Grade 10 3rd Quarter Questioner
What must be disabled to conceal a computer system from other devices?
1Network Recognition2Network Detection3Network Identification4Network Discovery
What feature must be turned off to prevent unauthorized access to files?
1Resource Sharing2Resource Discovery3Resource Allocation4Resource Splitting
Usernames and passwords are examples of _________________.
1confirmation2endorsements3passes 4credentials
What technical term is used for the name that wireless devices can scan and connect to?
1HTTP2RFID3WPA 4SSID
What type of password is recommended for wireless access points?
1SSID 2WEP 3WPA 4LAN
Which statement is true about firewalls?
1
. A firewall can protect the network from viruses 2A firewall is an application only3A
firewall is a hardware only 4A firewall can be both an application and a hardware
Which of the following people should have logged on to the access point’s configuration interface?
1Suppliers 2IT Manager 3Clients 4Guests
Which of the following statement is true?
1 2Firewalls and anti-malware can
. Both wired and wireless share the same security level
both terminate a virus 3A wired network is more secured than a wireless network 4A
wireless network is more secured than a wired network
What type of communication is prevented by a firewall?
A firewall disables all unauthorized incoming communications while still allows outgoing
communications.
Next question
1Incoming 2Both incoming and outgoing 3Outgoing 4Neither incoming nor outgoing
What software must be installed to secure the network from any viruses?
An anti-malware will help in securing the network from viruses that were able to pass through the
firewall. This must be done because a firewall is not capable of terminating a virus.
Next question
1Patches 2Operating System 3Firewall 4Anti-malware
Aside from establishing communications, what is the other main goal of a computer network?
Select your answer.
1Workload sharing2Process sharing 3Resource sharing 4Skills sharing
What property must be enabled to a file or printer before they can be accessed remotely by another
computer system?
Select your answer.
1Shared 2Hidden 3Secured 4Read-only
Which of the following access levels allows a shared file to be viewed only?
Select your answer.
1Read 2Full control 3Write 4Change
What access level allows a shared file to be viewed and edited, but cannot be deleted?
Select your answer.
1See 2Change 3Full control 4Read
Which access level allows a remote device to completely access a file?
Select your answer.
1Write 2Change 3Full control 4Read
If multiple files are to be shared, they can be transferred to the _______________.
Select your answer.
1public folder 2library folder 3favorite folder 4private folder
What option must be enabled to allow devices in a network to see or find each other?
Select your answer.
1Component discovery 2Peripheral discovery 3Device discovery 4Network discovery
Aside from the computer name, what can be typed in the run command to access a shared file or
printer?
Select your answer.
1Network address 2Computer number 3IP address 4Serial number
What is needed when accessing a file or printer for the first time?
Select your answer.
1Credentials 2Network key 3Initials 4SSID
What is needed to restrict unauthorized access to the shared files and peripherals?
Select your answer.
1Network maintenance 2System configuration 3Test and inspection 4Security protocols
True or False
Do not touch the Integrated Circuit or IC parts. Hold computer components at the middle.
Select your answer.
1False 2True
True or False
Always follow the organization’s OHS procedures and practices. Never wear Personal Protective
Equipment (PPE).
Select your answer.
1False 2True
True or False
Before touching any part of the computer, always ground or discharge yourself first. You can also use
a static wrist strap.
Select your answer.
1True 2False
True or False
To avoid getting electrocuted, getting wet, or damaging any part of the computer, remove any liquid
around or near your work area. Make sure that all parts, as well as your hands are dry.
Select your answer.
1True 2False
True or False
Never connect or use a telephone or modem during a lightning storm to avoid any electric shock that
can be caused by lightning.
Select your answer.
1False 2True
True or False
Use an Interruptible Power Supply (IPS), surge suppressor, or line conditioner to help protect the
components of the computer system from sudden increase and decrease in electrical power.
Select your answer.
1True 2False
True or False
When connecting cable connectors, pins should be checked if they are properly aligned.
Select your answer.
1True 2False
True or False
In handling the computer parts, use excessive force.
Select your answer.
1False 2True
True or False
Blower, compressed air, or brush should be used whenever the computer system is cleaned.
Select your answer.
1False 2True
True or False
In case of any accident or other emergencies, contingency measures should be avoided.
Select your answer.
1False 2True