- 1. Data is easily replaced when stolen or damaged.
A) True B) False
- 2. Which of these is NOT an environmental factor that can threatens your computer and contributes to hardware and software damage?
A) Static Electricity B) Animals C) Humidity D) Temperature
- 3. Data theft is decreasing.
A) True B) False
- 4. Hardware, such as a keyboard or mouse, do not require regular maintenance to function properly.
A) False B) True
- 5. Adding _______ to a computer generally helps increase performance, speed, and processing.
A) Output Devices B) Software Programs C) A Bigger Monitor D) RAM or Random Access Memory
- 6. The most common way to protect data in the workplace from outside threats _____.
A) Don't use the Internet B) Decrypt your data C) Install a firewall D) Install tile floors
- 7. Saved data can be lost or corrupted by _____.
A) Equipment failure B) All of these C) Hackers D) Fire or water damage E) Software viruses
- 8. Many businesses use _____ to protect their data, which makes the data unreadable until it is decrypted.
A) Passcodes B) Hacker defense software C) Input devices D) Encryption
- 9. A company normally has a tile floor or anti-static carpet installed in a computer room to help prevent _____.
A) Static electricity B) Humidity C) Theft D) Water damage
- 10. To protect against power spikes, a person should use a _____.
A) Uninterruptible power supply (UPS) B) Ping blocker C) Surge suppressor D) Driver
- 11. Backup files should be stored _____.
A) On-site B) Off-site
- 12. To backup data, one should save them to a ______ that can be used to restore data if lost or stolen.
A) Hard drive B) Removable storage device
- 13. Preventive maintenance is one of the best ways to cut down on computer repairs.
A) False B) True
- 14. Managing _______ is the most overlooked problem.
A) Cookies B) Computer cables C) Running anti-virus software D) Data on the hard drive
- 15. When data is broken up into several pieces that are not stored close to one another is ______.
A) Defragmented hard drive B) Disk fragmentation C) Cookies D) Temporary files
- 16. The ________ is a holding area for files and folders before their final deletion from a storage device.
A) Recycle bin B) Hard drive C) Temporary file folder
- 17. You can run a ______ to delete temporary files and other files that are not needed.
A) Disk defragmentation B) Disk cleanup C) Cookie cleanup
- 18. Disk defragmentation helps to ______ the data files on a hard drive making it easier for your computer to locate a file when needed.
A) Break up or fragment B) Organize C) Delete
- 19. Replacing the microprocessor or adding RAM to your computer is easy to do and can be completed by you at home.
A) True B) False
- 20. Which of the following threats causes harm to numerous computers by traveling through a computer network?
A) Hoax B) Trojan Horse C) Phage D) Worm
- 21. Which of the following viruses was named after the Greek's wooden peace offering used to gain access into Troy?
A) Hoax Virus B) Phage Virus C) Bomb Virus D) Trojan Horse Virus
- 22. Short Answer: We learned about 5 different ways to protect your computer hardware and data within the work environment. Tell me at least three (3) of the five (5) protective measures you could take.
- 23. Essay: Michael is responsible for the computer lab at Falls City High School. The lab is equipped with 24 desktop computers, an inkjet printer, Internet connection, and a projector. Michael's principal has asked him to put together a computer maintenance checklist that will be used during routine maintenance of the computer lab. Michael is new on the job and needs help with understanding the various threats to his computers, as well as ways he can protect against those threats. Describe at least three (3) reasons you should protect and maintain your computer on a regular basis. Then, describe specific checklist items that Michael could use to protect and properly maintain his computers. Your response should be at least 2-3 paragraphs. A paragraph includes at least 4 sentences.
|