Computer Fundamentals ch. 3 Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If the printed image is faded, this could indicate the toner might be low, or the print density is set to low, or the economy mode printer is turned on

...

There are___basic types of UPS systems

2

You should not operate computer equipment in a room where the temperature exceeds_____degrees

85

If media is damaged by water, first...?

Air tight Bag

The _______________window is used to execute a ping command.

Command Prompt

You would use the DOS ping command to test____________

Connectivity

what is commonly caused by the network provider's system not working properly

Connectivity problems

_______ Cables can prevent peripheral devices from communicating with the computer

Damaged

______is a critical component of most businesses that is not easily replaced

Data

_______ Can occur when older systems are discarded and the data is not deleted

Data Theft

People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called...?

Data Thieves

________is often caused by incorrect, corrupted, or missing drivers

Display Problems

A small program called a (n) ____________________ instructs the operating system on how to operate specific hardware.

Driver

________ is a secure process for keeping confidential information private

Encryption

are mechanical devices with moving parts, and inevitably wear out

Hard disks

A high level of ________ can cause computers to short circuit, resulting in the loss of data and damage to hardware

Humidity

should be considered when taking a cold notebook computer from an air-conditioned office into an automobile on a sunny day

Humidity

Data on a hard drive is stored in small ______ dots on the disk

Magnetic

The hardware for your display consists of two elements ______________

Monitor and Video Card

Some companies use spyware to ______

Monitor employee personal use

Create a ________ maintenance schedule and follow it regularly to clean equipment and perform tasks to keep computer devices in good working order

Monthly

Notebook computers are generally_______ expensive than desktop computers with similar storage and processing capabilities

More costly

What is the first step in trying to recover data from damaged media?

Move to secure environment

A common cause for connectivity problems is that the___________ do not match

Network Adapters and Switch ports

_________ is one of the more common printer problems

Paper Jam

___________ Can be caused by unsafe removal, dust, lint, sun exposure, shock, or force

Physical Damage

___________ is generally an easy to fix

Pinter Problems

________are short, fast transfers of electrical voltage, current, or energy

Power Spikes

To back up files, you should save them to ____________________________________

Removable disk or some other independent storage device

A _______________can monitor temperature and humidity levels in a computer room

Separate Thermostat

When a hardware device such as a printer or monitor does not work, it could be....?

Software problem, electrical problem, or mechanical problem

For optimal performance, the relative humidity of the computer room should be above 20 percent and below....?

The dew point

________ to computer equipment is a serious problem that many businesses and other organizations face.

Theft and Damage

Employees accessing company computers for personal use is considered

Theft of computer time

When using a(n) ping command, a_______________displayed instead of a reply indicates a breakdown somewhere between your computer and the site to which you are trying to connect

Timed out error

One option for preventing data loss due to power outages is to install a (n) _______________________

UPS (Uninterrupted power supply) System.

______ Procedures should place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost

backup

If a computer suffers water damage, make sure it's _________ before you restore power

completely dry

During the process of _____________, data is scrambled mathematically with a password or password key

encryption

The _________ process makes data unreadable unless or until it is decrypted

encryption

Backup data should be stored____________ in case the primary system becomes inaccessible

independently

The device shown in Figure 3-1 above would be used for Protection of ______

power spikes


Set pelajaran terkait

HK Applied CSCS Practice Questions

View Set

Algebra Regents Review (10 Question)

View Set

Autism Spectrum Disorder- KINS 407

View Set

Pediatric Respiratory - Critical Thinking

View Set

Kinn's Medical Assistant - Final

View Set

Intermediate Accounting II - Test 1 (Chapter 13, 14 & 15)

View Set

Chapter 3: Life Insurance Basics

View Set