0% found this document useful (0 votes)
55 views

Long Test css11

This document is a test from Tongohin National High School assessing networking and computer hardware concepts. It contains multiple choice questions about disk utilities like ScanDisk and CHKDSK, components like RAM and BIOS, networking protocols like SSH and protocols like TCP and UDP. It also asks to define disk partitioning tools, disk management tools, formatting, and defragmentation.

Uploaded by

Cha N Ot
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Long Test css11

This document is a test from Tongohin National High School assessing networking and computer hardware concepts. It contains multiple choice questions about disk utilities like ScanDisk and CHKDSK, components like RAM and BIOS, networking protocols like SSH and protocols like TCP and UDP. It also asks to define disk partitioning tools, disk management tools, formatting, and defragmentation.

Uploaded by

Cha N Ot
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

TONGOHIN NATIONAL HIGH SCHOOL

TONGOHIN INFANTA, QUEZON


CSS 11
2nd Quarter – Long test
CHRISTIAN M. TIERRA-0923-520-7852/0968-501-4252
Name: ________________________________________________________ Date: ___________________________
Grade/Section: _________________________________________________ Score: __________________________

I. Multiple Choice. Read and understand each item carefully. Write the letter of the correct answer
on space provider. (2pts each)
1. __________ checks the integrity of files and folders on a hard drive by scanning the file system.
a. Defrag
b. System file checker
c. Scandisk
d. Disk Cleanup
2. __________ tests the integrity of circuits and the quality of electricity in computer components.
a. Digital multimeter
b. Loopback adapter
c. Toner probe
d. Network tester
3. A _______________ is a set of steps to guide you through what needs to be done to thoroughly test the installation. It is designed
to help you work more effectively and to make sure you test everything that needs testing.
a. Test procedure
b. Defragmentation
c. Stress testing
d. Documentation
4. It is a non-functional form of testing which validates system against heavy network traffic, underclocking, overclocking, and
maximum request for resource utilization. It is also called ‘endurance testing’.
a. Defragmentation
b. Documentation
c. Stress testing
d. Test procedure
33
5. Adding more ______________ will help your computer system’s speed.
a. CPU
b. ROM
c. BIOS
d. RAM
6. A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution,
and other secure network services between two networked computers is known as:
a. TFTP
b. SSH
c. Telnet
d. RDP
7. Which of the following statements is correct regarding the functions of OSI model and TCP/IP protocols?
a. The network layer is responsible for path determination and logical addressing
b. The transport layer controls access to the physical media
c. TCP and UDP are network layer protocols
d. TCP and UDP are transport layer protocols
8. Which of the following statements is true regarding the operation of a transparent bridge (switch)?
a. The bridge learns destination mac addresses from frames and places them in the bridging table so that frames may be sent to the
correct port and filtered from others.
b. The bridge learns source mac addresses and places them in the bridging table so that frames may be sent to the correct port and
filtered from others.
c. The last unicast frame in a traffic flow must be flooded by the bridge.
d. Broadcast frames are filtered by default on transparent bridges.
9. Select the advantages of a LAN:
a. Initial setup is expensive.
b. Software & files can be shared
c. Peripherals can be shared
d. It is easily expandable
10. Which command is used to determine if an IP access list is enabled on a particular interface?
a. Show access-lists
b. Show IP interface
c. Show interface
d. Show interface access-lists
11. If you want to network computers far from each other how are you going to network the computers?
a. Use a repeater or extender
b. Use CAT6 cable to enhance connectivity
c. Use a wireless router
d. Use a server-based connection
12. After configuring the network interface card, how will you test the connectivity of your network?
a. PING the connection to check the network connectivity
b. Use a VLAN software to perform the test
c. Type IPCONFIG/ALL to check connectivity
d. Press start, all programs, network testing
13. You want to test the connection between a PC-to-PC network. How are you going to do this?
a. Check the cable if connected to both computer NICs
b. Test the circuitry of the network
c. Use net groper in this testing method
d. Use a crossover cable in connecting two computers
14. How are you are going to set or configure a network?
a. Change workgroup name and computer name; change IP address for all computers.
b. Workgroup name should not be identical to process the network.
c. There should be a DNS in each computer.
d. Activate the DHCP addon.
15. You would want to stress test your computer’s temperature, how are you going to perform this operation?
a. Overclock your CPU to test the temperature.
b. Undervolt the computer in the BIOS.
c. Use same voltage and clocks.
d. Use an application software from the internet.

II. Identification (4pts each)


Write the correct answer on the space provider.
1. ________________ are series of beeps that indicate an error condition in
your computer unit.
2. __________________ is also called ‘endurance testing’. It allows the user to
check the endurance power or the limit that the system can withstand
before breaking down.
3. A _______________ is a two-part tool. The first part generates a tone that
travels the length of the cable. Then the other part traces the cable.
4. _________________ is a stress testing method that tests the application
across multiple systems running at the same server. In this method, a
tester checks the system using different parameters, which is unlikely to
happen in a real scenario.
5.__________________ This stress testing method focuses on finding issues related to network,
performance bottleneck, and data locking issues in the application.

III. Define the following types of Communication (10pts each)

1. FDISK: -

2. Disk Management Tool-

3. Format: -

4. ScanDisk or CHKDSK–

5. Defragmentation:

You might also like