0% found this document useful (0 votes)
3 views

TLE

reviewer

Uploaded by

craidbolinas123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

TLE

reviewer

Uploaded by

craidbolinas123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1. What should you click on to open a new e-mail in most e-mail clients?

A) New message button

2. To attach a file to your e-mail, which option should you use?


B) Attach a file

3. When searching for a file on the internet, which of the following would be the best
action?
A) Type the file name into a search engine

4. What do you need to do before sending an e-mail to ensure it reaches the right recipient?
B) Add the correct recipient’s email address in the "To" field

5. What is the main purpose of using quotation marks in a search query?


C) To search for the exact phrase

6. If a program asks for system permissions to install, what is likely required?


A) User approval

7. What does the acronym "HTTP" stand for?


B) Hyper Text Transfer Protocol

8. What is the purpose of an installer program when installing software?


B) It helps configure and install the software

9. When you want to store an e-mail you received, what should you do?
B) Reply

10. You are installing a new software program. After launching the installer, you are
presented with multiple options such as agreement, installation location, and feature
selection. What is the correct order of steps to complete the installation?
C) License agreement, installation location, feature selection

11. While using a search engine, you receive thousands of search results. What strategy can
you use to refine your search to make it more specific?
C) Apply filters such as file type and date

12. You want to send an email to a group of people. Which option should you choose to send
the email to multiple recipients at once without disclosing their email addresses to each
other?
A) Use the "Bcc" field

13. When you search for a file and find multiple documents with similar names, what method
would help you find the correct file?
C) Check the file’s creation date
14. After sending an email, you realize you forgot to include an important document. What
should you do next?
B) Send another email with the attachment and mention the previous mistake

15. During the installation process, you are given the option to install additional toolbars.
What should you consider before installing these toolbars?
D) Whether they are from a trusted source

16. You are installing an application, but you notice that it is asking for permission to access
your contacts and camera. What should you do?
C) Review why the application needs these permissions

17. You search for a file by typing the file name in a search engine but can't find the file.
What could be a possible solution?
A) Try searching for a similar keyword or description

18. After receiving an e-mail with an important message, you realize the sender made a
mistake. You want to clarify the information but also keep the original message for
reference. What would be the best course of action?
B) Respond with your clarification and keep the original email as part of the
conversation

19. You are installing a program that requires you to set up an account and log in. During the
installation, you encounter a network error. What steps would you take to troubleshoot
and successfully install the program?
B) Check your internet connection and ensure it's stable, then retry the installation

20. When shutting down a computer, which of the following should you do first?
B) Close all open programs and files

21. What is the primary purpose of a firewall in a computer system?


B) To monitor network traffic and block malware

22. Which of the following is an example of malware?


C) II and III only

23. How are viruses and worms similar, and how are they different?
A) Both replicate themselves, but worms spread without user interaction

24. A company plans to protect its network from malware and unauthorized access. Which
combination of practices will provide the most comprehensive protection?
B) Installing antivirus software, enabling the firewall, and avoiding questionable
websites
25. Design a strategy for a small business to protect its computers and sensitive data from
malware attacks. Consider the following factors: cost-effectiveness, ease of
implementation, and employee awareness. Which steps would you prioritize?
B) Use free antivirus software, conduct employee training on safe browsing
practices, enable firewalls, and ensure systems are updated regularly

26. Which of the following is the first step in organizing files on a computer?
C) Creating new folders for organization

27. Which of the following actions can be performed when managing files on a computer?
A) Move files, rename files, delete files

28. How would you organize a folder containing a variety of file types such as text
documents, images, and spreadsheets?
C) Create subfolders for each type of file and move them accordingly

29. You are managing a shared folder for a group project. How would you ensure efficient
file organization and access?
C) Create a clear folder structure with specific roles for each subfolder (e.g.,
documentation, images, presentations), and set access permissions for security

30. Which of the following file formats would most likely be used for a presentation in your
project folder?
C) .pptx

31. Which of the following file extensions is used for images?


B) .jpg

32. What does the "Root Directory" represent in a computer's file system?
B) The highest-level directory on a disk

33. What is the difference between a folder and a subfolder?


B) A folder is used to organize subfolders

34. Which of the following file extensions is a text file?


B) .wav

35. What does the "Ctrl + X" shortcut do in file management?


C) Creates a copy of the selected file

36. What does "Save As" option allow you to do?


B) Save the file in a different location or with a new name
37. What does the "Ctrl + X" shortcut do in file management?
A) Cuts the selected file for moving

38. If you want to recover a file that was mistakenly deleted from the desktop, where
should you look first?
B) The Recycle Bin
39. Which is the correct way to retrieve a file from the Recycle Bin in Windows?
A) Right-click the file and click "Restore"

40. What should you do to search for a file using File Explorer in Windows?
A) Type part of the file name in the search bar

41. Which of these options helps you quickly navigate to a file or folder from the desktop?
A) Taskbar search icon

42. What does the "Send to" option do when zipping a folder?
B) Compresses the folder into a single zipped file

43. Which of these options is necessary when unzipping a compressed folder?


B) Right-click the zipped folder and choose "Extract All"

44. What does the "Ctrl + C" command do in file management?


A) Creates a copy of the selected file or folder

45. You are managing a folder structure on your computer. If you have a folder inside
another folder and you need to change the location of the parent folder, what happens
to the subfolder?
B) The subfolder moves with the parent folder

46. You accidentally delete a file that wasn't in the Recycle Bin, and there are no backups
available. How would you recover it, and what are the possible limitations of your
recovery options?
A) You cannot recover it without a backup, and it is permanently lost

47. You are trying to install a new application on your computer. You have downloaded an
installer file. What should you do next to begin the installation?
B) Double-click the installer file

48. You've successfully installed a new browser. What is the next step to start using it?
B) Open the application by clicking the shortcut icon

49. What does the term "URL" stand for?


B) Uniform Resource Locator
50. Which search engine would you most likely use to find websites on the internet?
B) Google

You might also like