IC3 Practice Test Video Answers
1. B
The IC3 exam measures basic digital literacy skills including computing, online, and application fundamentals.
2. B
Cloud-based email can be accessed anywhere with an internet connection.
3. B
PNG format supports lossless compression, maintaining image quality.
4. C
Two-factor authentication enhances account security.
5. C
The =AVERAGE() function calculates the mean of selected numbers.
6. B
Ctrl + V is the standard shortcut for paste.
7. B
Google Drive is an example of cloud storage.
8. B
Transitions are effects applied when moving between slides.
9. B
A keyboard is an input device.
10. B
Plagiarism is using others’ work without giving credit.
11. B
Malware is harmful software intended to disrupt or damage.
12. B
Internet bandwidth is measured in Mbps (megabits per second).
13. D
Microsoft Word is an application, not an operating system.
14. B
Spell Check identifies and suggests corrections for spelling errors.
15. A
Phishing attempts to trick users into giving sensitive information.
16. B
HTTPS is the secure version of HTTP for browsing.
17. A
A primary key uniquely identifies each record in a database.
18. B
Routers use IP addresses to connect to the internet.
19. B
Desktop publishing software is best for designing newsletters.
20. B
Google Docs is a cloud-based productivity tool.
21. B
Netiquette refers to respectful online behavior.
22. D
Terabyte is the largest among the listed storage units.
23. C
LAN stands for Local Area Network.
24. C
Copying without attribution is plagiarism, not prevention.
25. B
Open-source software allows free use and modification of code.
26. C
VPNs add a security layer when using public Wi-Fi.
27. B
Presentation software provides a visual way to communicate information.
28. C
Database software manages large sets of structured data like customer records.
29. A
A digital footprint is the trail of data left behind online.
30. A
Bcc stands for Blind Carbon Copy in email.
31. B
Online collaboration tools enable real-time teamwork and editing.
32. B
RAM is volatile memory that is cleared when power is off.
33. C
Sharing private data on unsecured websites exposes users to risks.
34. B
Excel files typically use the .xlsx extension.
35. C
A monitor is an output device displaying processed data.
36. C
A strong password includes a mix of uppercase, lowercase, numbers, and special characters.
37. A
Ergonomics is about designing equipment to minimize strain and injuries.