True/False Indicate whether the
statement is true or false.
|
|
1.
|
Theft of and damage to computer equipment is a serious problem that many
businesses and other organizations face.
|
|
2.
|
Data is a critical component of most businesses that is easily replaced.
|
|
3.
|
Backup data should be stored on site for easy access in case the primary system
becomes inaccessible.
|
|
4.
|
A separate thermostat can monitor the static electricity levels in a computer
room.
|
|
5.
|
If a computer suffers water damage, make sure you restore power as soon as
possible to help dry it out.
|
|
6.
|
Desktop computers are generally more expensive than notebook computers with
similar storage and processing capabilities.
|
|
7.
|
Hard disks are mechanical devices with moving parts, and inevitably wear
out.
|
|
8.
|
Paper jams are one of the more common printer problems.
|
|
9.
|
The hardware for your display consists of two elements: the monitor and the
video card.
|
|
10.
|
A common cause for connectivity problems is that the network adapters and switch
ports do not match.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
11.
|
Some companies use spyware to ____.
a. | trace stolen equipment | c. | designate a schedule for backing up data | b. | monitor employee
personal computer use | d. | sound
an alarm if equipment is moved |
|
|
12.
|
____ can occur when older systems are discarded and the data is not
deleted.
a. | Encryption | c. | Data theft | b. | Backup | d. | Viruses |
|
|
13.
|
The ____ process makes data unreadable unless or until it is decrypted.
a. | backup | c. | connectivity | b. | troubleshooting | d. | encryption |
|
|
14.
|
People who use remote software on stolen systems to connect to the
organization’s network and bypass the company’s security measures are called ____.
a. | firewalls | c. | spikers | b. | hackers | d. | bugs |
|
|
15.
|
To back up files, you should save them to ____.
a. | the main system | c. | an independent storage device | b. | the
organization’s network | d. | a notebook computer |
|
|
16.
|
Employees accessing company computers for personal use is considered
____.
a. | part of the job | c. | theft | b. | a relaxing break | d. | confidential |
|
|
17.
|
For optimal performance, the relative humidity of the computer room should be
above 20 percent and below ____.
a. | sea level | c. | the dew point | b. | the temperature | d. | 30 percent |
|
|
18.
|
What environmental factor should be considered when taking a cold notebook
computer from an air-conditioned office into an automobile on a sunny day?
a. | Humidity | c. | Power loss | b. | Magnetic fields | d. | Water damage |
|
|
19.
|
Data on a hard drive is stored in small ____ dots on the disk.
a. | water-proof | c. | removable | b. | magnetic | d. | battery-powered |
|
|
20.
|
Damaged cables can ____.
a. | prevent peripheral devices from communicating with the computer | c. | cause power
spikes | b. | cause a hard drive crash | d. | conduct static electricity |
|
|
21.
|
There are ____ basic types of UPS systems.
a. | two | c. | five | b. | four | d. | twelve |
|
|
22.
|
Which type of hardware issue would you evaluate using a boot disk?
a. | Printer problem | c. | Loss of network connectivity | b. | Display
problem | d. | Crashed hard
drive |
|
|
23.
|
If media is damaged by water, first ____.
a. | restart the computer | c. | dry it | b. | place it in an airtight plastic
bag | d. | any of the
above |
|
|
24.
|
What is the first step in trying to recover data from damaged media?
a. | Test the media to see how much damage has occurred. | b. | Turn the computer
on. | c. | Open the computer case to visually inspect it. | d. | Move the media to a
secure environment. |
|
|
25.
|
If the printed image is faded, this could indicate ____.
a. | the toner is low | c. | economy mode printing is turned on | b. | the print density is
set too low | d. | any of the
above |
|
|
26.
|
When a hardware device such as a printer or monitor does not work, it could be
___.
a. | a software problem | c. | a mechanical problem | b. | an electrical problem | d. | any of the
above |
|
|
27.
|
You would use the DOS ping command to test for which issue?
a. | Display problems | c. | Paper jams | b. | Connectivity | d. | Crashed hard
drive |
|
|
28.
|
What window do you use to execute a ping command?
a. | Accessories | c. | Command Prompt | b. | All Programs | d. | Test Connection |
|
|
|
FIGURE 3-1
|
|
29.
|
The device shown in Figure 3-1 above would be used for ____.
a. | backing up data | c. | preventing data loss due to power outages | b. | protecting against
power spikes | d. | monitoring the
humidity in a computer room |
|
|
|
FIGURE 3-2
|
|
30.
|
Figure 3-2 above shows ____.
a. | a video card problem | c. | the results of a ping command | b. | a driver giving
instructions to the operating system | d. | a loss of Internet connectivity |
|
|
|
Case 3-1 Britton lives in a rural area that sometimes experiences
electrical power failure or fluctuations. He wants to safeguard his computer system against power
outages.
|
|
31.
|
To protect against power spikes, Britton would use a(n) ____.
a. | standby power system (SPS) | c. | surge
suppressor | b. | driver | d. | separate thermostat |
|
|
32.
|
Britton could install an uninterruptible power supply (UPS) to keep his computer
running for several ____ following a power outage.
a. | minutes | c. | hours | b. | days | d. | weeks |
|
|
|
Case 3-2 Sylvia is the network administrator for the organization
where she works. One of her duties is to ensure the right balance of physical and environmental
conditions in the computer room.
|
|
33.
|
For optimal system reliability, Sylvia keeps the temperature in the computer
room between ____ degrees.
a. | 62 to 68 | c. | 78 to 85 | b. | 68 to 75 | d. | 85 to 92 |
|
|
34.
|
Sylvia had a tile floor installed in the computer room to help prevent
____.
a. | water damage | c. | humidity | b. | static electricity | d. | theft |
|
Matching
|
|
|
Identify the letter of the choice that best
matches the phrase or definition.
a. | Connectivity
problem | b. | Display problem | c. | Printer problem | d. | Crashed hard
drive | e. | Flash drive damage |
|
|
35.
|
Generally easy to fix.
|
|
36.
|
Commonly caused by the network provider’s system not working
properly.
|
|
37.
|
Can be caused by unsafe removal, dust, lint, sun exposure, shock, or
force.
|
|
38.
|
Often caused by incorrect, corrupted, or missing drivers.
|
|
39.
|
Generally caused by software corruption or hardware defects.
|