Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

Regional Diagnostic Test ICT-CSS-10.pptx

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Prochain SlideShare
Abc and w7.
Abc and w7.
Chargement dans…3
×

Consultez-les par la suite

1 sur 15 Publicité

Plus De Contenu Connexe

Similaire à Regional Diagnostic Test ICT-CSS-10.pptx (20)

Plus récents (20)

Publicité

Regional Diagnostic Test ICT-CSS-10.pptx

  1. 1. Regional Diagnostic Test in ICT-CSS-10 (To be given to recent Grade 11 students)
  2. 2. MULTIPLE CHOICE: Directions: Read each statement and or questions; and choose the letter of the correct answer. _______1. It is the introduction of new ideas to make the product and services more attractive and saleable to the target customers. A. new idea B. product development C. creativity D. innovation _______2. It is a managerial tool used to assess the environment and to gather important information that can be used for strategic planning. A. scanning B. WOTS Analysis C. SWOT Analysis D. survey analysis _______3. It is creating names, symbol, or designs that identifies and differentiates a product from the other products. A. product naming B. branding C. unique selling proposition D. tagline _______4. It is a meaningful and unforgettable statement that captures the essence of the brand. A. product naming B. branding C. unique selling proposition D. tagline _______5. These are things that people cannot live without. A. wants B. requirements C. desires D. needs
  3. 3. _______ 6. The Physical component/s of computer system including any equipment such as printer and mouse device. A. desktop B. software C. monitor D. hardware _______ 7. Computer programs and games are called? A. software B. operating system C. hardware D. applications _______ 8. Alfred bought the newest version of MS Office 2017, after installing it to his PC he gave a copy to his friend, Arnel. Then Arnel gave also the copy to his other friends. Both Alfred and Arnel are breaking the law for___________? A. copyright laws B. distributors law C. no laws at all D. publishing rights law _______ 9. Which of the following would not harm your computer system or its components? A. Hand towel B. dust and sand C. cellphone D. water _______ 10. Which of the following is not an output device? A. scanner B. printer C. flat screen monitor D. touch screen monitor
  4. 4. _______ 11. Which of the following devices have a limitation that we can only store information to it but cannot erase or modify it? A. Hard Disk B. Solid State Drive C. CDROM D. Flash drive/Floppy Drive _______ 12. Which technology is used in Compact Disks? A. Electromagnetic B. Electrical C. Magneto Optic Disk D. Compact Disk _______ 13. In order to play or hear sound on a computer, one needs: A. Video Card B. Memory C. Processor D. Sound Card/Speaker _______ 14. The instruction that tells the computer, what to do it and how to do it, is called ___________. A. Programs B. Software C. Applications D. Operating System _______ 15. When you save a file, it is permanent save to ___________. A. Memory B. CPU C. Processor D. Hard Disk
  5. 5. _______ 16. Select three input devices your computer uses: ________________. A. Mouse, Keyboard, Printer B. Keyboard, Mouse, Scanner C. Mouse, Printer, CPU D. Keyboard, Scanner, Headset _______ 17. The uniform resource locator or the address of a website is known as its: A. Hyperlink protocol B. IP address C. Source code D. URL _______ 18. What general term describes the physical equipment of a computer system, such as its screen, keyboard and storage: A. Output devices B. Hardware C. Input devices D. Software _______ 19. On a standard mouse, which is the most frequently used button in any usual operations of the computer. A. Scroll B. Left C. Right D. Mouse Ball _______ 20. What is the most widely-used operating system today? A. Microsoft's Windows B. IOS C. Android D. Linux/Open Source
  6. 6. _______ 21. A monitor is an example of input device. A. True B. False C. None of the Above D. Both A and B _______ 22. It is okay to use the computer during storm or power outage. A. True B. False C. None of the Above D. Both A and B _______ 23. Spilling liquids in your computer won't harm your system at all. A. True B. False C. None of the Above D. Both A and B _______ 24. A keyboard is a type of an output device. A. True B. False C. None of the Above D. Both A and B _______ 25. Tower, desktop and CPU are all the same components of a computer. A. True B. False C. None of the Above D. Both A and B
  7. 7. _______ 26. Also known as the processed data. A. Data B. Character C. Information D. Memory _______ 27. The people who use and operate computer is called _____________. A. User B. Open-ended C. End-user D. Computer Technician _______ 28. He is the father of the modern computer. A. Charles Babbage B. John Watt C. John Vincent Atanasoff D. ENIAC _______ 29. First generation computer invented by Howard Aiken and built by IBM in 1944. A. ECC B. UNIVAC C. Analytical Device D. Mark I _______ 30. This Following Programs can create word processor, except...? A. Microsoft Word 2007 B. Microsoft Word 2003 C. Microsoft Teams D. Microsoft One Note
  8. 8. _______ 31. What type of fault remains in the system for some period and then it will disappear. A. Permanent B. Transient C. Intermittent D. All of the mentioned _______ 32. Which of the following approaches are used to achieve reliable systems? A. Fault prevention B. Fault removal C. Fault tolerance D. All of the mentioned _______ 33. A system maintaining its integrity while accepting a temporary halt in its operation is said to be in a state of ___________. A. Full Fault Tolerance B. Graceful Degradation C. Fail Soft D. Fail Safe _______ 34. Which of the following Error Detection checks is not a part of Application detection? A. Hardware checks B. Timing checks C. Reversal checks D. Coding checks _______ 35. Exception handling is a type of ________________. A. forward error recovery mechanism B. backward error recovery mechanism C. All of the mentioned D. None of the mentioned
  9. 9. _______ 36. What form of software can also be called firmware? A. Embedded Software B. System BIOS C. Installation drivers D. Operation log _______ 37. After you install a new floppy drive and restart the system, the floppy drive light stays on constantly and you get an "FDD Controller Failure" POST error. What is the problem? A. Floppy cable not connected B. Floppy cable on forwards C. Floppy cable on backwards D. Floppy cable break _______ 38. Should you wear a grounding strap when servicing a CRT monitor? A. Yes B. No C. Maybe D. Not at All _______ 39. What are the 4 types of DC voltage usually produced by a power supply? A. -5V,+13V,-4V,+5V B. +12V, +4V,-5V,-13V C. +5V -5V +12V -12V +5V, -5V ,-12V ,+12V D. =2+1-3a _______ 40. Which is the largest computer in terms of physical size? A. The mainframe computer B. The microcomputer C. The tower computer D. The supercomputer
  10. 10. _______ 41. What does the acronym SSL represent? A. System Service Layer B. Secure Sockets Layer C. System Synchronize Link D. Secure System Link _______ 42. Which protocol is most similar to SSL? A. NTP B. FTP C. POP3 D. TLS _______ 43. Which protocol is commonly used to retrieve email from a mail server? A. FTP B. IMAP C. HTML D. TELNET _______ 44. Which is a common routing protocol used for local and wide area networks? A. RIP B. ARP C. UDP D. TCP _______ 45. Which is a link layer protocol? A. ARP B. TCP C. UDP D. HTTP
  11. 11. _______ 46. Which is crucial documentation to have before beginning of work? A. Deodorant B. Proper equipment C. Passwords for accounts D. Signed documentation of work agreement _______ 47. Which should be done when illegal materials are found? A. Ignore B. Remove material C. Report to supervisor D. Document and continue working _______ 48. Which items may be connected through USB? Choose all that apply. A. Mouse B. Web cam C. Keyboard D. All mentioned _______ 49. Which is a common safety hazard for IT technicians? A. Fire B. Falling CPU C. Hostile client D. Electrostatic discharge _______ 50. Antistatic equipment should always be used when working with which type of devices? A. CPU B. RAM C. Plug in System Unit D. Keyboard
  12. 12. _______ 51. Mrs. Alfonso follows the advice of a friend to be flexible especially if she intends to open a retail business. What Personal Entrepreneurial Competency (PECs) has been demonstrated by Mrs. Alfonso? A. Open to feedback B. Persistent C. Reliability D. Self-confidence _______ 52. Peter plans to put a “Digi-Print” shop in their locality. Which of the following will help him determine his plan for the successful setting up of his business? A. Check for a similar business to avoid competition B. Conduct a SWOT analysis C. Get feedback on the quality-of-service D. Survey of consumer associations. _______ 53. Which of the following should be considered first by a prospective entrepreneur in choosing the right location for his/her store? A. Access to the target customers B. Attractiveness of the store layout C. Type of merchandise D. Prevailing prices of goods _______ 54. What kind of hazard is caused by the organisms such as viruses, bacteria, fungi, and parasites? A. Biological hazard B. ergonomics hazard C. chemical hazard D. physical hazards _______ 55. Which of the following is a term used to describe something that has the potential to cause harm such as electricity, chemicals, working up a ladder, noise, a keyboard, a bully at work, stress, etc.? A. Exposure B. hazard C. risk D. threat
  13. 13. 56. Which of the following attacks requires a carrier file to self-replicate? A. Trojan B. Virus C. Worm D. Spam 57. Which of the following offers the strongest wireless signal encryption? A. WEP B. WAP C. WIPS D. WPA 58. Which of the following is a DoS attack? A. Listening in on network traffic to identify the MAC address of a computer B. Continually bombarding a targeted network with fake requests C. Injecting bogus networking re-configuration commands D. Forcing computers to drop their connections and reconnect with the attacker’s access point 59. What information do you need to set up a wireless access point? A. SSID B. MAC address C. IP address D. ARP 60. Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this? A. Insider threat B. Social engineering C. Phishing D. Whaling
  14. 14. Answer Key: 1. C 11. B 21. B 31. C 41. B 51. A 2. C 12. A 22. B 32. D 42. D 52. B 3. B 13. D 23. B 33. D 43. B 53. A 4. D 14. D 24. B 34. A 44. A 54. A 5. D 15. A 25. A 35. C 45. A 55. B 6. D 16. B 26. C 36. A 46. D 56. B 7. A 17. D 27. A 37. A 47. C 57. D 8. A 18. B 28. A 38. A 48. D 58. D 9. A 19. C 29. D 39. C 49. D 59. A 10. A 20. C 30. C 40. A 50. C 60. B

×