CIS 1110

Sound Byte

and

Help Desk

Labs

Part 2:  Chapters 5 - 7

 

 

 

 

Please use one scantron for each chapter.

Please answer the Buzz Words and Organizing Key Terms on a separate paper.

Correctly label your work.

 

 

 

 


CHAPTER 5 Assignments

For each chapter, the answers to the Buzz Words and Organizing Key Terms should be submitted on a separate sheet.

 

Buzz Words, p. 213

Organizing Key Terms, p. 214

Sound Byte Lab – Chapter 5     File Management  

 

Introduction: Most computer users know how to save files on their computer; however, organizing those files into a meaningful structure is a skill that not everyone has mastered. Windows XP makes it easy to organize your files so you can keep related information grouped together, find what you want quickly, and easily make backups of your important information.

 

As you step through the Sound Byte, circle the letter that indicates the correct answer.

Point value total: 3 pts.

 

1.         How do you sort your files in order by the date they were last modified?

            a.         Choose Detail from the View menu and then click on the Date header

            b.         Choose Date from the Detail menu and then choose View

            c.         Choose View from the Date menu and then click on the Detail header

            d.         Choose View from the Detail menu and then choose Date

 

2.         Which is NOT a way to make a new folder in Windows XP?

            a.         Select “Create a new folder” from the task pane.

            b.         Select New from the File menu and then choose Folder.

            c.         Select folder from the New menu.

            d.         Right-click an empty part of the file area and select New Folder.

 

3.         How do you move a file into a folder?

            a.         Left-click and drag it onto the folder icon.

            b.         Right-click and drag it onto the folder icon.

            c.         Right-click and select move.

            d.         Select “Put in folder” from the File menu.

 

4.         To select a group of files that are next to each other:

            a.         Click on the first file and drag it to the last file.

            b.         Click on the first file, hold Shift, and click on the last file.

            c.         Click on the first file, hold Ctrl, and click on the last file.

            d.         Right-click on the folder and then choose Select Files.

 

5.         To select two files that are not next to each other:

            a.         Click on the first file and drag it to the next file.

            b.         Click on the first file, hold Shift, and click on the next file.

            c.         Click on the first file, hold Ctrl, and click on the next file.

            d.         Right-click on the folder and then choose Select Files. 

 

6.         You know you need to update your folder structure if

            a.         there are many files that are not in folders.

            b.         there are more than five different folders in my documents.

            c.         every folder has files in it.

            d.         you have created a new file.

 

7.         When you right-click on a folder on the hard drive and choose Delete, what happens to the files?

            a.         They are erased.

            b.         They go into the Recycle bin.

            c.         They go into the Old Documents folder.

            d.         They are moved into the header section of the hard drive.

 

8.         Which is NOT a reason to organize your files?

            a.         quickly back-up important data

            b.         keep related files together

            c.         facilitate disk fragmentation

            d.         distinguishes individual user data

 

9.         Which is true?

            a.         A folder can hold many files.                 c.   A file is the same as a folder

            b.         A file can hold many folders.                 d.   A folder is a kind of document.      

 

10.       Folder names should ______________.

            a.         not contain spaces

            b.         be as short as possible

            c.         be meaningful and recognizable

            d.         use numbers only

Help Desk Call 1 – Chapter 5     Managing Hardware and Peripheral Devices: The OS

Multiple Choice:   Point value total: 4 pts

 

11.       Your computer’s main location for permanent storage space is:

            a.         the CD drive.                c. random access memory

            b.         the hard disk.                d. the cache file

           

12.       The operating system uses RAM to:

            a.         store the computer’s start up instructions.

            b.         store archived files for backup purposes.

            c.         retrieve information lost during unexpected power failures.

            d.         temporarily store instructions and data.

 

13.       All of the following statements about RAM are true, EXCEPT:

            a.         Deleting files will create more storage space in RAM.

            b.         RAM is used by the OS to coordinate the CPU’s activities.

            c.         Turning off the computer will erase the information in RAM.

            d.         The average computer has 128 MB to 2 GB of RAM.

 

14.       The process of optimizing RAM storage by using space on a computer’s hard drive is    known as:

            a.         generating an interrupt.

            b.         virtual memory.

            c.         paging.

            d.         flashing the hard drive.

 

15.       To free up space in RAM, the ____________ holds information that hasn’t been recently used by the CPU.

            a.         ROM chip

            b.         processor

            c.         swap file

            d.         optical drive

 

16.       The OS retrieves data and instructions from RAM over ____________ times faster than it could access them from             the hard drive.

            a.         ten

            b.         one hundred

            c.         one thousand

            d.         one million

 

17.       When a computer with an insufficient amount of RAM uses its virtual memory too often, it can cause:

            a.         a system failure.

            b.         thrashing.

            c.         the swap file to crash.

            d.         the computer to enter Safe Mode.

 

18.       A device driver is required to:

            a.         help the device communicate with the operating system.

            b.         complete the computer’s boot up process.

            c.         create a swap file.

            d.         improve peripheral response time.

 

19.       If you purchase a used printer and the operating system is unable to recognize it, you should:

            a.         purchase a new printer.

            b.         reload the operating system.

            c.         check the manufacturer’s Web site or a download site for the correct driver.

            d.         empty the cache files.

 

20.       Which of the following statements about Plug and Play is FALSE?

            a.         Plug and Play was created by Microsoft for the Windows ME operating system.

            b.         Plug and Play is a hardware and software standard.

            c.         Plug and Play includes device drivers in the operating system.

            d.         Plug and Play may not work for older devices.

 


Matching:

Match the following terms to their functions:

 

            21.       _____Paging                A. used for troubleshooting boot up errors

            22.       _____Safe mode          B. enables the OS to recognize a new device

            23.       _____Device driver      C. manages memory and interacts with devices

            24.       _____Plug and Play      D. replaces a swap file’s contents

            25.       _____OS                     E. translates specialized commands to and from peripherals

Help Desk Call 3 – Chapter 5     Organizing Your Computer: File Management

Multiple Choice:   Point value total: 5 pts

 

26.       Which of the following is NOT a method used to display two windows at the same time?

            a.         Tile the windows.

            b.         Use the cascade feature.

            c.         Resize the windows.

            d.         Display in thumbnail mode.

 

27.       The ____________ contains groups of buttons used to perform specific tasks, such as centering a document or             changing font color.

            a.         toolbar

            b.         scrollbar

            c.         title bar

            d.         menu bar

 

28.       To determine the file name of a document and the software application that is in use, a user can:

            a.         right-click on the toolbar.

            b.         look at the title bar.

            c.         click on a blank area of the task bar.

            d.         view the Help menu.

 

29.       Clicking the ____________ button will untile windows.

            a.         Cascade

            b.         Restore

            c.         Start

            d.         Undo

 

30.       Which of the following is NOT a way to resize or move a window that has been tiled?

            a.         Double-click the title bar

            b.         Position cursor at edge of window, click and drag

            c.         Click and drag the scrollbar button

            d.         Click the Restore button

 

31.       Clicking the My Network Places icon will:

            a.         activate the Network Connection Wizard.

            b.         display the router needed to connect to the network.

            c.         display only the devices that connect through the USB port.

            d.         show all the computers and devices connected to the computer via the network.

 

32.       The ___________ icon, found on the Windows desktop, is used to organize files and folders.

            a.         My Documents

            b.         Windows Explorer

            c.         Folder Sorter and Organizer

            d.         My Filing Cabinet

 

33.       The ___________ is used to access frequently used programs and to open the Control Panel.

            a.         Task bar

            b.         My Computer icon

            c.         Start Menu

            d.         System tray

 

34.       All of the following statements about the Windows search function are true, EXCEPT:

            a.         The Search feature is located in the System tray by default.

            b.         It is possible to search for files on the hard drive or on other storage devices.

            c.         It is not necessary to know the complete file name.

            d.         Searches can be limited to files created using a specific application.

 

35.       The contents of a computer are organized in a structure of ____________ which includes files, folders, and drives.

            a.         hierarchies

            b.         directories

            c.         categories

            d.         classes

 

36.       Within Windows Explorer, a folder’s contents can be collapsed by:

            a.         selecting the folder and pressing the Delete key.

            b.         double-clicking the root directory.

            c.         right-clicking the folder.

            d.         clicking on the minus sign.

 

37.       All of the following can be viewed in Windows Explorer’s left hand pane, EXCEPT:

            a.         drives.

            b.         the desktop.

            c.         files.

            d.         plus and minus signs.

 

38.       If a folder appearing in the left side of Windows Explorer does not have a plus or minus sign, you can be sure that:

            a.         the folder is empty.

            b.         the folder has been archived.

            c.         the contents of the folder have already been viewed.

            d.         there are no other folders within it, though there may be files.

 

39.       Opening a folder displayed in the left hand pane of Windows Explorer will:

            a.         cause the folder’s contents to display in the right hand pane.

            b.         launch the application associated with the folder.

            c.         expand any subfolders contained within it.

            d.         display the folder’s root directory.

 

40.       The computer’s hard drive is also known as the:

            a.         A: drive.

            b.         B: drive.

            c.         C: drive.

            d.         D: drive.

 

41.       Using the ____________ view allows you to see your computer’s folder contents as small images.

            a.         Details

            b.         Thumbnails

            c.         Icon

            d.         Tiles

 

42.       The ____________ view displays picture dimension information for graphic files.

            a.         Tiles

            b.         List

            c.         Icon

            d.         Thumbnails

 

43.       To view the maximum number of folders or files at one time, use the __________ view.                        

            a.         Icons

            b.         List

            c.         Details

            d.         Thumbnails

 

44.       Which of the following statements about the Recycle Bin is FALSE?

            a.         The Recycle Bin is a folder on the desktop.

            b.         Files deleted from the hard drive are sent to the Recycle Bin.

            c.         Selecting Empty the Recycle Bin permanently deletes all files contained in it.

            d.         To restore a deleted file from the Recycle Bin, select the file and choose Undelete.

 

45.       When using the Windows operating system, the file extension is:

            a.         assigned to a filename by the user.

            b.         the beginning of a filename.

            c.         always displayed in Windows Explorer.

            d.         an indication of the application the file was created in.

 

46.       All of the following are important file naming tips, EXCEPT:

            a.         being aware of the file naming conventions for the operating system in use.

            b.         using file extensions of five or more letters to provide greater naming flexibility.

            c.         remembering that files within the same folder must have unique file names.

            d.         assigning meaningful file names for easier retrieval.

 

Matching:

Match the following terms to their meanings:

            47.       _____Sherlock                         A. file management tool

            48.       _____Finder                            B. search function for Macs

            49.       _____System Information         C. file management structure

            50.       _____Directory                        D. most interactive view

            51.       _____Details                            E. provides hardware and software details

CHAPTER 6 Assignments

For each chapter, the answers to the Buzz Words and Organizing Key Terms should be submitted on a separate sheet.

 

Buzz Words, p. 253

Organizing Key Terms, p. 254

Sound Byte Lab – Chapter 6  Letting Your Computer Clean Up After Itself

 

Introduction: Your computer does not automatically clean up after itself. Many utilities are available that will remove unnecessary files, organize the disk, and clean up your system automatically each week (or whenever you choose).

 

Learn how you can keep your computer running smoothly and efficiently.

As you step through the Sound Byte, circle the letter that indicates the correct answer.

Point value total: 2 pts.

 

1.      What does disk clean up do?

a.       Re-format the hard drive

b.      Clean the read/write heads on the disk drive

c.       Remove unnecessary files

d.      Reorganize files so they are stored more efficiently

 

2.      You must shut down all running programs to analyze whether or not your system needs to be defragmented.

a.       True

b.      False – you do need to shut them down to defrag, but not to analyze

 

3.      When a disk is finished with defragmentation, all free space will be _________.

a.       blue

b.      white

c.       green

d.      red

 

4.      You should check to be sure that your screen saver is off before you run a disk defragmentation program.

a.       True     OR     b.   False

 

5.      The recycle bin is _________.

a.       just another folder stored on the hard drive

b.      a special section of the computer’s memory

c.       a separate hard drive used only for recycling

d.      a reserved section of flash memory

 

6.      When you restore a file from the recycle bin _________.

a.       a copy of the file is placed on the C: drive

b.      the old version of the file overwrites any newer versions

c.       it is permanently deleted

d.      the file is sent back to its original location

 

7.      Scan Disk will _________.

a.       fix file system errors and find and recover bad sectors

b.      find all unnecessary temporary files on the computer

c.       fix any hardware errors in the ram memory

d.      find any viruses or hacker programs on your system

 

8.      The task scheduler will allow you to _________.

a.       access the internet automatically at certain times

b.      perform automated program and data changes

c.       schedule a task for windows to perform automatically

d.      update your programs to the latest versions

 

9.      In the Internet Explorer Tools > Internet Options, you can _________.

a.       find updates for all of your utility programs

b.      set automatically scheduled tasks

c.       choose how often you want your computer defragmented

d.      delete cookies and temporary internet files

 

10.  Temporary files have the extension _________.

a.       .temp

b.      .tmp

c.       .tp

d.      .fil

Help Desk Call 1 – Chapter 6     Evaluating Your CPU and RAM

Multiple Choice:   Point value total: 5 pts

 

11.       The number of machine cycles a CPU can process per second is measured in:

a.       megabytes.

b.      megahertz and gigahertz.

c.       kilobytes per second.

d.      kilohertz and megahertz.

 

12.       The portion of the computer responsible for processing instructions, performing calculations, managing information             flow, and processing data is:

a.       RAM.

b.      the motherboard.

c.       the operating system.

d.      the CPU.

 

13.       Which of the following choices lists the machine cycle steps in their correct order?

a.       fetch č storeč execute č decode

b.      execute č storeč decode č fetch

c.       fetch č decodeč execute č store

d.      decode č storeč fetch č execute 


14.       To determine the CPU speed of a computer, you can:

a.       use a special metering device.

b.      right-click the My Computer icon, select Properties, and view the General tab.

c.       double-click the clock in the system tray.

d.      check the label on the back panel of the computer.

 

15.       Which of the following statements about CPU usage is NOT true?

a.       CPU usage is not a concern if the CPU meets the minimum system requirements.

b.      CPU usage measures the percentage of time the CPU is working.

c.       The Performance tab in the Task Manager displays current CPU usage.

d.      CPU usage levels that are consistently over 90 percent may indicate the need for a faster processor.

 

16.        CPUs use a ____________ to regulate the temperature.

a.       process regulator

b.      thermostat

c.       cooling cycle

d.      heat sink

 

17.       All of the following statements are important considerations when replacing or upgrading the CPU, EXCEPT:

a.       It can be cost effective to buy a processor that is slightly slower than the top of the line model.

b.      The actual replacement process is relatively simple – just line up the slots and plug it in.

c.       Replacement CPUs are interchangeable if they are manufactured by the same company.

d.      Replacing or upgrading a CPU may not make the system faster.

 

18.       In addition to RAM, computers use ____________ for permanent storage.

a.       nonvolatile storage devices

b.      volatile storage devices

c.       flash memory

d.      kernel memory

 

19.       The small circuit boards that hold the RAM chips are known as:

a.       motherboards.

b.      kernels.

c.       memory drivers.

d.      memory modules.

 

20.       The portion of physical memory used to run the operating system is:

a.       flash memory.

b.      kernel memory.

c.       ROM.

d.      RAM. 


21.       It is possible to determine the minimum amount of RAM a system requires by:

a.       adding up the requirements for the operating system and any applications that will be run at the same time, then adding a bit extra for input data.

b.      checking the General tab in the Systems Properties dialog box.

c.       examining the memory modules.

d.      checking the available amount of space on the hard drive.

 

22.       Adding RAM to a computer is a relatively easy process, once you’ve determined the:

a.       page file size.

b.      amount of RAM currently available on the hard drive.

c.       type of RAM that is needed.

d.      kernel size.

 

23.       The type of memory used on most newer computers is:

a.       SRAM.

b.      SDRAM.

c.       RAM+.

d.      DRAM.

 

24.       If the amount of RAM is insufficient for the system’s needs, the computer will:

a.       be unable to boot.

b.      create additional physical memory.

c.       search for additional flash memory.

d.      use virtual memory on the hard drive.

 

25.       A rule of thumb states that if the Page File Usage is more than 1.5 percent of the amount of installed RAM and very             little physical memory is available, then:

a.       the CPU should be upgraded or replaced.

b.      the virtual memory needs to be purged.

c.       adding more RAM will improve system performance significantly.

d.       the disk defragmentation utility should be run.

Matching:

Match the following terms to their meanings:

 

            26. _____motherboard            A. created when virtual memory is in use

            27. _____ALU                        B. primary circuit board

            28. _____nonvolatile                C. temporary storage

            29. _____page file                    D. performs logic and comparison decisions

            30. _____volatile                      E. CDs and hard drives

 

Animation Link – Chapter 6     Hard Disk Anatomy Interactive  

Extra Credit Lab

 

You must find the Animation link located on the Chapter 6 link in the left pane of the Student CD to complete this lab.

 

Introduction: Computers became practical for everyday use when they gained the ability to hold programs and data in long-term storage. Learn how the computer’s hard drive stores data, accesses it and runs efficiently.

As you step through the Animation, circle the letter that indicates the correct answer.

Point value total: 2 extra credit pts.

 

31.       Non-volatile storage _________.

a.       is erased whenever the power goes off

b.      is remembered even when the power goes off

c.       refers to the kind of memory used in older computers

d.      is quick to program and slow to decay.

 

32.       Why must the hard drive case remain sealed shut?

a.       Any change in the balance of the arms and motor will destroy its balance.

b.      You can only then eject the disk when it is finished.

c.       One speck of dust can cause a scratch that can ruin the disk.

d.      It is soldered together and does not have a seam to open.

 

33.       What is it called when a hard drive is ruined and the data destroyed?

a.       Out of range error

b.      Data error

c.       Hard drive crash

d.      Total system failure

 

34.       Which part of the hard drive is where the data is actually stored?

a.       Platter

b.      Read/write head

c.       Spindle

d.      Actuator arm

 

35.       What part of the hard drive moves the read/write heads?

a.       Platter

b.      Read/write head

c.       Spindle

d.      Actuator arm

 

36.       Formatting a disk _________.

a.       marks it into sections called tracks and sectors

b.      fills the disk with data from the inside to the outside

c.       compresses files to make disk access more efficient

d.      puts broken pieces of files together

 

37.       When the computer locates the block of data it is looking for on the hard drive it  _________.

a.       stops the spinning of the drive and goes into sleep mode

b.      sends the data from the drive to the bus

c.       formats the data

d.      moves it to a better location on the disk


38.       What happens as old files are deleted from a disk?

a.       The free space becomes scattered across the disk.

b.      New files cannot use their space until all other space is filled.

c.       They are moved to a backup disk for permanent storage.

d.      The other files on the disk are automatically moved to take up the empty space.

 

39.       Why is it useful to defragment a disk?

a.       The processor will have more memory available.

b.      Computer efficiency will increase, because reading and writing to the disk will be faster.

c.       There will be fewer errors caused by rewriting to the same sectors too many times.

d.      Less data will be lost.

 

40.       Access time is the amount of time required to _________.

a.       send data from the CPU through the bus

b.      defragment the majority of files on a disk

c.       move to the right track and sector on the disk

d.      find all of the separate blocks that make up a file.

 

CHAPTER 7 Assignments

 

Do not complete the Buzz Words and Organizing Key Terms for this chapter as we do not cover all the topics included as part of CIS 1110.

Sound Byte Lab – Chapter 7     Installing a Personal Firewall    

Introduction: Have you wondered what a firewall is? What it protects you against?

Do you need one? And if so, how you would set one up?

 

This lab will explain some of the dangers that come along with being online and how a firewall can protect you when it is properly installed and configured. As you step through the Sound Byte, circle the letter that indicates the correct answer.

 

Point value total: 4 pts.

 

1.      Keystroke loggers ________.

a.       programs that disrupt the flow of information from the keyboard to the PC

b.      programs that delay information traveling from the keyboard to the PC

c.       programs that record everything that is typed on a computer and store it in a file to be retrieved later

d.      a log of all activity related to the keystrokes that are pressed

 

2.      A remote access trojan is ________.

a.       a program that allows hackers to remotely control your PC as if they were sitting in front of it

b.      a “trojan horse” program that disguises itself until it is triggered to cause damage to your computer system

c.       remote access of your computer through hidden channels that you cannot trace

d.      the insertion of unwanted trojan information onto your computer while you are online

 

3.      A denial-of-service attack agent is ________.

a.       a program that allows hackers to launch attacks against other large computer installations using your computer

b.      a systematic attack of a large computer system that is continuously sent requests for service

c.       remote access of your computer causing it to deny all requests for service

d.      an indirect attack of you ISP service from an unknown agent.

 

4.      A hardware firewall is often built into a ________.

a.       router                     c. network interface card

b.      modem                   d. CPU

 

5.      A firewall will NOT ________.

a.       block intruders that are trying to access your PC

b.      let you know what programs are requesting internet access and giving you the choice to either allow or disallow it

c.       protect your e-mail

d.      disable viruses introduced to your system

 

6.      To add a computer to the trusted zone you need its ________.

a.       IP address

b.      network name and type of connection

c.       type of connection and security level

d.      security level

 

7.      Computers that belong to your trusted zone are ________.

a.       all computers you want to access on the Internet

b.      computers that will share your modem

c.       computers on your own home network

d.      running the same firewall program

 

8.      The Internet Zone includes ________.

a.       PC’s you want to block from communication with you

b.      all PCs that are not in the trusted zone

c.       all PCs on your own home network

d.      all non-networked computers

 

9.      The Alerts and Logs section is useful because ________.

a.       without the alerts and logs turned on, your firewall will not function.

b.      you want to know if a malicious program is accidentally installed on your PC and is trying to access the Internet. 

c.       it keeps track of the website addresses you visit and any cookies that result.

d.      it is the only filter that keeps out unwanted intruders.

 

10.  Hackers are ________.

a.       a myth made up by people who want to sell protection software

b.      a serious threat to business computer systems but not to personal users

c.       a legitimate threat to Internet security in the home that you should take seriously

d.      only a threat to servers and web hosting services

 

Sound Byte Lab – Chapter 7     Protecting Your Computer

 

Introduction: The more complex our computer systems become, the more difficult are the problems associated with them. Hardware and software can fail, people make mistakes, and virus threats and security breaches have become a fact of life.

 

Learn how to defend yourself against common problems and mistakes. As you step through the Sound Byte, circle the letter that indicates the correct answer.

 

Point value total: 3 pts.

 

11.  Defensive computing helps to protect you from __________.

a.       Viruses             c. computer errors

b.      your mistakes               d. all of the above

 

12.  If you accidentally delete an important file, you can __________.

a.       undelete it through the Recycle Bin or an equivalent utility if you have an operating system other than Windows on your computer.

b.      restore it from a timely backup.

c.       both a and b

d.      neither a nor b

 

13.  Norton and McAfee both provide __________.

a.       antivirus software                c.   computer errors

b.      Internet service                   d.   all of these

 

14.  Firewalls are capable of __________.

a.       scanning for viruses on your system

b.      checking floppy disks and CDs for corrupted files

c.       protecting your computer from Internet intrusion

d.      protecting against power surges

 

15.  Why are subscription services important?

a.       They tell you when new programs which may interest you are coming out.

b.      They update your virus definitions to correspond with current viruses.

c.       They allow for discounts on other programs of interest.

d.      They list other programs that the same company offers.

 

16.  Interfaces for antivirus software tend to be

a.       potentially dangerous to important files on your computer.

b.      used only by trained professionals.

c.       very different, varying from company to company.

d.      similar and simple for anyone to use.

 

17.  Which of the following is NOT a basic feature of anti-virus software discussed in the Sound Byte?

             a. Subscriptions

             b. System scans

 c. E-mail scans

             d. Blocking unwanted intrusions from hackers

 

18.       To automatically update your windows’ built in security, use:

a.       Start đ Programs đ Update đ Auto-Update

b.      My Computer đ Properties đ Automatic Update

c.       Network Neighborhood đ Security Settings đ Automate

d.      Start đ Run đ Format C:

 

19.       Which of the following correctly orders backup media from least to greatest possible storage capacity?

a.   Floppy disk, CD-R, flash drive

b.   Zip Drive, CD-R, Floppy Drive

c.   CD-R, Zip Drive, Tape Drive

d.   Zip Drive, Tape Drive, flash drive

     

20.       Creating a restore point _________.

a.       saves the whole computer exactly as it is now

b.      reverts the computer to a better-functioning setup

c.       brings back any files you may have deleted in the recent past

d.      both b and c

Help Desk Call 3 – Chapter 7     Avoiding Computer Viruses

Multiple Choice: 5 pts.

 

21.       A(n) ____________ attempts to spread itself to other computers by attaching itself to files that are being exchanged.

a.       packet sniffer

b.      firewall

c.       computer virus

d.      HTML tag

 

22.       Viruses aren’t always the problem when things go wrong.  Which of the following is a symptom that might indicate that a file has become corrupted for a reason other than virus infection?

a.       A strange animation plays on the computer screen.

b.      A software application stops working properly.

c.       Several program icons have disappeared from the desktop.

d.      The browser displays a new home page that was not selected by the user.

 

23.       The ___________ program is the program to which a virus attaches itself.

a.       client                c. server

b.      host                  d. boot-sector

 

24.       Which of the following statements about boot-sector viruses is NOT true?

a.       Boot-sector viruses copy themselves to a computer’s master boot record.

b.      Boot-sector viruses can delete the contents of an entire hard drive.

c.       Starting the computer with an infected floppy disk in the drive can launch a boot-sector virus.

d.      The hard drive’s master boot record is designed to trap and delete boot-sector viruses.

 

25.       All of the following statements about e-mail viruses are correct, EXCEPT:

a.       e-mail attachments may contain viruses.

b.      viruses can spread by using your e-mail address book.

c.       knowing the person who sent the e-mail does not mean the attachment is virus-free.

d.      it is possible to contract a virus from an e-mail message without opening the file attachment.

 

26.       The old Michelangelo virus, which was set to activate every year on March 6 and erase significant portions of a computer’s hard drive, is an example of a(n):

a.       e-mail virus.                  c.   logic bomb.

b.      macro virus.                  d.   worm.

 

27.       A(n) ____________ does not need to be executed and can spread quickly through network connections to infect systems.

a.       worm                           c.   script

b.      logic bomb                   d.   e-mail virus

 

28.       Which of the following statements about worms is NOT true?

a.       Worms travel between systems through their network connections.

b.      Worms are most often spread by infected floppy disks.

c.       Some worms do nothing but make copies of themselves.

d.      Worms can create enough traffic to shut down a network.

 

29.       Which of the following choices is the BEST way to avoid computer viruses?

a.       Only open e-mail attachments from people you know.

b.      Set up Word and Excel to disable macros.

c.       Avoid visiting unscrupulous Web sites.

d.      Install antivirus software and update it regularly.

 

30.       Antivirus software works by:

a.       blocking access to logical ports.

b.      scanning files when they are opened or executed.

c.       using packet sniffers to inspect data.

d.      requiring all incoming data to be encrypted.

 

31.       To be effective, experts recommend that antivirus software should be set up to automatically scan your system at least once every:

a.       hour.

b.      day.

c.       week.

d.      month.

 

32.       In addition to updating antivirus software on a regular basis, another important precaution to take is to:

a.   update the operating system regularly.

b.   set the computer to deny cookies.

c.   turn off the HTML viewing capabilities for the browser.

d.   disable the firewall to prevent conflicts with the antivirus software.

 

Matching:

Match the following terms to their meanings:

 

            33. _____scripts                      A. spreads without user interaction

            34. _____logic bomb               B. portion of virus code

            35. _____worm                       C. triggers when certain conditions are met

            36. _____signature                   D. good ones may collect legitimate personal information

            37. _____patch                        E. provides enhanced protection for the operating system

Help Desk Call 2 – Chapter 7     Understanding Firewalls

Multiple Choice: 5 pts.

 

38.       If your computer ____________, a firewall should definitely be installed.

a.       is part of a network

b.      is running an older version of Windows, such as Windows 98

c.       accesses the Internet

d.      does not have a surge protector

 

39.       Installing a firewall helps protect users from all of the following, EXCEPT:

a.       software glitches.

b.      identity theft.

c.       launching denial of service attacks.

d.      launching Trojan horses.

 

40.       A hacker may use a ___________ to detect and capture valuable Internet content.

a.   packet sniffer

b.   logic bomb

c.   denial of service attack

d.   firewall

 

41.       A hacker may try to access your home computer for the purpose of obtaining valuable data from your:

a.       ISP.                             c. hard drive

b.      Internet server.             d. RAM

 

42.       A program that appears desirable, but actually causes damage by installing a backdoor program is known as:

a.       freeware.

b.      a Trojan horse.

c.       a packet sniffer.

d.      a denial of service attack.

 

43.       A denial of service attack works by:

a.       interrupting a computer’s power source.

b.      interfering with a network’s wireless signal.

c.       bombarding a computer with more requests than it can handle.

d.      disabling a computer’s antivirus protection. 

 

44.       Firewalls protect computers by:

a.       blocking access to the TCP/IP protocol.

b.      preventing hackers from accessing physical ports.

c.       transmitting data in encrypted code.

d.      screening incoming data.

 

45.       Firewall protection can be obtained from all of the following, EXCEPT:

a.       a computer software or hardware retailer.

b.      an online download site.

c.       Windows XP.

d.      Windows 98.

 

46.       To ensure a firewall is working properly, you should:

a.       make sure the indicator light is on.

b.      try connecting to the Internet.

c.       run a testing agent.

d.      check to see if your email is being blocked.

 

47.       Which of the following statements about logical ports is NOT true?

a.       Each logical port provides the same service.

b.      Open ports can allow hackers to access the computer.

c.       Firewalls are used to close open ports.

d.      Logical ports are the computer’s communication gateways.

 

48.       All of the following statements about firewalls are true, EXCEPT:

a.       Firewalls are available as software programs.

b.      Switching your IP address frequently makes your firewall less effective.

c.       Hardware devices can provide firewall protection.

d.      Running a firewall can prevent a computer from being used as a zombie.

 

Matching:

Match the following terms to their meanings:

            49. _____packet sniffer               A. launched from multiple computers

            50. _____DDoS attack               B. communication gateway

            51. _____logical port                  C. result of hacker intrusion

            52. _____identity theft                 D. delivered by Trojan horse

            53. _____backdoor program       E. used to inspect data