Deck 3: Computer Protection
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/46
Play
Full screen (f)
Deck 3: Computer Protection
1
A separate thermostat can monitor the static electricity levels in a computer room.
False
2
One option for preventing data loss due to power outages is to install a(n) uninterruptible power supply (UPS) .
True
3
People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called ____.
A) firewalls
B) hackers
C) spikers
D) bugs
A) firewalls
B) hackers
C) spikers
D) bugs
B
4
The hardware for your display consists of two elements: the monitor and the video card.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
5
Create a yearly maintenance schedule and follow it regularly to clean equipment and perform tasks to keep computer devices in good working order.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
6
Paper jams are one of the more common printer problems.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
7
You should not operate computer equipment in a room where the temperature exceeds 75 degrees.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
8
Some companies use spyware to ____.
A) trace stolen equipment
B) monitor employee personal computer use
C) designate a schedule for backing up data
D) sound an alarm if equipment is moved
A) trace stolen equipment
B) monitor employee personal computer use
C) designate a schedule for backing up data
D) sound an alarm if equipment is moved
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
9
____ can occur when older systems are discarded and the data is not deleted.
A) Encryption
B) Backup
C) Data theft
D) Viruses
A) Encryption
B) Backup
C) Data theft
D) Viruses
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
10
Desktop computers are generally more expensive than notebook computers with similar storage and processing capabilities.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
11
A common cause for connectivity problems is that the network adapters and switch ports do not match.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
12
Backup data should be stored on site for easy access in case the primary system becomes inaccessible.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
13
Hard disks are mechanical devices with moving parts, and inevitably wear out.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
14
During the process of backup , data is scrambled mathematically with a password or password key.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ process makes data unreadable unless or until it is decrypted.
A) backup
B) troubleshooting
C) connectivity
D) encryption
A) backup
B) troubleshooting
C) connectivity
D) encryption
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
16
Theft of and damage to computer equipment is a serious problem that many businesses and other organizations face.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
17
When using a(n) ping command, a "timed out" error displayed instead of a reply indicates a breakdown somewhere between your computer and the site to which you are trying to connect.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
18
If a computer suffers water damage, make sure you restore power as soon as possible to help dry it out.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
19
Data is a critical component of most businesses that is easily replaced.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
20
To back up files, you should save them to ____.
A) the main system
B) the organization's network
C) an independent storage device
D) a notebook computer
A) the main system
B) the organization's network
C) an independent storage device
D) a notebook computer
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
21
When a hardware device such as a printer or monitor does not work, it could be ___.
A) a software problem
B) an electrical problem
C) a mechanical problem
D) any of the above
A) a software problem
B) an electrical problem
C) a mechanical problem
D) any of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
22
If media is damaged by water, first ____.
A) restart the computer
B) place it in an airtight plastic bag
C) dry it
D) any of the above
A) restart the computer
B) place it in an airtight plastic bag
C) dry it
D) any of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
23
What is the first step in trying to recover data from damaged media?
A) Test the media to see how much damage has occurred.
B) Turn the computer on.
C) Open the computer case to visually inspect it.
D) Move the media to a secure environment.
A) Test the media to see how much damage has occurred.
B) Turn the computer on.
C) Open the computer case to visually inspect it.
D) Move the media to a secure environment.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
24
Case 3-2 Sylvia is the network administrator for the organization where she works. One of her duties is to ensure the right balance of physical and environmental conditions in the computer room. For optimal system reliability, Sylvia keeps the temperature in the computer room between ____ degrees.
A) 62 to 68
B) 68 to 75
C) 78 to 85
D) 85 to 92
A) 62 to 68
B) 68 to 75
C) 78 to 85
D) 85 to 92
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
25
____________________ is a secure process for keeping confidential information private.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
26
FIGURE 3-2
Figure 3-2 above shows ____.
A) a video card problem
B) a driver giving instructions to the operating system
C) the results of a ping command
D) a loss of Internet connectivity

A) a video card problem
B) a driver giving instructions to the operating system
C) the results of a ping command
D) a loss of Internet connectivity
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
27
Which type of hardware issue would you evaluate using a boot disk?
A) Printer problem
B) Display problem
C) Loss of network connectivity
D) Crashed hard drive
A) Printer problem
B) Display problem
C) Loss of network connectivity
D) Crashed hard drive
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
28
If the printed image is faded, this could indicate ____.
A) the toner is low
B) the print density is set too low
C) economy mode printing is turned on
D) any of the above
A) the toner is low
B) the print density is set too low
C) economy mode printing is turned on
D) any of the above
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
29
Case 3-1 Britton lives in a rural area that sometimes experiences electrical power failure or fluctuations. He wants to safeguard his computer system against power outages. Britton could install an uninterruptible power supply (UPS) to keep his computer running for several ____ following a power outage.
A) minutes
B) days
C) hours
D) weeks
A) minutes
B) days
C) hours
D) weeks
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
30
For optimal performance, the relative humidity of the computer room should be above 20 percent and below ____.
A) sea level
B) the temperature
C) the dew point
D) 30 percent
A) sea level
B) the temperature
C) the dew point
D) 30 percent
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
31
Employees accessing company computers for personal use is considered ____.
A) part of the job
B) a relaxing break
C) theft
D) confidential
A) part of the job
B) a relaxing break
C) theft
D) confidential
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
32
What environmental factor should be considered when taking a cold notebook computer from an air-conditioned office into an automobile on a sunny day?
A) Humidity
B) Magnetic fields
C) Power loss
D) Water damage
A) Humidity
B) Magnetic fields
C) Power loss
D) Water damage
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
33
You would use the DOS ping command to test for which issue?
A) Display problems
B) Connectivity
C) Paper jams
D) Crashed hard drive
A) Display problems
B) Connectivity
C) Paper jams
D) Crashed hard drive
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
34
Case 3-2 Sylvia is the network administrator for the organization where she works. One of her duties is to ensure the right balance of physical and environmental conditions in the computer room. Sylvia had a tile floor installed in the computer room to help prevent ____.
A) water damage
B) static electricity
C) humidity
D) theft
A) water damage
B) static electricity
C) humidity
D) theft
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
35
What window do you use to execute a ping command?
A) Accessories
B) All Programs
C) Command Prompt
D) Test Connection
A) Accessories
B) All Programs
C) Command Prompt
D) Test Connection
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
36
FIGURE 3-1
The device shown in Figure 3-1 above would be used for ____.
A) backing up data
B) protecting against power spikes
C) preventing data loss due to power outages
D) monitoring the humidity in a computer room

A) backing up data
B) protecting against power spikes
C) preventing data loss due to power outages
D) monitoring the humidity in a computer room
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
37
Case 3-1 Britton lives in a rural area that sometimes experiences electrical power failure or fluctuations. He wants to safeguard his computer system against power outages. To protect against power spikes, Britton would use a(n) ____.
A) standby power system (SPS)
B) driver
C) surge suppressor
D) separate thermostat
A) standby power system (SPS)
B) driver
C) surge suppressor
D) separate thermostat
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
38
Damaged cables can ____.
A) prevent peripheral devices from communicating with the computer
B) cause a hard drive crash
C) cause power spikes
D) conduct static electricity
A) prevent peripheral devices from communicating with the computer
B) cause a hard drive crash
C) cause power spikes
D) conduct static electricity
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
39
There are ____ basic types of UPS systems.
A) two
B) four
C) five
D) twelve
A) two
B) four
C) five
D) twelve
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
40
Data on a hard drive is stored in small ____ dots on the disk.
A) water-proof
B) magnetic
C) removable
D) battery-powered
A) water-proof
B) magnetic
C) removable
D) battery-powered
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
42
A small program called a(n) ____________________ instructs the operating system on how to operate specific hardware.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
43
You are the owner of a small business and are concerned about the problem of possible theft of and/or damage to your computer equipment. What would be some possible consequences to your business of theft or damage? What safeguards could you implement to help protect your computer hardware?
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
44
A high level of ____________________ can cause computers to short circuit, resulting in the loss of data and damage to hardware.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
45
____________________ are short, fast transfers of electrical voltage, current, or energy.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck
46
____________________ procedures should place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost.
Unlock Deck
Unlock for access to all 46 flashcards in this deck.
Unlock Deck
k this deck