5th Summative Test
5th Summative Test
Java Programming
First Quarter-5th Summative Test
Name: _______________________________________Gr. & Section: 11-Surtido Score:______
I. Identification: Read each item and write the letter of the correct answer from the box before the
number.
A. Antivirus C. directory E. file format G. generic scanning I. virus K. zipping file
B. Data backup D. extension F. format H. specific scanning J. worms
1. It refers to the organization and layout of data that is stored in a file
2. a file system structure in which to store computer files
3. software that spreads from program to program, or from disk to disk, and uses each infected
program or disk to make copies of itself
4. Protects the computer against viruses by identifying and removing any viruses found
5. ending of a file that helps identify the type of file in operating systems such as Microsoft
Windows
6. works by copying itself into nodes or network terminals which does not require any
intervention from the user itself
7. Date can be recovered using this
8. the structure of how information is stored (encoded) in a computer file
9. method the software does not look for a specific signature but instead monitors the
behavior of all applications
10. compressing files by removing the redundancies in them
Java Programming
First Quarter-5th Summative Test
Name: _______________________________________Gr. & Section: 11-Surtido Score:______
I. Identification: Read each item and write the letter of the correct answer from the box before the
number.
A. Antivirus C. directory E. file format G. generic scanning I. virus K. zipping file
B. Data backup D. extension F. format H. specific scanning J. worms
1. It refers to the organization and layout of data that is stored in a file
2. a file system structure in which to store computer files
3. software that spreads from program to program, or from disk to disk, and uses each infected
program or disk to make copies of itself
4. Protects the computer against viruses by identifying and removing any viruses found
5. ending of a file that helps identify the type of file in operating systems such as Microsoft
Windows
6. works by copying itself into nodes or network terminals which does not require any
intervention from the user itself
7. Date can be recovered using this
8. the structure of how information is stored (encoded) in a computer file
9. method the software does not look for a specific signature but instead monitors the
behavior of all applications
10. compressing files by removing the redundancies in them
II. True or False : Write T if the statement is true and F if the statement is false.
____1. One of the commonly used troubleshooting steps is to reboot the computer.
____2. If you have trouble in logging in, you need to check printer if it plugged in correctly.
____3. Photography is the hiding of information by altering the actual information into different
representation.
____4. \ / : * ? " < > | is allowed in creating filename.
____5. Antivirus restricts information that comes to your computer from other computer
____6. Biometric is the technology of authenticating a person’s identity by verifying a personal
characteristics.
____7. Anti-virus is a program that detects, quarantines and remove spyware to prevent them
from getting to your computer.
____8. If the sounds is not working, check if the speaker is plugged correctly.
____9. If your computer is freezing, use the three finger salute – shift-alt-delete to close
unresponsive program.
____10. Specific scanning application scans files to look for known viruses matching definitions in
a “virus dictionary”
II. True or False : Write T if the statement is true and F if the statement is false.
____1. One of the commonly troubleshooting step is to reboot the computer.
____2. If you have trouble in logging in, you need to check printer if it plugged in correctly.
____3. Photography is the hiding of information by altering the actual information into different
representation.
____4. \ / : * ? " < > | is allowed in creating filename.
____5. Antivirus restricts information that comes to your computer from other computer
____6. Biometric is the technology of authenticating a person’s identity by verifying a personal
characteristics.
____7. Anti-virus is a program that detects, quarantines and remove spyware to prevent them
from getting to your computer.
____8. If the sounds is not working, check if the speaker is plugged correctly.
____9. If your computer is freezing, use the three finger salute – shift-alt-delete to close
unresponsive program.
____10. Specific scanning application scans files to look for known viruses matching definitions in
a “virus dictionary”