100% found this document useful (1 vote)
4K views3 pages

COMPUTER SYSTEMS SERVICING NC 11 Assessment Test

The document contains 30 multiple choice questions about various topics related to computer systems and networking. The questions cover topics such as common computer components and their specifications, operating systems, networking hardware and configurations, security concepts, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views3 pages

COMPUTER SYSTEMS SERVICING NC 11 Assessment Test

The document contains 30 multiple choice questions about various topics related to computer systems and networking. The questions cover topics such as common computer components and their specifications, operating systems, networking hardware and configurations, security concepts, and more.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

COMPUTER SYSTEMS SERVICING NC 11

1. What Is the common color for the USS 3.0 connector for Standard A receptacles and plugs?
A. Black
B. Blue
C. Red
D. White

2. What type of memory used in the Solid State Drive (SSD) as a storage?
A. Dynamic Random Access Memory (DRAM)
B. 8. Flash memory
C. Read Only Memory (ROM)
D. Static Random Access Memory (SRAM)

3. It is originally, where the BIOS stored in a standard PC.


A. Hard Disk Drive (HOD)
B. Random Access Memory (RAM)
C. Read Only Memory (ROM)
D. Solid State Drive (SSD)

4. _____ is a complete copy of everything stored on a physical optical disc.


A. Backup file
B. 8. ISO image
C. Memory map
D. Stored file

5. What is the minimum requirement for hard disk drive capacity in Windows 10?
A. 16 GB for 32-bit OS or 20 GB for 64-blt OS
B. 20 GB for 32-bit OS or 30 GB for 64-blt OS
C. 20 GB for 32-bit OS or 40 GB for 64-bit OS
D. 30 GB for 32blt OS or 40 GB for 64-bit OS

6. Where do Windows device drivers store?


A. Computer
B. Drivers and Settings
C. Hardware
D. Registry

7. What is the volt rating of the RED wire in a power supply?


A. -5Y
B. +5V
C. -12V
D. +12V

8. _____ is a network cable where one end is T568-A while the other is T568-B configuration.
A. Cross-Over
B. Extreme
C. Roll-Over
D. Straight-Thru

9. In Windows 7, when LAN connection has a cross and red indicator signifies that there is _____
A. emergency that needs attention
B. LAN update
C. problem with the LAN driver
D. virus in the LAN

10. Which of the following hardware components can connect over a computer network?
A. Network Driver
B. Network Hardware Card
C. Network Interface Card
D. Network Module Card

11. It is a networking device that forwards data packets between computer networks.
A. Hub
B. Patch Panel
C. Router
D. Wireless Access Point (WAP)

12. Wi-Fi is a trademarked phrase, which means


A. IEEE.801.11
B. IEEE.802.11
C. IEEE.803.11
D. IEEE.804.11

13. _____ is a collection of devices connected together in one physical location.


A. Campus Area Network (CAN)
B. Local Area Network (LAN)
C. Metropolitan Area Network (MAN)
D. D Wide Area Network (WAN)

14. A type of network that interconnects multiple local area network.


A. Campus Area Network
B. Local Area Network
C. Metropolitan Area Network
D. Wide Area Network

15. A computer program used to prevent, detect, and remove possible threats to the system.
A. Anti-virus software
B. Defragment software
C. Scandisk Software
D. Direct Software

16. _____ is a two or more PCs are connected and share resources without going through a separate server
computer.
A. Client Server
B. 8. Local Area Network
C. Peer to peer network
D. Personal Area Network

17. What IP address used by the virtual machine to communicate over the physical network?
A. Customer address
B. Internet address
C. Private address
D. Provider address

18. What type of version that protects unauthorized network access by utilizing a set up password?
A. Temporal Key Integrity Protocol (TKIP)
B. Wi-Fi Protected Setup (WPS)
C. WPA2-Enterprise
D. WPA2-Personal

19. _____ consists of the user matrices, and capability tables that govern the rights and privileges of users.
A. Access control list
B. Statement of Policy
C. Systems Management
D. Systems-Specific Policy

20. It occurs when an attacker or trusted insider steals data from a computer system and demands compensation
for its return.
A. Information Extortion
B. Malicious code
C. Theft
D. Threat

21. It monitors the initial security accreditation of an information system for tracking of changes.
A. Configuration Management
B. Continuous Assessment
C. Measurement and Metrics
D. Network Monitoring

22. What services in Windows Server that enables administrators to migrate data to a lower-cost and tape media on
file servers?
A. Data Compression Service
B. File Screening Service
C. Remote Storage Service
D. Volume Shadow Copy Service

23. What Application group that contains a Client Access Point and with at least one application specific resource?
A. Active node
B. Cluster
C. Cluster resource
D. Virtual cluster server
24. A utility tool that test whether a particular host is reachable across an IP network.
A. Dxdiag
B. Netstat
C. Ping
D. Tracer

25. Which of the following keys is not 1ppropr1ate to enter BIOS setup?
A. F1
B. F2
C. F5
D. F10

26. What enables users of Windows that corrects any problems preventing from booting up normally?
A. Disk cleanup
B. IPconfig
C. Safe mode
D. Task Manager

27. What Starts up recovery options in a computer that essentially boot Into the RECOVERY partition of the main
hard drive?
A. Command Prompt
B. Repair Computer
C. Safe mode
D. System Restore

28. A single physical hard drive can divide into multiple hard drives.

A. Boot
B. Local
C. Logical
D. Single

29. What are the two types of interface used to communicate between the hard drive and the computer
motherboard?
A. Advanced Technology Attachment (ATA) and Parallel Advanced Technology Attachment (PATA)
B. Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (SATA)
C. C. Industry Standard Architecture (ISA) and Advanced Technology Attachment (ATA)
D. Parallel Advanced Technology Attachment (PATA) and Industry Standard Architecture (ISA)

30. What is the spider-like interconnection in millions of pieces of information located on computers around the
cyber space?
A. Browser
B. E-commerce
C. Internet of Things (IOT)
D. World wide web

You might also like