Computer Fundamentals ch. 3 Test
If the printed image is faded, this could indicate the toner might be low, or the print density is set to low, or the economy mode printer is turned on
...
There are___basic types of UPS systems
2
You should not operate computer equipment in a room where the temperature exceeds_____degrees
85
If media is damaged by water, first...?
Air tight Bag
The _______________window is used to execute a ping command.
Command Prompt
You would use the DOS ping command to test____________
Connectivity
what is commonly caused by the network provider's system not working properly
Connectivity problems
_______ Cables can prevent peripheral devices from communicating with the computer
Damaged
______is a critical component of most businesses that is not easily replaced
Data
_______ Can occur when older systems are discarded and the data is not deleted
Data Theft
People who use remote software on stolen systems to connect to the organization's network and bypass the company's security measures are called...?
Data Thieves
________is often caused by incorrect, corrupted, or missing drivers
Display Problems
A small program called a (n) ____________________ instructs the operating system on how to operate specific hardware.
Driver
________ is a secure process for keeping confidential information private
Encryption
are mechanical devices with moving parts, and inevitably wear out
Hard disks
A high level of ________ can cause computers to short circuit, resulting in the loss of data and damage to hardware
Humidity
should be considered when taking a cold notebook computer from an air-conditioned office into an automobile on a sunny day
Humidity
Data on a hard drive is stored in small ______ dots on the disk
Magnetic
The hardware for your display consists of two elements ______________
Monitor and Video Card
Some companies use spyware to ______
Monitor employee personal use
Create a ________ maintenance schedule and follow it regularly to clean equipment and perform tasks to keep computer devices in good working order
Monthly
Notebook computers are generally_______ expensive than desktop computers with similar storage and processing capabilities
More costly
What is the first step in trying to recover data from damaged media?
Move to secure environment
A common cause for connectivity problems is that the___________ do not match
Network Adapters and Switch ports
_________ is one of the more common printer problems
Paper Jam
___________ Can be caused by unsafe removal, dust, lint, sun exposure, shock, or force
Physical Damage
___________ is generally an easy to fix
Pinter Problems
________are short, fast transfers of electrical voltage, current, or energy
Power Spikes
To back up files, you should save them to ____________________________________
Removable disk or some other independent storage device
A _______________can monitor temperature and humidity levels in a computer room
Separate Thermostat
When a hardware device such as a printer or monitor does not work, it could be....?
Software problem, electrical problem, or mechanical problem
For optimal performance, the relative humidity of the computer room should be above 20 percent and below....?
The dew point
________ to computer equipment is a serious problem that many businesses and other organizations face.
Theft and Damage
Employees accessing company computers for personal use is considered
Theft of computer time
When using a(n) ping command, a_______________displayed instead of a reply indicates a breakdown somewhere between your computer and the site to which you are trying to connect
Timed out error
One option for preventing data loss due to power outages is to install a (n) _______________________
UPS (Uninterrupted power supply) System.
______ Procedures should place a priority on files that would be difficult or impossible to replace or reconstruct if they were lost
backup
If a computer suffers water damage, make sure it's _________ before you restore power
completely dry
During the process of _____________, data is scrambled mathematically with a password or password key
encryption
The _________ process makes data unreadable unless or until it is decrypted
encryption
Backup data should be stored____________ in case the primary system becomes inaccessible
independently
The device shown in Figure 3-1 above would be used for Protection of ______
power spikes