ICF Third Quarter
Name: _____________________________Date_____________ Section______________Score__________
MULTIPLE CBOICE: Read the statements carefully and encircle the correct letter of your answer.
1. I wanted to create an email account that has no resemblance to other account. Why should I have a unique email address?
A. To have privacy in your account.
B. Avoid contact with other people.
C. No limitations of using other account.
D. Share links with friends even without permission.
2. John Andre is starting a new job in a certain Corporation. To use the computer in his desk, he has to know 2 important
details from a network administrator. What are these things?
A. Username and password C. Username and firewall
B. Password and firewall D. Encryption key and username
3. Rommel needs to log in to a computer network on which he doesn’t have a username. What will he do?
A. Restart the computer and hold down SHIFT key without permission.
B. Type his own username and password to create a new account.
C. Press CTRL + ESC to log in as a guest user.
D. None of the above.
4. In this email add,
[email protected]. The underlined phrase is considered as:
A. Domain name C. Server name
B. Username D. None of the above
5. Which of the following Web sites is the best example of an online business?
A. A site with links to pictures of a family reunion.
B. A site with an essay on the damaging effect of fast food health.
C. A site with shops for men and ladies fashion and apparel
D. A site with a searchable listing of the movies a video store has for sale.
6. Using the same password for Internet account and for network access and personal file protection is:
A. Not possible, since network use 12 character passwords.
B. A reasonable practice as long as the password is a secured one.
C. A bad idea, since Internet account passwords are easily stolen.
D. A good idea, since you will only have to remember one password.
7. What information does the email address suggest about the owner?
[email protected] A. This person works for a business in Philippines.
B. This person works for military in the Philippines.
C. This person is part of a non-profit artist’s organization.
D. This person works for a secondary school in Philippines.
8. This identifies the name of the user from others.
A. Mailbox name C. Domain name
B. C. Server name D. Name of organization
9. A system that is used to translate human-memorable domain names into the corresponding numeric Internet Protocol
(IP) addresses.
A. Top level domain C. Server name types
B. Domain name system D. Mailbox name
10. Some countries have their own domain name that composed of two-letter code. If Philippines is .ph, what is for China?
A. .ch B. .ci C. .cn D. .ca
History of computers
Match column A with B. Write the letter of your answer on the space provided.
A B
______1. Z1 a.1984
______2. Z3 b.1944
______3. Z4 c. 1950
______4. Colossus d. 1941
______5. ENIAC e. 1946
______6. First prototype computer f. 1953
______7. IBM 360 g. 1965
______8. Program 101 h. 1960
______9. Intell 1103 i. 1970
______10. Altair 8800 j. 1975
______11. Apple k. 1977
______12. Apple 2 l. 1976
______13. First Personal Computer m. 1981
______14. Apples First Graphic Computer n. 1983
______15. Macintosh PC o. 1930
Fill in the top level domains.
16_____US Military 21_____Saudi Arabia
17_____commercial company 22_____France
18_____Canada 23_____US Government
19_____United Kingdom 24_____China
20_____Philippines 25_____Ireland