Reviewer
Reviewer
1. What refers to the policy that an ICT student follows when working in the computer
laboratory?
A. Occupational Health and Safeties (OHS) Policy
B. Occupational Health and Safety (OHS) Policy
C. Opportunity Health and Security (OHS) Policy
D. Opportunity Healthy and Security Policy (OHS)
2. What uses continuous variable for mathematical operations and utilizes mechanical
or electrical energy?
A. Analog computers
B. Digital computer
C. Hybrid computer
D. Laptop
3. Which of these digital circuits are designed to operate on two states, namely bits 0
and 1?
A. Analog computer
B. Digital computer
C. Hybrid computer
D. Smartphones
6. What kind of computer is not acting as the server and requests information or
service from the server?
A. Administrator
B. Client
C. Server
D. User
12. Which command-line tool creates and deletes partitions on a hard drive?
A. Disk Management tool
B. FDISK
C. Format
D. ScanDisk
13. What tool initializes disks, creates partitions, and formats partitions?
A. Disk Management tool
B. Format tool
C. ScanDisk tool
D. ScanDisk tool
14. What do you call a series of beeps that indicates an error condition?
A. Beep codes
B. Beeps signal
C. Error codes
D. System error message
15. What optimizes space on a hard drive to allow faster access to programs and data?
A. Defrag
B. Disk cleanup
C. ScanDisk
D. System file checker
16. What do we call messages that can indicate problems or provide status
information?
A. Beep codes
B. Diskette-drive access indicators
C. Hard-disk drive access indicators
D. System error messages
18. Which indicators light up in response to data being transferred to or from the
drives?
A. Diskette-drive and hard-disk drive access indicators
B. Diskette-drive and hard-disk drive access incident
C. Diskette-ware and hard-disk drive access indicators
D. Light-drive and hard-disk drive access indicators
19. What part is connected to a cable at one end using specific adapters, such as an
RJ-45, coaxial, or metal clips?
A. Adapter
B. LED
C. Probe Part
D. Toner Part
20. What tool tests the integrity of circuits and the quality of electricity in computer
components?
A. Diagnostic tools
B. Digital multimeter
C. Loopback adapter
D. Toner probe
21. What shows configuration options for the operating system and advanced
debugging settings.
A. Boot
B. General
C. Startup
D. Tools
22. Which of the following provides a convenient list of diagnostic tools and other
advanced tools that you can run?
A. Boot
B. General
C. Startup
D. Tools
23. What do we call as the list of all services that start when the computer boots,
along with their status (Running or stopped)?
A. Boot Service
B. Services
C. Startup Service
D. Tools
24. Which one stores all information from the boot process in the file
%SystemRoot% Ntbtlog.txt?
A. Boot Log
B. Base video
C. No GUI Boot
D. OS Boot information
26. What device in your computer (or printers, gaming consoles, and other
networking equipment) connects your computer to your network?
A. Ethernet cabling
B. DSL or Cable Modem
C. Wired or wireless router
D. Wired or wireless network adapters
27. Which port hooks up to your computer and to the other clients?
A. LAN
B. USB Port
C. WAN
D. WPA
28. Which command should a network administrator use to create a new account to
access the network services?
A. File sharing
B. Network service
C. Network cables
D. User management
29. How can you solve if one of the computers cannot connect to another client's
computer while you are playing offline games?
A. Change the IP address
B. Check the LAN port if loose
C. Check the WAN port
D. Restart the computer
30. Do you think you can recover files in case of disaster like hard disk failure?
A. Yes, you can recover volumes, folders, files, certain applications, and the system
state through Windows Server Back-up.
B. Yes, you can by repairing the hard drive through a certain application.
C. No, it cannot be recovered.
D. No, there is no such hard drive repairing tool.
31. Which function of the server allows all the users to submit printing jobs to a
central unit?
A. Client-server
B. Peer-to-peer
C. Printer sharing
D. Server-peer
32. When you suddenly cannot connect to the Internet, any of several things could
be wrong. Which of the following is not the reason for this?
A. Loose network cable
B. IP Address conflict
C. Slow Internet connection
D. Website temporarily unavailable
33. Wireless routers can only reach a limited area of distance. If you have a big
house and have the router on one side, you might not be able to access the network
from the other side of the house. What is the best you will do?
A. Contact your provider and install another set of connection.
B. Buy another router for the other room.
C. Buy expensive wireless router.
D. Buy wireless extenders.
34. What might be the result if someone does not mind protecting their wireless
network or having a network password security?
A. Intruders can gain access to documents, email, and web assets.
B. Intruders can hide your internet connection.
C. Strangers can get your debit cards password.
D. Strangers can use debit cards in online banking.
35. What can be the effect of having a 10/100 Mbps router which is cheaper than
100/1000 Mbps router which are commonly used in a diskless server computer set-
up?
A. Data traffic is faster.
B. Data traffic is slow/lagging.
C. Internet connection is faster.
D. Internet connection is slower.
36. What do you call a bootable disk that contains a full usable OS?
A. Flash Drive
B. Live CD/DVD
C. Operating System
D. Universal Serial Port
38. Which of these instructs the computer on how to perform a number of basic
functions such as booting and keyboard control?
A. BIOS
B. Defrag
C. Disk Cleanup
D. System tray
39. What would happen if the System File Checker (SFC) is used?
A. It initializes disks and format partitions.
B. It optimizes space on a hard drive to allow faster access to programs.
C. It prepares a hard drive to store information.
D. It scans the operating system critical files and replaces files that are corrupted.
40. What is the best thing to do after performing an external visual inspection?
A. Boot the system
B. Debug the system
C. Observe the system
D. Scan the system
43. What would happen if the disk management tools are not used correctly?
A. Data stored on a computer will be at risk.
B. The software programs will fail.
C. Partitions will be deleted.
D. The system unit will lag.
46. Why is there a need to secure the captive screws in the serial and parallel ports?
A. To ensure a firm connection
B. To access the ports securely
C. To connect it properly
D. To open it easily
47. Most of the steps in the boot routine require observation of system functions
and indications. How will you complete all of these steps?
A. Reboot the system several times.
B. Boot the system while updating.
C. Reboot the system once.
D. Update the system.
48. What safety precautions would you recommend before starting to work inside
the computer?
A. Disconnect the power supply from the power source and the power supply cables
from the power supply.
B. Disconnect the power supply after removing the computer cover.
C. Disconnect the power supply cables and remove the computer cover.
D. Remove the computer cover then unplug the power source.
49. Suppose the heat sink assembly gets extremely hot during system operation.
What is the best thing to do?
A. Give sufficient time to cool before touching it.
B. Put the heat sink in a cool place.
C. Focus the electric fan on it.
D. Use hand gloves to hold it.