
Computer literacy is no longer “nice to have.” It’s a baseline skill that affects whether someone can operate effectively early on—navigating files, communicating professionally, collaborating in cloud tools, and protecting data.
This assessment package is designed for three audiences: (1) HR and hiring managers who want a structured, ready-to-administer computer literacy assessment to support consistent decision-making; (2) L&D teams and educators who want a transparent blueprint aligned to measurable competencies; and (3) job seekers who want an exam-style practice experience with clear scoring and next steps.This guide provides an exam specification (domains, weights, difficulty ramp), realistic scenarios, and a scoring model with proficiency bands and role-based example thresholds.
You’ll see what “proficient” can look like—and how to coach for it.Use the sample questions to practice or preview the exam, then apply the scoring and interpretation tables to benchmark results by role. If you’re building a program, you can use the framework as a starting point and tailor the weights and thresholds to match your environment (Microsoft 365 vs Google Workspace, Windows vs macOS, frontline vs office roles).
A computer literacy examination evaluates a person’s ability to use a computer and common workplace software safely, efficiently, and independently.
In hiring, it can help reduce onboarding friction and surface “hidden skill gaps” (missed attachments, misfiled documents, unsafe clicks, spreadsheet errors).
In training and workforce programs, it provides a competency baseline and a clear path to improvement.
Modern workplaces vary. This exam uses:
Universal concepts (file paths, permissions, phishing signals, browser troubleshooting, collaboration etiquette).
Tool equivalents (e.g., “Spell check” exists in Word and Google Docs; “Filters” exist in Excel and Google Sheets).
Optional role add-ons you can append if your organization standardizes on a specific toolset.
This blueprint is designed to make the exam structure clear and easy to adapt. Use it to administer an assessment or to build your own version with documented content coverage.
Device & OS Fundamentals (10%)
Basic navigation, settings awareness, accessibility basics
File & Folder Management (15%)
Create, rename, move, search, file types, cloud sync concepts
Productivity Docs – Word processing (10%)
Formatting, comments, version awareness, PDFs
Spreadsheets – Foundational (15%)
Sorting and filtering, references, basic formulas, data hygiene
Email & Calendar (15%)
Attachments, etiquette, search, rules and labels, scheduling
Internet & Browser Skills (10%)
Tabs, downloads, cache and cookies basics, forms, extensions
Collaboration & Cloud Tools (10%)
Shared links, permissions, version history, meeting tools
Security, Privacy & Safety (15%)
Password hygiene, phishing, updates, data handling
A practical examination should differentiate across proficiency levels:
Easy (30%): foundational recognition and routine actions
Medium (50%): correct decision-making in common workflows
Hard (20%): troubleshooting, judgment, and risk-aware choices
Each item maps to a practical outcome:- Find the right file, choose the right link-sharing permission, avoid a phishing trap, fix a spreadsheet view, schedule a meeting correctly.
To support consistent use in hiring and training:- Same instructions, time limits, and scoring rules for all candidates- Clear accommodations process (extra time, screen reader compatibility, keyboard-only navigation)
A knowledge exam is often strongest when paired with:- Work sample (e.g., simple spreadsheet cleanup)- Structured interview (rating rubric tied to the same domains)
Use these 10 items as a high-quality preview. For a full-length exam, replicate the pattern across domains and increase item count.
Instructions (practice): Attempt all questions. Suggested time: 12 minutes for this sample set.
You download a PDF named invoice_final_v3.pdf and need to store it so you can find it later. Which choice is best practice?A. Leave it in Downloads so it’s quickest to accessB. Move it into a clearly named folder (e.g., Finance/Invoices/2026-01) and keep the filename meaningfulC. Email it to yourself so it’s searchableD. Rename it to invoice.pdf for simplicity
Answer: B
You’re replying to a customer and need to include a file. What should you do before clicking Send?A. Convert the file to a ZIP every timeB. Confirm the correct file is attached and the message body references itC. Paste the entire file contents into the emailD. Add the customer to BCC
Answer: B
A website works for your coworker but not on your computer. The page won’t load correctly and buttons are unresponsive. What is a sensible first step?A. Factory reset your computerB. Clear the browser cache for that site or try an incognito/private windowC. Uninstall your operating system updatesD. Disable your keyboard
Answer: B
You need to share a document with an external vendor so they can view it but not edit. Which sharing setting is most appropriate?A. Anyone with the link can editB. Anyone in your company can editC. Specific people can view (or “Anyone with the link can view,” if allowed) with editing turned offD. Post the document in a public forum
Answer: C
In a spreadsheet, you want to calculate total cost from Quantity in cell B2 and Unit Price in cell C2. Which formula is correct?A. =B2+C2B. =B2*C2C. =B2/C2D. =SUM(B2:C2)
Answer: B
You sort a single column in a table (not the entire table range). What is the most likely problem?A. The font changesB. Data becomes misaligned (rows no longer match the correct records)C. The spreadsheet becomes read-onlyD. The file converts to PDF
Answer: B
You receive an email that appears to be from IT: “Your password expires today. Click here to keep access.” The sender address is it-support@companny-security.com (note the spelling), and the link text says “Company SSO” but points to an unfamiliar domain when you hover. What should you do?A. Click quickly to avoid being locked outB. Reply with your username so they can checkC. Report the email as phishing and verify through an official channel (IT portal/known number)D. Forward it to coworkers to warn them
Answer: C
An application is frozen and won’t close. What is the best next step?A. Wait indefinitely; forcing closure is never safeB. Use the operating system’s force-quit/task manager to close the app, then reopen and recover work if possibleC. Delete system filesD. Turn off updates permanently
Answer: B
Two people edited the same shared document and changes seem missing. Which feature most directly helps you identify what happened?A. Screen brightnessB. Version history / activity logC. Wallpaper settingsD. Printer queue
Answer: B
You need to schedule a meeting across time zones with three attendees. Which approach is most reliable?A. Pick any time; time zones always auto-correctB. Use the calendar scheduling assistant/free-busy view and confirm the meeting time zone settingC. Send a text message with “Meet at 3”D. Schedule three separate meetings
Answer: B
Compute percentage scores per domain to diagnose strengths and gaps.- Example: File & Folder Management domain has 6 points possible; candidate earns 4 → 67% in that domain.
Weighted composite based on blueprint weights.- Overall Score = Σ (Domain % × Domain Weight)
When to use this scale
Ideal for scenarios such as link sharing, email triage, and everyday troubleshooting tasks
4 – Optimal
Correct, efficient, secure, and clearly justified
3 – Acceptable
Correct outcome with minor inefficiency
2 – Risky
Partially correct but introduces avoidable errors or risks
1 – Poor
Likely to fail the task or create problems
0 – Unsafe or incorrect
Violates security or data handling expectations
What they can reliably do
Basic navigation but needs step-by-step support
Typical risk
Higher error rate, security mistakes, slow task completion
What they can reliably do
Completes routine tasks with occasional help
Typical risk
Misfiles documents, inconsistent email and calendar handling
What they can reliably do
Works independently in common office workflows
Typical risk
Minor troubleshooting gaps, needs guidance on edge cases
What they can reliably do
Efficient, secure, and coaches others informally
Typical risk
Low; can act as a peer support resource
Many teams set Proficient (70%+) as a starting threshold for independent office workflows, then adjust by role risk, tool stack, and required autonomy.
Thresholds should reflect risk and required autonomy. The examples below are starting points—not universal rules—and should be set based on job analysis and business needs.
Domains to emphasize: Email and Calendar, Files and Folders, Docs, Collaboration
Domains to emphasize: Email, Browser, Security, Collaboration
Domains to emphasize: Security and Privacy, Email, Files, Basic troubleshooting
Domains to emphasize: OS basics, Security, Browser basics, Collaboration
Domains to emphasize: Balanced across all domains
Implementation note: Pair the exam with a short work sample for roles where errors have compliance or financial impact.
This is where assessments become career accelerators—not just filters.
Weekly practice
Create a folder structure and file naming convention, then relocate 20 files correctly
Weekly practice
Send 10 practice emails with correct attachments and clear subject lines
Weekly practice
Identify 10 phishing red flags from example scenarios
Weekly practice
Clear cache and cookies, disable extensions one by one, and manage the downloads folder
Weekly practice
Clean a small dataset by removing duplicates, applying filters, and computing totals with simple formulas
Weekly practice
Share documents with correct view or edit access and verify permissions using a second account
Weekly practice
Learn and apply standard keyboard shortcuts to speed up daily tasks and reduce repetitive actions
Weekly practice
Use time zones and scheduling assistants to coordinate meetings across regions accurately
Weekly practice
Enable multi-factor authentication, practice safe file sharing, and verify device updates regularly
Weekly practice
Build a one-page personal SOP for recurring tasks and walk through three troubleshooting scenarios with documented decision paths
Focus
Streamline workflows, solve everyday operational issues, and escalate only true technical problems
Focus
Create short, clear walkthroughs for common tasks, onboarding flows, and team standards
Focus
Build skills in lookup functions and pivot table concepts to summarize and analyze operational data
Next steps
Volunteer to standardize team file structures, templates, or onboarding checklists
Use your assessment score as evidence in interviews:
“I’m advanced in security hygiene and collaboration workflows.”
To align with professional selection and evaluation norms, keep these principles:
Job analysis alignment: Test what the role actually uses (email, files, collaboration, security). Document it.
Standardization: Same time limits, instructions, and scoring rules.
Reliability mindset: Use enough items per domain to reduce noise; avoid one-question domains.
Fairness monitoring: Track outcomes by cohort; if used for hiring, periodically review results for adverse impact risk and ensure business necessity.
Practical benchmark guidance:
Some organizations treat 70–75% as a starting point for independent work in general office computer literacy, then adjust by role and risk.- High-trust environments (healthcare, finance, legal) often set higher thresholds and/or require stronger security subscores.
Use these resources based on your stack:
This computer literacy examination package is designed to be used—not just read. Start with the sample set, adopt the scoring bands, and scale into a full-length exam with transparent, documented standards.