POST-TEST
TRUE OR FALSE TEST
Instructions: Write TRUE if the statement is correct and FALSE if it is
incorrect.
1. Adjustments in technical work are always planned ahead of time.
2. Minor corrections in work processes are considered adjustments.
3. Unplanned events in the workplace often require urgent response.
4. All unplanned events can be ignored if they do not cause visible
damage.
5. A liquid spill on equipment is an example of an unplanned event.
6. Proper documentation is not necessary after responding to an
unplanned event.
7. Following safety procedures helps protect equipment, people, and
reputation.
8. Preventive measures are taken to avoid recurrence of unplanned
events.
IDENTIFICATION
Instructions: Read each question carefully and write the correct answer in
the space provided. Your answer must be specific and based on the lessons
from the given Information Sheets.
9. It refers to the process of diagnosing and fixing hardware or software
issues in a computer system.
Answer: ____________________
10. The person responsible for managing and maintaining the computer
systems in an organization.
Answer: ____________________
11. A temporary solution applied to address a system malfunction until a
permanent fix is implemented.
Answer: ____________________
12. This is the act of organizing files and folders systematically for easier
retrieval.
Answer: ____________________
13. A type of software used for managing and editing text-based
documents.
Answer: ____________________
14. The shortcut key used to copy selected content in most operating
systems.
Answer: ____________________
15. The process of removing dust and debris from computer components
using compressed air.
Answer: ____________________
16. The protective device that prevents electrical surges from damaging
equipment.
Answer: ____________________
17. A maintenance activity that updates the operating system to improve
performance and security.
Answer: ____________________
18. The immediate action taken when a liquid spill occurs on computer
equipment.
Answer: ____________________
19. A report prepared after an unplanned event, detailing the incident and
response.
Answer: ____________________
20. The act of taking proactive measures to prevent recurrence of a
previously encountered problem.
Answer: ____________________
MULTIPLE CHOICE TEST
Instructions: Read each question carefully and choose the best answer.
Write the letter of your choice on the space provided before each number.
21. How can you properly shut down a computer during a power outage?
A. By unplugging the power cord directly
B. By using the operating system’s shutdown feature quickly
C. By turning off the monitor only
D. By removing the battery immediately
22. How can you secure data before formatting a hard drive?
A. By deleting unnecessary files only
B. By creating a complete backup to an external device
C. By removing the antivirus software
D. By defragmenting the drive
23. How can you improve the performance of a slow-running computer?
A. By closing unnecessary programs and processes
B. By increasing the screen brightness
C. By changing the wallpaper frequently
D. By lowering the speaker volume
24. How can you prevent accidental deletion of important files?
A. By placing them in a hidden folder without backup
B. By enabling file protection or access restrictions
C. By storing them in the Downloads folder
D. By turning off the computer frequently
25. How can you check if a newly installed printer is working properly?
A. By changing the ink cartridges
B. By printing a test page through printer settings
C. By restarting the computer
D. By adjusting paper size
26. How can you troubleshoot a monitor that shows no display?
A. By checking the power and display cables
B. By replacing the keyboard
C. By adjusting the mouse sensitivity
D. By removing the CPU fan
27. How can you restore internet connectivity after disconnection?
A. By resetting the modem or router
B. By changing the desktop background
C. By deleting desktop shortcuts
D. By replacing the printer cable
28. How can you reduce overheating in a desktop computer?
A. By cleaning the cooling fans and vents
B. By lowering the volume level
C. By deleting browser history
D. By changing the theme color
29. How can you recover accidentally emptied Recycle Bin files?
A. By using file recovery software
B. By reinstalling the operating system
C. By adjusting the date and time
D. By disabling firewall settings
30. How can you verify that a USB drive is virus-free before use?
A. By scanning it with updated antivirus software
B. By renaming its files
C. By copying its files immediately
D. By formatting without checking
31. How can you make a network printer available to all computers in a
LAN?
A. By sharing it through network settings
B. By changing its color mode
C. By deleting its drivers
D. By lowering its print quality
32. How can you keep sensitive files safe from unauthorized access?
A. By encrypting them with a strong password
B. By renaming them with random letters
C. By storing them in the default Documents folder
D. By compressing them without password
33. How can you fix a computer that won’t boot into Windows?
A. By running the startup repair tool
B. By replacing the mouse
C. By adjusting screen resolution
D. By deleting all shortcuts
34. How can you ensure a newly installed software runs smoothly?
A. By updating drivers and required components
B. By changing desktop icons
C. By deleting temporary files only
D. By installing multiple antivirus programs
35. How can you protect your computer from malware infections?
A. By installing and regularly updating antivirus software
B. By turning off the monitor
C. By using only default passwords
D. By downloading from any website
36. How can you properly dispose of outdated computer parts?
A. By following e-waste disposal and recycling guidelines
B. By burning them in an open area
C. By burying them in the backyard
D. By throwing them in regular trash bins
37. How can you reduce the risk of data loss during a system update?
A. By creating a backup before updating
B. By disabling antivirus software permanently
C. By turning off the system mid-update
D. By ignoring update prompts
38. How can you increase the security of an online account?
A. By enabling two-factor authentication
B. By using the same password everywhere
C. By sharing login details with trusted friends
D. By turning off email notifications
39. How can you ensure safe handling of a computer’s internal
components?
A. By using an anti-static wrist strap
B. By working on a carpeted floor
C. By touching metal contacts directly
D. By wearing wet gloves
40. How can you avoid unauthorized access to a public computer?
A. By logging out of all accounts before leaving
B. By leaving the browser open for the next user
C. By saving passwords in the browser
D. By disabling password protection