Computer Literacy Examination: Practice + Scoring

Computer Literacy Examination: Free Practice Exam + Hiring Blueprint

Take a computer literacy examination with sample questions, answers, and scoring bands. Includes a hiring blueprint, example role cut-score ranges, and practical task scenarios.
Created on
January 29, 2026
Updated on
January 30, 2026
Traditional assessments are broken. AI can fake them in seconds.
"We were getting polished take-home responses that didn't match interview performance. With Truffle's live talent assessment software, we finally see the real candidate with no scripts and no AI assistance. We went from 10 days to hire down to 4."
80%

Less screening time
7X

faster hiring
10 minutes

Setup time per role
85%  

completion rates

Why we created this assessment

Computer literacy is no longer “nice to have.” It’s a baseline skill that affects whether someone can operate effectively early on—navigating files, communicating professionally, collaborating in cloud tools, and protecting data.

This assessment package is designed for three audiences: (1) HR and hiring managers who want a structured, ready-to-administer computer literacy assessment to support consistent decision-making; (2) L&D teams and educators who want a transparent blueprint aligned to measurable competencies; and (3) job seekers who want an exam-style practice experience with clear scoring and next steps.This guide provides an exam specification (domains, weights, difficulty ramp), realistic scenarios, and a scoring model with proficiency bands and role-based example thresholds.

You’ll see what “proficient” can look like—and how to coach for it.Use the sample questions to practice or preview the exam, then apply the scoring and interpretation tables to benchmark results by role. If you’re building a program, you can use the framework as a starting point and tailor the weights and thresholds to match your environment (Microsoft 365 vs Google Workspace, Windows vs macOS, frontline vs office roles).

Table of contents

    What a computer literacy examination measures (and why it matters)

    A computer literacy examination evaluates a person’s ability to use a computer and common workplace software safely, efficiently, and independently.

    In hiring, it can help reduce onboarding friction and surface “hidden skill gaps” (missed attachments, misfiled documents, unsafe clicks, spreadsheet errors).

    In training and workforce programs, it provides a competency baseline and a clear path to improvement.

    What this exam is (and isn’t)

    • Is: job-relevant, platform-agnostic where possible, scenario-driven, and scored with proficiency bands.
    • Is not: an advanced certification in Excel, IT support, or programming.

    Mixed-platform reality (Windows/macOS, Microsoft 365/Google Workspace)

    Modern workplaces vary. This exam uses:

    Universal concepts (file paths, permissions, phishing signals, browser troubleshooting, collaboration etiquette).

    Tool equivalents (e.g., “Spell check” exists in Word and Google Docs; “Filters” exist in Excel and Google Sheets).

    Optional role add-ons you can append if your organization standardizes on a specific toolset.

    Competency framework & exam blueprint (transparent by design)

    This blueprint is designed to make the exam structure clear and easy to adapt. Use it to administer an assessment or to build your own version with documented content coverage.

    Domain weights (recommended)

    Device & OS Fundamentals (10%)
    Basic navigation, settings awareness, accessibility basics

    File & Folder Management (15%)
    Create, rename, move, search, file types, cloud sync concepts

    Productivity Docs – Word processing (10%)
    Formatting, comments, version awareness, PDFs

    Spreadsheets – Foundational (15%)
    Sorting and filtering, references, basic formulas, data hygiene

    Email & Calendar (15%)
    Attachments, etiquette, search, rules and labels, scheduling

    Internet & Browser Skills (10%)
    Tabs, downloads, cache and cookies basics, forms, extensions

    Collaboration & Cloud Tools (10%)
    Shared links, permissions, version history, meeting tools

    Security, Privacy & Safety (15%)
    Password hygiene, phishing, updates, data handling

    Difficulty distribution

    A practical examination should differentiate across proficiency levels:

    Easy (30%): foundational recognition and routine actions

    Medium (50%): correct decision-making in common workflows

    Hard (20%): troubleshooting, judgment, and risk-aware choices

    Recommended format & timing

    • Total time: 25–35 minutes
    • Items: 30–40 total (mix of MCQ, multiple-select, and scenario items)
    • Performance tasks: 2–4 short “choose the best next step” simulations (even if delivered as text-based scenarios)
    • Reporting: overall score + domain subscores + proficiency band + coaching priorities

    Assessment methodology (How this exam stays job-relevant)

    1) Job-aligned task design

    Each item maps to a practical outcome:- Find the right file, choose the right link-sharing permission, avoid a phishing trap, fix a spreadsheet view, schedule a meeting correctly.

    2) Standardized administration (consistent comparisons)

    To support consistent use in hiring and training:- Same instructions, time limits, and scoring rules for all candidates- Clear accommodations process (extra time, screen reader compatibility, keyboard-only navigation)

    3) Multi-method approach (common in structured hiring)

    A knowledge exam is often strongest when paired with:- Work sample (e.g., simple spreadsheet cleanup)- Structured interview (rating rubric tied to the same domains)

    Free practice computer literacy examination (sample set)

    Use these 10 items as a high-quality preview. For a full-length exam, replicate the pattern across domains and increase item count.

    Instructions (practice): Attempt all questions. Suggested time: 12 minutes for this sample set.

    Question 1 — File management (Easy)

    You download a PDF named invoice_final_v3.pdf and need to store it so you can find it later. Which choice is best practice?A. Leave it in Downloads so it’s quickest to accessB. Move it into a clearly named folder (e.g., Finance/Invoices/2026-01) and keep the filename meaningfulC. Email it to yourself so it’s searchableD. Rename it to invoice.pdf for simplicity

    Answer: B

    Question 2 — Attachments & email hygiene (Easy)

    You’re replying to a customer and need to include a file. What should you do before clicking Send?A. Convert the file to a ZIP every timeB. Confirm the correct file is attached and the message body references itC. Paste the entire file contents into the emailD. Add the customer to BCC

    Answer: B

    Question 3 — Browser troubleshooting (Medium)

    A website works for your coworker but not on your computer. The page won’t load correctly and buttons are unresponsive. What is a sensible first step?A. Factory reset your computerB. Clear the browser cache for that site or try an incognito/private windowC. Uninstall your operating system updatesD. Disable your keyboard

    Answer: B

    Question 4 — Cloud sharing permissions (Medium)

    You need to share a document with an external vendor so they can view it but not edit. Which sharing setting is most appropriate?A. Anyone with the link can editB. Anyone in your company can editC. Specific people can view (or “Anyone with the link can view,” if allowed) with editing turned offD. Post the document in a public forum

    Answer: C

    Question 5 — Spreadsheet fundamentals (Medium)

    In a spreadsheet, you want to calculate total cost from Quantity in cell B2 and Unit Price in cell C2. Which formula is correct?A. =B2+C2B. =B2*C2C. =B2/C2D. =SUM(B2:C2)

    Answer: B

    Question 6 — Data sorting risk (Medium)

    You sort a single column in a table (not the entire table range). What is the most likely problem?A. The font changesB. Data becomes misaligned (rows no longer match the correct records)C. The spreadsheet becomes read-onlyD. The file converts to PDF

    Answer: B

    Question 7 — Security: phishing detection (Hard)

    You receive an email that appears to be from IT: “Your password expires today. Click here to keep access.” The sender address is it-support@companny-security.com (note the spelling), and the link text says “Company SSO” but points to an unfamiliar domain when you hover. What should you do?A. Click quickly to avoid being locked outB. Reply with your username so they can checkC. Report the email as phishing and verify through an official channel (IT portal/known number)D. Forward it to coworkers to warn them

    Answer: C

    Question 8 — OS/app responsiveness (Hard)

    An application is frozen and won’t close. What is the best next step?A. Wait indefinitely; forcing closure is never safeB. Use the operating system’s force-quit/task manager to close the app, then reopen and recover work if possibleC. Delete system filesD. Turn off updates permanently

    Answer: B

    Question 9 — Version control (Medium)

    Two people edited the same shared document and changes seem missing. Which feature most directly helps you identify what happened?A. Screen brightnessB. Version history / activity logC. Wallpaper settingsD. Printer queue

    Answer: B

    Question 10 — Calendar scheduling (Medium)

    You need to schedule a meeting across time zones with three attendees. Which approach is most reliable?A. Pick any time; time zones always auto-correctB. Use the calendar scheduling assistant/free-busy view and confirm the meeting time zone settingC. Send a text message with “Meet at 3”D. Schedule three separate meetings

    Answer: B

    Answer Key with micro-rationales (How to coach the skill)

    • Q1 (B): Retrieval beats convenience. Downloads becomes cluttered; consistent folder structure prevents loss.
    • Q2 (B): A common email error is missing/wrong attachments.
    • Q3 (B): Private windows isolate cache/cookies/extensions—fast, low-risk troubleshooting.
    • Q4 (C): Principle of least privilege: grant only what’s needed (view vs edit).
    • Q5 (B): Total cost is multiplication.
    • Q6 (B): Sorting one column breaks record integrity.
    • Q7 (C): Spoofed domains + mismatched links are classic phishing indicators.
    • Q8 (B): Force quit is a standard recovery step; reduces downtime.
    • Q9 (B): Version history provides an audit trail.
    • Q10 (B): Free/busy + time zone confirmation helps prevent missed meetings.

    Scoring system (transparent, role-ready)

    1) Item scoring

    • MCQ: 1 point each
    • Multiple-select: 2 points total; partial credit (e.g., +1 for each correct option selected, −1 for each incorrect selected; minimum 0)
    • Scenario/performance-based items: 2–4 points using a rubric (see below)

    2) Domain subscores

    Compute percentage scores per domain to diagnose strengths and gaps.- Example: File & Folder Management domain has 6 points possible; candidate earns 4 → 67% in that domain.

    3) Overall score

    Weighted composite based on blueprint weights.- Overall Score = Σ (Domain % × Domain Weight)

    4) Performance-based rubric (template)

    When to use this scale
    Ideal for scenarios such as link sharing, email triage, and everyday troubleshooting tasks

    4 – Optimal
    Correct, efficient, secure, and clearly justified

    3 – Acceptable
    Correct outcome with minor inefficiency

    2 – Risky
    Partially correct but introduces avoidable errors or risks

    1 – Poor
    Likely to fail the task or create problems

    0 – Unsafe or incorrect
    Violates security or data handling expectations

    Proficiency nands (what the score means in real life)

    Beginner (0–49)

    What they can reliably do
    Basic navigation but needs step-by-step support

    Typical risk
    Higher error rate, security mistakes, slow task completion

    Basic (50–69)

    What they can reliably do
    Completes routine tasks with occasional help

    Typical risk
    Misfiles documents, inconsistent email and calendar handling

    Proficient (70–84)

    What they can reliably do
    Works independently in common office workflows

    Typical risk
    Minor troubleshooting gaps, needs guidance on edge cases

    Advanced (85–100)

    What they can reliably do
    Efficient, secure, and coaches others informally

    Typical risk
    Low; can act as a peer support resource

    “Job-ready” definition (practical)

    Many teams set Proficient (70%+) as a starting threshold for independent office workflows, then adjust by role risk, tool stack, and required autonomy.

    Role-Based Example Thresholds (Adjust to Your Standard)

    Thresholds should reflect risk and required autonomy. The examples below are starting points—not universal rules—and should be set based on job analysis and business needs.

    Administrative Assistant (70–80%)

    Domains to emphasize: Email and Calendar, Files and Folders, Docs, Collaboration

    Customer Support (remote) (65–75%)

    Domains to emphasize: Email, Browser, Security, Collaboration

    Healthcare Front Desk (70–80%)

    Domains to emphasize: Security and Privacy, Email, Files, Basic troubleshooting

    Warehouse / Operations (device-based) (55–65%)

    Domains to emphasize: OS basics, Security, Browser basics, Collaboration

    Entry-level Office Generalist (65–75%)

    Domains to emphasize: Balanced across all domains

    Implementation note: Pair the exam with a short work sample for roles where errors have compliance or financial impact.

    Administration & integrity guide (remote or onsite)

    Recommended test conditions

    • Device: laptop/desktop preferred; specify if mobile is allowed
    • Browser: latest Chrome/Edge/Safari/Firefox
    • Environment: quiet, distraction-minimized
    • Time limit: fixed, with visible countdown

    Integrity controls (lightweight but effective)

    • Randomize item order and option order
    • Pull from a larger bank (at least 3–5 variants per objective)
    • Timebox sections to reduce answer-searching
    • Use honor statement + consequences
    • For higher-stakes hiring: live/recorded proctoring, ID verification, and plagiarism checks for written components

    Accessibility & accommodations

    • Keyboard-only navigation support
    • Screen-reader compatible markup
    • Extra time where appropriate, with consistent documentation
    • Avoid trick questions; prioritize clarity and job relevance

    Professional development roadmap (based on your band)

    This is where assessments become career accelerators—not just filters.

    If you scored Beginner (0–49): Build stability first (2–4 weeks)

    File organization habits

    Weekly practice
    Create a folder structure and file naming convention, then relocate 20 files correctly

    Email basics

    Weekly practice
    Send 10 practice emails with correct attachments and clear subject lines

    Security fundamentals

    Weekly practice
    Identify 10 phishing red flags from example scenarios

    If you scored Basic (50–69): Reduce errors and speed up (3–6 weeks)

    Browser troubleshooting basics

    Weekly practice
    Clear cache and cookies, disable extensions one by one, and manage the downloads folder

    Spreadsheet hygiene

    Weekly practice
    Clean a small dataset by removing duplicates, applying filters, and computing totals with simple formulas

    Collaboration permissions

    Weekly practice
    Share documents with correct view or edit access and verify permissions using a second account

    If you scored Proficient (70–84): Become reliably independent (4–8 weeks)

    Workflow efficiency and shortcuts

    Weekly practice
    Learn and apply standard keyboard shortcuts to speed up daily tasks and reduce repetitive actions

    Calendar mastery

    Weekly practice
    Use time zones and scheduling assistants to coordinate meetings across regions accurately

    Strong security behavior

    Weekly practice
    Enable multi-factor authentication, practice safe file sharing, and verify device updates regularly

    Process documentation and troubleshooting

    Weekly practice
    Build a one-page personal SOP for recurring tasks and walk through three troubleshooting scenarios with documented decision paths

    If you scored Advanced (85–100): Convert skill into leverage (ongoing)

    Becoming the go-to operator (without becoming IT)

    Focus
    Streamline workflows, solve everyday operational issues, and escalate only true technical problems

    Documentation and training micro-guides

    Focus
    Create short, clear walkthroughs for common tasks, onboarding flows, and team standards

    Advanced spreadsheet fundamentals

    Focus
    Build skills in lookup functions and pivot table concepts to summarize and analyze operational data

    Career move

    Next steps
    Volunteer to standardize team file structures, templates, or onboarding checklists
    Use your assessment score as evidence in interviews:
    “I’m advanced in security hygiene and collaboration workflows.”

    Industry standards & benchmarking (how to make results more defensible)

    To align with professional selection and evaluation norms, keep these principles:

    Job analysis alignment: Test what the role actually uses (email, files, collaboration, security). Document it.

    Standardization: Same time limits, instructions, and scoring rules.

    Reliability mindset: Use enough items per domain to reduce noise; avoid one-question domains.

    Fairness monitoring: Track outcomes by cohort; if used for hiring, periodically review results for adverse impact risk and ensure business necessity.

    Practical benchmark guidance:

    Some organizations treat 70–75% as a starting point for independent work in general office computer literacy, then adjust by role and risk.- High-trust environments (healthcare, finance, legal) often set higher thresholds and/or require stronger security subscores.

    Curated resources to improve computer literacy (high ROI)

    Use these resources based on your stack:

    Learning platforms (structured practice)

    • Microsoft Learn (Microsoft 365 fundamentals: Outlook/Teams/OneDrive basics)
    • Google Workspace Learning Center (Docs/Sheets/Drive collaboration)
    • LinkedIn Learning (computer skills, productivity, and workplace tech)

    Security hygiene essentials

    • CISA StopRansomware and phishing guidance (practical awareness)
    • Password manager documentation (1Password/Bitwarden) for real-world adoption

    Practice tools

    • A personal “sandbox” folder in Drive/OneDrive to practice permissions and version history
    • Spreadsheet practice datasets (simple CSVs) to drill sorting/filtering and formulas

    Career advancement strategies (turn results into outcomes)

    For job seekers

    • Put a measurable claim on your resume only if you can defend it:
    • “Computer literacy examination: Proficient (78%) — file management, email/calendar, collaboration permissions, phishing identification.”
    • In interviews, give proof:
    • Describe how you prevent attachment mistakes, manage shared links, and avoid data misalignment in spreadsheets.

    For managers and HR

    • Use domain subscores to place people into the right onboarding track:
    • Low Security score → phishing + safe-sharing module before tool training
    • Low Files/Folders score → standardize naming and folder conventions early
    • Pair the exam with a short work sample for finalists where errors have higher impact.

    For L&D / educators

    • Teach to the domains, not the tools:
    • “Principle of least privilege,” “record integrity in tables,” “version history as audit trail” remain stable even as apps evolve.

    Implementation checklist (copy/paste)

    • [ ] Confirm target roles and tool stack (M365 vs Google Workspace; Windows/macOS mix)
    • [ ] Select domain weights and threshold approach
    • [ ] Build a 30–40 item form with difficulty ramp
    • [ ] Add 2–4 performance-based scenarios with rubric
    • [ ] Standardize instructions, timing, and retake policy
    • [ ] Generate score report: overall + domain subscores + proficiency band + recommended next steps
    • [ ] Review quarterly (security items age quickly)

    This computer literacy examination package is designed to be used—not just read. Start with the sample set, adopt the scoring bands, and scale into a full-length exam with transparent, documented standards.

    Other popular free assessment templates

    Want to learn more about Truffle?
    Check out all our solutions.
    Self-paced interviews
    Let candidates respond on their own time while you review on yours.
    AI video interviews
    Turn one-way video responses into scored interviews with clear insights.
    Recruiting automation software
    Automate the repetitive parts of recruiting while keeping decisions thoughtful and human.
    High-volume recruiting software
    Screen applicants quickly without burning out your team or missing great candidates.
    Automated phone interview software
    Replace phone screens with automated voice interviews that scale without losing nuance.
    AI recruitment tool
    Use AI to review candidates faster with AI-assisted insights and other AI recruiting tools.
    Candidate assessment software
    Go beyond resumes with structured interviews that reveal communication, thinking, and role fit.
    Applicant screening software
    Review large applicant pools fast with consistent screening that surfaces real signal early.
    Automated interview software
    Use AI to summarize automated video interview responses and surface match scores.