- 1. Data is easily replaced when stolen or damaged.
A) True B) False
- 2. Which of these is NOT an environmental factor that can threatens your computer and contributes to hardware and software damage?
A) Humidity B) Animals C) Temperature D) Static Electricity
- 3. Data theft is decreasing.
A) False B) True
- 4. Hardware, such as a keyboard or mouse, do not require regular maintenance to function properly.
A) True B) False
- 5. Adding _______ to a computer generally helps increase performance, speed, and processing.
A) Output Devices B) RAM or Random Access Memory C) A Bigger Monitor D) Software Programs
- 6. The most common way to protect data in the workplace from outside threats _____.
A) Decrypt your data B) Install a firewall C) Install tile floors D) Don't use the Internet
- 7. Saved data can be lost or corrupted by _____.
A) Hackers B) All of these C) Equipment failure D) Fire or water damage E) Software viruses
- 8. Many businesses use _____ to protect their data, which makes the data unreadable until it is decrypted.
A) Hacker defense software B) Input devices C) Encryption D) Passcodes
- 9. A company normally has a tile floor or anti-static carpet installed in a computer room to help prevent _____.
A) Theft B) Water damage C) Humidity D) Static electricity
- 10. To protect against power spikes, a person should use a _____.
A) Driver B) Surge suppressor C) Uninterruptible power supply (UPS) D) Ping blocker
- 11. Backup files should be stored _____.
A) On-site B) Off-site
- 12. To backup data, one should save them to a ______ that can be used to restore data if lost or stolen.
A) Removable storage device B) Hard drive
- 13. Preventive maintenance is one of the best ways to cut down on computer repairs.
A) True B) False
- 14. Managing _______ is the most overlooked problem.
A) Data on the hard drive B) Computer cables C) Cookies D) Running anti-virus software
- 15. When data is broken up into several pieces that are not stored close to one another is ______.
A) Disk fragmentation B) Cookies C) Temporary files D) Defragmented hard drive
- 16. The ________ is a holding area for files and folders before their final deletion from a storage device.
A) Hard drive B) Recycle bin C) Temporary file folder
- 17. You can run a ______ to delete temporary files and other files that are not needed.
A) Cookie cleanup B) Disk defragmentation C) Disk cleanup
- 18. Disk defragmentation helps to ______ the data files on a hard drive making it easier for your computer to locate a file when needed.
A) Break up or fragment B) Delete C) Organize
- 19. Replacing the microprocessor or adding RAM to your computer is easy to do and can be completed by you at home.
A) False B) True
- 20. Which of the following threats causes harm to numerous computers by traveling through a computer network?
A) Trojan Horse B) Worm C) Phage D) Hoax
- 21. Which of the following viruses was named after the Greek's wooden peace offering used to gain access into Troy?
A) Phage Virus B) Trojan Horse Virus C) Hoax Virus D) Bomb Virus
- 22. Short Answer: We learned about 5 different ways to protect your computer hardware and data within the work environment. Tell me at least three (3) of the five (5) protective measures you could take.
- 23. Essay: Michael is responsible for the computer lab at Falls City High School. The lab is equipped with 24 desktop computers, an inkjet printer, Internet connection, and a projector. Michael's principal has asked him to put together a computer maintenance checklist that will be used during routine maintenance of the computer lab. Michael is new on the job and needs help with understanding the various threats to his computers, as well as ways he can protect against those threats. Describe at least three (3) reasons you should protect and maintain your computer on a regular basis. Then, describe specific checklist items that Michael could use to protect and properly maintain his computers. Your response should be at least 2-3 paragraphs. A paragraph includes at least 4 sentences.
|