0% found this document useful (0 votes)
18 views13 pages

THEORY

The document is a knowledge assessment package for a Level I course in Hardware and Networking Service at Admas University. It outlines various modules of competence, including connecting hardware peripherals and operating personal computers, along with a structured exam format. The assessment includes multiple-choice questions covering key ICT concepts and practices.

Uploaded by

birukbemeresu12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views13 pages

THEORY

The document is a knowledge assessment package for a Level I course in Hardware and Networking Service at Admas University. It outlines various modules of competence, including connecting hardware peripherals and operating personal computers, along with a structured exam format. The assessment includes multiple-choice questions covering key ICT concepts and practices.

Uploaded by

birukbemeresu12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

MINISTRY OF LABOR AND SKILLS

ADMAS UNIVERSITY MESKEL CAMPUS


DEPARTMENT OF INFORMATION COMMUNICATION TECHNOLOGY
SECTOR: - ICT
OCCUPATION: HARDWARE AND NETWORKING SERVICE Level – I
KNOWLEDGE ASSESSMENT PACKAGE
The assessment covers the following units of competence:

MODULE CODE MODULE TITLE


EIS HNS1 01 1221 Connect Hardware Peripherals
EIS HNS1 02 1221 Operate Personal Computer
EIS HNS1 03 1221 Protect Application or System Software
EIS HNS1 04 1221 Install Software Application
EIS HNS1 05 1221 Develop Computer Keyboard Skill
EIS HNS1 06 1221 Create and Use Spreadsheet
EIS HNS1 07 1221 Maintain Equipment and Software Inventory and Documentation

EIS HNS1 08 1221 Identify and Use Network Hand Tools


EIS HNS1 09 1221 Access and Use Internet
EIS HNS1 10 1221 Apply 5S Procedures
Structure of Exam
Section No of questions No of marks Suggested time
Multiple choice questions
Total

Candidate Name

Registration Number

Name of Assessment Centre

Name of Training Provider


General Instructions
1. Write your Name and ID number in the space provided on the separate answer sheet.
2. You have 10 minutes reading time and opportunity to ask questions to the Assessor
3. All written responses must be in CAPITAL LETTER.
4. At the end of the examination return this book to the assigned Accredited Assessor
5. Do not bring the following items into the assessment venue
 Mobile telephones
 Written notes
INSTRUCTION: Choose the best answer and write you answer on the separate answer sheet
only
1. The communications protocol used for the transfer of information over the Internet.
A. Upload
B. Download
C. HTTP
D. IP
2. A software application used to access information on the World Wide Web
A. Website
B. Webpage
C. Web Browser
D. Hyperlink
3. Is a unique identifier used to locate a resource on the Internet?
A. URL
B. HTTP
C. Webpage
D. Website
4. Details that should be included within a hardware inventory includes: -
A. Description of hardware device
B. Supplier
C. Manufacturer
D. Model number
E. All
5. _____ refers to a method of saving a webpage
A. Search engine
B. Internet
C. Bookmark
D. Browser
6. Among the following which one is not categorized under search engine
A. Mozilla Firefox
B. Yahoo
C. Google search
D. MSN
7. _______ is a device used to conjoin two pieces of metal by deforming one or both of them to
hold each other
A. RJ-45
B. Cable
C. Crimper
D. Cable Tester
E. none
8. Type of Ethernet cable that connects the wires with one to one on both sides.
A. Straight through
B. Cross Over
C. Roll Over
D. Twisted Pair
9. An electronic device that measures signal for correct wiring.
A. Network Cable Crimper
B. RJ45
C. Network Cable Tester
D. ST Connector
10. The hand tool used to connect telecommunications and network wires to a patch panel.
A. Puncher
B. Crimper
C. Digital multimeter
D. Network Tester
11. Which of the following software can’t be categorized as application software?
A. MS-Access
B. Windows 10
C. Spreadsheet
D. Word processing
12. A computer program that functions as an intermediary between a computer user and the
computer hardware is called
A. Hardware
B. Application software
C. Operating system.
D. Driver
13. One of the following is not a part of 5S.
A. Shine
B. standardize
C. sort
D. Sustain
E. None
14. Which of the following allows you to sign in/ login to your computer
A. User account
B. Bank account
C. e-mail account
D. all
15. Which user accounts can have parental controls?
A. Administrator Account
B. Standard Account
C. Standard with Family Safety account
D. Gust account
16. A malicious software with the capability to damage computer hardware and software is ____
A. Distractive software
B. Operating system
C. Application software
D. B and C
17. A kind of software that designed to prevent viruses, worms and Trojan horses from getting
onto a computer as well as remove any malicious software code that has already infected a
computer is called.
A. Distractive software
B. Anti-virus
C. Operating system
D. Application software
18. Which one is not an example of a peripheral device?
A. Keyboard
B. Mouse
C. Register
D. Speakers
19. Which component is not found in the CPU?
A. Control unit
B. ALU
C. Memory
D. Print
20. _______Is a measuring unit of CPU speed.
A. megabytes.
B. gigahertz.
C. gigabytes.
D. terabytes.
21. A program is
A. a hardware device.
B. a memory device
C. a set of instructions.
D. a register.
22. _____ is the physical device of a computer system.
A. Software
B. Hardware
C Application
D. Program
23. Which of the following are the characteristics of Computer?
A. Speed
B. Accuracy
C. Versatility
D. Storage
E. All
24. Computers can be classified into Supercomputer, Mainframe, Mini, and Micro
Computer based on their:
A. Purposes
B. Hardware Design and Type
C. Size and Capacity
D.ALL
25. _____ is a device that supplies electrical energy to one or more electric loads.
A. Monitor
B. Printer
C. Power supply
D. Keyboard
26. When storing peripherals
A. Make sure equipment is kept in ideal working conditions
B. Adhere to current occupational health and safety guidelines
C. Ensure the electrical safety of the device
D. Consider security of the device
E. All
27. Details that should be included within a software inventory includes: -
A. Version
B. Installed date
C. Manufacturer
D. Model number
E. All
28. Which one of the following is Advantages of dial up internet connection?
A. Very economic and widely available in some remote places
B. Cheap solution as it uses existing infrastructure to provide internet connection.
C. Hardware costs are minimal since it uses a standard modem
D. Easy configuration
E. All
29. Who provides an internet?
A.TCP
B.ISP
C. FTP
D.HTTP
30. What is internet?
A. Programming language
B. Network connecting computers all over the world
C. Computer program to transfer data
D. All of these
31. Which of the following set of characters considered as home keys?
A. a s d f g h l k j p
B. a s d f g;l k j h
C. a s d f g h j k l;
D. a s d f g;l k j i
32. Typing errors may be
A. Use of capital or small letters
B. Punctuations
C. space and incompleteness
D. Spelling
E. All
33. Which one is a short cut key to copy a document?
A. Ctrl+S
B. Ctrl+A
C. Ctrl+P
D. Ctrl+C
34. Which of the following is Ergonomic Requirement?
A. Avoiding radiation from computer screens
B. Chair height, seat and back adjustment
C. Footrest and lighting
D. Keyboard and mouse position
E. All
35. _____ is a place where your fingers should rest.
A. Keyboard
B. keys
C. home keys
D. all
36. Keep things clean and tidy; no refuse or dirt in work area.
A. Sort
B. Straighten
C. Shine
D. Standardize
37. Is develop a commitment and pride in keeping to standards.
A. Sustain
B. Straighten
C. Shine
D. Standardize
38. Among the following one which one is used for mathematical calculations.
A. Word processing
B. Spread sheet
C. Database management system
D. Auto cad
39. Which one of the following is a very focus of 5s?
A. Arrangement of equipment
B. A & B are correct
C. Cleanness of environment
D. None of the above
40. The combination of raw number and column letter is
A. Column name
B. Cell name
C. Raw name
D. All
41. Which one of the following is an application software?
A. Windows xp
B. ubuntu
C. mac
D. adobe Photoshop
42. among the following one is not a type of software installation.
A. Attended installation
B. Silent installation
C. Clean installation
D. Upgrade installation
43. Which one of the following is a system software?
A. Windows 7
B. Microsoft word
C. Peachtree accounting
D. all
44. Why do we create partition while installing operating system?
A. To divide our computer for two users
B. To divide our hard disk physically
C. To separate user and system files
D. none
45. Which one of the following operating systems is virus protected?
A. Windows xp
B. Vista
C. Windows 7
D. Ubuntu
46. Virus commonly spread
A. Through Email Attachment C. By Removable storage devises
B. By running infected programs D. All

8
Department of Informatics Protect Application or System Software
Written Test-1
47. prevent, detect & remove malware, viruses & worms used to is______
A. Spam C. Antivirus Software
B. Computer Virus D. Threats
48. a small software program that is specifically designned to spread between computers & delay basic
computer functions.
A. User Account C. Human Virus
B. Computer Virus D. All
49. Computer viruses effects when it is infect the computer system

A. Slow down the overall computer performance


B. Hide & lead to lose files
C. Crash the computer system& programs
D. All
50. The primary means of access for real people to the system is_________
A. Access Permission C. User Accounts
B. Access Right D. Antivirus
51. One of the following user cannot install and remove software.

A. Standard user C. Administrator


B. Limited user D. a&b
52. The one is not true about protecting destructive software.
A. Monitoring and identifying unusual disk activity.
B. Scanning program and data files on your computer.
C. Scanning incoming on-line data.
D. None
53. One of the following activities must perform every day.
A. Data backup B. Defragment hard drive C. scanning viruses D. a & c

54. Any device connected externally to a computer and used in the transfer of data is considered as:
A. Software B.Peripheral C. Programs D. Instructions

55. What is the small program that tells the computer how to communicate with input/output devices
A. Virus B. Storage Device C.Device Driver D. Peripheral

56. It is what the computer displays as a result of processing data.


A. Output B. Input C. Storage D. All

Occupational Title: - HNS Program: - Regular/EXTENSION


Level: - I
57. Which of the following is permanently storage device?
A. Hard disk B. Floppy disk C. Flash disk D. All

58. Which Slots are brown in color, very short, faster speed and it is only designed for modern graphic
[video] cards. 64-bit wide is a common.
A. PCI B. AGP C. ISA D. All

59. Another name of CPU can be


A. Processor B. Central processing Unit C. Brain of Computer D. All

60. The processor’s speed has been measured in what?


A. Byte B. GHz C. GB D. Bit

61. This is use to connect the monitor to the system unit.


A. VGA Cable B. Audio Cable C. NIC Cable D. Power Cord

62. A Device which draws power (supplies electrical energy) to the computer system from local source
is:
A. Power Cord B. Power Supply C. Monitor D. Modem
63. Devices that accept data from outside peripherals and transfer it into CPU are
called_______
A. Menu bar B. Input Devices C. Digital Devices D. Output Devices
64. A bar usually located at the bottom of a desktop and organizes start button, opened
programs, system date and time, etc. is?
A. Title bar C. menu bar
B. Status bar D. Task bar
65. Small picture that may appear on your desktop is called
A. Title bar B. Icons C. Computer D. Start menu
66. Among the following which one is personal computer
A. Supercomputer C. Microcomputer
B. Minicomputer D. Mainframe Computer
67. Which one of the following is the correct data processes cycle
A. Input  Output Processes.
10
B. Output  Processes  Input.
C. Input  Processes  Output.
D. Processes  Input  Output.
68. Among the following hardware device, which one is used to move the pointer around
the screen and to perform tasks?
A. Microphone C. Mouse
B. Speaker D. Printer
69. Which one is different from the others?
A. Printer B. Keyboard C. Speaker D. Monitor
70. Among the following, which one is used for storing temporarily deleted files?

A. Recycle bin C. My document


B. My computer D. folder
71. Microsoft word is a
A. Spreadsheet program
B. Presentation program
C. Word processing program
D. None the above

11
Answer Sheet
1. 2.
3. 4.
5. 6.
7. 8.
9. 10.
11. 12.
13. 14.
15. 16.
17. 18.
19. 20.
21. 22.
23. 24.
25. 26.
27. 28.
29. 30.
31. 32.
33. 34.
35. 36.
37. 38.
39. 40.
41. 42.
43. 44.
45. 46.
47. 48.
49. 50.
51. 52.
53. 54.
55. 56.
57. 58.
59. 60.
61. 62.
63. 64.
65. 66.
67. 68.
69. 70.
71. 72.

12

You might also like