Name: 
 

Chapter 3 Computing Fundamentals



True/False
Indicate whether the statement is true or false.
 

 1. 

Theft of and damage to computer equipment is a serious problem that many businesses and other organizations face.
 

 2. 

Data is a critical component of most businesses that is easily replaced.
 

 3. 

Backup data should be stored on site for easy access in case the primary system becomes inaccessible.
 

 4. 

A separate thermostat can monitor the static electricity levels in a computer room.
 

 5. 

If a computer suffers water damage, make sure you restore power as soon as possible to help dry it out.
 

 6. 

Desktop computers are generally more expensive than notebook computers with similar storage and processing capabilities.
 

 7. 

Hard disks are mechanical devices with moving parts, and inevitably wear out.
 

 8. 

Paper jams are one of the more common printer problems.
 

 9. 

The hardware for your display consists of two elements: the monitor and the video card.
 

 10. 

A common cause for connectivity problems is that the network adapters and switch ports do not match.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 11. 

Some companies use spyware to ____.
a.
trace stolen equipment
c.
designate a schedule for backing up data
b.
monitor employee personal computer use
d.
sound an alarm if equipment is moved
 

 12. 

____ can occur when older systems are discarded and the data is not deleted.
a.
Encryption
c.
Data theft
b.
Backup
d.
Viruses
 

 13. 

The ____ process makes data unreadable unless or until it is decrypted.
a.
backup
c.
connectivity
b.
troubleshooting
d.
encryption
 

 14. 

People who use remote software on stolen systems to connect to the organization’s network and bypass the company’s security measures are called ____.
a.
firewalls
c.
spikers
b.
hackers
d.
bugs
 

 15. 

To back up files, you should save them to ____.
a.
the main system
c.
an independent storage device
b.
the organization’s network
d.
a notebook computer
 

 16. 

Employees accessing company computers for personal use is considered ____.
a.
part of the job
c.
theft
b.
a relaxing break
d.
confidential
 

 17. 

For optimal performance, the relative humidity of the computer room should be above 20 percent and below ____.
a.
sea level
c.
the dew point
b.
the temperature
d.
30 percent
 

 18. 

What environmental factor should be considered when taking a cold notebook computer from an air-conditioned office into an automobile on a sunny day?
a.
Humidity
c.
Power loss
b.
Magnetic fields
d.
Water damage
 

 19. 

Data on a hard drive is stored in small ____ dots on the disk.
a.
water-proof
c.
removable
b.
magnetic
d.
battery-powered
 

 20. 

Damaged cables can ____.
a.
prevent peripheral devices from communicating with the computer
c.
cause power spikes
b.
cause a hard drive crash
d.
conduct static electricity
 

 21. 

There are ____ basic types of UPS systems.
a.
two
c.
five
b.
four
d.
twelve
 

 22. 

Which type of hardware issue would you evaluate using a boot disk?
a.
Printer problem
c.
Loss of network connectivity
b.
Display problem
d.
Crashed hard drive
 

 23. 

If media is damaged by water, first ____.
a.
restart the computer
c.
dry it
b.
place it in an airtight plastic bag
d.
any of the above
 

 24. 

What is the first step in trying to recover data from damaged media?
a.
Test the media to see how much damage has occurred.
b.
Turn the computer on.
c.
Open the computer case to visually inspect it.
d.
Move the media to a secure environment.
 

 25. 

If the printed image is faded, this could indicate ____.
a.
the toner is low
c.
economy mode printing is turned on
b.
the print density is set too low
d.
any of the above
 

 26. 

When a hardware device such as a printer or monitor does not work, it could be ___.
a.
a software problem
c.
a mechanical problem
b.
an electrical problem
d.
any of the above
 

 27. 

You would use the DOS ping command to test for which issue?
a.
Display problems
c.
Paper jams
b.
Connectivity
d.
Crashed hard drive
 

 28. 

What window do you use to execute a ping command?
a.
Accessories
c.
Command Prompt
b.
All Programs
d.
Test Connection
 
 
FIGURE 3-1

nar001-1.jpg
 

 29. 

The device shown in Figure 3-1 above would be used for ____.
a.
backing up data
c.
preventing data loss due to power outages
b.
protecting against power spikes
d.
monitoring the humidity in a computer room
 
 
FIGURE 3-2

nar002-1.jpg
 

 30. 

Figure 3-2 above shows ____.
a.
a video card problem
c.
the results of a ping command
b.
a driver giving instructions to the operating system
d.
a loss of Internet connectivity
 
 
Case 3-1
Britton lives in a rural area that sometimes experiences electrical power failure or fluctuations. He wants to safeguard his computer system against power outages.
 

 31. 

To protect against power spikes, Britton would use a(n) ____.
a.
standby power system (SPS)
c.
surge suppressor
b.
driver
d.
separate thermostat
 

 32. 

Britton could install an uninterruptible power supply (UPS) to keep his computer running for several ____ following a power outage.
a.
minutes
c.
hours
b.
days
d.
weeks
 
 
Case 3-2
Sylvia is the network administrator for the organization where she works. One of her duties is to ensure the right balance of physical and environmental conditions in the computer room.
 

 33. 

For optimal system reliability, Sylvia keeps the temperature in the computer room between ____ degrees.
a.
62 to 68
c.
78 to 85
b.
68 to 75
d.
85 to 92
 

 34. 

Sylvia had a tile floor installed in the computer room to help prevent ____.
a.
water damage
c.
humidity
b.
static electricity
d.
theft
 

Matching
 
 
Identify the letter of the choice that best matches the phrase or definition.
a.
Connectivity problem
b.
Display problem
c.
Printer problem
d.
Crashed hard drive
e.
Flash drive damage
 

 35. 

Generally easy to fix.
 

 36. 

Commonly caused by the network provider’s system not working properly.
 

 37. 

Can be caused by unsafe removal, dust, lint, sun exposure, shock, or force.
 

 38. 

Often caused by incorrect, corrupted, or missing drivers.
 

 39. 

Generally caused by software corruption or hardware defects.
 



 
Check Your Work     Start Over