CSS 12 3RD Grading Exam
CSS 12 3RD Grading Exam
Region V
Division of Camarines Sur
CALABANGA NATIONAL SCIENCE HIGH SCHOOL
(Formerly : Calabanga National High School)
Sta. Cruz, Calabanga, Camarines Sur
School ID: 301952
11. Choose the feature that allows administrators to specify the types of files that can be saved within a
Windows volume and folder:
a. File Classification Infrastructure c. File Compression
b. File Encryption d. File Screening
12. What record clustering technology involves distributing client requests across several servers with replicated
configurations?
a. Cluster Quorum c. Hyper-V Virtualization
b. Network Load Balancing d. Quick Migration
13. Identify the log file technology that conserves disk space by limiting the growth of the performance log file:
a. Circular Logging c. Counter Logs
b. Linear Logging d. View Log File Data
14. Choose the system that provides quick, automatic, and centralized management for distributing IP addresses
within a network:
a. Domain Name System (DNS) c. Dynamic Host Control Protocol (DHCP)
b. Simple Mail Transfer Protocol (SMTP) d. Transmission Control Protocol (TCP)
Analyzing
15. Identify the command-line tool used to discover the IP address corresponding to a host or domain name:
a. MSDOS b. NsLookup c. Ping Traceart
16. What is the subsequent task to be performed after planning to rectify the network?
a. Implementing the agreement c. Implementing the idea
b. Implementing the results d. Implementing the solution
17. Determine the type of memory utilized in Solid State Drives (SSD) for storage:
a. Dynamic Random Access Memory (DRAM) c. Flash Memory
b. Read Only Memory (ROM) d. Static Random Access Memory (SRAM)
18. What is the minimum required capacity for a hard disk drive in Windows 10?
a. 16GB for 32-bit OS or 20GB for 64-bit OS
b. 20GB for 32-bit OS or 30GB for 64-bit OS
c. 20GB for 32-bit OS or 40GB for 64-bit OS
d. 30GB for 32-bit OS or 40GB for 64-bit OS
19. Identify the computer program designed to prevent, detect, and remove potential threats to the system:
a. Anti-Virus software c. Defragment software
b. Scandisk software d. Direct software
20. What IP address is used by virtual machines to communicate over the physical network?
a. Customer address c. Internet address
b. Private address d. Provider address
21. What enables Windows users to correct any problems preventing normal boot-up?
a. Disk cleaning c. Ipconfig
b. Safe mode d. System restore
22. What initiates the recovery option in a computer, essentially booting into the RECOVERY partition of the
main hard drive?
a. Command prompt c. Repair computer
b. Safe mode d. System restore
23. Name the two types of interfaces used to communicate between the hard drive and the computer
motherboard:
a. Advanced Technology Attachment (ATA) and Parallel Advanced Technology Attachment (PATA)
b. Advanced Technology Attachment (ATA) and Serial Advanced Technology Attachment (PATA)
c. Industry Standard Architecture (ISA) and Advanced Technology Attachment (ATA)
d. Parallel Advanced Technology Attachment (PATA) and Industry Standard Architecture (ISA)
24. What compound is used to prevent the overheating of the CPU?
a. Central Processing Unit (CPU) separator c. Heat sink insulator
b. Interface sink d. Thermal paste
Applying
25. In Server 2008, a yellow-colored indicator on the Local Area Network (LAN) connection icon signifies ______.
a. Driver problem c. No connectivity
b. Update d. Virus
26. What is the alternative for a wired connection that uses radio frequency to send signals between devices and
routers?
a. Wireless Fidelity c. Wireless Finder
b. Wireless Firmware d. Wireless Fix
27. Who is assigned to monitor the security operations and network users?
a. Encoder c. End-user
b. Network administrator d. Network technician
28. _________ is used to store user documents with a large amount of memory and storage space.
a. Application server c. File server
b. Mail server d. Print server
29. What IP address is used by virtual machines to communicate over the physical network?
a. Customer address c. Internet address
b. Private address d. Provider address
30. __________ consists of user matrices and capability tables that govern the rights and privileges of users.
a. Access control list c. Statement of policy
b. System management d. System-specific policy
Evaluation
31. In the context of computer systems, what is the term for when an attacker or trusted insider steals data and
demands compensation for its return?
a. Information extortion b. Malicious code c. Theft d. Threat
32. Which service in Windows Server enables administrators to migrate data to lower-cost tape media on file
servers?
a. Data compression service c. File screening service
b. Remote storage service d. Volume shadow copy service
33. What application group contains a Client Access Point and at least one application-specific resource?
a. Active mode b. Cluster c. Cluster resource d. Virtual cluster server
34. What utility tool tests whether a particular host is reachable across an IP network?
a. Dxdiag b. Netstart c. Ping d. Tracer
35. The computer system is considered functional if it is in ___________.
a. Auto shut off c. Change option
b. Good option d. Normal booting
36. What term describes an update that downloads and installs the latest version?
a. Check update b. Full updates c. Fully updates d. Semiautomatic.
37. What is the term for the physically damaged cluster of storage on a hard drive?
a. Bad sector c. GUILD partition table
b. Master Boot Record (MBIR) d. Volume
38. What occurs when two or more devices are connected with the same IP address on a computer network?
a. Dynamic IP address conflict c. IP address conflict
b. Private IP address error d. Static IP address error
39. Which storage device should be replaced if frequent error messages appear while moving files and booting
up the operating system?
a. Flash drive c. Hard disk
b. Optical drive d. Random Access Memory
40. What recovery console command writes a new master boot record on the hard disk drive?
a. Bimrul b. Bootrec c. Chikdisk d. Fixmbr
Prepared by:
Good luck!