You are on page 1of 3

Republic of the Philippines

DEPARTMENT OF EDUCATION
Region IV-A CALABARZON
DIVISION OF LAGUNA
BALIAN INTEGRATED NATIONAL HIGH SCHOOL
Balian, Pangil, Laguna
4th Monthly Test in TLE – ICT Grade 10
Name:_________________________________ Grade and Section:_______________________ Score:_______
I. Multiple Choice. Select the best answer.
1. Refers to the actions carried out to retain an item in or restore it to an acceptable condition
a. Maintenance b. Maintenance Program c. Maintenance Schedule d. Quality management
2. Taking out and disposing unnecessary items.
a. SEISO (Sweep) b. SEIKETSU (Sanitize) c. SEIRI (Sort) d. SEITON
(Systematize)
3. Design and revised business process components to improve results.
a. Plan b. Do c. Check d. Act
4. A method for ensuring that all the activities necessary to design, develop and implement a product or service
are effective with respect to the system and its performance.
a. Maintenance b. Maintenance Program c. Maintenance Schedule d. Quality management
5. Arrangement/organization of necessary items in good order for use.
a. SEISO (Sweep) b. SEIKETSU (Sanitize) c. SEIRI (Sort) d. SEITON
(Systematize)
6. Assess the measurements and report the results to decisions makers
a. Plan b. Do c. Check d. Act
7. Is a comprehensive list of maintenance and its incidents.
a. Maintenance b. Maintenance Program c. Maintenance Schedule d. Quality management
8. Implement the plan and measure its performance.
a. Plan b. Do c. Check d. Act
9. A list allocating specific maintenance of an area.
a. Maintenance b. Maintenance Program c. Maintenance Schedule d. Quality management
10. Turning on a cold system subjects it to the greatest possible temperature variations.
a. Power Line Noise b. Power Cycling (On and off) c. Heating and Cooling d. Static
Electricity
11. They are caused by improper groundings of the system power.
a. Power Line Noise b. Power Cycling (On and off) c. Heating and Cooling d. Static
Electricity
12. Temperature variation leads to serious problems. one indicating allowable temperatures during operation
and other indicating temperatures under non-operating conditions.
a. Power Line Noise b. Power Cycling (On and off) c. Heating and Cooling d. Static
Electricity
13. Sucking the dust, dirt, hair, cigarette particles, and other particles out of a computer can be one of the best
methods of cleaning a computer
a. Cloth b. Water or rubbing alcohol c. Portable Vacuum d. Cotton swabs
14. Moistened with rubbing alcohol or water are excellent tools for wiping hard to reach areas in your keyboard,
mouse, and other locations.
a. Cloth b. Water or rubbing alcohol c. Portable Vacuum d. Cotton swabs
15. The best tool used when rubbing down a component;
a. Cloth b. Water or rubbing alcohol c. Portable Vacuum d. Cotton swabs
16. Keeps the appearance of the computer looking new
a.Case Cleaning b.Hard drive cleaning c.Motherboard cleaning d.Scanner
cleaning
17. It cannot be cleaned physically, they can be cleaned with various utilities on the computer to help it run fast
and more efficiently.
a.Case Cleaning b.Hard drive cleaning c.Motherboard cleaning d.Scanner
cleaning
18. Dust and especially particles of cigarette smoke can build up and corrode circuitry causing various
problems such as computer lockups
a.Case Cleaning b.Hard drive cleaning c.Motherboard cleaning d.Scanner cleaning
19. Report on the hardware and software installed in the computer plus interrupts and addresses used by the
hardware, but do not attempt to test it.
a. Disk Data Diagnostics b. Whole machine diagnostics c. Systems Snoopers d. Regular maintenance
20. They provide full system configuration information (including the interrupt and memory address used by each place of
hardware.
a. Disk Data Diagnostics b. Whole machine diagnostics c. Systems Snoopers d. Regular maintenance
21. Concentrate on the disk drives and the data structures of the hard disk and/or floppy disk, patiently reading
each sector in search of corrupted data.
a. Disk Data Diagnostics b. Whole machine diagnostics c. Systems Snoopers d. Regular maintenance
22 is a term used for the process of scanning the file system and reducing the amount of fragmentation in file
systems. Doing this may greatly improve system performance.
a. Defragmentation b. ScanDisk c. Error-checking d. Disk Clean up
23.This tool helps you free up space on your hard disk to improve the performance of your computer
a. Defragmentation b. ScanDisk c. Error-checking d. Disk Clean up
24. A utility in Microsoft Windows which checks your drive to make sure there aren’t any problems with it.
a. Defragmentation b. ScanDisk c. Error-checking d. Disk Clean up

25. A destructive executable program that infects the other programs in the system and spreads by
replicating itself.
a. Malware b. Virus c. Worm d. Spyware
26. It spreads without user action and distributes complete copies (possibly modified) of itself across networks
a. Malware b. Virus c. Worm d. Spyware
27. Is a software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.
a. Malware b. Virus c. Worm d. Spyware
28 Is any technology that aids in gathering information about a person or organization without their knowledge.
It can overload your system and shutdown other services..
a. Malware b. Virus c. Worm d. Spyware
29. Is a new type of computer virus that infects the macros within a document or template.
a. Stealth viruses b. Program viruses c. Macro Viruses d. Boot viruses
30 Hybrid of Boot and Program viruses. They infect program files and when the infected program is executed,
these viruses infect the boot record.
a. Polymorphic viruses b. Multipartite viruses c. Program viruses d. Macro
Viruses
31 This is done when the virus cannot be easily identified removed from the file and the removal of virus means
the removal of the complete file.
a. Cache b. Removing viruses c. Quarantine d. Anti -Spyware
32. A computer program that appears to be useful software, but instead compromises your security and causes
a lot of damage.
a. Spyware b.Malware c.Trojan Horse d.Finder
33 Searches for the new uninfected files and the
a. Replicator b. Finder c. Antivirus Software d. Updating Windows
34 Microsoft regularly issues updates (patches) to fix bugs and plug security holes in Windows.
a. Windows update b signs that you have spyware c. To clear your cache d. To remove viruses
35. Virus that can encrypt its code in different ways so that it appears differently in each infection
a. Polymorphic viruses b. Multipartite viruses c. Program viruses d. Macro
Viruses
36. Actually targets these files and infects it by multiplying itself.
a. Replicator b. Finder c. Virus d. Worm
37. It corrupts files. It slows down the speed of the computer system. It deletes various files
a. Sources of Virus b. Virus Affects a System c. Types of viruses d. Removing viruses
38. These viruses infect floppy disk boot records or master boot records in hard disks
a. Stealth viruses b. Program viruses c. Macro Viruses d. Boot viruses
39. These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV
(driver) and .SYS (device driver).
a. Polymorphic viruses b. Multipartite viruses c. Program viruses d. Macro
Viruses
40 All those files stored in your cache take up space, so from time to time, you may want to clear out the files
stored in your cache to free up some space on your computer
a. Removing the virus b. Quarantine c.Clearing the cache d. Updating Windows
41. On the ___________ ___________tab, click either Automatic download the updates, and install them on the
schedule that I specify or Download updates for me, but let me choose when to install them.
a. Automatic Updates b. Express Install c. Windows update d. Scheduled update
42. You have a lot of popup windows when visiting the web or just logging on to your system and your
homepage has changed to a different site.
a. Protect Yourself from Spyware b. Updating Windows c. Typical signs that you have spyware
43. The Temporary Internet Files folder contains a kind of travel record of the items you have seen, heard, or
downloaded from the Web, including images, sounds, Web pages, even cookies.
a. Quarantine b. Virus c. Cache d. Removing Viruses
44. Click Start, point to Accessories, point to System Tools, and then click Backup. If the Backup option does not
appear on the System Tools menu, you can ________.
a. Install it b. Checked it c. Reinstall it d. Update it
45 On the Backup Type, Destination, and Name page, click Choose a place to save your backup, and select your
external hard disk drive. Then click _____.
a. Apply b. Next c. OK d. Advanced
46. Click Start, click ______________, and then double-click Add or Remove Programs.
a. Control Panel b. Computer c. Program Files d. Defaults Programs
47. Fixes some kinds of incorrect file information and provides early detection of potential hard drive crash.
a. Disk Cleanup b Run Scandisk (Standard Scan) c. Run Disk Defragmenter d. Upgrades
48. This frees up space on your hard drive by displaying and, if you desire, removing unnecessary or unused
progra
ms, temporary files and Internet cache files.
a. Disk Cleanup b Run Scandisk (Standard Scan) c. Run Disk Defragmenter d. Upgrades
49. To run a system or device for a period of time to ensure that all components are working properly.
a. Pinging b. Bathtub Curve c. Burn In d. Report
50.This command is the basic tool for testing TCP/IP connectivity. It sends a special packet (called ICMP Echo)
to a particular IP address and looks for a reply..
a. Pinging b. Bathtub Curve c. Burn In d. Report
God Bless!

You might also like