CLICK HERE FOR BLOGGER TEMPLATES AND MYSPACE LAYOUTS »

Rabu, 03 November 2010

Evaluation of Semester 1

Page 110-115
A. Multiple Choice
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.

B. Essay
Answer the following questions correctly.
1. Explain the proper way to turn a computer on and off.
2. Name several categories of application software.
3. Explain briefly about computer operation.
4. What is the abbreviations and the function of ROM.
5. Name word processing software from Windows Vista operating system.
6. Name types of flash memory that you know.
7. Name three examples of computer network topology.
8. What are the ethics in using ICT device in the places of worship?
9. Name aspects to be aware of in using a cellphone.
10. Describe the advantages of usng genuine software.
Answer;
 1. here are the steps to turn on a computer.
   a. ensure that all power cable in a computer are connected .
   b. turn on the CPU by pressing the On or Power button on the cassing.
   c. turn on the monitor by pressing the On or Power button on the monitor.
   d. wait until the booting procedure is finished, which is shown by desktop appearance on the monitor screen.
  here is the standard shut down procedure for Microsoft Windows Vista operating system
   a. close all active application programs.
   b. click the Start button on the destop menu.
   c. click the Shut Down button.
   d. wait a moment until the computer is shutting down.
 2.a. Word Processor (Office Suite)
    b. Graphic Suite
    c. Multimedia
    d. Web Browser
 3.



 4. ROM (Read Only Memory). ROM is to save computer operating program, such as BIOS and booting.
 5.a. Word Processor
    b. Graphic Suite
    c. Multimedia
    d. Web Browser
 6.


 7.a. topologi bus
    b. topologi star
    c. topologi ring
8. a. To avoid using ICT devices in the places of worship, lecture classes, during a discussion, and other occassions that may disrup people's concentration.
    b. To switch into silent or vibrate mode when entering the aforementioned environment.
    c. Not using the ICT  device for cemilar actions, such as spreading threats, terrors, or false information, and stealing com[any's data or hacking the computer network.

0 komentar: