0% found this document useful (0 votes)
59 views3 pages

Grade 10 Chs Periodic Test

This document appears to be a test for a Grade 10 TLE Computer Hardware Servicing class at Paguiruan High School in the Philippines. It contains 38 multiple choice questions testing students' knowledge of topics like boot configuration utilities, networking cables, IP addressing, protocols, and network types. The test covers common computer hardware and networking troubleshooting and configuration tools.

Uploaded by

siena lacson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views3 pages

Grade 10 Chs Periodic Test

This document appears to be a test for a Grade 10 TLE Computer Hardware Servicing class at Paguiruan High School in the Philippines. It contains 38 multiple choice questions testing students' knowledge of topics like boot configuration utilities, networking cables, IP addressing, protocols, and network types. The test covers common computer hardware and networking troubleshooting and configuration tools.

Uploaded by

siena lacson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Republic of the Philippines

Department of Education
Region III – Central Luzon
SCHOOLS DIVISION OFFICE OF PAMPANGA
High School Blvd. Brgy. Lourdes, City of San Fernando
PAGUIRUAN HIGH SCHOOL
SECOND PERIODIC TEST IN TLE GRADE 10
COMPUTER HARDWARE SERVICING
School Year 2022 – 2023

NAME: __________________________________ SECTION: ___________________ SCORE: __________

DIRECTION: ON YOUR ANSWER SHEET, WRITE THE LETTER OF THE CORRECT ANSWER.

1. What boot configuration utility allows setting the programs that will run at startup?
A. Ipconfig C. msconfig
B. regedit D. dxdiag
2. What application allows you to edit the registry?
A. Ipconfig C. msconfig
B. regedit D. dxdiag
3. Which of the following enables you to test sound and graphics output?
A. Ipconfig C. msconfig
B. regedit D. dxdiag
4. Which of the following is an applet that controls the look of windows?
A. Appearance and Themes C. Performance and Maintenance
B. Network and Internet D. Sounds, Speech and Audio
5. Which of the following applets does not belong to performance and maintenance category?
A. Administrative tool C. Power Options
B. Automatic Updates D. System
6. Which of the following is a wizard used to configure MS Windows for vision, hearing and mobility needs?
A. Accessibility Option C. Sounds, speech and audio
B. Security Center D. User Accounts
7. Which of the following tab in direct X Diagnostic tool displays your current audio settings?
A. Input C. Sound
B. Music D. System
8. Which of the following networking cable category is the most used?
A. Cat3 C. Cat 5 and 5e
B. Cat 5 D. Cat 6
9. What copper-cored cable is surrounded by a heavy shielding?
A. coaxial cable C. optical fiber
B. fiber optics D. twisted pair
10.What Ethernet cable is used to connect two devices directly?
A. cross- over C. both A and B
B. straight-through D. none of the options
11.Which of the following is a number used to identify a device on a network?
A. Default gateway C. IP address
B. DNS Server D. Subnet mask
12.In which of the following IP address classes does 192.168.1.105 belong to?
A. Class A C. Class C e. Class E
B. Class B D. Class D
13.What command is used to test the ability of the source computer to reach a specified destination computer?
A. Ipconfig C. Ping
B. Msconfig D. Regedit
14.What do you call an approach to computer networking where all computers show equivalent responsibility
for processing data?
A. Client server C. Peer to client
B. Peer to peer D. None of the options
15.Which of the following is an example of a Class A subnet mask?
A. 255.0.0.0 C. 255.255.255.0
B. 255.255.0.0 D. 255.255.255.255
16. A tool used for crimping RJ45
A. LAN tester C. Crimping tool
B. patching tool D. wire stripper
17. If there is a fire, you should follow these safety procedures, EXCEPT:
A. Always have a planned fire escape route before beginning any work.
B. fight a fire that is out of control or not contained.
C. Get out of the building quickly in case of an out-of-control fire.
D. Contact emergency services immediately for help.
18. Fiber-optic cables are useful for communications, but they have certain hazards, EXCEPT:
A. Glass shards C. Dangerous chemical
B. Tools with sharp edges D. Tools with blunt edges
19. It is the most commonly used cabling in networks. UTP cables have a range of 328 feet (100 m).
A. UTP cable C. STP cable
B. twisted pair D. coaxial cable
20. A kind of cable where in each pair of wire is wrapped in metallic foil to better shield the wires from noise.
Four pairs of wires are then wrapped in an overall metallic braid or foil.
A. UTP cable C. STP cable
B. twisted pair D. Coaxial cable
21. It is a type of copper cabling that is used for telephone communications and most Ethernet networks.
A. UTP cable C. STP cable
B. twisted pair D. Coaxial cable
22. a coaxial cable used in networks operating at 10 Mbps, with a maximum length of 500 meters.
A. Thicknet (10BASE5) C. Thinnet (10BASE2)
B. RG-59 D. RG-6
23. It is the most used for cable television in the U.S.
A. Thicknet (10BASE5) C. Thinnet (10BASE2)
B. RG-59 D. RG-6
24. It is a glass or plastic conductor that transmits information using light.
A. twisted pair C. Coaxial cable
B. fiber optic cable D. Ethernet
25.It require messages to arrive within a certain amount of time so that computers do not wait indefinitely for
messages that may have been lost.
A. Ping C. Ipconfig
B. Protocol D. IP address
26. represents a set of public standards that specify how packets of information are exchanged between
computers over one or more networks.
A. TCP/IP C. IPX/SPX
B. NetBEUI D. AppleTalk
27. it is a protocol suite used to network Macintosh computers. It is composed of a comprehensive set of
protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model.
A. TCP/IP C. IPX/SPX
B. NetBEUI D. AppleTalk
28. It governs how files such as text, graphics, sound, and video are exchanged on the World Wide Web
(WWW).
A. FTP C. SSH
B. Telnet D. HTTP
29. It is an application used to connect to a remote computer that lacks security features.
A. FTP C. SSH
B. Telnet D. HTTP
30. It is a number that is used to identify a device on the network. Each device on a network must have a
unique __________to communicate with other network devices.
A. Ping C. Ipconfig
B. Protocol D. IP address
31. a command used to find out the IP address of a certain network you are connected to.
A. Ping C. Ipconfig
B. Protocol D. IP address
32. a software utility used to dynamically assign IP addresses to network devices.
A. DHCP C. Settings
B. cmd D. DNS
33. It is a Command Prompt command used to test the ability of the source computer to reach a specified
destination computer.
A. Ping C. Ipconfig
B. Protocol D. IP address
34. Using this option will ping the target until you force it to stop using Ctrl-C
A. -t C.-a-
B. -r count D. -s count
35. Use this option to report the time, in Internet Timestamp format, that each echo request is received, and
echo reply is sent.
A. -t C.-a-
B. -r count D. -s count
36. devices are connected directly to each other without any additional networking devices between them In
this type of network, each device has equivalent capabilities and responsibilities.
A. Client- server network C. peer-peer network
B. Personal Area Network D. Local Area Network
37. A type of network wherein it commonly perform some of the processing work for client machines, such as
sorting through a database before delivering only the records requested by the client.
A. Client- server network C. peer-peer network
B. Personal Area Network D. Local Area Network
38. It helps keep data and equipment safe by giving only the appropriate people access.
A. Privacy C. Client security
B. Internet security D. computer/network security
39. Events or attacks that steal, damage, or destroy such equipment as servers, switches, and wiring.
A. Physical C. Data
B. Internal D. External
40. Users outside an organization who do not have authorized access to the network or resources
A. Physical C. Data
B. Internal D. External
41. Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.\
A. Physical C. Data
B. Internal D. External
42. which use available resources, such as passwords or scripts, to gain access to and run programs designed
to vandalize.
A. Malicious threats C. Unstructured attacks
B. Accidental threats D. Structured attacks
43. Security attacks where an employee intends to cause damage.
A. Malicious threats C. Unstructured attacks
B. Accidental threats D. Structured attacks
44. It is attached to small pieces of computer code, software, or document. If it spreads to other computers,
those computers could continue to spread it.
A. worm C. trojan horse
C. bug D. virus
45. It is a self-replicating program that is harmful to networks, it uses the network to duplicate its code to the
hosts on a network, often without any user intervention.
A. worm C. trojan horse
C. bug D. virus
46.It is hidden in software that appears to do one thing, and yet behind the scenes it does another.
A. worm C. trojan horse
C. bug D. virus
47. A software designed to detect, disable, and remove viruses, worms, and Trojans before they infect a
computer.
A. Operating system C. Application software
B. Antivirus software D. Firmware
48. the following are all antivirus software, EXCEPT:
A. Shareware C. Norton
B. McAfee D. G Data
49. It is the way of protecting a computer from intrusion through the ports.
A. Data encryption C. Firewall
B. Antivirus D. password
50. A sharing of or offering access to digital information or resources, including documents, multimedia
(audio/video), graphics, computer programs, images and e-books. It is the private or public distribution of data
or resources in a network with different levels of sharing privileges.
A. file sharing C. Data sharing
B. food sharing D. Answer sharing

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy