0% found this document useful (0 votes)
37 views6 pages

Q2 Tle10-Reviewer

This document contains a test for students on computer networking concepts. It includes 24 multiple choice questions covering topics like cable types, IP addressing, protocols, security threats, and firewall configuration. The questions are part of a test being administered to assess students' understanding of configuring computer systems and networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views6 pages

Q2 Tle10-Reviewer

This document contains a test for students on computer networking concepts. It includes 24 multiple choice questions covering topics like cable types, IP addressing, protocols, security threats, and firewall configuration. The questions are part of a test being administered to assess students' understanding of configuring computer systems and networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Republic of the Philippines

Department of Education
Region I
Schools Division Office of San Carlos City
DOYONG NATIONAL HIGH SCHOOL
Doyong San Carlos City, Pangasinan

LO3: Configure Computer System and Nework


Direction: Read and understand carefully the following items and choose the letter of the correct answer
and write it in the space before each item.
1. Cables are the only medium materials that used to connect different devices on networks. Which of
the following cable uses glass or plastic to transmit data?
a. Co-axial cable c. Twisted pair cable
b. Fiber optic cable d. UTP cable
2. Twisted pair cable is a type of copper cabling that is used for telephone communications and most
Ethernet networks. Which of the following type of twisted pair cable has correct description?
a. Unshielded twisted pair (UTP) relies solely on the cancellation effect produced by the twisted-
wire pairs that limits signal degradation caused by electromagnetic interface (EMI) and radio
frequency interference (RFI).
b. Unshielded twisted pair (UTP) relies solely on the cancellation effect produced by the twisted-
wire pairs that exceed signal degradation caused by electromagnetic interface (EMI) and radio
frequency interference (RFI).
c. Shielded twisted pair (STP) increase electrical noise from within the cable but it reduces EMI
and RFI from outside the cable.
d. Shielded twisted pair (STP) reduces electrical noise from within the cable but it increase EMI
and RFI from outside the cable.
3. Coaxial cable is a copper-cored cable surrounded by a heavy shielding which is used to connect the
computers to the rest of the network and consists of four different types. Which of the following types of co-
axial cable has the capacity to operate with a speed of 10Mbps with a maximum wire length of 500 meters?
a. Thinnet b. Thicknet c. RG-59 c. RG-6
4. Using the question in item no.4, what type of co-axial cable is the most commonly used for cable television in
the U.S.?
a. Thinnet b. Thicknet c. RG-59 c. RG-6
5. An optical fiber is a glass or plastic conductor that transmits information using light. Which of the following
has incorrect statement about fiber optic?
a. Fiber-optic cable is not affected by EMI or RFI
b. Fiber-optic cable uses the speed of sound to deliver signals without compromising its clarity.
c. All signals are converted to light pulses to enter the cable and are converted back into electrical signals
when they leave it.
d. Fiber-optic cable can deliver signals that are clearer, and can go farther, without compromising the clarity
of signals.
6. What type of internet cable is used to connect two devices directly?
a. Cross-over cable c. Straight through cable
b. Co-axial cable d. Twisted pair cable
7. Arrange the following procedures in creating internet cable according to its sequence:
I. Cut across the wires 1/2 inch from the cut sleeve to the end of the wires.
II. Pinch the wires between your fingers and straighten them
III. Unwind and pair the similar colors
IV. Cut into the plastic sheath 1 inch from the end of the cut cable.

a. I-II-III-IV b. IV-III-II-I c. II-I-III-IV d. III-IV-I-II


8. These are sets of rules governing communication within and between computers and define the
format of the messages to be exchanged on a network.
a. IP Addressing c. Data Communication
b. Internet Protocol d. Safety Rules
9. Which of the following is not included among the main functions of protocol?
a. Ignoring errors c. Compressing the data
b. Deciding how the data should be sent d. Addressing the data
10. An IP address is a number that is used to identify a device on the network and it is represented by
the series of bits through binary (1’s and 0’s). How many series of bits does IP address consist?
a. 22 Binary bits c. 42 Binary bits
b. 32 Binary bits d. 52 Binary bits
11. The logical IP address is hierarchical and is composed of two parts. The first part identifies the
network portion of IP address, and the second part identifies a host portion of IP Address on the
network. From an IP address 192.168.10.15, which of it is the network portion of an IP address?
a. 192.168.15 b. 192.10.15 c. 192.168.10 d. 192.10.168
12. Using item number 13, what is the numerical value of the host portion of IP Address?
a. 192 b. 10 c. 15 d. 168
13. An IP address has a dotted-decimal number such as 192.168.17.10. What was its binary
equivalent?
a. 11000000101010000000000100000101 c. 11000000101010000000000100001101
b. 11000000101010000001000100001010 d. 11000000101010000000100100001010
14. What is the sum of the following group of binary numbers?
(1001;1101;1010;0001)
a. 100001 b. 100100 c. 100011 d. 101001
15. What is the absolute decimal value of binary number 1100010?
a. 99 b. 98 c. 97 d. 96
16. What is the absolute decimal value of a binary number 1001.1101?
a. 9.8125 b. 9.7125 c. 9.7225 d. 9.6125
17. What command is used to test the ability of the source computer to reach a specified destination
computer?
a. Ipconfig b. Msconfig c. Ping d. Regedit
18. It is a command used to find out the IP address of a certain network you are connected to.
a. Ipconfig b. Msconfig c. Ping d. Regedit
19. What do you call an approach to computer networking where all computers show equivalent
responsibility for processing data?
a. Client server c. Peer-to-client
b. Peer to peer d. None of the options
20. Which of the following IP address classes is used for experimental testing?
a. Class B b. Class C c. Class D d. Class E
21. To successfully protect computers and the network, a technician must understand both of the following types
of threats (physical threats and data threats) to computer security. Which of the following is an example of
data threats in a computer system?

a. Events or attacks that destroy such equipment like servers, switches, and wiring.
b. Events or attacks that remove or steal information.
c. Events or attacks that result damage of different hardware materials in the network.
d. Events or attacks that destroys the integrity of the company.
22. Threats to security can come from inside or outside an organization, and the level of potential damage can
vary greatly. Which of the following statements shows that threats came outside an organization?
a. An employee unintentionally corrupt important files in the system.
b. An employee Accidentally corrupt important files in the system.
c. The student accidentally corrupts the important files of his teacher’s computer.
d. The student accidentally corrupts the important files saved on his computer.
23. Computer viruses are created with malicious intent and sent by attackers. Which of the following viruses has
the ability to attach to small pieces of computer code, software, or document?
a. Virus b. Worm c. Trojanhorse d. all of the above

24. It is a self-replicating program that is harmful to computer and network system.


a. Virus b. Worm c. Trojanhorse d. all of the above
25. What software is designed to detect, disable, and remove viruses, worms, and Trojans before they infect a
computer?
a. Excel c. Virus Protection Software
b. Recyclebin d. Firewall
26. It helps prevent attackers from monitoring or recording traffic between resources and computers by using
code and ciphers.
a. Port protection b. Data Protection c. Port Encryption d. Data Encryption
27. What is the way of protecting a computer from intrusion through the ports?
a. Enable computer firewall c. Update anti-virus software
b. Disable computer firewall d. Upgrade windows software
28. There are three steps to follow to enable firewall for Windows 7. Which of the following has a correct
sequence to do the job?
I. Open Windows Firewall by clicking the Start button , and then clicking Control Panel. In the
search box, type firewall, and then click Windows Firewall.
II. In the left pane, click Turn Windows Firewall on or off. If you're prompted for an administrator
password or confirmation, type the password or provide confirmation. Turn Windows Firewall on
or off link in Windows Firewall.
III. Click Turn on Windows Firewall under each network location that you want to help protect, and
then click OK.

a. I-II-III b. I-III-II c. III-II-I d. III-I-II


29. It is a security layer used in mobile devices that employ the Wireless Applications Protocol.
a. Wireless Transport Layer Security (WTLS) c. Lightweight Extensible Authentication Protocol
b. Service Set Identifier d. Wired Equivalent Privacy
30. This refers to the offering access to digital information or resources, including documents, multimedia
(audio/video), graphics, computer programs, images and e-books.
a. Printer Sharing c. File Sharing
b. Centralized file hosting d. Removable storage devices
31. Which of the following statements is the primary reason in the development of network?
a. to allow groups of computer users to share peripheral devices
b. to allow groups of computer users to share application devices
c. to allow groups of computer users to share software devices
d. to allow groups of computer users to accidentally share peripheral devices
32. Arrange the following steps according to their sequence in installing Windows 7 Ultimate.
I. Place Windows 7 DVD in your DVD-rom drive and start your PC.
II. Install or repair Windows 7
III. Read the license terms and tick I accept license terms.
IV. Setup your language, time and currency format, keyboard or input method
a. I-II-III-IV b. I-III-II-IV c. I-III-IV-I d. I-IV-II-III

LO1: INSTALLING AND CONFIGURING COMPUTER SYSTEM (ICCS)

33. Which of the following is the first step in installing Windows Server 2008 R2?
a. Read the license terms for Windows Server 2008 R2
b. Insert the installation media for Windows Server 2008 R2
c. Enter language and other preferences for Windows Server 2008 R2
d. Select Windows Server 2008 R2 Enterprise and click Next.

34. After reading the license terms in installing Windows 7 Ultimate, what will happen next?
a. You are now be presented with two options. Upgrade or Custom
b. You are allowed to setup your language, time and currency format, keyboard or input method
c. You need to choose where you would like to install Windows 7
d. You are asked if you allow to install or repair Windows 7 Ultimate instantly.
35. What operating system is released by Microsoft in 2009 that features a quick launch toolbar that
revolutionized how the users find various commands and menu options?
a. Windows 7 b. Windows 8 c. Windows 9 d. Windows 10
36. To be able to run a 32-bit Windows 7 operating system in a computer, the system must meet the required
minimum requirements of hard disk space. What is the minimum available hard disk space to run a 32-bit
windows 7 in a personal computer?
a. 32 Gigabyte b. 20 Gigabyte c. 16 Gigabyte d. 10 Gigabyte
37. Using the question in item number 40, what is the minimum available hard disk space to run a 64-bit windows
7 in your personal computer?
a. 32 Gigabyte b. 20 Gigabyte c. 16 Gigabyte d. 10 Gigabyte
38. RAM is essentially short-term memory where data is stored as the processor needs it. What is the
recommended memory space of RAM for a personal computer to run windows server 2008?
a. 512 Megabyte c. 4 Gigabyte or more
b. 512 Gigabyte d. 2 Gigabyte or more

LO2: INSTALLING AND CONFIGURING COMPUTER SYSTEM (ICCS)

39. Computer networking refers to interconnected computer devices that can exchange data and share resources
with each other. Which of the following statements best describe Client-server Network?
a. It enables a computer to handle network roles such us print server.
b. It enables a computer to handle network roles such us print server and file server.
c. It enables a computer to handle network roles such us print server, web server and file server.
d. It enables a computer to handle network roles such as print server, domain controller, web server, and
file server.
40. A software that is used to communicate with different hardware devices to be able to run a program.
a. Microsoft Office c. Printer Software
b. Operating System d. Basic Input Output System
41. Some games and programs may require a graphic cards with high quality for optimal performance of a
computer. What graphic device with higher driver is required for Windows 7 to run in personal computer?
a. DirectX 12 b. DirectX 11 c. DirectX 10 d. DirectX 9
42. What particular form of software application is designed to enable interaction with hardware devices and is
sometimes called software driver?
a. Device driver application c. Hardware driver application
b. Computer driver application d. Software driver application
43. A device driver usually communicates with the hardware by means of the communications subsystem or
computer bus to which the hardware is connected. To do this, the driver must be updated. From the following
steps arrange them according to their order to manually update the Windows 7 driver.
I. Right-click ‘This PC’ (name of the computer) and select ‘Properties.
II. Select ‘Device Manager’.
III. Go to the ‘Start’ button and open the Menu option.
IV. Click the > button to update some drivers.

a. III-I-II-IV b. III-II-I-IV c. III-IV-I-II d. III-II-IV-I

44. To manually update the device driver software of windows 7, there are six steps to follow and one of them is
to “Right Click Update Driver Software” where you will get dual options to select from. In what step does it
belong?
a. Step 2 b. Step 3 c. Step 4 d. Step 5
45. DriverPack Solution is a free driver updater tool that finds the proper device drivers your computer needs. In
installing this software what step does “stop running this script” message belong?
a. Step 7 b. Step 6 c. Step 5 d. Step 4
46. DriverPack Solution is a lightweight program that doesn't take long to download and connect to the internet
for free online driver updates. Which of the following shows the advantages of this program?
a. Quick downloads
b. No option for scheduled scans
c. Sometimes seems slower than it should
d. Includes other features unrelated to driver updates
47. What will happen if you click “Cancel” before you install and configure a peripheral device using DriversPack
Solution in a computer system?
a. Not allowing the computer system to update drivers pack from the website.
b. Allowing the computer system to update drivers pack from the website.
c. Directly opening a browser to update your DriverPack Solution.
d. Wait for the program to install the new update of DriverPack Solution.
Prepared by: Checked by: Approved:

BRYAN M. MEJIA VALENTINA M. ROMAN,EdD. JANICE T. DATUIN


Teacher III Head Teacher III Principal II
KEY ANSWERS

1. B 26. B
2. A. 27. A.
3. C 28. C
4. B 29. B
5. C 30. C
6. B 31. B
7. A 32. A
8. B 33. B
9. B 34. B
10. A 35. A
11. B 36. B
12. C 37. C
13. C 38. C
14. B 39. B
15. A 40. A
16. B 41. B
17. A 42. A
18. C 43. C
19. C 44. C
20. A 45. A
21. B 46. B
22. A 47. A
23. D 48. D
24. B 49. B
25. C 50. C

You might also like