T L E-Reviewer

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Republic of the Philippines

Department of Education
NATIONAL CAPITAL REGION
SCHOOLS DIVISION OF TAGUIG CITY AND PATEROS

Reviewer in TLE 7-ICT-CSS

Name: Score:

Grade & Section: Date:

Directions: Read each statement carefully. Encircle the letter of the correct answer.

1. When you need to convert your printed documents into digital information, what kind of
input device will you use?
A. keyboard B. mouse C. scanner D. microphone

2. This kind of hazard may lead to anxiety and depression.


A. biological hazard B. chemical hazard
C. ergonomic hazard D. psychosocial hazard

3. what tool are you going to use to retrieve parts from locations that are too tight for your hands to
fit?
A. part retriever B. tweezers C. wire cutter D. nut driver

4. Which of the following is a systematic care for tools, equipment and machines?
A. preventive maintenance B. proper hygiene
C. security protocols D. maintenance and assistance

5. These are components of a circuit that usually rely on an external power source to control or modify
electrical signals.
A. diode B. inductor C. resistor D. capacitor

6. A single strand of metal that transmits power or data from one area to another.
A. insulators B. wire C. cable D. conductors

7. Which of the following statements best describe hand tools?


A. Hand tools are used to prevent ESD damage to computer equipment.
B. Hand tools can be used to check the integrity and quality of electricity.
C. Hand tools are devices for performing work on materials with the use of hands.
D. Hand tools are used to ensure that components are not damaged during cleaning.

8. How to convert a decimal system to a binary system?


A. Conversion of decimal number to binary is through the use of the remainder
method.
B. Converting decimal system to binary system involves dividing the number by 2 recursively until you
are left with 0, while taking note of each remainder.
C. Read the series of 1s and 0s on the right from the bottom up. This is the binary equivalent of the
decimal number.
D. Converting from binary to decimal involves multiplying the value of each digit, 1 or 0, by the value
of the placeholder in the number.

9. It is a must to use the approved or recommended compressed air or vacuum cleaner, what do you
think is the reason behind this?
A. Because non-standard vacuum cleaners need a higher supply of electric current.
B. Because standard vacuum cleaners are easier to use.
C. Because standard vacuum cleaner don’t cause electrostatic buildup.
D. Because non-standard vacuum cleaner contains chemicals that can leave impurities.

10. How does anti-static wrist strap work?


A. Anti-static wrist strap works by tightening bolts and screws inside the computer.
B. This is used to removed magnetic fields around electronic devices.
C. The anti-static wrist strap helps in blowing away dust in computer components.
D. Anti-static wrist strap helps prevent ESD between you and the equipment.
11. What is the binary system equivalent of decimal number “29”?
A. 10001 B. 11110 C. 11001 D. 11101

12. What are the main characteristics of primary storage devices?


A. Primary Storage is an early storage device.
B. Primary Storage is a main storage of the computer that is volatile in nature
C. Primary Storage is an external storage device.
D. Primary Storage is also known as Thumb drive

13. It is the biggest board in the computer chassis that allocates power and allows communication among
computer hardware components.
A. CPU B. motherboard C. ROM D. RAM

14. It is the computer's main circuit board.


A. disc drive B. RAM C. CPU D. motherboard

15. What tool is used to hold screws, jumpers, fasteners and other small parts to prevent them from
getting mixed together?
A. parts-organizer B. multimeter C. Cable Ties D. wire cutter

16. It is used in different equipment like digital cameras and cellphones.


A. SSD B. HDD C. flash drive D. SD card

17. It is the amount of data stored in the storage unit. This storage is capacity expressed in terms
of bytes.
A. binary unit B. memory unit C. decimal unit D. nibble unit

18.When you are working with a slotted screw, what kind of screwdriver should you use?
A. flat head screwdriver B. torx screwdriver
C. hex driver D. Philips head screwdriver

19. In cleaning computer components, what tool can you use to blow away dust and debris from
different computer parts without touching the components?
A. wire cutter B. cable ties C. hex driver D. compressed air

20. Linda is using the computer for more than eight hours a day without proper workstation setup and
poor posture. What might be the hazard that Linda is facing or experiencing every day?
A. biological hazard B. chemical hazard
C. ergonomic hazard D. physical hazard

21.These tools are essential when maintaining and repairing computers. Which of these tools ensure that
computer components are not damaged during cleaning?
A. cleaning tools B. ESD tools C. hand tools D. diagnostic tools

22. Which of the following is a computer hardware responsible for supplying all computer components
with power?
A. circuit B. power supply C. wire D. cable

23. A non-volatile memory used to start up or boot-up the computer.


A. primary storage B. ROM C. secondary storage D. RAM

24. In repairing inside the computer, buildup of static electricity might happen which is harmful to
both human and components, to prevent this to happen what kind of tool should you use?
A. Flat head screwdriver and Phillips head screwdriver
B. Parts organizer and lint-free cloth
C. Anti-static Wrist strap and Anti-static mat
D. Multimeter and loopback adapter

25. For instance, you are using a computer desktop in an internet café and you did not notice that the CPU
is open with an exposed live circuit. This is an example of a hazard, what might be the possible risk?
A. The CPU with an exposed live circuit is the hazard because it can harm You.
B. The computer desktop is a risk because of the possibility of danger it offers.
C. It can harm you and can even put your life in danger through electrocution.
D. An open CPU will not cause any harm or danger

26. Convert 101100 into a decimal system.


A. 44 B. 45 C. 75 D. 76

27. What is the benefit of using flowchart?


A. Flowchart makes it difficult to present a more complex task or program.
B. Flowcharts can be very helpful in training employees to perform the process.
C. Flowchart is a time-consuming process.
D. In flowchart the symbols used are random and do not have specific meanings.

28.Flowchart uses graphic symbols to show connection and process which is called elements. What kind of
element is used to show the start and end of flowchart?
A. decision B. sub-process C. process D. terminator

29. It is a physical object in an electronic system used to affect the electrons or their associated fields with
the intended function of the electronic system.
A. electronic components B. debugging
C. inspection testing D. prototyping

30. A web browser developed by Microsoft and included in Windows 10.


A. Google chrome B. opera C. Microsoft edge D. safari

1. The goal of this hazard control is to choose a new chemical that is less hazardous than the original.
A. elimination B. substitution
C. good housekeeping D. emergency preparedness

31. Refers to the external storage not directly accessed by the CPU.
A. non-volatile B. main memory C. volatile memory D. secondary storage

32. Listed below are steps to convert Binary System into Decimal System, arrange the steps according to
the correct order.
1. Add the results together
2. Continue doing this until you reach the MSB
3. Write down the number
4. Multiply the digit by the value of the placeholder
5. Start with the LSB
A. 3, 5, 4, 2, 1 B. 1, 2, 3, 4, 5 C. 5, 4, 3, 2, 1 D. 3, 4, 2, 5, 1

33. If excessive force is needed to remove or add a component, something is probably wrong. As a computer
technician what should you do in this kind of situation?
A. Try to use a screwdriver as a pry bar
B. Ignore the device manual or diagram and continue to add or remove the components
C. Use any type of screwdriver to puncture the parts or components
D. Check if there is a clip or latch that is securing the component.

34. In a computer, what do you call a pointing device that functions by detecting two-dimensional motion
relative to its supporting surface?
A. keyboard B. mouse C. monitor D. drive

35. This type of hazard can be transferable from one area to another and can easily infect vulnerable parts
of the body.
A. biological hazard B. chemical hazard
C. ergonomic hazard D. physical hazard

36. It is an information space where documents and other web resources are identified by Uniform
Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the Internet.

A. world wide web B. web browser C. URL D. HTML

37. How will you differentiate Volatile from Non-Volatile Memory?


A. Volatile memory requires power to maintain the stored information. While non-volatile
memory can retain stored information even without power.
B. Volatile memory is capable of holding information. While non-volatile memory is the biggest
board in the computer chassis.
C. Volatile memory is a main storage, on the other hand non-volatile memory is an external storage
device.
D. Volatile Memory example is ROM while Non-volatile memory is RAM.

38. What is the main function of the CPU?


A. CPU is a computer memory that can retain stored information even without power.
B. CPU is a tiny switch activated by the electronic signals, on and off.
C. CPU is a chip that is responsible primarily for number the crunching and data
management.
D. CPU is the main circuit board of the computer.

39. A portable non-volatile memory device often a size of thumb that is connected to USB port.
A. SSD B. HDD C. flash drive D. SD card
40. When working around electronic devices, be sure that the tools you are using have not been
magnetized. To prevent this from happening, what will you do to test your tools before using it?
A. Magnetic fields can be harmful to data stored on magnetic media.
B. You can use multi tester and loopback adapter to check the magnetic field
C. Test your tool by touching the tool with a screw.
D. Test your tool by using a lint-free cloth.

41.What is a type of memory that is considered to be a secondary storage and also, a non-volatile memory
that gives faster access, noiseless and less power consumption?
A. hard disk drive B. flash drive C. SD card D. solid state drive

42. This tool is used to manipulate small parts.


A. part retriever B. tweezers C. wire cutter D. hex driver

43. It is the smallest measurable increment of data and everything in a computer is built upon them.
A. megabytes B. kilobytes C. bytes D. bit

44. What is the function of ROM in the computer system?


A. Use to open and run computer programs and applications.
B. Use to store the Basic Input Output System (BIOS) program in the computer.
C. A volatile memory that temporarily stores files in the document.
D. An external storage device which is indirectly accessible by the CPU.

45. Convert the 97 into a binary system.


A. 00100010 B. 01100001 C. 01001101 D. 0101001

46. What tool will you use to loosen or tighten a star-like depression screw?
A. nut driver B. hex driver C. torx screwdriver D. Philips screwdriver

47. What is the primary input device for a computer allowing users to type information?
A. keyboard B. mouse C. scanner D. microphone

48. Convert 01001000 into a decimal system.


A. 45 B. 51 C. 72 D. 76

49. It is the system's short-term memory.


A. REM B. RAM C. RIM D. ROM

50. If excessive force is needed to remove or add a component, something is probably wrong. As a computer
technician what should you do in this kind of situation?
E. Try to use a screwdriver as a pry bar
F. Ignore the device manual or diagram and continue to add or remove the components
G. Use any type of screwdriver to puncture the parts or components
H. Check if there is a clip or latch that is securing the component.

You might also like