1.
Which of the following is an example of a web browser?
Correct Answer
B. Internet Explorer
Explanation
Internet Explorer is an example of a web browser. It is a software application that allows users to access and navigate the internet. It is specifically designed to display websites and webpages, interpret HTML code, and render the content for users to view. Internet Explorer was one of the most popular web browsers before being replaced by Microsoft Edge.
2.
“Outlook
Express” and “Microsoft Outlook 2000” are examples of?
Correct Answer
D. Email Clients
Explanation
"Outlook Express" and "Microsoft Outlook 2000" are examples of email clients. Email clients are software applications that allow users to send, receive, and manage their email messages. These applications provide features such as composing and organizing emails, managing contacts, and accessing multiple email accounts. "Outlook Express" and "Microsoft Outlook 2000" specifically are popular email clients developed by Microsoft.
3.
Which of the following is not an example of an Operating System?
Correct Answer
C. Mozilla Firefox
Explanation
Mozilla Firefox is a web browser, not an operating system. Operating systems, such as Windows Vista, Mac OSX, and Windows 7, are software that manage computer hardware and software resources and provide common services for computer programs.
4.
Which
of the following is considered a Web Search Engine?
Correct Answer
C. Google or Yahoo!
Explanation
Google and Yahoo! are considered web search engines because they are online platforms that allow users to search for information on the internet. They have search algorithms that index web pages and provide relevant search results based on user queries. Outlook Express and Microsoft Outlook are email clients, Internet Explorer and Netscape Communicator are web browsers, and Windows XP and Linux are operating systems, none of which are web search engines.
5.
What are
COOKIES?
Correct Answer
A. Small pieces of text, stored on a user's computer by a web browser; and they contain the user's settings, shopping cart contents, or other data used by websites
Explanation
Cookies are small pieces of text that are stored on a user's computer by a web browser. These cookies contain the user's settings, shopping cart contents, or other data used by websites. They are used to enhance the user experience by remembering preferences and speeding up certain computer operations.
6.
What is a CACHE?
Correct Answer
B. Used to speed up certain computer operations by temporarily placing data, or a copy of it, in a location where it can be accessed more rapidly than normal
Explanation
A cache is used to speed up certain computer operations by temporarily placing data, or a copy of it, in a location where it can be accessed more rapidly than normal.
7.
What is a
protocol?
Correct Answer
C. Special set of rules that end points in a telecommunication connection use when they communicate
Explanation
A protocol is a special set of rules that end points in a telecommunication connection use when they communicate. It defines the format, timing, sequencing, and error control of messages exchanged between devices. Protocols ensure that data is transmitted and received accurately and efficiently, allowing devices to communicate effectively with each other.
8.
How do we access
Internet Options in Internet Explorer?
Correct Answer
A. Tools menu
Explanation
To access Internet Options in Internet Explorer, you need to go to the Tools menu. This menu typically appears at the top of the browser window and contains various options and settings related to the browser. Within the Tools menu, you should be able to find the Internet Options tab, which allows you to customize and configure various settings for your Internet browsing experience.
9.
Which menu option would you select in Outlook Express to add a new account?
Correct Answer
A. Tools menu
Explanation
In Outlook Express, a new email account is added through the "Tools" menu. Upon opening the application, users navigate to the menu bar at the top and select "Tools," which leads them to a dropdown menu offering various options. Among these options is one related to "Accounts" or "Account Settings." Clicking on this option opens a window where users can manage their email accounts. Within this window is typically an option to add a new account. Users follow the provided prompts to input the necessary information for the new email account. Overall, accessing the "Tools" menu in Outlook Express is the primary way to add a new email account to the application.
10.
Which of the following use(s) HTTP as its protocol?
Correct Answer
D. Both A and B
Explanation
Both Internet Explorer and Netscape Navigator use HTTP as their protocol. HTTP (Hypertext Transfer Protocol) is the protocol used for transferring data over the internet. Internet Explorer and Netscape Navigator are web browsers, which allow users to access and view websites on the internet. These browsers communicate with web servers using HTTP to request and receive web pages, images, and other resources. Microsoft Outlook, on the other hand, is an email client and does not use HTTP as its protocol.
11.
Which of the following use(s) SMTP and POP3 as its protocol?
Correct Answer
A. Outlook Express or Microsoft Outlook
Explanation
Outlook Express or Microsoft Outlook uses SMTP (Simple Mail Transfer Protocol) for sending emails and POP3 (Post Office Protocol 3) for receiving emails. These protocols allow the email client to communicate with the email server and perform the necessary actions for sending and receiving emails.
12.
Which
of the following could not be a valid email address?
ExplanationThe email address "edward.cullen'
[email protected]" could not be a valid email address because it contains an apostrophe, which is not allowed in email addresses.
13.
Which
of the following applications is often required in order to view animated
webpages?
Correct Answer
B. Macromedia Flash Player
Explanation
Macromedia Flash Player is often required to view animated webpages. Flash Player is a multimedia software platform that enables the playback of interactive content, including animations, videos, and games, on web browsers. It is widely used for creating and viewing animated content on websites. Without Flash Player, the animations on webpages would not be able to play or be displayed properly.
14.
What
feature of a Windows Operating System allows the user to view the list of
peripherals installed in a computer?
Correct Answer
C. Device Manager
Explanation
The Device Manager is a feature in a Windows Operating System that allows the user to view the list of peripherals installed in a computer. It provides a detailed view of all the hardware devices connected to the computer, such as printers, scanners, keyboards, and mice. The Device Manager also allows the user to manage and troubleshoot any issues related to these peripherals, such as updating drivers or disabling devices.
15.
What mark will appear in the Windows peripheral if the device is not installed properly?
Correct Answer
C. “Exclamation Mark”
Explanation
The mark that appears in the Windows peripheral if the device is not installed properly is typically an "Exclamation Mark." This mark indicates that there is an issue or problem with the device, such as a driver error or hardware malfunction.
16.
What mark will
appear in the Windows peripheral if the device has conflicts?
Correct Answer
C. “Exclamation Mark”
Explanation
When a device has conflicts in Windows, an exclamation mark will appear in the Windows peripheral. This symbol indicates that there is an issue with the device and it is not functioning properly. The exclamation mark serves as a warning sign to the user that they need to troubleshoot and resolve the conflicts in order to restore normal functionality.
17.
What mark will
appear in the Windows peripheral if the device is disabled?
Correct Answer
A. Red “X”
Explanation
When a device is disabled in Windows, a red "X" mark will appear in the Windows peripheral. This indicates that the device is currently not functioning or unavailable. The red "X" mark is commonly used as a symbol to represent a disabled or inactive device in Windows.
18.
Which of the
following is not a purpose of an internet firewall?
Correct Answer
C. Hide the identity of the user
Explanation
An internet firewall is designed to block unauthorized access to a computer, restrict access to a network, and control inbound traffic from a user or program. However, hiding the identity of the user is not a purpose of an internet firewall. Firewalls primarily focus on protecting the system and network from external threats, rather than concealing the user's identity.
19.
Adware
can:
Correct Answer
C. Generate endless pop up(s) and make your web browser slow
Explanation
Adware is a type of malicious software that is designed to generate endless pop-up advertisements and slow down the performance of a web browser. It does not increase the speed of a computer or allow the user to download videos from the internet. Additionally, while adware can be intrusive and annoying, it does not typically steal sensitive information such as passwords from a computer.
20.
Spyware can:
Correct Answer
A. Steal sensitive information such as passwords from a computer
Explanation
Spyware is a type of malicious software that is designed to secretly gather sensitive information from a computer without the user's knowledge or consent. It can steal passwords, credit card numbers, and other personal information, which can then be used for fraudulent purposes. This makes it a serious threat to the security and privacy of computer users.
21.
Which of the
following could be an IP address?
Correct Answer
A. 192.168.1.1
Explanation
The given answer, 192.168.1.1, could be an IP address because it follows the standard format of an IP address which consists of four sets of numbers separated by periods. Each set can range from 0 to 255, making it a valid IP address. The other options, 192:168:1:1 and 192,168,1,1, do not follow the correct format for an IP address, so they cannot be valid IP addresses. Therefore, the correct answer is 192.168.1.1.
22.
What
DOS Command is used to view IP information
Correct Answer
A. IPCONFIG
Explanation
IPCONFIG is the correct answer because it is a DOS command used to view IP information. It displays the current configuration of all network interfaces on a computer, including IP address, subnet mask, default gateway, and DNS servers. This command is commonly used for troubleshooting network connectivity issues and checking the IP configuration settings.
23.
Which does not describe a public network:
Correct Answer
B. Local Area Network
Explanation
Option C, "Local Area Network," does not describe a public network. A Local Area Network (LAN) typically refers to a network that is limited to a small geographic area, such as a home, office, or campus. It is not inherently public, as it is usually privately owned and operated by an organization or individual for their own use. Public networks, on the other hand, are accessible to devices outside the network, and they can include Wide Area Networks (WANs) as well as the internet. Therefore, option C does not fit the description of a public network.
24.
What is the first step you should take when troubleshooting a computer that won't start?
Correct Answer
B. Check if the computer is plugged in and the power switch is on.
Explanation
When a computer does not start, the initial step in troubleshooting should involve checking the most basic potential issues before moving to more complex diagnostics. This includes ensuring that the computer is properly plugged into a power source and that the power switch is turned on. This step helps to rule out any simple power supply issues that might be preventing the computer from starting.
25.
A
required device used to connect to an ISP Network.
Correct Answer
C. Modem
Explanation
A modem is the correct answer because it is a device that is used to connect to an ISP network. A modem converts the digital signals from a computer into analog signals that can be transmitted over telephone lines or cable lines, allowing the computer to access the internet through the ISP network. Switches, routers, and hubs are networking devices that are used to connect multiple devices within a local network, but they are not specifically used to connect to an ISP network.
26.
Which does not
describe a Wireless Access Point?
Correct Answer
C. Could also be a modem
Explanation
A wireless access point is a device that allows wired communication devices to connect to a wireless network using Wi-Fi, Bluetooth, or related standards. It usually connects to a router. However, it cannot be a modem as modems are used for different purposes, such as converting analog signals to digital signals for internet connectivity. Therefore, the statement "Could also be a modem" does not describe a wireless access point.
27.
A WLAN connection is
Correct Answer
A. A wireless connection using radio waves
Explanation
The correct answer is A, a wireless connection using radio waves. This is because WLAN stands for Wireless Local Area Network, and it uses radio waves to connect devices to the internet or to other devices within a specific area. This type of connection allows for flexibility and mobility as it does not require physical cables to connect devices.
28.
What does 802.11g mean?
Correct Answer
D. Is a standard for WLANs (Wireless Local Area Network) that offers transmission over relatively short distances at up to 54 Mbps
Explanation
802.11g is a standard for WLANs (Wireless Local Area Network) that allows for wireless transmission over relatively short distances at a maximum speed of 54 Mbps. This standard provides a faster data transfer rate compared to previous standards like 802.11b, making it suitable for applications that require higher bandwidth such as video streaming or online gaming.
29.
A type of broadband connection that uses phone lines as a medium:
Correct Answer
C. DSL Broadband
Explanation
DSL (Digital Subscriber Line) broadband is a type of broadband internet connection that uses existing telephone lines to transmit digital data. It allows for high-speed internet access over these traditional copper phone lines.
30.
Many
computers in the household can be connected to an internet service provider
at a time
Correct Answer
A. TRUE
Explanation
This statement is true because multiple computers in a household can indeed be connected to an internet service provider at the same time. This is usually achieved through the use of a router, which allows multiple devices to connect to the internet through a single internet connection. Each device is assigned a unique IP address, allowing them to access the internet simultaneously.
31.
Which does not describe an "Aspect Ratio"?
Correct Answer
D. None of the Above
Explanation
All the provided choices correctly describe what an "Aspect Ratio" is, and thus the correct selection is "None of the Above," meaning that none of the statements fail to describe an aspect ratio.
32.
A
television system that has more than the usual number of lines per frame so
its pictures show more detail:
Correct Answer
B. HDTV
Explanation
HDTV stands for High Definition Television, which is a television system that has more than the usual number of lines per frame. This allows for a higher resolution and more detailed pictures compared to standard definition television (SDTV) or enhanced definition television (EDTV). HDTV provides a clearer and sharper image quality, making it the preferred choice for high-quality viewing experiences. CCTV, on the other hand, stands for Closed-Circuit Television and refers to a surveillance system rather than a television system.
33.
Which of the following can not be used to connect a cable box to a television?
Correct Answer
C. RJ45 Cable
Explanation
The RJ-45 cable cannot be used to connect a cable box to a television. RJ-45 cables are typically used for Ethernet connections, while coaxial and RCA cables are commonly used for audio and video connections. Therefore, the RJ-45 cable is not compatible with connecting a cable box to a television.
34.
Which of the
following supports High Definition?
Correct Answer
D. All of the above
Explanation
All of the options listed (HDMI, Component, and DVI) support High Definition. HDMI (High-Definition Multimedia Interface) is a digital interface that supports high-quality audio and video transmission. Component cables can also support high-definition video signals, typically using three separate cables for video and two for audio. DVI (Digital Visual Interface) is another digital video interface that can transmit high-definition video signals. Therefore, all three options mentioned can support High Definition.
35.
Which of the following supports Standard Definition?
Correct Answer
D. Coaxial Cable
Explanation
Coaxial cable supports Standard Definition (SD) as it is commonly used to transmit television signals, including SD video, from broadcast antennas, cable television, and satellite television. While component cables can also support SD, coaxial cable is more traditionally associated with SD video signals. Ethernet and USB are used for digital data transmission and are not specifically tied to Standard Definition video transmission.
36.
What is call
waiting?
Correct Answer
B. A telepHone service that alerts someone using the pHone to an incoming call and allows switching between calls
Explanation
Call waiting is a telephone service that alerts the user to an incoming call while they are already on a call. It allows the user to put the current call on hold and switch to the new incoming call. This feature ensures that the user does not miss any important calls and can manage multiple calls efficiently.
37.
What is a caller
ID?
Correct Answer
A. A telepHone service that provides for subscribers the name and telepHone number of a caller, which appear on a display as the call is being received
Explanation
Caller ID is a telephone service that displays the name and telephone number of the caller on a display as the call is being received. This allows subscribers to identify who is calling before answering the phone.
38.
What is call
forwarding?
Correct Answer
C. A telepHone service that enables a customer to have an incoming call automatically rerouted to another extension
Explanation
Call forwarding is a telephone service that allows incoming calls to be automatically redirected to another extension or phone number. This feature is useful when a person is unavailable or wants to forward calls to a different location or device. It enables customers to manage their calls and ensure they don't miss important communications.
39.
Which of the following is not a function of a voicemail?
Correct Answer
C. Use for paging the user
Explanation
Voicemail systems are primarily designed to handle incoming calls when the recipient is unavailable to answer. They allow callers to leave voice messages, which can be recorded, saved, and later retrieved by the intended recipient. Voicemail systems typically do not include a paging feature, which is more commonly associated with intercom systems or separate paging devices. Therefore, option C, "use for paging the user," is not a function of a voicemail system.
40.
The term used to differentiate standard telephone calls from telephone calls that are made and received over the Internet
Correct Answer
C. VoIP
Explanation
VoIP stands for Voice over Internet Protocol, which is a technology that allows telephone calls to be made and received over the Internet. It is used to differentiate standard telephone calls from calls made and received over the Internet. IPTV refers to Internet Protocol Television, which is a system for delivering television services over the Internet. POTS stands for Plain Old Telephone Service, which refers to traditional analog telephone service. Therefore, the correct answer is VoIP.
41.
If New York time is three hours ahead of San Francisco time, what time would it be in New York if a San Francisco clock is one hour behind, the time shows 4 o'clock?
Correct Answer
D. 8 o'clock
Explanation
If the San Francisco clock is one hour behind and shows 4 o'clock, then the actual time in San Francisco would be 5 o'clock. Since New York time is three hours ahead of San Francisco time, the time in New York would be 8 o'clock.
42.
Most
of the Montano family lives in Cebu City. Many of the people in Cebu City
celebrate Sinulog Festival. Cesar is a member of the Montano family. Based on
these facts, we can conclude that:
Correct Answer
D. None of the above can be concluded.
Explanation
Based on the information given, it is stated that "Most" of the Montano family lives in Cebu City, but it does not necessarily mean that Cesar is part of the majority. Additionally, it is mentioned that "Many" people in Cebu City celebrate Sinulog Festival, but it does not imply that Cesar does not celebrate it. Therefore, we cannot conclude whether Cesar lives in Cebu City or if he celebrates Sinulog Festival.
43.
Bella must use EDSA to get to work. Bella has a meeting today at 9:00 AM. If Bella misses the meeting, she probably will lose a major account. EDSA is closed all day due to repairs. Based on the above, we can conclude that:
Correct Answer
C. Bella will lose a major account.
Explanation
Bella needs to use EDSA to get to work, but it's closed all day for repairs. She has a crucial meeting at 9:00 AM, and missing it could result in losing a major account. Since EDSA's closure prevents her from getting to work on time, it is reasonable to conclude that Bella will miss the meeting and, consequently, lose the major account. Other conclusions cannot be definitively drawn from the given information.
44.
Which of the following steps is essential when troubleshooting a computer that won't turn on?
Correct Answer
B. Verifying that the power cable is properly plugged in
Explanation
When troubleshooting a computer that won't turn on, the first step should be to check if the power cable is properly plugged in. This basic check ensures that the computer is receiving power, which is a fundamental requirement for it to start. Other steps like checking the monitor connection, running an antivirus scan, or updating the operating system are not relevant if the computer itself cannot turn on.
45.
You receive a call from an individual who is NOT a customer, she states her friend has an account but forgot his password and had requested her to call and obtain the password for him. She can’t verify any of the profile authentication information with you. What should your next course of action be?
Correct Answer
C. Inform her that the customer will need to call to obtain his password information. Explain to her that the login information is confidential. Also, direct her to the online self-help for login/password issues.
Explanation
The correct answer is to inform the caller that the customer will need to call to obtain his password information. This is the appropriate course of action because the caller cannot verify any of the profile authentication information. It is important to prioritize the security and confidentiality of the customer's login information, and directing the caller to the online self-help for login/password issues ensures that the customer can receive the necessary assistance while maintaining the security of their account.
46.
What is the
shortcut key to Cut?
Correct Answer
B. CTRL + X
Explanation
The shortcut key CTRL + X is used to cut selected text or objects. Cutting removes the selected content from its original location and stores it in the clipboard. This action is commonly used to move or transfer content to a different location within a document or to another document entirely.
47.
What is the
shortcut key to Paste?
Correct Answer
D. CTRL + V
Explanation
The shortcut key "CTRL + V" is used to paste content. When you copy or cut content using "CTRL + C" or "CTRL + X", the content is stored in the clipboard. By using "CTRL + V", you can paste the content from the clipboard into the desired location.
48.
What is the
shortcut key to Redo?
Correct Answer
C. CTRL + Y
Explanation
The shortcut key to redo in most applications is CTRL + Y. This key combination allows the user to reverse the previous undo action and restore the changes that were undone. It is a convenient way to quickly redo an action without having to navigate through menus or use the mouse.
49.
What
button enables the number pad on the keyboard?
Correct Answer
B. Num Lock
Explanation
The Num Lock button enables the number pad on the keyboard. When the Num Lock is turned on, the keys on the number pad function as numbers, allowing the user to input numerical data easily.
50.
What
button enables all letters to be uppercase?
Correct Answer
D. Caps Lock
Explanation
The Caps Lock button enables all letters to be uppercase. When this button is pressed, it activates the Caps Lock function, causing all letters to be typed in uppercase until it is turned off. This is useful when typing in all capital letters or when needing to temporarily switch to uppercase for emphasis or specific formatting purposes.