You are on page 1of 2

Department of Education

NORTHERN BUGASONG NATIONAL HIGH SCHOOL


COMPUTER SYSTEMS SERVICING NCII
Grade II
Prepared by: Mrs. Hope M. Valdepeñas

Name: ______________________________ Grade& Section: ____________ Score: __________


Parent’s Printed Name and Signature: ____________________

Test I . Direction: Identify the Precautions and Procedures write TRUE if the statement is correct and FALSE if the
statement is wrong.
________1) An operating system is a set of programs that manage computer hardware resources and provide common
services for application software.
________2) Operating system is not a vital component of the system software in a computer system. Application programs
require an operating system which are usually separate programs, but can be combined in simple systems.
________3) Time-sharing operating systems schedule time for efficient use of the system and may also include accounting
for cost allocation of processor time, mass storage, printing, and other resources.
________4) For software functions such as input and output and memory allocation, the operating system acts as an
intermediary between application programs and the computer hardware.
________5) Operating systems are found on almost any device that contains a computer—from cellular phones and video
game consoles to supercomputers and web servers

Test II. Direction: Select your answer on the choices below that will correspond on the statement. Write the
letter of your answer on the space provided.

A. Violation of Privacy B. Impact on the Environment


C. Public Safety D. Health Risk E. Impact on Labor Force
______ 1. Computer manufacturing processes and computer waste are depleting natural resources and polluting the
environment.
______ 2. Although computers have improved productivity in many ways and created an entire industry with hundreds of
thousands of new jobs,
______ 3. The skills of millions of workers and managers have been replaced by computers.
______ 4. It is crucial that personal and confidential records be protected properly.
______ 5. Adults, teen, and children around the world are using computers to share publicly their photos, videos,
journals, music, and other personal information.
______ 6. Computer users should protect themselves from these health risks through proper workplace design, good
posture while at the computer, and appropriately spaced work breaks.
______ 7. When computers are discarded in landfills, they release toxic materials and potentially dangerous levels of
lead, mercury, and flame retardants.
______ 8. Prolonged or improper computer use can lead to injuries or disorder of the hands, wrists, elbows, eyes, necks,
and back
______ 9. Do not share information that would allow others to identify or locate you.
______ 10. Some records were not properly protected, individuals have found their privacy violated and identities
stolen.

Test III. Enumeration: Give what is asked.

Examples of INPUT DEVICES


1.
2.
3.
4.
5.
Examples of OUTPUT DEVICES
6.
7.
8.
9.
10.
Examples of COMPUTER HARDWARE
11.
12.
13.
14.
15.

Test III. Identify the parts of MS Excel

1. 6. 11.

2. 7. 12.

3. 8. 13.

4. 9. 14.

5. 10. 15.

You might also like