You are on page 1of 5

Item Answer

Used to carry out a large number of tasks through the sharing of information. a
a. computer network b. internet protocol
c. both a and b d. none of these
Refers to any computing devices such as computers that send and receive c
network packets across the network.
a. ISP b. Router c. Node d. Card
A language which computer device use to communicate. a
a. Network Protocols b. Service Preference
c. Internet Language d. Command Prompt
Which statement support the function of a router? a
a. They determine which node the information came from and where to send
it to.
b. They determine which address the information came from and where to
send it to.
c. They determine the language a computer is using.
d. All of the choices.
What can you say about NIC? d
a. NIC allows both wired and wireless communications.
b. NIC allows communications between computers connected via local area
network (LAN) as well as communications over large-scale network
through Internet Protocol (IP).
c. NIC is both a physical layer and a data link layer device.
d. All of the choices.
What can you say about network packets? b
a. It refer to any computing device such as computers that send and receive
network packets across the network.
b. It is the data that is sent to and from the nodes in a network.
c. They determine which node the information came from and where to send
it to.
d. All of the choices
What fact would you select to justify that the network uses ring topology? a
a. It uses a single cable with the end nodes connected to each other so the
signal can circle through the network to find its recipient.
b. Each computer in the network has an independent connection to the
center of the network.
c. The information for the last node on the network has to run through each
connected computer.
d. None of the choices.
What fact would you select to justify that the network uses star topology? b
a. It uses a single cable with the end nodes connected to each other so the
signal can circle through the network to find its recipient.
b. Each computer in the network has an independent connection to the
center of the network.
c. The information for the last node on the network has to run through each
connected computer.
d. None of the choices.
What conclusions can you draw with the ff. statement: “Each computer in the b
network has an independent connection to the center of the network”?
a. The network is using ring topology.
b. The network is using star topology.
c. The network is using bus topology.
d. The network is using a third party firewall.
What conclusions can you draw with the ff. statement: “It uses a single cable with a
the end nodes connected to each other so the signal can circle through the
network to find its recipient”?
a. The network is using ring topology.
b. The network is using star topology.
c. The network is using bus topology.
d. The network is using a third party firewall.
What choice would you have made if your teacher wanted you to install an c
operating system in a generic PC?
a. Choose android operating system because they are always upgraded.
b. Choose MAC OS because it is stable and branded.
c. Choose Microsoft windows or Linux because they are compatible with
generic PCs.
d. I may choose any because they can all work with a generic PC.
What would you recommend if your friend asks you about an OS for his/her Cell c
phone?
a. Apple tvOS for Apple TV
b. Solaris, HP-UX, DG-UX, and other variants of Unix
c. Apple iOS and Google Android
d. DEC VMS (virtual memory system)
What could be done best in a laboratory o minimize the use of cables in a
networking?
a. I am going to use wireless network cards and router to achieve wireless
networking
b. I am going to use star topology to minimize cables in a laboratory
c. I am going to use ring topology to minimize cables in a laboratory
d. I am going to use bus topology to minimize cables in a laboratory
What would happen if the computer’s NIC suddenly malfunctioned? a
a. If the computer’s NIC suddenly malfunctioned then it will be impossible for
the computer to connect to the network.
b. If the computer’s NIC suddenly malfunctioned then it will still be possible for
the computer to connect to the network.
c. If the computer’s NIC suddenly malfunctioned then network will be very
fast
d. None of he choices will happen.
This is the device that will broadcast the Wi-Fi signal from your Internet modem c
throughout your house.
a. NIC b. SSID c. Wireless Router d. Advanced Firewall
It gives us access to all kinds of information at a moment's notice. b
a. WiFi b. Internet c. both a and b d. none of these
Allows you to connect laptops, smartphones, and other mobile devices to your a
home Internet service without an Ethernet cable.
a. Wireless Network b. Internet c. both a and b d. none of these
Which statement support Threat-focused NGFW? a
a. These firewalls include all the capabilities of a traditional NGFW and also
provide advanced threat detection and remediation.
b. These are typically deployed as a virtual appliance in a private cloud.
c. These typically combines, in a loosely coupled way, the functions of a
stateful inspection firewall with intrusion prevention and antivirus. It may
also include additional services and often cloud management.
d. These allows or blocks traffic based on state, port, and protocol.
Which statement support UTM Firewall? c
a. These firewalls include all the capabilities of a traditional NGFW and also
provide advanced threat detection and remediation.
b. These are typically deployed as a virtual appliance in a private cloud.
c. These typically combines, in a loosely coupled way, the functions of a
stateful inspection firewall with intrusion prevention and antivirus. It may
also include additional services and often cloud management.
d. These allows or blocks traffic based on state, port, and protocol.
Which statement support Stateful inspection firewall? d
a. These firewalls include all the capabilities of a traditional NGFW and also
provide advanced threat detection and remediation.
b. These are typically deployed as a virtual appliance in a private cloud.
c. These typically combines, in a loosely coupled way, the functions of a
stateful inspection firewall with intrusion prevention and antivirus. It may
also include additional services and often cloud management.
d. These allows or blocks traffic based on state, port, and protocol.
What examples of common IP addresses would you use to access your router’s a
setting?
a. I should try to use IP Address which include 192.168.0.1, 192.168.1.1, and
192.168.2.1.
b. I should try to use IP Address which include 127.0.0.1, 127.0.1.1, and
127.0.2.1.
c. All should work if I’ll try them
d. None will work
What would result if you disabled the access point’s periodic broadcast of the b
SSID?
a. a wireless client can scan the network’s SSID in order to join the network.
b. a wireless client must already know the network’s SSID in order to join the
network.
c. A wireless client can connect to the network as soon as he or she opens
his/her wifi receiver
d. None will happen.
What would result if you typed 192.168.1.1 into browser of a pc which is connected c
to a PLDT modem?
a. A warning will show up that you need to pay your last bill to continue
availing of the internet.
b. You will be redirected into a website which will allow you to shop online
c. You will be directed to the router’s configuration screen.
d. Nothing will happen.
What is the function of a wifi repeater? a
a. It amplifies the signal into further location.
b. It doubles the speed of the network.
c. It protects the network from attackers.
d. All of the choices
What evidence can you find that a laboratory is using wireless network? b
a. LAN cables connect computers to the network
b. NIC uses Antenna as receiver of radio waves from a router
c. No NIC is found in all computers
d. None of the choices
Why is WIFI better than LAN? a
a. Wifi is wireless which makes it cheaper as well as faster
b. LAN is cheaper than WIFI
c. LAN uses wires which are easier to install
d. All of the choices
How would you prove that you disabled “Allow broadcast SSID to associate?” b
successfully?
a. When you search for SSID, it will appear on available wireless networks.
b. When you search for SSID, it will never appear on available wireless
networks.
c. When you search for SSID, you will automatically be connected to the
wireless network
d. None of the choices
What would you recommend if a laboratory is not receiving high signal from a wifi b
in another laboratory?
a. Create a LAN cable to connect to the router from another laboratory
b. Install a repeater to amplify the signal from another laboratory
c. Purchase another wifi subscription from a TELCO
d. None of the choices
A planned system of working to prevent illness and injury where you work by a
recognizing and identifying hazards and risks.
a. OHS b. SHO c. both a and b d. none of these
An investigation conducted to provide stakeholders with information about the a
quality of the product or service under test.
a. Network Testing b. OHS c. both a and b d. none of these
Any document that records the procedure adopted and results obtained from a c
scientific or technical activity or investigation.
a. Incident Report b. Accident Report c. Technical report d. none of these
Which statement supports Technical report? a
a. any document that records the procedure adopted and results obtained
from a scientific or technical activity or investigation.
b. any document that records the procedure adopted and results obtained
from incident or investigation.
c. any document that records the procedure adopted and results obtained
from an accident or investigation.
d. None of the choices
Which statement supports Occupational Health and Safety Standards? c
a. Each student has a responsibility to their colleagues and their organization
to report and act upon any potential workplace hazard.
b. Students need to be aware of the type of hazards that are possibly present
in their work environment.
c. a and b
d. none of the choices
Which statement supports Occupational Health and Safety (OHS) Policy? c
a. An Information and Communication technology (ICT) student should know
how to behave when working in the computer laboratory, and to
accomplish task safely.
b. Safety practices should be learned early and always adheres in working
with any electrical and electronic device, including personal computers
and its peripherals.
c. a and b
d. none of the choices
What would result if you applied Occupational Health and Safety (OHS) Policy? a
a. You will know how to behave when working in the computer laboratory,
and to accomplish task safely.
b. You can identify the hazards where you are working and decide how
dangerous they are.
c. a and b
d. none of the choices
How would you organize the following to show the correct procedure in d
Occupational Health and Safety Standards?
1. Identify the hazard.
2. Clear the area close to the hazard.
3. Partition the hazard off or clearly identify the area to protect other people from
harm.
4. If the hazard can be easily and safely cleared, then do so

a. 4,3,2,1 b. 1,2,4,3 c. 2,1,3,4 d. 1,2,3,4


How would you organize the following to show the correct procedure in Testing the d
Wireless NIC?
1. Disconnect the Ethernet patch cable from your computer.
2. A red “X” appears over the “Local Area Connection” icon.
3. Hover over the “Wireless Network Connection” icon in the tray.
4. Open a command window.
5. Ping 127.0.0.1.
6. Use the ipconfig command.
7. Get IP address of the default gateway.
8. Ping the default gateway.
9. A successful ping indicates that there is a connection between the computer
and the default gateway.
a. 9,8,7,6,5,4,3,2,1 b. 1,2,3,4,9,8,7,6,5 c. 4,3,2,1,5,6,7,8,9 d. 1,2,3,4,5,6,7,8,9
What evidence can you find that indicates a successful ping in testing wireless NIC? a
a. A successful ping indicates that there is a connection between the
computer and the default gateway.
b. A successful ping indicates that there is no connection between the
computer and the default gateway.
c. A successful ping indicates that there is a connection between the
computer and another computer from a network.
d. A successful ping indicates that there is no connection between the
computer and another computer from a network.
What is the function of network testing? d
a. It is an investigation conducted to provide stakeholders with information
about the quality of the product or service under test.
b. It can provide an objective, independent view of the network to allow the
business to appreciate and understand the risks of network
implementation.
c. It is, in the end, making sure that your network configuration works as
designed.
d. All of the choices
What choice would you have made to prove Computer Network Testing is done? a
a. Testing is used at key checkpoints in the overall process to determine
whether objectives are being met.
b. Testing is used at key checkpoints in specific process to determine whether
objectives are being met.
c. a and b
d. none of the choices
How would you prove that the Accident Reports Form contain all the needed b
information?
a. When the following details are present: Name of the person injured, Date
and time of the accident, Type of injury, Action taken to prevent further
accidents
b. When the following details are present: Name of the person injured, Date
and time of the accident, Type of injury, First aid given, Action taken to
prevent further accidents
c. When the following details are present: Name of the person injured, Date
and time of the accident, First aid given, Action taken to prevent further
accidents
d. When the following details are present: Name of the person injured, Type
of injury, First aid given, Action taken to prevent further accidents
What will happen if you will not follow the Personal Safety While Working with PCs? c
a. You will be awarded for being the fastest student because you only focus
on what you are doing without considering your environment
b. You will always be safe because your classmates will look after you.
c. You or others can be injured or even killed if you don’t follow proper safety
guidelines when working along with PCs.
d. None of the choices
The main working memory in a computer is called ___________. c
a. memory b. processor c. RAM d. ROM
A glue that holds your home network together. d
a. DSL b. Ethernet c. hub d. router
What would happen if RAM issues, Malware issues, and Hardware issues appear on b
a computer?
a. The computer can be used longer is because of some basic habits that will
prevent serious problems or might cause damages if not be avoided.
b. The computer can no longer be used longer because of serious problems
or might cause damages.
c. a and b
d. none of the choices

How would you solve simple network problem using what you have learned in ICT? a
a. Unplug and plug the network cable
b. Clean the PC’s RAM
c. Check the power supply
d. Restart the printer
How would you classify the following equipment/facilities? Motherboard, Power b
supply, NIC, Protective eye wear, Wire stripper w/ cutter, Pliers
a. Motherboard, Power supply, NIC, Protective eye wear, Wire stripper w/
cutter, Pliers are all tools in CSS
b. Motherboard, Power supply, NIC, are system unit components while
Protective eye wear, Wire stripper w/ cutter, Pliers are tool in CSS
c. Motherboard, Power supply, NIC, are tools while Protective eye wear, Wire
stripper w/ cutter, Pliers are components of a system unit
d. Motherboard, Power supply, NIC, Protective eye wear, Wire stripper w/
cutter, Pliers are all components of a system unit
What is the main feature of a RAM? a
a. RAM is the main working memory which is used to run programs.
b. RAM is the computer’s primary storage area
c. RAM is Responsible for determining the quality of the audio and visuals
output by the computer.
d. All of the choices
In wireless security, what component specification would you best recommend in b
terms on power?
a. A power supply with surge protector
b. A power supply with UPS function and surge protector
c. A power supply with UPS function
d. None of these
How would you investigate the availability of wireless networks, and test a
connectivity?
a. Open a command window>> Ping 127.0.0.1>> Use the ipconfig
command>> Get IP address of the default gateway>> Ping the default
gateway.
b. Open a command window>> Ping the default gateway>>Ping 127.0.0.1>>
Use the ipconfig command>> Get IP address of the default gateway
c. Any would work
d. None may work

A
p
p
r
o
v
e
d
:

M
A
R
I
F
E
B
.
D
E
G
U
Z
M
A
N
E
d
D

P
r
i
n
c
i
p
a
l
I
I

You might also like