42 Questions
Which of the following is a recommended practice for taking care of your computer?
Avoiding clutter around the computer
What should you do if the weather or atmosphere is too hot for your computer?
Turn off the computer
Which of the following is a precaution to take when installing programs on your computer?
Install programs one at a time
Which of the following is a recommended practice for taking care of your computer?
Disinfecting the keyboard with alcohol wipes
What should you do if the weather or atmosphere is too hot for your computer?
Turn off the computer unit
Which of the following is a precaution to take when installing programs on your computer?
Beware of viruses
Which of the following is NOT a recommended practice for taking care of your computer?
Cluttering up the space around the computer
Which of the following is NOT a precaution to take when installing programs on your computer?
Install multiple programs simultaneously
Always keep your computer free from ______, grime, and all kinds of dirt. The keyboard should be disinfected with alcohol wipes.
dust
Place your computer, speaker, scanner, and printer atop of a ______ surface. Slightly cold weather is ideal for computers. If the weather or atmosphere is too hot, turn off your computer unit.
sturdy
Avoid cluttering up the space around the ______.
computer
True or false: It is important to keep your computer free from dust, grime, and dirt?
True
True or false: The keyboard should be disinfected with alcohol wipes?
True
True or false: Cluttering up the space around the computer is recommended?
False
Match the following tips with their respective categories:
Do not flame others = Respecting others Place your computer on a sturdy surface = Taking care of your computer Install programs one at a time = Avoiding potential issues Beware of viruses = Computer safety
Match the following actions with their purposes:
Disinfecting the keyboard with alcohol wipes = Keeping the computer clean Turning off the computer in hot weather = Preventing overheating Avoid cluttering up the space around the computer = Maintaining a clean workspace Respecting other people's privacy = Promoting a respectful online environment
Match the following statements to their implications:
Slightly cold weather is ideal for computers = Computers function better in cooler environments Always keep your computer free from dust, grime, and all kinds of dirt = Cleanliness is important for computer maintenance Do not flame others = Online discussions should be respectful Beware of viruses = Computers are susceptible to malicious software
Match the terms with its definition.
Computer security risk = is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability Cybercrime = an online or Internet based illegal act Biometric device = it authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer Hardware Theft = the act of stealing computer equipment
A malicious software that affects a computer negatively by altering the way the computer works.
Virus
A malicious software that copies itself repeatedly, using up resources and possibly shutting down the computer or network.
Worm
A malicious program that hides within or looks like a legitimate program.
Trojan Horse
A program that hides in a computer and allows someone from a remote location to take full control.
Rootkit
Which of the following is NOT a symptom of an infected computer due to an internet and network attack.
The operation system runs smoothly as usual.
You can start a computer with any removable media inserted in the drives or ports.
False
Always open an email attachment regardless if it's not from a trusted source.
False
Set the macro security in programs so that you can enable or disable macros.
True
Install an antivirus program on all your computer and update it regularly.
True
Scan the media device for malware before using it.
True
Stay informed about new virus alerts and virus hoaxes.
True
Match the terms and its definition.
Firewall = hardware and/or software that protects a network's resources from intrusion Unauthorized access = the use of a computer or network without permission Unauthorized use = the use of a computer or its data for unapproved or possibly illegal activities. Hardware Vandalism = the act of defacing or destroying computer equipment
What are the security measures that we can do to help reduce the chances of hardware theft and vandalism?
- Physical acccess controls
- Alarm Systems
- Cables to lock equipment
- Real time location system
- Passwords, possessed objects and biometrics
This occurs when someone intentionally erases programs, steals software media, illegally copies a program or illegally registers or activates a program.
Match the terms with its definition.
Information Theft = occurs when someone steals personal or confidential information Encryption = a process of converting readable data into unreadable characters to prevent unauthorized access. System Failure = the prolonged malfunction of a computer. Backup = a duplicate of a file, program, or disk that can be used if the original is lost, damage or destroyed. It is usually stored in a location separate from the computer site.
The process of using a wireless internet connection of someone else without their permission or knowledge.
Wireless Piggybacking
An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Ergonomics
Computer Ethics are the moral guidelines that govern the use of computers and information systems.
True
The widespread use of computers has led to health concerns like Repetitive Strain Injury (RSI) and Computer Vision Syndrome (CVS).
True
Give examples of Hand Exercises
Enumerate the techniques to ease eyestrain.
Match the terms and their definitions.
Intellectual Property Rights = the rights to which creators are entitled for their work Copyright = protects any tangible form of expression. IT code of conduct = a written guideline that helps determine whether a specific computer action is ethical or unethical. Information Privacy = refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
It is an unsolicited email message or newsgroup posting.
A scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information.
Taking Care of Your Computer: Learn essential tips to keep your computer in top shape, including cleaning techniques, optimal placement, and temperature considerations. Ensure your computer's longevity and performance while staying safe and respectful of others.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free