You are on page 1of 2

Department of Education

Region III
Division of Zambales
GOV. MANUEL D. BARRETTO NATIONAL HIGH SCHOOL
San Felipe, Zambales

Second Periodical Test


In CHS Grade-10

I. Modified true or false


Directions: Write SECURITY if the underlined word on the subsequent statement makes
it true and VIRUS if it is makes the statement a false one then write the correct term/word
to correct it. (2 points each). Write your answer in a separate sheet of paper.
_________1.Computer and network security help keep data and equipment safe.
_________2.A technician’s secondary responsibilities include data and network
security.
_________3.Threats to security can come from inside and outside the organization.
_________4.Computer viruses are created and sent by attackers who have malicious
intent.
_________5.A virus is transferred to another computer through e-mail, file transfer and
instant messaging.
__________6. A security plan policies should be constantly updated to reflect the latest
threats to a network.
__________7. A network has single layer of security, including physical, wireless and
data.

II. Matching Type


Directions: Match column A with column B in order to identify the term / word being
described.

A B
11. when an employee intends to cause a. Accidental threats
damage b. Antivirus software
12. when user damages data or equipment c. Data encryption
unintentionally d. Firewall
13. attached to small pieces of computer e. Malicious threats
code, software and documents f. Traffic
14. a self-replicating program that is g. Trojan horse
harmful to network h. Virus
15. it is technically a worm i. VPN
16. software designed to detect, disable j. WPA
and remove viruses k. WEP
17. it involves using codes and ciphers l. Worm
18. a way of protecting a computer from m. Physical
intrusion through the ports n. Data
19. an encryption system that protects data
20. data being transported on a network
21. Types of threat to computer security
which includes events or attacks that
steal, damaged or destroy such
equipment
22. events or attacks that remove, corrupt,
deny access to low, access to or steal
information
III.. Acrostic
Direction: Give the meaning of the acronyms given below:
1. HTTP- _________________________________________
2. FTP- ___________________________________________
3. NIC- ___________________________________________
4. POP3- _________________________________________
5. IMAP- __________________________________________
6. TCP-____________________________________________
7. SMTP-__________________________________________
8. NetBEUI-________________________________________
9. IETF-___________________________________________
10. IPX-___________________________________________
11. SPX___________________________________________

IV.Direction. Answer the following questions: (4 points each)

1. How to share files and folders using windows XP?

2. How to share printer?

3. How to configure Windows Firewall?

4. How to configure wireless router?

5. How to configure an Ethernet NIC to use DHCP to otain an IP address?

Prepared by:

Mylene D. Fernandez
Teacher

_______________
Parents Signature
Date

You might also like