1.
Which of the following is an example of a web browser?
Correct Answer
B. Internet Eplorer
Explanation
Internet Explorer is an example of a web browser. It is a software application that allows users to access and navigate the internet. It is specifically designed to display websites and webpages, interpret HTML code, and render the content for users to view. Internet Explorer was one of the most popular web browsers before being replaced by Microsoft Edge.
2.
“Outlook
Express” and “Microsoft Outlook 2000” are examples of?
Correct Answer
D. Email Clients
Explanation
"Outlook Express" and "Microsoft Outlook 2000" are examples of email clients. Email clients are software applications that allow users to send, receive, and manage their email messages. These applications provide features such as composing and organizing emails, managing contacts, and accessing multiple email accounts. "Outlook Express" and "Microsoft Outlook 2000" specifically are popular email clients developed by Microsoft.
3.
Which of the following is not an example of an Operating System?
Correct Answer
C. Mozilla Firefox
Explanation
Mozilla Firefox is a web browser, not an operating system. Operating systems, such as Windows Vista, Mac OSX, and Windows 7, are software that manage computer hardware and software resources and provide common services for computer programs.
4.
Which
of the following is considered a Web Search Engine?
Correct Answer
C. Google or Yahoo!
Explanation
Google and Yahoo! are considered web search engines because they are online platforms that allow users to search for information on the internet. They have search algorithms that index web pages and provide relevant search results based on user queries. Outlook Express and Microsoft Outlook are email clients, Internet Explorer and Netscape Communicator are web browsers, and Windows XP and Linux are operating systems, none of which are web search engines.
5.
What are
COOKIES?
Correct Answer
A. Small pieces of text, stored on a user's computer by a web browser; and they contain the user's settings, shopping cart contents, or other data used by websites
Explanation
Cookies are small pieces of text that are stored on a user's computer by a web browser. These cookies contain the user's settings, shopping cart contents, or other data used by websites. They are used to enhance the user experience by remembering preferences and speeding up certain computer operations.
6.
What is a CACHE?
Correct Answer
B. Used to speed up certain computer operations by temporarily placing data, or a copy of it, in a location where it can be accessed more rapidly than normal
Explanation
A cache is used to speed up certain computer operations by temporarily placing data, or a copy of it, in a location where it can be accessed more rapidly than normal.
7.
What is a
protocol?
Correct Answer
C. Special set of rules that end points in a telecommunication connection use when they communicate
Explanation
A protocol is a special set of rules that end points in a telecommunication connection use when they communicate. It defines the format, timing, sequencing, and error control of messages exchanged between devices. Protocols ensure that data is transmitted and received accurately and efficiently, allowing devices to communicate effectively with each other.
8.
How do we access
Internet Options in Internet Explorer?
Correct Answer
A. Tools menu
Explanation
To access Internet Options in Internet Explorer, you need to go to the Tools menu. This menu typically appears at the top of the browser window and contains various options and settings related to the browser. Within the Tools menu, you should be able to find the Internet Options tab, which allows you to customize and configure various settings for your Internet browsing experience.
9.
Which
menu option would you select in Outlook Express to add a new account?
Correct Answer
B. Identities menu
Explanation
To add a new account in Outlook Express, you would select the "Identities menu" option. This menu allows you to manage different identities or profiles within Outlook Express. By selecting this option, you can create a new identity and add a new email account to it.
10.
Which of the following use(s) HTTP as its protocol?
Correct Answer
D. Both A and B
Explanation
Both Internet Explorer and Netscape Navigator use HTTP as their protocol. HTTP (Hypertext Transfer Protocol) is the protocol used for transferring data over the internet. Internet Explorer and Netscape Navigator are web browsers, which allow users to access and view websites on the internet. These browsers communicate with web servers using HTTP to request and receive web pages, images, and other resources. Microsoft Outlook, on the other hand, is an email client and does not use HTTP as its protocol.
11.
Which of the following use(s) SMTP and POP3 as its protocol?
Correct Answer
A. Outlook Express or Microsoft Outlook
Explanation
Outlook Express or Microsoft Outlook uses SMTP (Simple Mail Transfer Protocol) for sending emails and POP3 (Post Office Protocol 3) for receiving emails. These protocols allow the email client to communicate with the email server and perform the necessary actions for sending and receiving emails.
12.
Which
of the following could not be a valid email address?
ExplanationThe email address "edward.cullen'
[email protected]" could not be a valid email address because it contains an apostrophe, which is not allowed in email addresses.
13.
Which
of the following applications is often required in order to view animated
webpages?
Correct Answer
B. Macromedia Flash Player
Explanation
Macromedia Flash Player is often required to view animated webpages. Flash Player is a multimedia software platform that enables the playback of interactive content, including animations, videos, and games, on web browsers. It is widely used for creating and viewing animated content on websites. Without Flash Player, the animations on webpages would not be able to play or be displayed properly.
14.
What
feature of a Windows Operating System allows the user to view the list of
peripherals installed in a computer?
Correct Answer
C. Device Manager
Explanation
The Device Manager is a feature in a Windows Operating System that allows the user to view the list of peripherals installed in a computer. It provides a detailed view of all the hardware devices connected to the computer, such as printers, scanners, keyboards, and mice. The Device Manager also allows the user to manage and troubleshoot any issues related to these peripherals, such as updating drivers or disabling devices.
15.
What mark will
appear in the Windows peripheral if the device is not installed properly?
Correct Answer
B. Yellow “Question Mark”
Explanation
If a device is not installed properly in Windows, a yellow "Question Mark" will appear in the Windows peripheral. This indicates that there is an issue with the installation or recognition of the device.
16.
What mark will
appear in the Windows peripheral if the device has conflicts?
Correct Answer
C. “Exclamation Mark”
Explanation
When a device has conflicts in Windows, an exclamation mark will appear in the Windows peripheral. This symbol indicates that there is an issue with the device and it is not functioning properly. The exclamation mark serves as a warning sign to the user that they need to troubleshoot and resolve the conflicts in order to restore normal functionality.
17.
What mark will
appear in the Windows peripheral if the device is disabled?
Correct Answer
A. Red “X”
Explanation
When a device is disabled in Windows, a red "X" mark will appear in the Windows peripheral. This indicates that the device is currently not functioning or unavailable. The red "X" mark is commonly used as a symbol to represent a disabled or inactive device in Windows.
18.
Which of the
following is not a purpose of an internet firewall?
Correct Answer
C. Hide the identity of the user
Explanation
An internet firewall is designed to block unauthorized access to a computer, restrict access to a network, and control inbound traffic from a user or program. However, hiding the identity of the user is not a purpose of an internet firewall. Firewalls primarily focus on protecting the system and network from external threats, rather than concealing the user's identity.
19.
Adware
can:
Correct Answer
C. Generate endless pop up(s) and make your web browser slow
Explanation
Adware is a type of malicious software that is designed to generate endless pop-up advertisements and slow down the performance of a web browser. It does not increase the speed of a computer or allow the user to download videos from the internet. Additionally, while adware can be intrusive and annoying, it does not typically steal sensitive information such as passwords from a computer.
20.
Spyware
can:
Correct Answer
A. Steal sensitive information such as passwords from a computer
Explanation
Spyware is a type of malicious software that is designed to secretly gather sensitive information from a computer without the user's knowledge or consent. It can steal passwords, credit card numbers, and other personal information, which can then be used for fraudulent purposes. This makes it a serious threat to the security and privacy of computer users.
21.
Which of the
following could be an IP address?
Correct Answer
A. 192.168.1.1
Explanation
The given answer, 192.168.1.1, could be an IP address because it follows the standard format of an IP address which consists of four sets of numbers separated by periods. Each set can range from 0 to 255, making it a valid IP address. The other options, 192:168:1:1 and 192,168,1,1, do not follow the correct format for an IP address, so they cannot be valid IP addresses. Therefore, the correct answer is 192.168.1.1.
22.
What
DOS Command is used to view IP information
Correct Answer
A. IPCONFIG
Explanation
IPCONFIG is the correct answer because it is a DOS command used to view IP information. It displays the current configuration of all network interfaces on a computer, including IP address, subnet mask, default gateway, and DNS servers. This command is commonly used for troubleshooting network connectivity issues and checking the IP configuration settings.
23.
Which does not describe a public network:
Correct Answer
C. Local Area Network
Explanation
A Local Area Network (LAN) does not describe a public network because the devices on the network are not "visible" to devices outside the network. LANs are typically used within a small geographical area, such as a home, office, or school, and are meant to provide private and secure communication between devices within that area. In contrast, a Wide Area Network (WAN) is a public network that connects devices over a larger geographical area, such as multiple offices or cities, and allows for communication between devices both within and outside the network. Therefore, option C, "Both A and B," is incorrect as LANs do not have the characteristic of being visible to devices outside the network.
24.
Which does not describe a private network:
Correct Answer
D. Both A and B
Explanation
The correct answer is "Both A and B". This means that a private network is one where the devices on the network are not "visible" to devices outside the network. A Wide Area Network (WAN) and a Local Area Network (LAN) are both examples of private networks, as they are designed to be secure and not accessible to external devices.
25.
A
required device used to connect to an ISP Network.
Correct Answer
C. Modem
Explanation
A modem is the correct answer because it is a device that is used to connect to an ISP network. A modem converts the digital signals from a computer into analog signals that can be transmitted over telephone lines or cable lines, allowing the computer to access the internet through the ISP network. Switches, routers, and hubs are networking devices that are used to connect multiple devices within a local network, but they are not specifically used to connect to an ISP network.
26.
Which does not
describe a Wireless Access Point?
Correct Answer
C. Could also be a modem
Explanation
A wireless access point is a device that allows wired communication devices to connect to a wireless network using Wi-Fi, Bluetooth, or related standards. It usually connects to a router. However, it cannot be a modem as modems are used for different purposes, such as converting analog signals to digital signals for internet connectivity. Therefore, the statement "Could also be a modem" does not describe a wireless access point.
27.
A
WLAN connection is
Correct Answer
A. A wireless connection using radio waves
Explanation
The correct answer is A, a wireless connection using radio waves. This is because WLAN stands for Wireless Local Area Network, and it uses radio waves to connect devices to the internet or to other devices within a specific area. This type of connection allows for flexibility and mobility as it does not require physical cables to connect devices.
28.
What
does 802.11g mean?
Correct Answer
D. Is a standard for WLANs (Wireless Local Area Network) that offers transmission over relatively short distances at up to 54 Mbps
Explanation
802.11g is a standard for WLANs (Wireless Local Area Network) that allows for wireless transmission over relatively short distances at a maximum speed of 54 Mbps. This standard provides a faster data transfer rate compared to previous standards like 802.11b, making it suitable for applications that require higher bandwidth such as video streaming or online gaming.
29.
A
type of broadband connection that uses phone lines as a medium:
Correct Answer
A. Dial-Up Broadband
Explanation
Dial-Up Broadband is a type of broadband connection that uses phone lines as a medium. This type of connection is slower compared to other broadband options like Cable, DSL, or Satellite. It uses the existing infrastructure of telephone lines to establish a connection, but the speed is limited due to the technology used. Dial-Up connections are typically slower and less reliable than other options, making them less popular in today's fast-paced internet environment.
30.
Many
computers in the household can be connected to an internet service provider
at a time
Correct Answer
A. TRUE
Explanation
This statement is true because multiple computers in a household can indeed be connected to an internet service provider at the same time. This is usually achieved through the use of a router, which allows multiple devices to connect to the internet through a single internet connection. Each device is assigned a unique IP address, allowing them to access the internet simultaneously.
31.
Which does not describe an "Aspect Ratio"?
Correct Answer
A. The width-to-height ratio of a film or television image
Explanation
Aspect Ratio refers to the ratio of the width of an image to its height. It is typically expressed as two numbers separated by a colon. Therefore, the statement "The width-to-height ratio of a film or television image" accurately describes an Aspect Ratio. The other options, such as "Expressed as two numbers separated by a colon" and "Ratio of the width of the image to its height" also correctly describe Aspect Ratio. Therefore, the correct answer is "None of the above" as all the options describe Aspect Ratio.
32.
A
television system that has more than the usual number of lines per frame so
its pictures show more detail:
Correct Answer
B. HDTV
Explanation
HDTV stands for High Definition Television, which is a television system that has more than the usual number of lines per frame. This allows for a higher resolution and more detailed pictures compared to standard definition television (SDTV) or enhanced definition television (EDTV). HDTV provides a clearer and sharper image quality, making it the preferred choice for high-quality viewing experiences. CCTV, on the other hand, stands for Closed-Circuit Television and refers to a surveillance system rather than a television system.
33.
Which
of the following can not be used to connect a cable box to a television?
Correct Answer
C. RJ—45 Cable
Explanation
The RJ-45 cable cannot be used to connect a cable box to a television. RJ-45 cables are typically used for Ethernet connections, while coaxial and RCA cables are commonly used for audio and video connections. Therefore, the RJ-45 cable is not compatible with connecting a cable box to a television.
34.
Which of the
following supports High Definition?
Correct Answer
D. All of the above
Explanation
All of the options listed (HDMI, Component, and DVI) support High Definition. HDMI (High-Definition Multimedia Interface) is a digital interface that supports high-quality audio and video transmission. Component cables can also support high-definition video signals, typically using three separate cables for video and two for audio. DVI (Digital Visual Interface) is another digital video interface that can transmit high-definition video signals. Therefore, all three options mentioned can support High Definition.
35.
Which of the
following supports Standard Definition?
Correct Answer
D. Coaxial Cable
Explanation
Coaxial cable supports Standard Definition. Coaxial cable is a type of cable that is commonly used for transmitting audio and video signals. It has a high bandwidth capacity and is capable of carrying both analog and digital signals. Coaxial cable is commonly used in cable television systems and is capable of supporting standard definition video signals.
36.
What is call
waiting?
Correct Answer
B. A telephone service that alerts someone using the phone to an incoming call and allows switching between calls
Explanation
Call waiting is a telephone service that alerts the user to an incoming call while they are already on a call. It allows the user to put the current call on hold and switch to the new incoming call. This feature ensures that the user does not miss any important calls and can manage multiple calls efficiently.
37.
What is a caller
ID?
Correct Answer
A. A telephone service that provides for subscribers the name and telephone number of a caller, which appear on a display as the call is being received
Explanation
Caller ID is a telephone service that displays the name and telephone number of the caller on a display as the call is being received. This allows subscribers to identify who is calling before answering the phone.
38.
What is call
forwarding?
Correct Answer
C. A telephone service that enables a customer to have an incoming call automatically rerouted to another extension
Explanation
Call forwarding is a telephone service that allows incoming calls to be automatically redirected to another extension or phone number. This feature is useful when a person is unavailable or wants to forward calls to a different location or device. It enables customers to manage their calls and ensure they don't miss important communications.
39.
Which of the
following is not a function of a voice mail?
Correct Answer
D. None of the above
Explanation
The given answer, "none of the above," is correct because all of the options listed are functions of a voice mail. Voice mail is used for answering and routing telephone calls, recording, saving, and relaying messages, and paging the user. Therefore, none of the options listed is not a function of a voice mail.
40.
The
term used to differentiate standard telephone calls from telephone calls that
are made and received over the Internet
Correct Answer
C. VoIP
Explanation
VoIP stands for Voice over Internet Protocol, which is a technology that allows telephone calls to be made and received over the internet. It is used to differentiate standard telephone calls from calls made and received over the internet. IPTV refers to Internet Protocol Television, which is a system for delivering television services over the internet. POTS stands for Plain Old Telephone Service, which refers to traditional analog telephone service. Therefore, the correct answer is VoIP.
41.
If New York time is three hours ahead of San Francisco time, what time would it be in New York if a San Francisco clock is one hour behind, the time shows 4 o'clock?
Correct Answer
D. 8 o'clock
Explanation
If the San Francisco clock is one hour behind and shows 4 o'clock, then the actual time in San Francisco would be 5 o'clock. Since New York time is three hours ahead of San Francisco time, the time in New York would be 8 o'clock.
42.
Most
of the Montano family lives in Cebu City. Many of the people in Cebu City
celebrate Sinulog Festival. Cesar is a member of the Montano family. Based on
these facts, we can conclude that:
Correct Answer
D. None of the above can be concluded.
Explanation
Based on the information given, it is stated that "Most" of the Montano family lives in Cebu City, but it does not necessarily mean that Cesar is part of the majority. Additionally, it is mentioned that "Many" people in Cebu City celebrate Sinulog Festival, but it does not imply that Cesar does not celebrate it. Therefore, we cannot conclude whether Cesar lives in Cebu City or if he celebrates Sinulog Festival.
43.
Bella must use EDSA to get to work. Bella has a meeting today at 9:00 AM. If Bella misses the meeting, she probably will lose a major account. EDSA is closed all day due to repairs. Based on the above, we can conclude that:
Correct Answer
A. Bella will not be able to get to work.
Explanation
Based on the given information that Bella must use EDSA to get to work and EDSA is closed all day due to repairs, we can conclude that Bella will not be able to get to work. Since Bella has a meeting at 9:00 AM and she cannot reach her workplace, it is likely that she will not be able to reschedule the meeting. Additionally, it is mentioned that if Bella misses the meeting, she probably will lose a major account. Therefore, it is reasonable to conclude that Bella will lose a major account.
44.
A customer calls in irate stating that he has been without services for two days. You attempt to verify his account information, but he keeps interrupting you stating that he is ready to sue that his service provider for all the problems he has experienced. What steps best describe the way to resolve the customer’s issue?
Correct Answer
B. Be empathetic with the customer, then take control of the call. Explain to the customer that you will work to resolve their issue and credit their account once their service has been restored.
Explanation
The correct answer is to be empathetic with the customer, then take control of the call. This is the best approach because it acknowledges the customer's frustration and shows understanding. By taking control of the call, the representative can guide the conversation towards finding a solution. Explaining that the issue will be resolved and the account will be credited once the service is restored reassures the customer that their concerns are being addressed. This approach demonstrates empathy, assertiveness, and a commitment to resolving the customer's problem.
45.
You receive a call from an individual that is NOT a customer, she states her friend has an account, but forgot him password, and had requested her to call and obtain the password for him. She can’t verify any of the profile authentication information with you. What should your next course of action be?
Correct Answer
C. Inform her that the customer will need to call to obtain his password information. Explain to her that the login information is confidential. Also direct her to the on-line self help for login/passwords issues.
Explanation
The correct answer is to inform the caller that the customer will need to call to obtain his password information. This is the appropriate course of action because the caller cannot verify any of the profile authentication information. It is important to prioritize the security and confidentiality of the customer's login information, and directing the caller to the online self-help for login/password issues ensures that the customer can receive the necessary assistance while maintaining the security of their account.
46.
What is the
shortcut key to Cut?
Correct Answer
B. CTRL + X
Explanation
The shortcut key CTRL + X is used to cut selected text or objects. Cutting removes the selected content from its original location and stores it in the clipboard. This action is commonly used to move or transfer content to a different location within a document or to another document entirely.
47.
What is the
shortcut key to Paste?
Correct Answer
D. CTRL + V
Explanation
The shortcut key "CTRL + V" is used to paste content. When you copy or cut content using "CTRL + C" or "CTRL + X", the content is stored in the clipboard. By using "CTRL + V", you can paste the content from the clipboard into the desired location.
48.
What is the
shortcut key to Redo?
Correct Answer
C. CTRL + Y
Explanation
The shortcut key to redo in most applications is CTRL + Y. This key combination allows the user to reverse the previous undo action and restore the changes that were undone. It is a convenient way to quickly redo an action without having to navigate through menus or use the mouse.
49.
What
button enables the number pad on the keyboard?
Correct Answer
B. Num Lock
Explanation
The Num Lock button enables the number pad on the keyboard. When the Num Lock is turned on, the keys on the number pad function as numbers, allowing the user to input numerical data easily.
50.
What
button enables all letters to be uppercase?
Correct Answer
D. Caps Lock
Explanation
The Caps Lock button enables all letters to be uppercase. When this button is pressed, it activates the Caps Lock function, causing all letters to be typed in uppercase until it is turned off. This is useful when typing in all capital letters or when needing to temporarily switch to uppercase for emphasis or specific formatting purposes.