Sunteți pe pagina 1din 2

Second Periodic Examination a. Documentation b. user documentation 30.

It pertains to load the first piece of software that starts a


ICT CSS – Grade 12 c. instructional material d. technical documentation computer
a. Boot b. Operating system
I. TRUE OR FALSE: Write A if True and B if False 20. What is the maximum cable length for STP? c. Storage Media d. bootstraps
a. 100 feet b. 150 feet c. 100 meters d. 1000 meters
1. You are trying to reformat a laptop. The first thing you need to 31. A derogatory term for inexperienced crackers who use scripts
do is to obtain its hardware specification. 21. It is a group of computer systems and other computing and programs developed by others.
2. We don’t need driver during installation/formatting process. hardware devices that are linked together through communication a. black hat b. hacker c. script kiddie d. cracker
3. Scanner is not able to scan without the presence of its required channels to facilitate communication and resource-sharing among
driver. a wide range of users. 32. It is a program which bypasses network security, allowing
4. Ring topologies are found in some office buildings or school a. Ethernet b. Internet crackers to obtain remote access while remaining hidden.
campuses. c. computer network d. wireless router a. denial of service attack b. backdoor
5. Plug and play meaning, the devices will not work without c. brute force attack d. phishing
requiring driver installation. 22. Topology introduces the concept of routes.
6. Only hub devices connect directly to the tree bus, and each hub a. Ring Topology b. Mesh Topology 33. A piece of software that cracks computer systems.
functions as the root of a tree of devices. c. Tree Topology d. Star Topology a. exploit b. sneakers c. virus d. worm
7. If the backbone cable fails, the entire network effectively
becomes usable. 23. It is also called a "hard boot". 34. It is a destructive program that spreads by inserting copies of
8. If system’s drivers are not installed, Manufacturers default a. Cold boot b. Warm Boot itself into the programs or documents.
software are not possible to use c. Storage Media d. Flash drive a. trojan b. worm c. virus d. spyware
9. Ethernet bus topologies are relatively easy to install and don't
require much cabling compared to the alternatives. 24. It means the devices will work without requiring driver 35. It is decrypting a password by working through all keys
10. Driver is the linker of the computer’s devices attached to it. installation. combination possibilities.
11. Devices typically connect to the hub with Unshielded Twisted a. Driver b. OS c. Apps d. Plug n Play a. denial of service attack b. backdoor
Pair (UTP) Ethernet. c. brute force attack d. phishing
12. Before installation/reformatting we should check first all device 25. It is an application that is accessed over a network such as the
drivers needed in installation process. Internet or an intranet. 36. One who breaks into systems, without permission, for no
13. All devices are not working without installer driver. a. Web App b. Mobile App personal gain and with no malicious intentions, often offering to
14. A device is enabled without a driver. c. Desktop App d. System software help fix security holes albeit breaking laws in doing so.
15. Driver is the linker of a certain hardware to computer. a. white hat b. black hat c. pink hat d. gray hat
26. This is designed for the end user of the computer hardware or
II. MULTIPLE CHOICE: Choose the letter of the correct answer. software. 37. The art and science of exploring the phone network for the
16. It is a device for recording (storing) information (data). a. Documentation b. user documentation purposes of hobby or utility.
a. Storage Media b. Operating system c. instructional material d. technical documentation a. phone phreaking b. phishing
c. Boot d. Application c. pharming d. hacking
27. Which connectors does UTP use?
17. It is a software program that enables a specific hardware a. STP b. BNC c. RJ-45 d. RJ-69 38. it is a destructive self-contained program that does not need
device to work with a computer's operating system. to be part of another program or document.
a. Driver b. System software 28. Usually a small network constrained to a small geographic area a a. trojan b. worm c. virus d. spyware
c. application software d. OS a. wide area network (WAN)
b. metropolitan area network (MAN) 39. An individual hired to break into places to test security.
18. It is a type of software that allows you to perform specific tasks. c. local area network (LAN) a. sneaker b. hacker c. script kiddie d. cracker
a. Driver b. System software d. Personal Area Network (PAN)
c. Application software d. Desktop App 40. Acquiring sensitive personal information like passwords and
29. Topology joins multiple star topologies together onto a bus. other details by sending email that will direct user to visit website
19. It is the collection of documents that are designed to help a. Mesh Topology b. Star Topology and be asked to update username/password of your credit card.
people who need to manage, operate or maintain computer c. Ring Topology d. Tree Topology a. denial of service attack b. backdoor
hardware or software. c. brute force attack d. phishing
III. ILLUSTRATION (2 points each) 3. BUS Topology Kindly use this answer sheet in answering questions no. 1-40

1. Straight Through Cable Configuration

4. STAR Topology

2. Crossover Cable Configuration

5. TREE Topology

S-ar putea să vă placă și