SlideShare une entreprise Scribd logo
1  sur  5
ICT
 SUMMATIVE TEST 2ND QUARTER
Choose and shade the letter of the correct answer
1) It refers to a list of the key components that make up the computer.
a. Specs b. Manufactures c. Brand d. Checklist
2) The main working memory in a computer is called ___________.
a. ROM b. RAM c. Processor d. memory chips
3) It stores the applications and programs that run on the PC, as well as any
work created by users.
a. CD/DVD b. RAM c. Hard drive d. Zip drive
4) These cards are installed inside a PC and are responsible for determining
the quality of the visuals output by the computer.
a. Audio Card b. Graphics Card c. LAN Card d. Adapter card
5) These are the two leading companies when it comes to manufacturing
processors.
a. HP and Dell b. Epson and Canon c. AMD and Intel d. Acer and Asus
6) This card allows a computer to be connected to a network. A 10/100/1000
Mbps (Megabits per second) card is the standard card specifications today
a. Audio Card b. Graphics Card c. Network Card d. Adapter card
7) It is a free open source operating system.
a. Microsoft Windows b. Linux c. Mac OS d. Chrome OS
8) A cabling is used to connect your wired network adapters to a router or
network switch.
a. Internet b. Ethernet c. coaxial d. fiber optic
9) A glue that holds your home network together
a. router b. DSL c. Hub d. Ethernet cable
10)The standard transfer speed of your wireless connection is __________.
a. 802.11g b. 801.11g c. 802.11m d. 802.11j
11) The wired half of your router has a speed of _____________.
a. 10/100 Mbps b. 10/10/100 Mbps c. 100/1000 Mbps d. 10/10/1000 Mbps
12)Routers have two types of ports available at the back. Which is not part of it?
a. LAN b. WAN c. MAN d. WLAN
13)It basically means to create a redundant copy of a data.
a. Data Backup b. Image copy c. System restore d. hardcopy
14)It refers to any kind of malicious codes, objects or content that infiltrates your
computer, resulting in damage and causing your system to act in an undesirable
manner.
a. Software b. Spyware c. Malware d. Firmware
15)Software is used to identify problems on a computer or piece of equipment.
a. Network software tool b. Hardware Software tool
c. Diagnostic Software tool d. Firmware software tool
16) Disk ________ rearranges fragmented data so your disks and drives can work more
efficiently.
a. Defragmenter b. Fragmenter c. software d. defrag
17) It is a system-defined database which is used by an Operating System to store all
the information needed to configure the Windows settings.
a. Registry b. Register c. Registration d. Registering
18) This is an application that checks the computer’s hard drive for errors and bad
sectors.
a. Scan b. System Restore c. Scan Disk d. Data backup
19) It is a computer maintenance utility that is included in the Microsoft Windows
operating system and it is designed to free up space on the hard drive.
a. Network software tool b. Data Backup
c. Scan Disk d. Disk Cleanup
20) Network Diagnostic Tool is an efficient and reliable tool to help you determine and
identify the possible network issues that prevent you from using your computer to
the fullest.
a. Burn-in b. Hardware Software tool
c. Diagnostic Software tool d. Network Diagnostic tool

Contenu connexe

Tendances

PC Assembly and Disassembly.pptx
PC Assembly and Disassembly.pptxPC Assembly and Disassembly.pptx
PC Assembly and Disassembly.pptx
ErwinIruma
 

Tendances (20)

TLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lessonTLE ICT CSS 10 Weekly budget of lesson
TLE ICT CSS 10 Weekly budget of lesson
 
Css grade 11 week 4
Css grade 11 week 4Css grade 11 week 4
Css grade 11 week 4
 
Maintain Computer Systems and Network.ppt
Maintain Computer Systems and Network.pptMaintain Computer Systems and Network.ppt
Maintain Computer Systems and Network.ppt
 
CSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer NetworksCSS NC II Module : Set-up Computer Networks
CSS NC II Module : Set-up Computer Networks
 
Installing and configuring computer System
Installing and configuring computer SystemInstalling and configuring computer System
Installing and configuring computer System
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
STRATEGIC INTERVENTION MATERIAL
STRATEGIC INTERVENTION MATERIALSTRATEGIC INTERVENTION MATERIAL
STRATEGIC INTERVENTION MATERIAL
 
TLE K to12 ICT - CHS learning module
 TLE K to12 ICT - CHS learning module TLE K to12 ICT - CHS learning module
TLE K to12 ICT - CHS learning module
 
Ict 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systemsIct 9 module 4, lesson 1.3 diagnosing computer systems
Ict 9 module 4, lesson 1.3 diagnosing computer systems
 
Computer System Servicing Prelim Examination 2018
Computer System Servicing Prelim Examination 2018Computer System Servicing Prelim Examination 2018
Computer System Servicing Prelim Examination 2018
 
Install computer system,devices and peripherals
Install computer system,devices and peripheralsInstall computer system,devices and peripherals
Install computer system,devices and peripherals
 
PC Assembly and Disassembly.pptx
PC Assembly and Disassembly.pptxPC Assembly and Disassembly.pptx
PC Assembly and Disassembly.pptx
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)
 
Quarter ii css 9
Quarter ii css 9Quarter ii css 9
Quarter ii css 9
 
TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)TLE ICT 10 CSS MELC (UNOFFICIAL)
TLE ICT 10 CSS MELC (UNOFFICIAL)
 
Use of tools in pc hardware servicing
Use of tools in pc hardware servicingUse of tools in pc hardware servicing
Use of tools in pc hardware servicing
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
 
Ict 9 module 3, lesson 1.5 materials, tools, equipment and testing devices
Ict 9 module 3, lesson 1.5 materials, tools, equipment and testing devicesIct 9 module 3, lesson 1.5 materials, tools, equipment and testing devices
Ict 9 module 3, lesson 1.5 materials, tools, equipment and testing devices
 
LAN Cabling
LAN CablingLAN Cabling
LAN Cabling
 
Ict 9 module 3, lesson 2.1 safety precautions
Ict 9 module 3, lesson 2.1 safety precautionsIct 9 module 3, lesson 2.1 safety precautions
Ict 9 module 3, lesson 2.1 safety precautions
 

Similaire à ICT 2nd QUARTER summative.pptx

Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Yazeed Khalid
 
1. With a USB keyboard, youll be able to enter commands as soon as.docx
1. With a USB keyboard, youll be able to enter commands as soon as.docx1. With a USB keyboard, youll be able to enter commands as soon as.docx
1. With a USB keyboard, youll be able to enter commands as soon as.docx
elliotkimberlee
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx
corbing9ttj
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
JeanmarieColbert3
 
Shelly sheehanmultiple choice.reading1
Shelly sheehanmultiple choice.reading1Shelly sheehanmultiple choice.reading1
Shelly sheehanmultiple choice.reading1
sas6802
 
Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docx
sleeperharwell
 

Similaire à ICT 2nd QUARTER summative.pptx (20)

Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
Comptia220 701aessentials100-questionpracticeexam-130612192456-phpapp02
 
1. With a USB keyboard, youll be able to enter commands as soon as.docx
1. With a USB keyboard, youll be able to enter commands as soon as.docx1. With a USB keyboard, youll be able to enter commands as soon as.docx
1. With a USB keyboard, youll be able to enter commands as soon as.docx
 
1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx1)   In which era were only the U.S. government, colleges, and unive.docx
1)   In which era were only the U.S. government, colleges, and unive.docx
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
 
Shelly sheehanmultiple choice.reading1
Shelly sheehanmultiple choice.reading1Shelly sheehanmultiple choice.reading1
Shelly sheehanmultiple choice.reading1
 
Challenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docxChallenge Examination1) In which era were only the U.S. government.docx
Challenge Examination1) In which era were only the U.S. government.docx
 
Com Ed 1 Prelim
Com Ed 1 PrelimCom Ed 1 Prelim
Com Ed 1 Prelim
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
Digital Planet Tomorrows Technology and You Complete 10th Edition Beekman Tes...
 
computer quiz
computer quizcomputer quiz
computer quiz
 
Computer fundamental-mcq-bank
Computer fundamental-mcq-bankComputer fundamental-mcq-bank
Computer fundamental-mcq-bank
 
MCQ Bank for Computer Fundamantals from mcqSets.com
MCQ Bank for Computer Fundamantals from mcqSets.comMCQ Bank for Computer Fundamantals from mcqSets.com
MCQ Bank for Computer Fundamantals from mcqSets.com
 
Embedded based microprocessor system one marks 50 questions and answers by S...
Embedded based microprocessor system one marks 50 questions and answers  by S...Embedded based microprocessor system one marks 50 questions and answers  by S...
Embedded based microprocessor system one marks 50 questions and answers by S...
 
Abc and w7.
Abc and w7.Abc and w7.
Abc and w7.
 

Plus de Michael Montarde (9)

FILMORA Video editing Filmora presintation for video and audio editing
FILMORA Video editing Filmora presintation for video and audio editingFILMORA Video editing Filmora presintation for video and audio editing
FILMORA Video editing Filmora presintation for video and audio editing
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
 
How-to-Install-Windows7.pptx
How-to-Install-Windows7.pptxHow-to-Install-Windows7.pptx
How-to-Install-Windows7.pptx
 
DEALING WITH FAILURES AND MISTAKES.pptx
DEALING WITH FAILURES AND MISTAKES.pptxDEALING WITH FAILURES AND MISTAKES.pptx
DEALING WITH FAILURES AND MISTAKES.pptx
 
A GUIDE TO PLAN PREPARATION.pdf
A GUIDE TO PLAN PREPARATION.pdfA GUIDE TO PLAN PREPARATION.pdf
A GUIDE TO PLAN PREPARATION.pdf
 
Information and Communication Technology.pptx
Information and Communication Technology.pptxInformation and Communication Technology.pptx
Information and Communication Technology.pptx
 
network printer.ppt
network printer.pptnetwork printer.ppt
network printer.ppt
 
Empowerment_Q2_module1.docx
Empowerment_Q2_module1.docxEmpowerment_Q2_module1.docx
Empowerment_Q2_module1.docx
 
Empowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdfEmpowerment_Q1_Module1.pdf
Empowerment_Q1_Module1.pdf
 

Dernier

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

ICT 2nd QUARTER summative.pptx

  • 2. Choose and shade the letter of the correct answer 1) It refers to a list of the key components that make up the computer. a. Specs b. Manufactures c. Brand d. Checklist 2) The main working memory in a computer is called ___________. a. ROM b. RAM c. Processor d. memory chips 3) It stores the applications and programs that run on the PC, as well as any work created by users. a. CD/DVD b. RAM c. Hard drive d. Zip drive 4) These cards are installed inside a PC and are responsible for determining the quality of the visuals output by the computer. a. Audio Card b. Graphics Card c. LAN Card d. Adapter card 5) These are the two leading companies when it comes to manufacturing processors. a. HP and Dell b. Epson and Canon c. AMD and Intel d. Acer and Asus
  • 3. 6) This card allows a computer to be connected to a network. A 10/100/1000 Mbps (Megabits per second) card is the standard card specifications today a. Audio Card b. Graphics Card c. Network Card d. Adapter card 7) It is a free open source operating system. a. Microsoft Windows b. Linux c. Mac OS d. Chrome OS 8) A cabling is used to connect your wired network adapters to a router or network switch. a. Internet b. Ethernet c. coaxial d. fiber optic 9) A glue that holds your home network together a. router b. DSL c. Hub d. Ethernet cable 10)The standard transfer speed of your wireless connection is __________. a. 802.11g b. 801.11g c. 802.11m d. 802.11j
  • 4. 11) The wired half of your router has a speed of _____________. a. 10/100 Mbps b. 10/10/100 Mbps c. 100/1000 Mbps d. 10/10/1000 Mbps 12)Routers have two types of ports available at the back. Which is not part of it? a. LAN b. WAN c. MAN d. WLAN 13)It basically means to create a redundant copy of a data. a. Data Backup b. Image copy c. System restore d. hardcopy 14)It refers to any kind of malicious codes, objects or content that infiltrates your computer, resulting in damage and causing your system to act in an undesirable manner. a. Software b. Spyware c. Malware d. Firmware 15)Software is used to identify problems on a computer or piece of equipment. a. Network software tool b. Hardware Software tool c. Diagnostic Software tool d. Firmware software tool
  • 5. 16) Disk ________ rearranges fragmented data so your disks and drives can work more efficiently. a. Defragmenter b. Fragmenter c. software d. defrag 17) It is a system-defined database which is used by an Operating System to store all the information needed to configure the Windows settings. a. Registry b. Register c. Registration d. Registering 18) This is an application that checks the computer’s hard drive for errors and bad sectors. a. Scan b. System Restore c. Scan Disk d. Data backup 19) It is a computer maintenance utility that is included in the Microsoft Windows operating system and it is designed to free up space on the hard drive. a. Network software tool b. Data Backup c. Scan Disk d. Disk Cleanup 20) Network Diagnostic Tool is an efficient and reliable tool to help you determine and identify the possible network issues that prevent you from using your computer to the fullest. a. Burn-in b. Hardware Software tool c. Diagnostic Software tool d. Network Diagnostic tool