- 1. Data is easily replaced when stolen or damaged.
A) True B) False
- 2. Which of these is NOT an environmental factor that can threatens your computer and contributes to hardware and software damage?
A) Humidity B) Temperature C) Animals D) Static Electricity
- 3. Data theft is decreasing.
A) False B) True
- 4. Hardware, such as a keyboard or mouse, do not require regular maintenance to function properly.
A) False B) True
- 5. Adding _______ to a computer generally helps increase performance, speed, and processing.
A) A Bigger Monitor B) Output Devices C) Software Programs D) RAM or Random Access Memory
- 6. The most common way to protect data in the workplace from outside threats _____.
A) Decrypt your data B) Install tile floors C) Install a firewall D) Don't use the Internet
- 7. Saved data can be lost or corrupted by _____.
A) Hackers B) Software viruses C) All of these D) Fire or water damage E) Equipment failure
- 8. Many businesses use _____ to protect their data, which makes the data unreadable until it is decrypted.
A) Input devices B) Encryption C) Hacker defense software D) Passcodes
- 9. A company normally has a tile floor or anti-static carpet installed in a computer room to help prevent _____.
A) Water damage B) Theft C) Humidity D) Static electricity
- 10. To protect against power spikes, a person should use a _____.
A) Driver B) Uninterruptible power supply (UPS) C) Surge suppressor D) Ping blocker
- 11. Backup files should be stored _____.
A) Off-site B) On-site
- 12. To backup data, one should save them to a ______ that can be used to restore data if lost or stolen.
A) Hard drive B) Removable storage device
- 13. Preventive maintenance is one of the best ways to cut down on computer repairs.
A) True B) False
- 14. Managing _______ is the most overlooked problem.
A) Computer cables B) Cookies C) Data on the hard drive D) Running anti-virus software
- 15. When data is broken up into several pieces that are not stored close to one another is ______.
A) Defragmented hard drive B) Disk fragmentation C) Cookies D) Temporary files
- 16. The ________ is a holding area for files and folders before their final deletion from a storage device.
A) Hard drive B) Temporary file folder C) Recycle bin
- 17. You can run a ______ to delete temporary files and other files that are not needed.
A) Disk defragmentation B) Cookie cleanup C) Disk cleanup
- 18. Disk defragmentation helps to ______ the data files on a hard drive making it easier for your computer to locate a file when needed.
A) Delete B) Organize C) Break up or fragment
- 19. Replacing the microprocessor or adding RAM to your computer is easy to do and can be completed by you at home.
A) False B) True
- 20. Which of the following threats causes harm to numerous computers by traveling through a computer network?
A) Phage B) Hoax C) Worm D) Trojan Horse
- 21. Which of the following viruses was named after the Greek's wooden peace offering used to gain access into Troy?
A) Hoax Virus B) Trojan Horse Virus C) Phage Virus D) Bomb Virus
- 22. Short Answer: We learned about 5 different ways to protect your computer hardware and data within the work environment. Tell me at least three (3) of the five (5) protective measures you could take.
- 23. Essay: Michael is responsible for the computer lab at Falls City High School. The lab is equipped with 24 desktop computers, an inkjet printer, Internet connection, and a projector. Michael's principal has asked him to put together a computer maintenance checklist that will be used during routine maintenance of the computer lab. Michael is new on the job and needs help with understanding the various threats to his computers, as well as ways he can protect against those threats. Describe at least three (3) reasons you should protect and maintain your computer on a regular basis. Then, describe specific checklist items that Michael could use to protect and properly maintain his computers. Your response should be at least 2-3 paragraphs. A paragraph includes at least 4 sentences.
|