0% found this document useful (0 votes)
18 views39 pages

Unit 1: Computer Maintenance - 50 Multiple Choice Questions

The document consists of multiple-choice questions covering two units: Computer Maintenance and Operating Systems and Software Essentials. Unit 1 focuses on hardware management, troubleshooting, and safety measures in computer maintenance, while Unit 2 addresses operating system installation, configuration, and maintenance. Key concepts include the importance of ESD protection, the role of BIOS, and the significance of regular system maintenance.

Uploaded by

tesfaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views39 pages

Unit 1: Computer Maintenance - 50 Multiple Choice Questions

The document consists of multiple-choice questions covering two units: Computer Maintenance and Operating Systems and Software Essentials. Unit 1 focuses on hardware management, troubleshooting, and safety measures in computer maintenance, while Unit 2 addresses operating system installation, configuration, and maintenance. Key concepts include the importance of ESD protection, the role of BIOS, and the significance of regular system maintenance.

Uploaded by

tesfaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 39

Unit 1: Computer Maintenance - 50 Multiple

Choice Questions
1. What is the primary focus of Unit 1 in the Computer Maintenance and Networking
Teacher Trainees’ Module?
A. Network configuration
B. Computer maintenance and hardware management
C. Software development
D. Cybersecurity protocols
2. What is a key objective of Unit 1?
A. Develop web applications
B. Build understanding of computer hardware components and maintenance
C. Configure server roles
D. Promote entrepreneurship skills
3. What is a career pathway in computer maintenance and networking?
A. Software programming
B. Roles like IT technician, network administrator, or hardware specialist
C. Graphic design
D. Database management
4. Which skill is essential for a computer maintenance technician?
A. Web design
B. Troubleshooting hardware issues
C. Marketing strategies
D. Database scripting
5. What is Kaizen in the context of computer maintenance?
A. A programming language
B. A philosophy of continuous improvement in processes
C. A network protocol
D. A hardware component
6. How does Kaizen benefit IT workplaces?
A. Increases hardware costs
B. Enhances efficiency and productivity
C. Reduces system security
D. Limits collaboration
7. What is a key principle of Kaizen?
A. Ignoring small changes
B. Implementing small, incremental improvements
C. Deleting system files
D. Avoiding teamwork
8. What is a common Kaizen tool used in IT maintenance?
A. Web browser
B. 5S methodology (Sort, Set, Shine, Standardize, Sustain)
C. Paint software
D. Network cable
9. What does the “Sort” step in 5S involve?
A. Keeping unnecessary tools in the workspace
B. Removing unneeded items from the work area
C. Formatting drives
D. Sharing files
10. What is the purpose of ensuring safe work conditions in IT?
A. To increase costs
B. To prevent accidents and protect equipment
C. To reduce efficiency
D. To limit productivity
11. What is a common safety measure in computer maintenance?
A. Wearing jewelry while working
B. Using an antistatic wrist strap
C. Keeping liquids near equipment
D. Ignoring ventilation
12. What does ESD stand for?
A. External System Drive
B. Electrostatic Discharge
C. Enhanced Security Device
D. Electronic Storage Disk
13. Why is ESD protection important?
A. To increase system speed
B. To prevent damage to components from static electricity
C. To improve network connectivity
D. To reduce storage capacity
14. What is an internal computer component?
A. Monitor
B. Motherboard
C. Keyboard
D. Mouse
15. Which component is considered the “brain” of the computer?
A. Power Supply Unit
B. Central Processing Unit (CPU)
C. Hard Drive
D. Monitor
16. What is the function of the Power Supply Unit (PSU)?
A. Processes data
B. Converts AC power to DC power for components
C. Stores files
D. Displays output
17. What is an external component of a computer?
A. RAM
B. Printer
C. GPU
D. CMOS battery
18. What is the purpose of the motherboard?
A. To display images
B. To interconnect all computer components
C. To store data
D. To cool the system
19. Which component temporarily stores data for quick access?
A. Hard Drive
B. RAM
C. ROM
D. Power Supply
20. What is the role of a cooling system in a computer?
A. To store files
B. To maintain safe operating temperatures
C. To connect to networks
D. To display graphics
21. What is a key step before assembling a computer?
A. Turn on the power
B. Gather tools and ensure ESD protection
C. Install software
D. Connect peripherals
22. What is the first step in disassembling a computer?
A. Remove the CPU
B. Turn off and unplug the system
C. Install drivers
D. Format the drive
23. Which tool is essential for assembling computer components?
A. Hammer
B. Phillips-head screwdriver
C. Paintbrush
D. Stapler
24. What should you do with components after disassembly?
A. Discard them
B. Label and organize them safely
C. Leave them exposed
D. Power them on
25. What is thermal paste used for during assembly?
A. To connect cables
B. To ensure proper heat transfer between CPU and heatsink
C. To clean components
D. To secure screws
26. What is a common tool for retrieving small parts during assembly?
A. Tweezers
B. Flashlight
C. Cable ties
D. Cleaning cloth
27. What is the purpose of troubleshooting in computer maintenance?
A. To install software
B. To identify and resolve hardware or software issues
C. To delete files
D. To configure networks
28. What is a POST error code?
A. A network configuration error
B. A code indicating hardware issues during boot
C. A software update
D. A file format
29. Which tool helps diagnose POST errors?
A. Cleaning cloth
B. POST debug card
C. Network cable
D. Mouse
30. What is a common cause of beep codes during startup?
A. Successful boot
B. Hardware faults like RAM or GPU issues
C. Network failure
D. Software updates
31. How do you interpret POST error codes?
A. Ignore them
B. Refer to the motherboard manual
C. Format the drive
D. Change the wallpaper
32. What is a common hardware troubleshooting step?
A. Delete all files
B. Check connections and reseat components
C. Install new software
D. Update the OS
33. What is a symptom of a failing power supply?
A. Fast system performance
B. Random shutdowns or failure to power on
C. High-quality prints
D. Stable network
34. What is the purpose of a diagnostic tool like MemTest86?
A. To test network speed
B. To check RAM for errors
C. To update drivers
D. To clean components
35. What should you do if a computer overheats?
A. Ignore it
B. Check cooling fans and clean dust
C. Delete files
D. Disconnect peripherals
36. What is a common external component requiring maintenance?
A. CPU
B. Printer
C. Motherboard
D. RAM
37. What is the role of the BIOS in a computer?
A. To store user files
B. To initialize hardware during startup
C. To connect to Wi-Fi
D. To display images
38. What is a common safety hazard in computer maintenance?
A. Using an antistatic mat
B. Working with a powered-on system
C. Organizing tools
D. Cleaning components
39. What is a benefit of applying Kaizen in computer maintenance?
A. Increased downtime
B. Streamlined processes and reduced errors
C. Higher costs
D. Limited collaboration
40. What is the “Standardize” step in the 5S methodology?
A. Removing unnecessary items
B. Creating consistent procedures for tasks
C. Cleaning the workspace
D. Sustaining improvements
41. What is a career benefit of computer maintenance skills?
A. Limited job opportunities
B. Eligibility for roles like IT support specialist
C. Reduced technical knowledge
D. No need for troubleshooting
42. What is a common internal component that requires regular maintenance?
A. Monitor
B. Cooling fan
C. Keyboard
D. Mouse
43. What is the purpose of an antistatic mat?
A. To increase static electricity
B. To prevent ESD damage to components
C. To clean surfaces
D. To organize cables
44. What is a common troubleshooting tool for hardware?
A. Web browser
B. Digital multimeter
C. Word processor
D. Social media
45. What should you check if a computer fails to boot?
A. Monitor resolution
B. Power connections and hardware seating
C. Internet speed
D. Printer settings
46. What is a common external peripheral requiring driver installation?
A. CPU
B. Scanner
C. RAM
D. Motherboard
47. What is the “Sustain” step in 5S?
A. Cleaning the workspace
B. Maintaining improvements through discipline
C. Removing items
D. Setting tools in order
48. What is a common repair task for hardware faults?
A. Deleting files
B. Replacing faulty components like RAM or PSU
C. Changing wallpapers
D. Updating software
49. What is a key principle of safe work conditions?
A. Ignoring ventilation
B. Ensuring proper grounding and ventilation
C. Keeping liquids near equipment
D. Working with open power supplies
50. What is a benefit of teaching computer maintenance with a constructivist approach?
A. Passive learning
B. Students build knowledge through hands-on activities
C. Limited problem-solving
D. Memorizing procedures only

Unit 2: Operating Systems and Software


Essentials - 50 Multiple Choice Questions
51. What is the primary focus of Unit 2 in the Computer Maintenance and Networking
Teacher Trainees’ Module?
A. Network configuration
B. Operating systems and software management
C. Hardware assembly
D. Network security
52. What is a key objective of Unit 2?
A. Develop web applications
B. Install, configure, and maintain operating systems and software
C. Design network topologies
D. Promote entrepreneurship
53. What is an operating system (OS)?
A. A hardware component
B. Software that manages hardware and software resources
C. A network protocol
D. A peripheral device
54. Which of the following is an example of an operating system?
A. Microsoft Word
B. Windows 10
C. Google Chrome
D. Adobe Photoshop
55. What is a dual-boot configuration?
A. Running two applications simultaneously
B. Installing two operating systems on the same computer
C. Connecting two networks
D. Using two monitors
56. What is a key requirement for a dual-boot setup?
A. Single partition
B. Separate partitions for each operating system
C. No drivers needed
D. Single user account
57. Which tool is used to create a bootable USB for OS installation?
A. Notepad
B. Rufus or Windows Media Creation Tool
C. Paint
D. File Explorer
58. What is the first step in installing an operating system?
A. Format the drive
B. Boot from installation media (USB/DVD)
C. Install applications
D. Configure network settings
59. What is the purpose of a product key during OS installation?
A. To configure hardware
B. To activate and validate the OS license
C. To connect to Wi-Fi
D. To install drivers
60. What is a partition in the context of OS installation?
A. A network segment
B. A section of a hard drive allocated for an OS or data
C. A user account
D. A software update
61. Which file system is commonly used for Windows OS installations?
A. FAT32
B. NTFS
C. ext4
D. APFS
62. What is the purpose of a user account in an operating system?
A. To store files
B. To control access and permissions
C. To connect to networks
D. To update drivers
63. What is the difference between an administrator and a standard user account?
A. Administrators have limited access; standard users have full control
B. Administrators have full control; standard users have limited access
C. Both have identical permissions
D. Standard users cannot log in
64. How do you create a user account in Windows?
A. Open File Explorer
B. Use Control Panel or Settings (Accounts)
C. Run Paint
D. Edit system files
65. What is a group policy in Windows?
A. A hardware configuration
B. A set of rules to manage user and computer settings
C. A network protocol
D. A backup tool
66. What is a driver in the context of software?
A. A file format
B. Software that enables communication between OS and hardware
C. A network cable
D. A user account
67. Where can you find drivers for a hardware device?
A. Social media
B. Manufacturer’s website or Windows Update
C. Email attachments
D. Random websites
68. What is the purpose of updating drivers?
A. To delete files
B. To improve hardware performance and compatibility
C. To change wallpapers
D. To configure networks
69. How do you install a driver in Windows?
A. Open Recycle Bin
B. Use Device Manager or run the driver installer
C. Edit system files
D. Change desktop settings
70. What is a common symptom of an outdated driver?
A. Improved performance
B. Hardware malfunctions or errors
C. Faster boot times
D. Stable network
71. What is system maintenance in the context of operating systems?
A. Deleting all files
B. Regular tasks to optimize performance and security
C. Installing games
D. Changing wallpapers
72. Which Windows tool is used for disk cleanup?
A. Paint
B. Disk Cleanup
C. Task Manager
D. Notepad
73. What is the purpose of defragmenting a hard drive?
A. To delete data
B. To optimize file access speed
C. To connect to Wi-Fi
D. To install drivers
74. Which tool is used to defragment a drive in Windows?
A. File Explorer
B. Disk Defragmenter (Optimize Drives)
C. Paint
D. Control Panel
75. What is a system restore point?
A. A network configuration
B. A snapshot of system settings for recovery
C. A user account
D. A file format
76. How do you create a system restore point in Windows?
A. Open Recycle Bin
B. Use System Protection in System Properties
C. Run Task Manager
D. Edit system files
77. What is the purpose of Windows Update?
A. To delete files
B. To install security patches and updates
C. To change wallpapers
D. To configure hardware
78. What is a common issue during OS installation?
A. Incompatible hardware or missing drivers
B. Fast internet speed
C. Updated software
D. Full storage
79. What is a boot loader?
A. A hardware component
B. Software that manages the boot process for multiple OSes
C. A network cable
D. A user account
80. What is a common dual-boot OS combination?
A. Windows and macOS
B. Windows and Linux
C. Linux and iOS
D. Android and Windows
81. What is a registry in Windows?
A. A hardware component
B. A database storing system and application settings
C. A network protocol
D. A backup tool
82. How do you access the Windows Registry?
A. Open File Explorer
B. Use Registry Editor (regedit)
C. Run Paint
D. Change desktop settings
83. What is a common risk of editing the Windows Registry?
A. Improved performance
B. System instability if done incorrectly
C. Faster boot times
D. Stable network
84. What is the purpose of Task Manager in Windows?
A. To edit photos
B. To monitor and manage running processes
C. To share files
D. To configure printers
85. What is a common system maintenance task?
A. Deleting all files
B. Removing temporary files and updating software
C. Changing wallpapers
D. Installing games
86. What is a benefit of regular system maintenance?
A. Increased errors
B. Improved performance and security
C. Reduced storage
D. Limited connectivity
87. What is a common tool for checking disk health?
A. Notepad
B. Check Disk (chkdsk)
C. Paint
D. Task Manager
88. What does the “chkdsk” command do?
A. Deletes files
B. Scans and repairs disk errors
C. Updates drivers
D. Configures networks
89. What is a common symptom of a corrupted OS?
A. Fast performance
B. Frequent crashes or error messages
C. Stable network
D. High-quality prints
90. What should you do if an OS fails to boot?
A. Delete all files
B. Use Safe Mode or Recovery Environment
C. Change wallpaper
D. Install new hardware
91. What is Safe Mode in Windows?
A. A full-featured mode
B. A diagnostic mode with minimal drivers
C. A network configuration
D. A backup tool
92. What is a common cause of software conflicts?
A. Updated drivers
B. Incompatible or outdated applications
C. Fast internet
D. Clean disk
93. How do you uninstall a program in Windows?
A. Open Recycle Bin
B. Use Programs and Features in Control Panel
C. Run Task Manager
D. Edit system files
94. What is a benefit of configuring user accounts?
A. Increased security risks
B. Controlled access and permissions
C. Reduced performance
D. Limited storage
95. What is a common software maintenance task?
A. Deleting all files
B. Updating applications and removing unused programs
C. Changing wallpapers
D. Installing games
96. What is a common tool for managing startup programs?
A. Paint
B. Task Manager or System Configuration (msconfig)
C. Notepad
D. File Explorer
97. What is the purpose of a backup in system maintenance?
A. To delete data
B. To restore data in case of failure
C. To share files
D. To configure networks
98. Which Windows tool is used for backups?
A. Notepad
B. File History or Backup and Restore
C. Paint
D. Task Manager
99. What is a common step to resolve driver issues?
A. Delete all files
B. Roll back or update the driver in Device Manager
C. Change wallpaper
D. Format the drive
100. Why is teaching OS maintenance with a constructivist approach effective?
A. Encourages passive learning
B. Promotes hands-on problem-solving and critical thinking
C. Limits practical skills
D. Focuses on memorization

Unit 3: Networking and Resource Sharing -


50 Multiple Choice Questions
101. What is the primary focus of Unit 3 in the Computer Maintenance and
Networking Teacher Trainees’ Module?
A. Hardware assembly
B. Networking and resource sharing
C. Operating system installation
D. Cybersecurity protocols
102. What is a key objective of Unit 3?
A. Develop software applications
B. Configure and manage network systems and resource sharing
C. Repair computer hardware
D. Promote ethical standards
103. What is a computer network?
A. A single computer
B. A group of interconnected devices sharing data
C. A hardware component
D. A software application
104. Which type of network is typically used in a small office?
A. WAN
B. LAN
C. MAN
D. PAN
105. What is the purpose of requirements gathering in network setup?
A. To delete files
B. To identify user needs and network specifications
C. To install software
D. To change wallpapers
106. What is a common requirement for a network setup?
A. Monitor size
B. Number of users and devices
C. Keyboard type
D. Mouse sensitivity
107. Which device connects multiple devices in a network?
A. Monitor
B. Switch or router
C. CPU
D. Printer
108. What is the role of a router in a network?
A. Stores files
B. Directs data packets between networks
C. Prints documents
D. Scans images
109. What is an IP address?
A. A physical address of a computer
B. A unique numerical label for network devices
C. A user account
D. A software license
110. Which protocol automatically assigns IP addresses?
A. HTTP
B. DHCP
C. FTP
D. SNMP
111. What is a subnet mask used for?
A. To encrypt data
B. To divide a network into smaller subnetworks
C. To store files
D. To configure printers
112. What is a default gateway?
A. A storage device
B. A device that connects a local network to external networks
C. A user account
D. A software update
113. How do you check an IP address in Windows?
A. Open Recycle Bin
B. Use Command Prompt with “ipconfig”
C. Run Paint
D. Change desktop settings
114. What is the purpose of a DNS server?
A. To assign IP addresses
B. To translate domain names to IP addresses
C. To share files
D. To update drivers
115. Which tool is used to test network connectivity?
A. Notepad
B. Ping
C. Paint
D. Task Manager
116. What does the “ping” command do?
A. Deletes files
B. Tests connectivity between devices
C. Updates software
D. Configures printers
117. What is resource sharing in a network?
A. Limiting access to files
B. Allowing multiple users to access files or devices
C. Formatting drives
D. Changing wallpapers
118. Which protocol is commonly used for file sharing in Windows?
A. HTTP
B. SMB (Server Message Block)
C. FTP
D. SNMP
119. How do you share a folder in Windows?
A. Delete the folder
B. Right-click folder > Properties > Sharing tab > Share
C. Open Task Manager
D. Change desktop settings
120. What is a benefit of printer sharing in a network?
A. Increased costs
B. Multiple users can print from one device
C. Reduced print quality
D. Limited access
121. What is a requirement for setting up a network printer?
A. A CD-ROM drive
B. An IP address or network discovery enabled
C. A graphics card
D. A local USB connection
122. What is a network drive?
A. A local storage device
B. A shared folder mapped for network access
C. A software application
D. A hardware component
123. How do you map a network drive in Windows?
A. Open Control Panel > Appearance
B. Right-click This PC > Map Network Drive
C. Run Paint
D. Edit system files
124. What is a disadvantage of resource sharing?
A. Increased security
B. Potential security risks if not properly configured
C. No maintenance needed
D. Reduced efficiency
125. What is a collaboration tool in networking?
A. A hardware component
B. Software for teamwork and communication
C. A network cable
D. A backup tool
126. Which of the following is a collaboration tool?
A. Microsoft Teams
B. File Explorer
C. Paint
D. Notepad
127. What is remote access in networking?
A. Deleting files remotely
B. Accessing a computer or network from a different location
C. Formatting drives
D. Changing wallpapers
128. Which tool is used for remote access in Windows?
A. Notepad
B. Remote Desktop Connection
C. Paint
D. Task Manager
129. What is a requirement for remote desktop access?
A. A local USB connection
B. Enabled Remote Desktop settings and credentials
C. A CD-ROM drive
D. A graphics card
130. What is a VPN used for in remote access?
A. To store files
B. To create a secure connection over the internet
C. To print documents
D. To update drivers
131. What is a common issue with network connectivity?
A. Updated drivers
B. Incorrect IP settings or cable issues
C. Fast internet
D. Clean disk
132. What is the purpose of a firewall in network configuration?
A. To increase speed
B. To block unauthorized access
C. To share files
D. To update software
133. What is a common network topology?
A. Star topology
B. File topology
C. User topology
D. Software topology
134. What is a benefit of a star topology?
A. Difficult to troubleshoot
B. Easy to manage and expand
C. High failure rate
D. Limited scalability
135. What is a switch in a network?
A. A storage device
B. A device that connects devices within a LAN
C. A user account
D. A software update
136. What is a MAC address?
A. A software license
B. A unique physical address for network devices
C. A user account
D. A file format
137. What is the purpose of NAT (Network Address Translation)?
A. To delete files
B. To map private IP addresses to public ones
C. To share printers
D. To update drivers
138. What is a common protocol for secure file transfer?
A. HTTP
B. SFTP
C. SNMP
D. SMTP
139. What is the role of a modem in network setup?
A. Stores files
B. Converts digital signals to analog for internet access
C. Prints documents
D. Scans images
140. What is a wireless access point?
A. A storage device
B. A device connecting wireless devices to a wired network
C. A user account
D. A software update
141. What is a common issue with shared printers?
A. Full storage
B. Incorrect IP or driver issues
C. Updated software
D. Fast internet
142. What is the purpose of QoS (Quality of Service) in networking?
A. To delete files
B. To prioritize network traffic for better performance
C. To share folders
D. To update drivers
143. What does the “tracert” command do?
A. Deletes files
B. Traces the route packets take to a destination
C. Updates software
D. Configures printers
144. What is a workgroup in Windows networking?
A. A group of servers
B. A collection of computers sharing resources in a small network
C. A software application
D. A hardware component
145. How do you enable file sharing in Windows?
A. Turn off network discovery
B. Enable file and printer sharing in Network and Sharing Center
C. Delete shared folders
D. Disable the firewall
146. What is a benefit of using collaboration tools?
A. Reduced communication
B. Improved teamwork and productivity
C. Increased costs
D. Limited access
147. What is a common security measure for shared resources?
A. Open access
B. Password-protected sharing
C. No encryption
D. Public sharing
148. What is a common tool for remote collaboration?
A. Paint
B. Zoom or Microsoft Teams
C. Notepad
D. File Explorer
149. What is a benefit of remote access tools?
A. Increased security risks
B. Accessing systems from anywhere
C. Reduced performance
D. Limited connectivity
150. Why is the inquiry-based approach effective for teaching networking?
A. Encourages passive learning
B. Promotes student-led exploration and problem-solving
C. Limits practical skills
D. Focuses on memorization

Unit 4: IT Entrepreneurship and Workplace


Ethics - 50 Multiple Choice Questions
151. What is the primary focus of Unit 4 in the Computer Maintenance and
Networking Teacher Trainees’ Module?
A. Network configuration
B. IT entrepreneurship and workplace ethics
C. Hardware troubleshooting
D. Operating system installation
152. What is a key objective of Unit 4?
A. Configure server roles
B. Promote ethical standards and business skills in IT
C. Install software drivers
D. Design network topologies
153. What does workplace ethics refer to in the IT industry?
A. Hardware maintenance
B. Principles guiding professional behavior and decision-making
C. Network protocols
D. Software licensing
154. Which of the following is an example of ethical behavior in IT?
A. Sharing client data without permission
B. Respecting user privacy and data confidentiality
C. Using pirated software
D. Ignoring security updates
155. What is a consequence of unethical behavior in IT?
A. Increased trust
B. Loss of reputation or legal issues
C. Improved productivity
D. Enhanced security
156. What is a key principle of professional ethics in IT?
A. Ignoring client needs
B. Maintaining integrity and transparency
C. Deleting client data
D. Avoiding communication
157. What is IT entrepreneurship?
A. Managing hardware only
B. Starting and running IT-related businesses or projects
C. Configuring networks
D. Installing operating systems
158. What is a business idea in the context of IT entrepreneurship?
A. A network topology
B. A concept for providing IT services or products
C. A hardware component
D. A software update
159. Which of the following is an IT business idea?
A. Selling clothing
B. Offering computer repair services
C. Manufacturing furniture
D. Growing crops
160. What is a feasibility study?
A. A hardware troubleshooting guide
B. An analysis to determine if a business idea is viable
C. A network configuration
D. A software license
161. What is a key component of a feasibility study?
A. Desktop wallpaper settings
B. Market analysis and financial projections
C. RAM specifications
D. Printer configurations
162. What does market research involve in IT entrepreneurship?
A. Ignoring customer needs
B. Identifying target customers and their demands
C. Formatting drives
D. Sharing files
163. What is a target market?
A. All potential customers
B. A specific group of customers for a product or service
C. A network protocol
D. A hardware component
164. What is a SWOT analysis used for in entrepreneurship?
A. To configure networks
B. To identify Strengths, Weaknesses, Opportunities, and Threats
C. To install software
D. To troubleshoot hardware
165. Which of the following is a strength in a SWOT analysis for an IT business?
A. Lack of technical skills
B. Expertise in network configuration
C. High competition
D. Limited funding
166. What does the “T” in SWOT stand for?
A. Technology
B. Threats
C. Trends
D. Targets
167. What is a business plan?
A. A network topology
B. A document outlining business goals and strategies
C. A hardware component
D. A software update
168. Why is a business plan important for an IT startup?
A. To reduce internet speed
B. To guide operations and attract investors
C. To delete files
D. To configure printers
169. What is a startup cost in an IT business?
A. Ongoing operational expenses
B. Initial expenses to start the business
C. Software updates
D. Network configurations
170. Which of the following is a startup cost for an IT business?
A. Monthly utilities
B. Purchasing diagnostic tools
C. Employee salaries
D. Marketing campaigns
171. What is revenue in an IT business?
A. Money spent on operations
B. Income from services or products
C. Hardware costs
D. Network bandwidth
172. What is profit?
A. Total expenses
B. Revenue minus expenses
C. Initial investment
D. Market share
173. What is a business model?
A. A hardware configuration
B. A plan for generating revenue and profit
C. A network topology
D. A software license
174. Which business model is common for IT services?
A. Subscription-based services
B. Selling physical products only
C. Growing crops
D. Manufacturing cars
175. What is the purpose of marketing in an IT business?
A. To increase costs
B. To promote services and attract customers
C. To configure servers
D. To assemble computers
176. Which marketing strategy is effective for an IT repair business?
A. Ignoring customer feedback
B. Using social media to reach local clients
C. Deleting advertisements
D. Avoiding promotions
177. What is a unique selling proposition (USP)?
A. A common service offered by competitors
B. A feature that distinguishes a business from competitors
C. A network protocol
D. A hardware component
178. Why is customer service critical in an IT business?
A. To increase expenses
B. To build trust and retain clients
C. To reduce sales
D. To limit communication
179. What is a common way to advertise an IT business?
A. Word-of-mouth referrals
B. Ignoring local markets
C. Deleting social media
D. Avoiding promotions
180. What is a sole proprietorship?
A. A business owned by multiple partners
B. A business owned by one person
C. A government-run organization
D. A non-profit entity
181. What is a legal requirement for starting an IT business?
A. Changing desktop settings
B. Obtaining a business license
C. Formatting drives
D. Sharing files
182. What is a partnership in business?
A. A single-owner business
B. A business owned by two or more individuals
C. A network configuration
D. A software update
183. What is the purpose of a business budget?
A. To increase expenses
B. To plan and control financial resources
C. To delete files
D. To configure printers
184. Which of the following is a fixed cost in an IT business?
A. Repair materials
B. Office rent
C. Customer refunds
D. Advertising campaigns
185. What is a variable cost?
A. A cost that remains constant
B. A cost that changes with business activity
C. A network fee
D. A software license
186. What is break-even analysis?
A. Calculating total revenue
B. Determining when revenue equals expenses
C. Configuring network settings
D. Installing software
187. Why is cash flow important for an IT startup?
A. To limit growth
B. To ensure funds for operations and growth
C. To reduce sales
D. To delete files
188. What is a common source of funding for an IT startup?
A. Personal savings or loans
B. Deleting resources
C. Ignoring budgets
D. Changing wallpapers
189. What does a balance sheet show?
A. Daily operations
B. Assets, liabilities, and equity of a business
C. Network configurations
D. Software updates
190. What is an income statement?
A. A list of hardware components
B. A report of revenue, expenses, and profit over time
C. A network topology
D. A printer configuration
191. What is a competitive analysis?
A. Ignoring competitors
B. Evaluating competitors’ strengths and weaknesses
C. Formatting drives
D. Sharing files
192. Which skill is essential for an IT entrepreneur?
A. Avoiding customer interaction
B. Problem-solving and technical expertise
C. Ignoring market trends
D. Deleting resources
193. What is a pitch in entrepreneurship?
A. A hardware repair technique
B. A brief presentation to attract investors or clients
C. A network configuration
D. A software update
194. Why is networking important for IT entrepreneurs?
A. To limit opportunities
B. To build professional relationships and opportunities
C. To reduce sales
D. To configure servers
195. What is a business risk in IT entrepreneurship?
A. Guaranteed success
B. Potential challenges like competition or funding issues
C. A network protocol
D. A hardware component
196. How can an IT entrepreneur mitigate risks?
A. Ignore planning
B. Develop a risk management plan
C. Delete files
D. Avoid marketing
197. What is a value proposition?
A. A list of expenses
B. The benefit a business offers to customers
C. A network setting
D. A software license
198. Which tool can help manage an IT business’s finances?
A. File Explorer
B. Accounting software like QuickBooks
C. Task Manager
D. Paint
199. What is the purpose of a business logo?
A. To configure networks
B. To create brand recognition
C. To delete files
D. To install software
200. Why is the reflective approach effective for teaching IT entrepreneurship?
A. Encourages passive learning
B. Promotes self-assessment and critical thinking
C. Limits practical skills
D. Focuses on memorization

Unit 5: System Security and Protection - 50


Multiple Choice Questions
201. What is the primary focus of Unit 5 in the Computer Maintenance and
Networking Teacher Trainees’ Module?
A. Hardware assembly
B. System security and protection
C. IT entrepreneurship
D. Resource sharing
202. What is a key objective of Unit 5?
A. Develop web applications
B. Implement security measures for systems and networks
C. Install operating systems
D. Promote business skills
203. What is Windows Server primarily used for?
A. Desktop applications
B. Managing network services and resources
C. Web browsing
D. Hardware assembly
204. Which edition of Windows Server is suitable for large-scale virtualization?
A. Essentials
B. Standard
C. Datacenter
D. Home
205. What is a prerequisite for installing Windows Server?
A. Checking system requirements like CPU and RAM
B. Formatting the client PC
C. Installing a web browser
D. Changing the wallpaper
206. What is the minimum RAM required for Windows Server 2022 Standard?
A. 512 MB
B. 2 GB
C. 4 GB
D. 8 GB
207. Which tool is used to install Windows Server?
A. File Explorer
B. Windows Server Installation Wizard
C. Task Manager
D. Paint
208. What is the purpose of a product key during Windows Server installation?
A. To configure hardware
B. To activate and validate the server license
C. To connect to Wi-Fi
D. To install drivers
209. What is Active Directory (AD)?
A. A file-sharing protocol
B. A directory service for managing network users and resources
C. A hardware component
D. A backup tool
210. What is the role of a Domain Controller in Active Directory?
A. To store files
B. To manage authentication and authorization
C. To print documents
D. To configure firewalls
211. Which role must be installed for Active Directory?
A. File Server
B. Active Directory Domain Services (AD DS)
C. Web Server
D. Print Server
212. What is a Group Policy in Windows Server?
A. A hardware configuration
B. A set of rules to manage user and computer settings
C. A network protocol
D. A backup method
213. How do you access Group Policy settings?
A. Open File Explorer
B. Use Group Policy Management Console
C. Run Paint
D. Change desktop settings
214. What is a firewall in network security?
A. A storage device
B. A system to filter network traffic and block unauthorized access
C. A user account
D. A software update
215. Which type of firewall examines packet headers?
A. Application-layer firewall
B. Packet-filtering firewall
C. Proxy firewall
D. Stateful inspection firewall
216. What is Wi-Fi security used for?
A. To increase network speed
B. To protect wireless networks from unauthorized access
C. To store files
D. To update drivers
217. Which Wi-Fi encryption standard is most secure?
A. WEP
B. WPA2
C. WPA3
D. Open Wi-Fi
218. What is a common Wi-Fi security practice?
A. Using default passwords
B. Enabling strong encryption and changing default credentials
C. Disabling SSID broadcast
D. Sharing passwords
219. What is a VPN in network security?
A. A public file-sharing network
B. A secure tunnel for data over public networks
C. A hardware component
D. A backup tool
220. What is the purpose of authentication in user accounts?
A. To share files
B. To verify user identity
C. To delete data
D. To configure printers
221. What is two-factor authentication (2FA)?
A. Using two passwords
B. Requiring two forms of verification for access
C. Deleting two files
D. Sharing two resources
222. How do you create a user account in Windows Server?
A. Open Recycle Bin
B. Use Active Directory Users and Computers
C. Run Paint
D. Edit system files
223. What is a security group in Active Directory?
A. A storage device
B. A group for managing permissions for multiple users
C. A network cable
D. A software update
224. What is the purpose of system maintenance in Windows Server?
A. To delete files
B. To ensure performance and security
C. To share printers
D. To configure hardware
225. Which tool is used for backups in Windows Server?
A. Notepad
B. Windows Server Backup
C. Paint
D. Task Manager
226. What is a common cause of Windows Server installation failure?
A. Incompatible hardware or missing drivers
B. Fast internet speed
C. Updated software
D. Clean disk
227. What is network infrastructure in the context of security?
A. Hardware components only
B. The framework of devices, protocols, and services for secure networking
C. A user account
D. A software application
228. What is a common network security threat?
A. Software updates
B. Malware or phishing attacks
C. Backups
D. File sharing
229. What is a phishing attack?
A. A hardware failure
B. A scam to steal credentials via fake emails or websites
C. A network protocol
D. A backup method
230. How can you mitigate phishing attacks?
A. Click all links
B. Train users to verify senders and avoid suspicious links
C. Share passwords
D. Disable firewalls
231. What is a denial-of-service (DoS) attack?
A. A backup method
B. Overloading a network to disrupt service
C. A file-sharing protocol
D. A hardware repair
232. What is a common way to prevent DoS attacks?
A. Disable firewalls
B. Use traffic filtering and rate limiting
C. Share credentials
D. Avoid updates
233. What is a digital certificate?
A. A hardware component
B. A document verifying identity for secure communication
C. A network cable
D. A file format
234. Which protocol uses digital certificates?
A. HTTP
B. SSL/TLS
C. FTP
D. SNMP
235. What is the purpose of network segmentation?
A. To increase traffic
B. To isolate network sections for improved security
C. To delete files
D. To configure printers
236. What is a VLAN (Virtual Local Area Network)?
A. A physical network cable
B. A logical network segment for isolating traffic
C. A backup tool
D. A file-sharing protocol
237. What is a benefit of using VLANs?
A. Reduced security
B. Improved network security and performance
C. Increased hardware costs
D. Limited scalability
238. What is a common tool for monitoring network traffic?
A. Notepad
B. Wireshark
C. Paint
D. Task Manager
239. What is a security patch?
A. A hardware upgrade
B. A software update to fix vulnerabilities
C. A network cable
D. A file compression tool
240. What is a common source of network vulnerabilities?
A. Regular updates
B. Outdated software or unpatched systems
C. Backups
D. File sharing
241. What is a security policy in Windows Server?
A. A hardware configuration
B. A set of rules to protect systems and data
C. A backup tool
D. A file-sharing protocol
242. What is a common security policy rule?
A. Allow all access
B. Restrict access to authorized users only
C. Disable encryption
D. Share passwords
243. What is a system restore point in Windows Server?
A. A network configuration
B. A snapshot of system settings for recovery
C. A user account
D. A file format
244. What is a common maintenance task for Windows Server?
A. Deleting all files
B. Applying security patches and updates
C. Changing wallpapers
D. Installing games
245. What is the purpose of Event Viewer in Windows Server?
A. To edit photos
B. To monitor system logs and troubleshoot issues
C. To share files
D. To configure printers
246. What is Remote Desktop Services (RDS)?
A. A file-sharing protocol
B. A service for accessing servers remotely
C. A hardware component
D. A backup tool
247. What is a common issue with network connectivity in Windows Server?
A. Incorrect firewall or IP settings
B. Too much storage
C. Updated software
D. Fast internet
248. What is a common tool for managing Windows Server?
A. Notepad
B. Server Manager or PowerShell
C. Paint
D. Task Manager
249. What is a benefit of strong Wi-Fi security?
A. Increased vulnerabilities
B. Protection from unauthorized access
C. Reduced performance
D. Limited connectivity
250. Why is the collaborative approach effective for teaching system security?
A. Encourages passive learning
B. Promotes teamwork and peer learning for practical tasks
C. Limits problem-solving
D. Focuses on memorization

**Unit 1: Computer Maintenance**

1. B

2. B

3. B

4. B

5. B

6. B

7. B

8. B

9. B

10. B

11. B

12. B

13. B

14. B
15. B

16. B

17. B

18. B

19. B

20. B

21. B

22. B

23. B

24. B

25. B

26. A

27. B

28. B

29. B

30. B

31. B

32. B

33. B

34. B

35. B

36. B

37. B

38. B

39. B
40. B

41. B

42. B

43. B

44. B

45. B

46. B

47. B

48. B

49. B

50. B

**Unit 2: Operating Systems and Software Essentials**

51. B

52. B

53. B

54. B

55. B

56. B

57. B

58. B

59. B

60. B

61. B
62. B

63. B

64. B

65. B

66. B

67. B

68. B

69. B

70. B

71. B

72. B

73. B

74. B

75. B

76. B

77. B

78. A

79. B

80. B

81. B

82. B

83. B

84. B

85. B

86. B
87. B

88. B

89. B

90. B

91. B

92. B

93. B

94. B

95. B

96. B

97. B

98. B

99. B

100. B

**Unit 3: Networking and Resource Sharing**

101. B

102. B

103. B

104. B

105. B

106. B

107. B

108. B
109. B

110. B

111. B

112. B

113. B

114. B

115. B

116. B

117. B

118. B

119. B

120. B

121. B

122. B

123. B

124. B

125. B

126. A

127. B

128. B

129. B

130. B

131. B

132. B

133. A
134. B

135. B

136. B

137. B

138. B

139. B

140. B

141. B

142. B

143. B

144. B

145. B

146. B

147. B

148. B

149. B

150. B

**Unit 4: IT Entrepreneurship and Workplace Ethics**

151. B

152. B

153. B

154. B

155. B
156. B

157. B

158. B

159. B

160. B

161. B

162. B

163. B

164. B

165. B

166. B

167. B

168. B

169. B

170. B

171. B

172. B

173. B

174. A

175. B

176. B

177. B

178. B

179. A

180. B
181. B

182. B

183. B

184. B

185. B

186. B

187. B

188. A

189. B

190. B

191. B

192. B

193. B

194. B

195. B

196. B

197. B

198. B

199. B

200. B

**Unit 5: System Security and Protection**

201. B

202. B
203. B

204. C

205. A

206. B

207. B

208. B

209. B

210. B

211. B

212. B

213. B

214. B

215. B

216. B

217. C

218. B

219. B

220. B

221. B

222. B

223. B

224. B

225. B

226. A

227. B
228. B

229. B

230. B

231. B

232. B

233. B

234. B

235. B

236. B

237. B

238. B

239. B

240. B

241. B

242. B

243. B

244. B

245. B

246. B

247. A

248. B

249. B

250. B

You might also like