Summative g10
Summative g10
Directions: Read each item carefully. Choose the letter of the correct answer.
1. It is a program or set of programs that are designed to prevent, search for, detect, and remove software
viruses, and other malicious software like worms, trojans, adware, and more.
A. Application B. Antivirus C. Web D. Windows Store
2. It is a program or group of programs designed for clients.
A. Application B. Antivirus C. Web D. Windows Store
3. It is the simplification of the process of locating and installing software from third-party developers—when you find an app
in the Windows store, you won't have to do any extra work to install it.
A. Application B. CD-ROM C. Web D. Windows Store
4. The most common way to get new software.
A. Application B. CD-ROM C. Web D. Windows Store
5. The following are means of uninstalling software, except one:
A. Add/Remove Programs B. Control Panel C. Settings D. Windows
6. The older way of installing applications through compact disks, done during the mid-1990s to late 2000s.
A. Add/Remove Programs B. Control Panel C. Settings D. Windows
7. Unlike Application software, this in mainly involve with running the computer.
A. Antivirus Software B. Computer Viruses C. System Software D. System Updates
8. The teacher always updates his operating system. By doing this he can have these benefits, except one:
A. Add new features and improve existing ones.
B. Help spreading viruses to another device
C. Updates help patch security flaws
D. Help protect your data.
9. A method of flooding the Internet with copies of the same message
A. Adware B. Spam C. Spyware D. Virus
10. The least dangerous and most lucrative Malware that displays advertisements.
A. Adware B. Spam C. Spyware D. Virus
11. It is software that tracks your internet activities to send advertising
A. Adware B. Spam C. Spyware D. Virus
12. A contagious program or code that attaches itself to another piece of software and then reproduces itself when that
software is run.
A. Adware B. Spam C. Spyware D. Virus
13. Shantel’s computer has been infected by a type of malware. She noticed that her antivirus has been disabled. This could
be the malware that causes the trouble.
A. Backdoors B. Trojan C. Worm D. Virus
14. Ms. Herra is installing an anti-virus software when his system crashes. This could be the cause of the incident.
A. Backdoors B. Trojan C. Worm D. Virus
15. Malware is a term which means:
A. Malfunctioned Software B. Maldives Spyware C. Malicious Software D. Malaria Software
16. Yam’s laptop has been infected and cannot open photos anymore. This type of malware can be the reason.
A. Backdoors B. Trojan C. Worm D. Virus
17. It tests the basic functionality of computer ports.
A. Digital Multimeter B. Loopback Adapter C. Screwdriver D. Toner Probe
18. A device that can take many types of measurements.
A. Digital Multimeter B. Loopback Adapter C. Screwdriver D. Toner Probe
19. These tools help diagnose computer and network problems and determine which computer device is not functioning
correctly.
A. Cleaning tools B. Diagnostic Tools
C. Hardware tools D. Software tools
20. It generates a tone that travels that traces the cable.
A. Digital Multimeter B. Loopback Adapter C. Screwdriver D. Toner
21. Optimizes space on a hard drive to allow faster access to programs and data.
A. Defragmentation B. Disk Cleanup
C. ScanDisk D. SFC
22. This checks the integrity of files and folders on a hard drive by scanning the file system.
A. Defragmentation B. Disk Cleanup
C. ScanDisk D. SFC
23. A command-line tool that scans the operating system critical files and replaces files that are corrupted.
A. Defragmentation B. Disk Cleanup
C. ScanDisk D. SFC
24. Clears space on a hard drive by searching for files that can be safely deleted.
A. Defragmentation B. Disk Cleanup
C. ScanDisk D. SFC
25. This is consists of devices communicating in close range such as CPs and Bluetooth devices.
A. CAN B. PAN
C. LAN D. WLAN
26. This is two or more computers connected to share resources.
A. Internet B. Network
C. SharePoint D. Transfer
27. It covers a small area using a Wi-Fi router.
A. CAN B. PAN
C. LAN D. WLAN
28. It covers a small local area such as homes, offices, buildings, etc.
A. CAN B. PAN
C. LAN D. WLAN
29. If Tagaytay has its own free Wi-Fi on the streets, this is the type of network it possesses.
A. GAN B. LAN
C. MAN D. WAN
30. An internet connectivity provided by a certain school or institution.
A. CAN B. PAN
C. LAN D. WLAN
31. This is the term for the physical arrangement of computer networks.
A. Internet B. Topology
C. Taxonomy D. WWW
32. This type of network uses satellites to widespread its connectivity.
A. GAN B. LAN
C. MAN D. WAN
33. Ms. Mary wants to have computer connection that will use the least amount of wires. This is the best option.
A. Bus B. Mesh
C. Ring D. Star
34. It simply means each computer is connected to every other computer
A. Bus B. Mesh
C. Ring D. Star
35. This connection has a central straight common wire.
A. Bus B. Mesh
C. Ring D. Star
36. This connection requires a switch or hub.
A. Bus B. Mesh
C. Ring D. Star
37. It is used to cut away plastic jackets of cables.
A. Crimper B. Lan Tester
C. Network Multimeter D. Wire Stripper
38. This is used to test cables to see if it’s good or bad, or to find what type of cable it is if not labeled.
A. Crimper B. Lan Tester
C. Network Multimeter D. Wire Stripper
39. A multifunctional tool that can test cables, ports, and network adapters.
A. Crimper B. Lan Tester
C. Network Multimeter D. Wire Stripper
40. Used to attach cable terminators permanently.
A. Crimper B. Lan Tester
C. Network Multimeter D. Wire Stripper
41. It enables computers on a network to communicate by plugging in the cables.
A. Bridge B. HUB
C. Router D. Switch
42. This is the meaning of the abbreviation UTP.
A. Unidentified Technical Problem B. Unshielded Twisted Pair
C. Unbalanced Type Protocol D. Unyielding Technological Procedure
43. It enables computers to communicate and they can pass information between to networks.
A. Bridge B. HUB
C. Router D. Switch
44. It works by identifying the intended destination of information
A. Bridge B. HUB
C. Router D. Switch
45. This is the meaning of RJ in RJ45
A. Radio Jack B. Register Jack
C. Radio Jumper D. Register Jumper
46. Connects networks with the same protocol.
A. Bridge B. HUB
C. Router D. Switch
47. The following are the disadvantages of networking, expect one:
A. Cheap Set up B. Main Server Dependency
C. Security D. Spreading of Viruses
48. The following are the advantages of networking, expect one:
A. Cost Efficiency B. File Sharing
C. Resource Consuming D. Storage Capacity
49. This cable configuration is used to connect computers directly.
A. Cross-over B. Straight-Through
C. STP D. UTP
50. The most common type of Network Cable Configuration
A. Cross-over B. Straight-Through
C. STP D. UTP
TECHNOLOGY AND LIVELIHOOD EDUCATION
Summative 4th Quarter
CSS-10
SY 2024-2025
KEY TO CORRECTION
1. B 26. B
2. A 27. D
3. D 28. C
4. C 29. D
5. D 30. C
6. B 31. B
7. C 32. D
8. B 33. C
9. B 34. C
10. A 35. A
11. C 36. D
12. D 37. D
13. A 38. B
14. B 39. C
15.C 40. A
16. C 41. B
17. B 42. B
18. A 43. C
19. D 44. D
20. D 45. B
21. A 46. A
22. C 47. A
23. D 48. C
24. C 49. A
25. B 50. B