Introduction

There are 3 stages in the recruitment process to become an IT Volunteer at Citizens Advice Enfield

  • Stage 1 - Your application to see if you meet our requirements.
  • Stage 2 - The ICT Test which you are about to undertake.
  • Stage 3 - The interview which you may be invited to subject to you passing the ICT Test
  • Stage 4 - If you have been successful in all the above stages and us obtaining references, you will be invited to join us

    Instructions

  • You have 25 minutes to complete the test.
  • The test comprises of 20 IT related questions divided in 4 sections.
  • You need answer at least 14 questions correctly to attain the 70% pass marks.
  • There are 4 possible answer to each question of which only one is the correct answer.
  • At the bottom of each section you will see a next or previous button for you to move to the next or previous section.
  • You may go backward to the previous section if you wish to change any of your answers.
  • At the end of the test, you will see the submit button.
  • Only Click the submit button when you are ready to register all your answers.
  • Once you click on the submit button the test is complete.
  • DO NOT CLICK SUBMIT UNTIL YOU ARE READY TO REGISTER YOUR ANSWERS.

    GOOD LUCK

    Enter your Details

    Firstname Surname
    Email Address Mobile Phone
  • Question 88. Which is the largest unit of storage among the following?

    Terabyte
    Megabyte
    Kilobyte
    Gigabyte
     

    Question 59. Which of these is not part of Azure?

    Storage
    Database
    Web Services
    Windows 10
     

    Question 54. Cloud computing is a term referred to

    storing and accessing of data over the internet
    store any data on the hard disk of your personal computer
    store any data on the hard disk of your an internal virtual server
    accessing your data using VPN
     

    Question 58. PAAS stands for

    Programming as a Service
    Project as a Structure
    Project as a Service
    None of the above
     

    Question 17. With respect to computers which one of the following best describes phishing?

    A malicious program installed on a system that stays concealed to avoid detection
    A method of bypassing normal authentication procedures over a connection to a network.
    A type of unsolicited bulk email of identical messages sent to numerous recipients.
    An attempt to acquire sensitive information for malicious reasons by masquerading as a trustworthy entity.
     

    Question 60. What is cmdlet command of Azure

    a command part of the PowerShell environment?
    a C++ command
    a PHP command
    a web service command
     

    Question 15. Which of the following is an example of propriety software?

    Linux
    Microsoft Internet explorer
    Microsoft office
    Microsoft windows
     

    Question 67. Which one is not a data storage service?

    Amazon Drive
    Dropbox
    Jumpshare
    MegaDrive
     

    Question 86. Which one of the following representthe binary equivalent of the decimal number 23?

    1011
    10111
    10011
    None of the above
     

    Question 64. How much free space does Google Drive offer?

    5Gb
    15Gb
    25Gb
    50Gb
     

    Question 84. SMIME in Internet technology stands for

    Secure Multipurpose Internet Mail Extension
    Secure Multimedia Internet Mail Extension
    Simple Multipurpose Internet Mail Extension
    Simple Multimedia Internet Mail Extension
     

    Question 100. The function of a DHCP server is to

    assign IP addresses to clients
    route clients through the default gateway
    route clients to the internet
    ensure clients have access to the internet
     

    Question 42. Which one of the following is not a search engine ?

    Google
    Chrome
    Yahoo
    Bing
     

    Question 47. 'www' stands for

    work with web
    word wide web
    world wide web
    worth while web
     

    Question 29. If the binary equivalent of the decimal number 48 is 110000 then the binary equivalent of the decimal number 51 is given by

    110011
    110010
    110001
    110100
     

    Question 34. Which of the following is not an input device

    Microphone
    Keyboard
    Joystick
    Monitor
     

    Question 99. What does DHCP stanfds for?

    Dynamic Host Configuration Protocol
    Dynamic Host Configuration Preamble
    Dynamic Host Control Protocol
    Destination Host Configuration Protocol
     

    Question 40. Binary equivalent of decimal number 35 is

    100011
    110001
    110101
    101011
     

    Question 101. Which one is not a private IPv4 address

    10.168.12.101
    172.168.12.116
    192.168.12.110
    172.32.12.116
     

    Question 52. Virtual memory

    an extremely large main memory.
    an extremely large secondary memory.
    an illusion of extremely large main memory
    a type of memory used in super computers.