0% found this document useful (0 votes)
107 views2 pages

ICF Third Quarter9

This document contains an ICF third quarter test with multiple choice and matching questions about computers, email addresses, passwords, and internet domains. The multiple choice section tests knowledge of email security, logging into networks, and online businesses. The matching questions cover the history of computers from the 1930s to the 1980s and top-level domains for different countries and organizations.

Uploaded by

nelverd123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views2 pages

ICF Third Quarter9

This document contains an ICF third quarter test with multiple choice and matching questions about computers, email addresses, passwords, and internet domains. The multiple choice section tests knowledge of email security, logging into networks, and online businesses. The matching questions cover the history of computers from the 1930s to the 1980s and top-level domains for different countries and organizations.

Uploaded by

nelverd123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

ICF Third Quarter

Name: _____________________________Date_____________ Section______________Score__________


MULTIPLE CBOICE: Read the statements carefully and encircle the correct letter of your answer.
1. I wanted to create an email account that has no resemblance to other account. Why should I have a unique email address?
A. To have privacy in your account.
B. Avoid contact with other people.
C. No limitations of using other account.
D. Share links with friends even without permission.
2. John Andre is starting a new job in a certain Corporation. To use the computer in his desk, he has to know 2 important
details from a network administrator. What are these things?
A. Username and password C. Username and firewall
B. Password and firewall D. Encryption key and username
3. Rommel needs to log in to a computer network on which he doesn’t have a username. What will he do?
A. Restart the computer and hold down SHIFT key without permission.
B. Type his own username and password to create a new account.
C. Press CTRL + ESC to log in as a guest user.
D. None of the above.
4. In this email add, [email protected]. The underlined phrase is considered as:
A. Domain name C. Server name
B. Username D. None of the above
5. Which of the following Web sites is the best example of an online business?
A. A site with links to pictures of a family reunion.
B. A site with an essay on the damaging effect of fast food health.
C. A site with shops for men and ladies fashion and apparel
D. A site with a searchable listing of the movies a video store has for sale.
6. Using the same password for Internet account and for network access and personal file protection is:
A. Not possible, since network use 12 character passwords.
B. A reasonable practice as long as the password is a secured one.
C. A bad idea, since Internet account passwords are easily stolen.
D. A good idea, since you will only have to remember one password.
7. What information does the email address suggest about the owner?
[email protected]

A. This person works for a business in Philippines.


B. This person works for military in the Philippines.
C. This person is part of a non-profit artist’s organization.
D. This person works for a secondary school in Philippines.
8. This identifies the name of the user from others.
A. Mailbox name C. Domain name
B. C. Server name D. Name of organization
9. A system that is used to translate human-memorable domain names into the corresponding numeric Internet Protocol
(IP) addresses.
A. Top level domain C. Server name types
B. Domain name system D. Mailbox name
10. Some countries have their own domain name that composed of two-letter code. If Philippines is .ph, what is for China?
A. .ch B. .ci C. .cn D. .ca
History of computers

Match column A with B. Write the letter of your answer on the space provided.

A B

______1. Z1 a.1984

______2. Z3 b.1944

______3. Z4 c. 1950

______4. Colossus d. 1941

______5. ENIAC e. 1946

______6. First prototype computer f. 1953

______7. IBM 360 g. 1965

______8. Program 101 h. 1960

______9. Intell 1103 i. 1970

______10. Altair 8800 j. 1975

______11. Apple k. 1977

______12. Apple 2 l. 1976

______13. First Personal Computer m. 1981

______14. Apples First Graphic Computer n. 1983

______15. Macintosh PC o. 1930

Fill in the top level domains.

16_____US Military 21_____Saudi Arabia

17_____commercial company 22_____France

18_____Canada 23_____US Government

19_____United Kingdom 24_____China

20_____Philippines 25_____Ireland

You might also like