Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
61 views13 pages

Tesda Answer Sheet

The document is a comprehensive answer sheet containing various technical questions and answers related to computer hardware, networking, and software. It covers topics such as USB connectors, memory types, network configurations, security protocols, and troubleshooting commands. Each entry provides a specific question followed by its corresponding answer, serving as a reference for IT-related knowledge.

Uploaded by

Marga Balajadia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views13 pages

Tesda Answer Sheet

The document is a comprehensive answer sheet containing various technical questions and answers related to computer hardware, networking, and software. It covers topics such as USB connectors, memory types, network configurations, security protocols, and troubleshooting commands. Each entry provides a specific question followed by its corresponding answer, serving as a reference for IT-related knowledge.

Uploaded by

Marga Balajadia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

TESDA ANSWER SHEET

1. This is the common color of a 3.0 USB connector. It is the standard Type- A
receptacle and plug.= BLUE
2. A Type of Memory used in the SSD (Solid-State Drive) as Storage.= FLASH
MEMORY
3. Where is the BIOS Stored in a Standard Computer? = READ ONLY MEMORY
4. A complete copy of everything stored on a physical optical disc is commonly
referred to as an = ISO IMAGE OR IMAGE
5. The minimum requirement for storage capacity required for Windows 10
Installation. =
16 GB FOR 32-BIT OS OR 20 GB FOR 64-BIT OS
6. A Windows Location where the device drivers store. = REGISTRY
7. What is the red wire on the PSU's (power supply) voltage rating? = +5
8. is a network cable where one end is T568A while the other
is T568B configuration = CROSS-OVER
9. In Windows 7, when LAN connection has across and red Indicator signifies that
there is
.= PROBLEM WITH THE LAN DRIVER
10.Which of the following hardware components can connect over a computer
network? =
NETWORK INTERFACE CARD
11.It is the networking device that forwards data packets between computer
networks. =
ROUTER
12.Wi-Fi is a trademark phrase, which means . = IEEE.802.11
13. is a collection of devices connected together in one physical location.
= LOCAL AREA NETWORK
14.A type of network that interconnects multiple local area network. =
WIDE AREA NETWORK
15.A computer program used to prevent, detect, and remove possible threats to
the system.
= ANTI-VIRUS SOFTWARE
16. Is a two or more PCs are connected and share resources
without going through a separate server computer. = PEER TO PEER
NETWORK
17.What IP address used by the virtual machine to communicate overthe physical
network?
= PROVIDER ADDRESS
18.What type of version that protects unauthorized network access by
utilizing a set-up password? = WPA2-PERSONAL
19. Consists of the user matrices, and capabilitytables that govern the
rights and privileges of users. = ACCESS CONTROL LIST
20.It occurs when an attacker or trusted insider steals data from a computer
system and demands compensation for its return. = INFORMATION
EXTORTION
21.It monitors the initial security accreditation of an information system
for tracking of changes. = CONTINUOUS ASSESSMENT
22.What services in Windows Server that enables administrators to
migrate data to a low-cost and tape media on fileservers? = REMOTE
STORAGE DEVICE
23.What application group that contains a Client Access Point and with at
least one application specific resource? = VIRTUAL CLUSTER SERVER
24.A utility tool test whether a particular host is reachable across an IP network.
= PING
25.Which of the following keys is not appropriate to enter BIOS setup? = F3
26.Allows a computer to boot up without unnecessary drivers, which makes it
easier to run diagnostics and uninstall unwanted apps. = SAFE MODE
27.What Starts up recovery options in a computer that essentially boot into the
RECOVERY partition of the main hard drive? = REPAIR COMPUTER
28.A single physical hard drive can divide into multiple hard drives. =
LOGICAL
29.What are the two types of interface used to communicate between the hard
drive and the computer motherboard? = ADVANCE TECHNOLOGY
ATTACHMENT (ATA) AND SERIAL ADVANCED TECHNOLOGY ATTACHMENT
(SATA)
30.What is the spider-like Interconnection in millions of pieces of information
located on computers around the cyber space? = WORLD WIDE WEB
31.A compound used to prevent overheating of CPU = THERMAL PASTE
32.What is the maximum cable length for USB 2.0? = 5 METERS
33.What software programs stores into a Read Only Memory (ROM)? = FIRMWARE
34.Disc image is also known as . = ISO IMAGE
35.What is the minimum hardware requirements of the computer RAM, for
Windows 10? =
1 GIGABYTE (GB) FOR 32-BIT OR 2GB FOR 64-BIT
36.An extension of Microsoft management console used to manage
hardware devices including device drivers. = DEVICE MANAGER
37.What is the volt rating of the YELLOW wire in a power supply? = +12V
38.A Yost cable ,Cisco cable ,and Console cable also known as . = ROLL
OVER
39.In server 2008, Local area Network (LAN) connection icon in a yellow
color indicator signifies .= NO CONNECTIVITY
40.Light Emitting Diode (LED) In Network Interface Card (NIC) has lights. = 2
41.Port is an application of network address translation (NAT) the directs a
communication request from one address and port number combination to
another . = FORWARDING
42.What is the alternative for wired connection that uses radio frequencies to
send signals between devices and a router ? = WIRELESS FIDELITY
43. is a computer made up of an interconnection of local area network
(LANs)within a limited geographical area ,e.g. corporate buildings . =
CAMPUS AREA NETWORK
44.What terms applies to the interconnection of LAN in a city into 5 to 50
kilometers ? =
SYSTEM AREA NETWORK
45.Who is assign to monitor the network security ,operation and network users? =
NETWORK ADMINISTRATOR
46. is used to store the user documents with large amount of memory
and storage space . = FILE SERVER
47.What IP address used by the virtual machine to communicate over the
physical network?
= PROVIDER ADDRESS
48.What type of version verifies network users though a server and
requires a more a complicated setup ,but provides additional security?
= WPA2-ENTERPRISE
49. Is a way to identify a specific process to which an internet or
other network message forwarded when it arrives at a server = PORT
NUMBER
50.An automated software program that executes certain commands when
it receive a specific input is . = BOT
51. enable administrators to configure storage thresholds on particular
set of data stored on server NTFS volumes = FILE SYSTEM QUOTA
52.What feature in window Server provides the ability to migrate workloads
between a source and target cluster ? = FAILOVER
53.What log files that records performance statistic based on the various
objects and instances available in Performance monitor ? = COUNTER
LOGS
54.The Recovery Console Command that examines the volume for errors and
repairs it . =
CHKSDSK
55.The computer system is functional if it is = NORMAL BOOTING
56.What kind of windows update lets you downloads and installs latest updates
versions? =
FULLY AUTOMATIC
57.What is the physically damaged cluster of storage on the hard drive ? = BAD
SECTOR
58.It occurs when two or more devices connected with the same IP address in
a computer network . = IP ADDRESS CONFLICT
59.What storage device should replace if frequent error messages appear
while moving files and booting up operating system? = HARD DISK
60.What Recovery Console Commands that writes a new master boot record
on the hard disk drive ? = FIXMBR
61.What is the maximum cable length for UBS 3.0 using a non-twisted
pair wire? = 3 METERS
62.M.2 is a form factor for . = STORAGE DRIVE
63.What kind of chip stores the settings in the BIOS? = REAL TIME
CLOCK/NON VOLATILE RANDOM ACCESS MEMORY (RTC/NVRAM)
CHIP
64.It is used as a substitute for actual disc, allowing users to run without
having to load a CD or DVD. = ISO FILE
65.What Windows edition has a program capable of restricting other users to
access certain program in a computer? = WINDOWS ULTIMATE
66.In what folder that the device can be found? = SYSTEM32
67.An Ideal voltage range on the hotwires of a Molex connector? = RED=
5V,YELLOW= 12V
68.What Ethernet cable used to connect computers to hubs & switches? =
STRAIGHT-THRU
69.A network interface controller also known as . = LAN CARD
70.What class of IP address is 192. 168.0.1? = CLASS C
71.A router that is design to operate in the internet backbone. = CORE
72. allow to define a list of devices and only allow those devices on Wi-Fi
network. =
MAC ADDRESS FILTERING
73.What type of network that connects thought signals, e.g. Infrared? =
WIRELESS PERSONAL AREA NETWORK
74. allows users to move around the coverage area in a line of
sight while maintaining a network connection. = WIDE AREA
NETWORK
75. is an enterprise-level heterogeneous backup and recovery suite.=
NETBACKUP
76.A type of serve that allow the central administrator and management of
network users and network resources. = DIRECTORY SERVER
77. is an information asset suffering damage, unintended modification or
disclosure. =
LOSS
78.The network security standard that tries to make connections between a
router and wireless devices faster and easier. = WPS
79.Which of the following is the most efficient in transferring larger
files? = FILE TRANSFER PROTOCOL
80.What technique used to gain unauthorized access to computers,wherein
the intruder sends messages with a source IP address? = SPOOFING
81.It enables administrators to define the types of file that can save within
a windows volume and folder. = FILE SCREENING
82.What log files that conserves disc space by ensuring that the performance
log file will not continue growing over certain limits? = NETWORK LOAD
BALANCING
83.A should be upgraded to receive and transmit strong signals to and
from other computer. = NETWORK CARD
84.A protocol that provides quick, automatic, and central management for the
distribution of IP addresses within a network. = DYNAMIC HOST CONTROL
PROTOCOL (DHCP)
85.What command-line tool used to find the IP address that corresponds
to a host or domain name? = NSLOOKUP
86.What is the problem of a computer if the time and date keeps on
resetting even after fixing in the BIOS? = CMOS BATTERY FAILURE
87.A tool used for checking the condition of the hard drive with signs like
“Good” “Caution” or “ bad”. = CRYSTALDISKINFO
88.A Task to do after planning to fix the network is . = IMPLEMENTING
THE SOLUTIONS
89.A process of scanning, Identifying, diagnosing and resolving problems,
errors and bugs in software. = SOFTWARE TROUBLESHOOTING
90. is a 24 pin USB connector system with a rotationally symmetrical
connector. =
UNIVERSAL SERIAL BUS (USB) C THUNDERBOLL
91.it facilitates communication between the CPU and other devices in the system.
=
CHIPSET
92.What option in the BIOS/UEFI used to over clock computers = VOLTAGE
BASIC INPUT OUTPUT SYSTEM (BIOS)
93.Minimum byte capacity of a bootable flash drive for Windows 10 is = 8GB
94.What is the minimum RAM requirement of servers 2012 R2? = 512 MB
95.IN Windows 7,Windows update and security is located in = SETTINGS
96.What voltages that ATX12V P1 connector provides for the motherboard? =
3,3V,5V,12V
97. defined as a structured network cabling system standard for
commercial buildings and between buildings in campus
environments. = ANSITA/TIA 568
98.in networking refers to places of related information that are transferred
through a network = CONNECTION
99.What Class of IP addressing is172.168.10.1? = CLASS B
100. What type of router enables an internal network to connect to external
network? =
EDGE
101. What pertain to the maximum data transfer rate of a network for internet
connection?
= BANDWIDTH
102. What type of a high speed network/subnetwork that composed of hosts
and interconnects using a variety of technology/topology? = STORAGE
AREA NETWORK
103. it acts like a border router to connect corporate sites to wired access lines
=
CUSTOMER PREMISES EQUIPMENT (CPE)
104. is a process of recognizing a users identity = AUTHENTICATION
105. A type of server that occupies a large portion of computing territory
between the database server and end user. = APPLICATION SERVER
106. In the context of security is a privilege or assigned permission for the
use of computer data or resources. = ACCESS
107. What media types of 10-megabit Ethernet that compose of broadband
coaxial cable carrying multiple baseband channels for a maximum length of
3,600 meters? = 10BASE-36
108. A network security system that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. = FIREWALL
109. What term used refer when a system is unavailable = DOWNTIME
110. Which of the following commands used to certify the peer name
resolution in Active Directory? = NSLOOKUP
111. What active directory protocol used to access data from a database? =
LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP)
112. Which of the following displays the measures and various real time
statistics on the system’s performing? = VIEW CURRENT ACTIVITY
113. What type of peripheral card having media access control address? =
NETWORK INTERFACE CARD
114. Which of the following is a term for the main patch panel that
links to every telecommunication room inside the building? =
VERTICAL CROSS-CONNECT
115. An enclosed or semi-enclosed channel that protects, routes and hides
cables and wires = RACEWAY
116. A material that slid before crimping both ends of a patch cable and
acts to reduce strain in a cable. = BOOT
117. What test verifies the operation of communication device by sending
and receiving data from the same port? = LOOPBACK TEST
118. What networking tool that monitors and intercepts traffic over the
computer network?
= PACKET ANALYZER
119. Resistance reading of an open wire is = INFINITE OHMS
120. is an interface standard for a serial bus for high-speed
communications also referred as institute for Electrical and Electronics
Engineer (IEEE) 1394 interface. = FIREWIRE
121. A microchip to manage data communication between a CPU and a
motherboard. =
INPUT/OUTPUT CONTROLLER HUB
122. A Setup option in Unified Extensible Firmware Interface (UEFI) Basic Input
Output System (BIOS) that allows security settings to perform such tasks as
locating the device.
= LOJACK
123. A text based command used for creating bootable flash drive = DISKPART
124. What is the minimum Random Access Memory (RAM) requirement of
Server 2008 R2? = 512MB
125. In Windows 7, an indicator tells that the video driver has not
installed.= ONLY STANDARD VIDEO IS DISPLAYED
126. A Volt meter reading of a shorted diode. = ZERO VOLT
127. is the purpose of joining two cables ends together. =
CABLE SPLICING
128. What is the hardware device that enables to connect serial
devices across a network? = TERMINAL SERVER
129. What Class of IP addressing is 10.10.10.1? = CLASS A
130. How many device can connect to a wireless router? = 250
131. A device that acts as a bridge between wireless clients and wired network
is .
= ACCESS POINT
132. A logical subnetwork that groups collection of devices from the same
nework switch.
= VIRTUAL LOCAL AREA NETWORK
133. It is the time lapse between data send and when received, it can have a
big impact on performance. = LATENCY
134. which means pushing components to its limit and extremes. =
STRESS TEST
135. What type of server that enables large numbers users to exchange
information near instantaneously and formerly known as Internet Relay Chat
(IRC) Servers? =
REAL-TIME COMMUNICATION SERVER
136. It ensures that information and programs are changing only in a
specified and authorized manner. = INTERGRITY
137. What command-line network utility that displays network connections
for TCP and routing tables? = NETSTAT
138. What set of rules that describe how software and hardware should
interact within a network? = COMMUNICATIONS PROTOCOL
139. What attack includes the execution of viruses, worms, trojan horses, and
active Web scripts with the intent to destroy or steal information? =
MALICIOUS CODE
140. Set of rules for transferring files such as text. graphic images, sound,
video and other multimedia files, on the World Wide Web (WWW). =
HYPERTEXT TRANSFER PROTOCOL (HTTP)
141. What is the traditional method used to access server data and using
the server message block protocol over TCP/IP? = WINDOWS FOLDER
SHARING
142. What two command-line utilities used to export and import Active
Directory object information? = LDIFDE.EXE AND CSVDE.EXE
143. A node in a computer network that allows data to flow from one discrete
network to another. = GATEWAY
144. What electrical quantities measured when performing continuity
testing of twisted pair cable? = RESISTANCE
145. What types of backup used in hard drive, disc, flash drive and external
drive that are housed on site? = LOCAL BACKUP
146. What recovery tool in windows fixes and scans computer problem
that prevents computer from booting repeatedly? = STARTUP REPAIR
147. used to run commands for troubleshooting unbootable operating
system.
= WINDOS RECOVERY ENVIRONMENT
148. Which of the following electronic components need to discharge
electrically before the replacement of parts? = CAPACITOR
149. The most current wireless netwoking standard and can communicate
with the older network standards. = 802.11n

You might also like