Exam 3: Computer Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Paper jams are one of the more common printer problems.

(True/False)
4.8/5
(34)

FIGURE 3-1 FIGURE 3-1   The device shown in Figure 3-1 above would be used for ____. The device shown in Figure 3-1 above would be used for ____.

(Multiple Choice)
4.8/5
(34)

When using a(n) ping command, a "timed out" error displayed instead of a reply indicates a breakdown somewhere between your computer and the site to which you are trying to connect.

(True/False)
4.8/5
(34)

If media is damaged by water, first ____.

(Multiple Choice)
4.7/5
(41)

Some companies use spyware to ____.

(Multiple Choice)
4.9/5
(38)
Identify the letter of the choice that best matches the phrase or definition.
Generally caused by software corruption or hardware defects.
Printer problem
Can be caused by unsafe removal, dust, lint, sun exposure, shock, or force.
Connectivity problem
Generally easy to fix.
Flash drive damage
Correct Answer:
Verified
Premises:
Responses:
Generally caused by software corruption or hardware defects.
Printer problem
Can be caused by unsafe removal, dust, lint, sun exposure, shock, or force.
Connectivity problem
Generally easy to fix.
Flash drive damage
Often caused by incorrect, corrupted, or missing drivers.
Crashed hard drive
Commonly caused by the network provider's system not working properly.
Display problem
(Matching)
4.7/5
(39)

____________________ is a secure process for keeping confidential information private.

(Short Answer)
4.7/5
(43)

____ can occur when older systems are discarded and the data is not deleted.

(Multiple Choice)
4.7/5
(39)

____________________ procedures should place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost.

(Short Answer)
4.8/5
(35)

People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called ____.

(Multiple Choice)
4.8/5
(40)

Data on a hard drive is stored in small ____ dots on the disk.

(Multiple Choice)
4.8/5
(35)

A separate thermostat can monitor the static electricity levels in a computer room.

(True/False)
4.8/5
(34)

What is the first step in trying to recover data from damaged media?

(Multiple Choice)
4.7/5
(41)

____________________ are short, fast transfers of electrical voltage, current, or energy.

(Short Answer)
4.7/5
(39)

What environmental factor should be considered when taking a cold notebook computer from an air-conditioned office into an automobile on a sunny day?

(Multiple Choice)
4.9/5
(34)

You are the owner of a small business and are concerned about the problem of possible theft of and/or damage to your computer equipment. What would be some possible consequences to your business of theft or damage? What safeguards could you implement to help protect your computer hardware?

(Essay)
4.7/5
(39)

You should not operate computer equipment in a room where the temperature exceeds 75 degrees.

(True/False)
4.8/5
(37)

A small program called a(n) ____________________ instructs the operating system on how to operate specific hardware.

(Short Answer)
4.9/5
(34)

During the process of backup , data is scrambled mathematically with a password or password key.

(True/False)
5.0/5
(39)

You would use the DOS ping command to test for which issue?

(Multiple Choice)
4.7/5
(28)
Showing 21 - 40 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)