Exam 3: Computer Protection
Exam 1: Computers and Computer Systems46 Questions
Exam 2: Input, Output, and Processing46 Questions
Exam 3: Computer Protection46 Questions
Exam 4: Computer Maintenance46 Questions
Exam 5: Computer-Related Issues46 Questions
Exam 6: Software and Hardware Interaction46 Questions
Exam 7: Software Fundamentals46 Questions
Exam 8: Operating Systems46 Questions
Exam 9: Windows Management46 Questions
Exam 10: Operating System Customization46 Questions
Exam 11: Exploring Microsoft Office 200746 Questions
Exam 12: Getting Started With Word Essentials46 Questions
Exam 13: Editing and Formatting Documents46 Questions
Exam 14: Sharing Documents46 Questions
Exam 15: Working With Tables46 Questions
Exam 16: Enhancing Documents46 Questions
Exam 17: Getting Started With Excel Essentials46 Questions
Exam 18: Organizing and Enhancing Worksheets46 Questions
Exam 19: Creating Formulas and Charting Data46 Questions
Exam 20: Getting Started With Powerpoint Essentials46 Questions
Exam 21: Enhancing Presentations With Multimedia Effects46 Questions
Exam 22: Getting Started With Access Essentials46 Questions
Exam 23: Managing and Reporting Database Information46 Questions
Exam 24: Network Fundamentals46 Questions
Exam 25: Communication Services46 Questions
Exam 26: Communications and Collaboration46 Questions
Exam 27: Using the Internet and the World Wide Web46 Questions
Exam 28: Web Content46 Questions
Exam 29: Technology and Society46 Questions
Exam 30: Computer Safety and Ethics46 Questions
Select questions type
FIGURE 3-1
The device shown in Figure 3-1 above would be used for ____.

(Multiple Choice)
4.8/5
(34)
When using a(n) ping command, a "timed out" error displayed instead of a reply indicates a breakdown somewhere between your computer and the site to which you are trying to connect.
(True/False)
4.8/5
(34)
Identify the letter of the choice that best matches the phrase or definition.
Correct Answer:
Premises:
Responses:
(Matching)
4.7/5
(39)
____________________ is a secure process for keeping confidential information private.
(Short Answer)
4.7/5
(43)
____ can occur when older systems are discarded and the data is not deleted.
(Multiple Choice)
4.7/5
(39)
____________________ procedures should place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost.
(Short Answer)
4.8/5
(35)
People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called ____.
(Multiple Choice)
4.8/5
(40)
Data on a hard drive is stored in small ____ dots on the disk.
(Multiple Choice)
4.8/5
(35)
A separate thermostat can monitor the static electricity levels in a computer room.
(True/False)
4.8/5
(34)
What is the first step in trying to recover data from damaged media?
(Multiple Choice)
4.7/5
(41)
____________________ are short, fast transfers of electrical voltage, current, or energy.
(Short Answer)
4.7/5
(39)
What environmental factor should be considered when taking a cold notebook computer from an air-conditioned office into an automobile on a sunny day?
(Multiple Choice)
4.9/5
(34)
You are the owner of a small business and are concerned about the problem of possible theft of and/or damage to your computer equipment. What would be some possible consequences to your business of theft or damage? What safeguards could you implement to help protect your computer hardware?
(Essay)
4.7/5
(39)
You should not operate computer equipment in a room where the temperature exceeds 75 degrees.
(True/False)
4.8/5
(37)
A small program called a(n) ____________________ instructs the operating system on how to operate specific hardware.
(Short Answer)
4.9/5
(34)
During the process of backup , data is scrambled mathematically with a password or password key.
(True/False)
5.0/5
(39)
You would use the DOS ping command to test for which issue?
(Multiple Choice)
4.7/5
(28)
Showing 21 - 40 of 46
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)