Publicidad

ICT 2nd QUARTER summative.pptx

Teacher 1 en DHGGMHS(DepEd)
23 de Mar de 2023
Publicidad

Más contenido relacionado

Publicidad

ICT 2nd QUARTER summative.pptx

  1. ICT  SUMMATIVE TEST 2ND QUARTER
  2. Choose and shade the letter of the correct answer 1) It refers to a list of the key components that make up the computer. a. Specs b. Manufactures c. Brand d. Checklist 2) The main working memory in a computer is called ___________. a. ROM b. RAM c. Processor d. memory chips 3) It stores the applications and programs that run on the PC, as well as any work created by users. a. CD/DVD b. RAM c. Hard drive d. Zip drive 4) These cards are installed inside a PC and are responsible for determining the quality of the visuals output by the computer. a. Audio Card b. Graphics Card c. LAN Card d. Adapter card 5) These are the two leading companies when it comes to manufacturing processors. a. HP and Dell b. Epson and Canon c. AMD and Intel d. Acer and Asus
  3. 6) This card allows a computer to be connected to a network. A 10/100/1000 Mbps (Megabits per second) card is the standard card specifications today a. Audio Card b. Graphics Card c. Network Card d. Adapter card 7) It is a free open source operating system. a. Microsoft Windows b. Linux c. Mac OS d. Chrome OS 8) A cabling is used to connect your wired network adapters to a router or network switch. a. Internet b. Ethernet c. coaxial d. fiber optic 9) A glue that holds your home network together a. router b. DSL c. Hub d. Ethernet cable 10)The standard transfer speed of your wireless connection is __________. a. 802.11g b. 801.11g c. 802.11m d. 802.11j
  4. 11) The wired half of your router has a speed of _____________. a. 10/100 Mbps b. 10/10/100 Mbps c. 100/1000 Mbps d. 10/10/1000 Mbps 12)Routers have two types of ports available at the back. Which is not part of it? a. LAN b. WAN c. MAN d. WLAN 13)It basically means to create a redundant copy of a data. a. Data Backup b. Image copy c. System restore d. hardcopy 14)It refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. a. Software b. Spyware c. Malware d. Firmware 15)Software is used to identify problems on a computer or piece of equipment. a. Network software tool b. Hardware Software tool c. Diagnostic Software tool d. Firmware software tool
  5. 16) Disk ________ rearranges fragmented data so your disks and drives can work more efficiently. a. Defragmenter b. Fragmenter c. software d. defrag 17) It is a system-defined database which is used by an Operating System to store all the information needed to configure the Windows settings. a. Registry b. Register c. Registration d. Registering 18) This is an application that checks the computer’s hard drive for errors and bad sectors. a. Scan b. System Restore c. Scan Disk d. Data backup 19) It is a computer maintenance utility that is included in the Microsoft Windows operating system and it is designed to free up space on the hard drive. a. Network software tool b. Data Backup c. Scan Disk d. Disk Cleanup 20) Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the possible network issues that prevent you from using your computer to the fullest. a. Burn-in b. Hardware Software tool c. Diagnostic Software tool d. Network Diagnostic tool
Publicidad