You are on page 1of 3

Republic of the Philippines

Mindanao State University


Maigo School of Arts and Trades
Maigo, Lanao Del Norte

ICT-CHS
First Periodical Exam

NAME: ________________________________________ GRADE & SECTION: ______________ DATE: _______________

Test I. True or False 9. ____________ is the underlying protocol used by the


Directions: Write TRUE if the statement is correct and World Wide Web and this protocol defines how messages
FALSE if otherwise. are formatted and transmitted
_______1. A safe workplace is clean, organized and well- a. HTTP b. TCP/IP c. Net BEUI d. Apple Talk
lit. 10. ____________ is a networking protocol and software
_______2. One must unplug the power from the source program used to access remote computers and terminals
before opening a case and performing services. over the Internet or a TCP/IP computer network.
_______3. It is a best practice that a fire extinguisher and a. FTP c. TELNET
first aid kit be available in the workplace. b. IMAP d. Google
_______4. You are allowed to open the power supply or 11. a computer program designed to replicate and spread
a monitor. on its own, preferably without a user’s knowledge
_______5. You can bring food and drinks inside the a. Spyware c. Trojan horse
laboratory. b. Virus d. Adware
_______6.The key to a well-tuned computer system is the 12. In which of the following IP address classes does
proper configuration. 192.168.1.105 belong to?
_______7. Boot log stores all information from the boot a. Class A c. Class C e. Class E
process. b. Class B d. Class D
_______8. Registry is a collection of database of 13. the process of copying and backing up all end devices
configuration of database of configuration in Windows and network nodes in a computer network.
Operating System. a. Anti-virus c. Back uping
_______9. The shortcut of Microsoft Configuration is b. Msconfig d. Regedit
Ipconfig. 14. What do you call an approach to computer networking
_______10. An IP address serves two main functions: host where all computers show equivalent responsibility for
or network interface identification and location processing data?
a. Client server c. Peer to client
addressing. b. Peer to peer d. None of the options
Test II. Multiple Choice 15. Which of the following is an example of a Class A
Directions: Write the letter of the correct answer in a clean subnet mask?
sheet of paper. a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d.
1. ________ IP addresses never change. 255.255.255.255
a. dynamic c. extatic Test IV. Identify the following Network topologies
b. static d. diagnostic
2. ________ IP ADDRESSES are temporary and are 1. In the _____________topology, some
assigned each time a computer access the Internet. workstations are connected to all the others, and
a. dynamic b. extatic c. static d. diagnostic some are connected only to those other nodes
3. A global computer network providing a variety of with which they exchange the most data.
information and communication facilities, consisting of 2. The __________ topology uses two or more star
interconnected networks using standardized networks connected together.
communication protocols. 3. In ___________ topology the signal travels in
a. ICT c. internet only one direction.
b. Computer network d. Global network 4. In the ____________topology, the workstations
4. the global Internet consists of __________ of are connected in a closed loop configuration.
interconnected networks run by service providers, 5. In the __________ topology, every workstaton is
individual companies, universities, governments, and connected to a main cable.
others. 6. __________ is the capacity to be changed in size
a. tens of thousands c. hundreds or scale.
b. millions d. 10 thousands 7. ______________ is the arrangement of a
5. a set of rules governing the format of data sent over the network, including its nodes and connecting lines.
Internet or other network. 8. In _____________ there is a central computer or
a. software c. Internet protocol server to which all the workstations are directly
b. system update Updates d. Operating system connected.
6. the following are the types of protocol EXCEPT. 9. ______________ topology is well suited for
a. FTP b. TELNET c. IMAP d. Google temporary networks that must be set up in a hurry
7. Electronic mail was invented by _________ 10. ______________ topology has multiple links, so
a. Robert Khan c. Vint Cerf if one route is blocked then other routes can be
b. Ray Tomlinson d. Eliasar Malicovic used for data communication
8. ____________ is built on a client-server model Test IV. Enumeration
architecture using separate control and data connections 1-7 Different types of Network Topologoies
between the client and the server. 8-11 the ABCD of computer maintenance
a. FTP b. TELNET c. IMAP d. Google 12-15 what are the first three safety steps
when fire occurs
ANSWER KEY

I. True or false
1. True
2. True
3. True
4. False
5. False
6. True
7. True
8. True
9. False
10. True

II. Multiple Choices

1. C
2. B
3. D
4. A
5. C
6. A
7. C
8. B
9. D
10. C
11. C
12. C
13. C
14. B
15. A

III. Matching Type

1. L
2. J
3. I
4. E
5. A
6. H
7. G
8. K
9. D
10. C

7
2
8
11
12
9
13
10
1
3
4
5
6
IV. Acronyms

1. Unshielded Twisted Pair


2. Shielded Twisted Pair
3. Internet Protocol
4. Transmission Control Protocol / Internet Protocol
5. Hypertext Transfer Protocol
6. File Transfer Protocol
7. Secure Shell
8. Internet Message Access Protocol
9. Simple Mail Transfer Protocol
10. Dynamic Host Control
11. Domain Name System
12. Time to Live
13. Local Area Networking
14 . Virtual Private Network
15. Network Interface Card

You might also like