
B) Double-click the installer file
48. You've successfully installed a new browser. What is the next step to start using it?
B) Open the application by clicking the shortcut icon