Computer Resource Awareness Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Jenny Hartman
J
Jenny Hartman
Community Contributor
Quizzes Created: 1 | Total Attempts: 123
Questions: 20 | Attempts: 124

SettingsSettingsSettings
Computer Resource Awareness Quiz! - Quiz

.


Questions and Answers
  • 1. 

    Which of the following is the strongest password?

    • A.

      P@ssw0rd

    • B.

      !'m5tr0nGrU

    • C.

      Jenny123

    Correct Answer
    B. !'m5tr0nGrU
    Explanation
    The password "!'m5tr0nGrU" is the strongest because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This makes it harder for hackers to guess or crack the password using common methods such as dictionary attacks or brute force attacks. Additionally, the password is longer, which adds an extra layer of security.

    Rate this question:

  • 2. 

    How often should your Internet History files be cleaned out?

    • A.

      Every 90 days

    • B.

      Every 30 days

    • C.

      Every 60 days

    Correct Answer
    B. Every 30 days
    Explanation
    Internet history files should be cleaned out every 30 days to ensure privacy and security. Regularly clearing these files helps to prevent unauthorized access to personal information and browsing habits. It also helps to improve the performance and speed of the internet browser by freeing up storage space. By cleaning out internet history files every 30 days, users can maintain a clean and secure browsing experience.

    Rate this question:

  • 3. 

    How can you tell if you may have malware or a virus on your computer?

    • A.

      Frequent pop-up ads when you’re not connected to the internet

    • B.

      Your web browser opens to a different homepage that what you have selected

    • C.

      You have a sudden rise in system crashes

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the given options are indicators that you may have malware or a virus on your computer. Frequent pop-up ads when you're not connected to the internet can be a sign of adware or malware. If your web browser opens to a different homepage than the one you have selected, it could be due to a browser hijacker. A sudden rise in system crashes may indicate the presence of a virus or malware affecting the stability of your system. Therefore, all of the above options suggest the possibility of malware or a virus on your computer.

    Rate this question:

  • 4. 

    What should you do with your computer when you leave for the day?

    • A.

      Log off the network and turn it off

    • B.

      Log off all open applications and leave it on

    • C.

      Log off the network and leave it on

    Correct Answer
    C. Log off the network and leave it on
    Explanation
    You should log off the network and leave the computer on when you leave for the day. Logging off the network ensures that your computer is disconnected from any external connections, reducing the risk of unauthorized access or data breaches. Leaving the computer on allows for necessary updates and maintenance tasks to be performed during non-working hours, improving the overall performance and security of the system.

    Rate this question:

  • 5. 

    The purpose of the Computer Resource Awareness program is to:

    • A.

      Ensure all employees understand their responsibilities with regard to using the Foundation’s computer resources

    • B.

      Keep the Internal Auditor of our backs

    • C.

      Give IS something to do

    Correct Answer
    A. Ensure all employees understand their responsibilities with regard to using the Foundation’s computer resources
    Explanation
    The purpose of the Computer Resource Awareness program is to ensure that all employees are aware of and understand their responsibilities when it comes to using the Foundation's computer resources. This program aims to educate and inform employees about the proper and responsible use of computer resources, such as hardware, software, and data, in order to maintain security, confidentiality, and integrity. By raising awareness and promoting responsible behavior, the program helps to minimize risks and protect the Foundation's computer resources from misuse or unauthorized access.

    Rate this question:

  • 6. 

    Everything created and saved on BFT computer equipment, including BFT, supported smartphones, is the property of BFT.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that all content created and saved on BFT computer equipment, including BFT-supported smartphones, is owned by BFT. This implies that BFT has the rights to access, control, and potentially use any data or information stored on their devices. Therefore, the answer "True" indicates that BFT claims ownership over all content created and saved on their computer equipment.

    Rate this question:

  • 7. 

    How often is mailbox size checked?

    • A.

      Every 90 days

    • B.

      Every 60 days

    • C.

      Every 30 days

    Correct Answer
    C. Every 30 days
    Explanation
    The mailbox size is checked every 30 days. This means that after every 30-day period, the size of the mailbox is examined. This regular monitoring ensures that the mailbox does not exceed its storage capacity and helps in managing the storage efficiently. By checking the size frequently, any potential issues or limitations can be identified and addressed in a timely manner.

    Rate this question:

  • 8. 

    What is the first thing you should do if you send an email to an unintended recipient?

    • A.

      Resend to the correct recipient

    • B.

      Notify the unintended recipient that you sent them something in error

    • C.

      Notify the legal department

    • D.

      Notify your supervisor

    Correct Answer
    D. Notify your supervisor
    Explanation
    If you send an email to an unintended recipient, the first thing you should do is notify your supervisor. This is important because your supervisor needs to be aware of the mistake and can guide you on the appropriate actions to take. They may advise you on how to handle the situation, such as retracting the email or apologizing to the unintended recipient. Notifying your supervisor allows them to be informed and involved in resolving the issue.

    Rate this question:

  • 9. 

    What is the name of our spam filter?

    • A.

      Axxys Spam Defense

    • B.

      Spamalot

    • C.

      Anti-Spam Shield

    Correct Answer
    A. Axxys Spam Defense
    Explanation
    Axxys Spam Defense is the correct answer because it is stated in the question itself. The question asks for the name of "our" spam filter, implying that the question is referring to a specific spam filter that is being used by the person or organization asking the question. Therefore, Axxys Spam Defense is the name of the spam filter being referred to in this context.

    Rate this question:

  • 10. 

    All files are included in the periodic system backups.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement "All files are included in the periodic system backups" is false because it is unlikely that all files are included in the backups. System backups typically prioritize essential files and may exclude temporary or unnecessary files. Additionally, there may be files that are actively being used and cannot be backed up during the backup process. Therefore, it is not accurate to say that all files are included in the backups.

    Rate this question:

  • 11. 

    In general, surfing the internet is allowed, however, which activities should be avoided?

    • A.

      Clicking ads in websites

    • B.

      Browsing social network sites

    • C.

      Downloading screen savers, toolbars, emoticons, or desktop backgrounds

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    All of the above activities should be avoided while surfing the internet. Clicking ads in websites can lead to potential scams or malware. Browsing social network sites can be a waste of time and may expose personal information to a wider audience. Downloading screen savers, toolbars, emoticons, or desktop backgrounds can contain viruses or spyware that can harm the computer. Therefore, it is best to avoid engaging in any of these activities while surfing the internet.

    Rate this question:

  • 12. 

    Passwords - which of the following statements is/are true?

    • A.

      Should not be shared

    • B.

      Can be the same for everything

    • C.

      Must have at least 6 characters

    • D.

      All of the above

    Correct Answer
    A. Should not be shared
    Explanation
    Sharing passwords is a security risk as it allows unauthorized access to personal accounts. It is recommended to keep passwords confidential to protect sensitive information. The other statements, "Can be the same for everything" and "Must have at least 6 characters," are not true as using the same password for multiple accounts increases vulnerability to hacking, and having a longer and more complex password is generally considered more secure. Therefore, the correct answer is that passwords should not be shared.

    Rate this question:

  • 13. 

    If you are allowed access to your BFT email account on mobile devices they must be:

    • A.

      Password protected

    • B.

      BFT issued

    • C.

      IPhone/iPad only

    • D.

      Option 4

    Correct Answer
    A. Password protected
    Explanation
    The correct answer is password protected because it ensures that only authorized individuals can access the BFT email account on mobile devices. This adds an extra layer of security and helps prevent unauthorized access to sensitive information.

    Rate this question:

  • 14. 

    You are giving the Monday Morning Devotional but forgot your Bible at home. You go online to download a version to use.  Which do you pick?

    • A.

      King James Version

    • B.

      New International Version

    • C.

      The Living Bible

    • D.

      None - downloading or installing unapproved software is prohibited

    Correct Answer
    D. None - downloading or installing unapproved software is prohibited
    Explanation
    The correct answer is "None - downloading or installing unapproved software is prohibited." This option is chosen because the question states that downloading or installing unapproved software is prohibited. Therefore, since the person is not allowed to download any version of the Bible online, they should not pick any of the given options.

    Rate this question:

  • 15. 

    When you participate in social networking or blogging to discuss BFT business, you should always:

    • A.

      Request permission from Senior Vice President , Finance and Administration to Use any BFT trademarks or reproduce any BFT materials

    • B.

      Include a disclaimer that the views expressed are yours alone and do not necessarily reflect the views of my employer

    • C.

      Avoid disclosing any confidential or proprietary information

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "All of the above." When participating in social networking or blogging to discuss BFT business, it is important to request permission from the Senior Vice President, Finance and Administration to use any BFT trademarks or reproduce any BFT materials. Additionally, including a disclaimer that the views expressed are yours alone and do not necessarily reflect the views of your employer is necessary. Finally, it is crucial to avoid disclosing any confidential or proprietary information. Therefore, all of the options mentioned above should be followed when engaging in discussions about BFT business on social networking or blogging platforms.

    Rate this question:

  • 16. 

    To create your Outlook signature:

    • A.

      Click on Insert, Signature, Signatures, New

    • B.

      Type directly into the Outlook message and save

    • C.

      Nothing - signatures are standardized and automatically load when you sign in to the network

    Correct Answer
    C. Nothing - signatures are standardized and automatically load when you sign in to the network
    Explanation
    The correct answer is "Nothing - signatures are standardized and automatically load when you sign in to the network." This means that in Outlook, signatures are already set up and saved on the network, so users do not need to create a new signature or manually insert it into their messages. The signatures will automatically load when they sign in to the network.

    Rate this question:

  • 17. 

    Websites such as cnn.com, msnbc.com, msn.com, dallasnews.com, and yahoo.com are free of malicious code and malware.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The statement is false because it is not accurate to claim that websites such as cnn.com, msnbc.com, msn.com, dallasnews.com, and yahoo.com are completely free of malicious code and malware. While these websites may have security measures in place to prevent such issues, it is still possible for them to be targeted by hackers or for malware to be accidentally introduced. Therefore, it is important for users to always exercise caution and have their own security measures in place when browsing any website.

    Rate this question:

  • 18. 

    The system is protected by a spam filter, anti-virus software, and firewalls.  Therefore, it is safe to assume that files attached to emails are safe.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement suggests that because the system is protected by a spam filter, anti-virus software, and firewalls, it is safe to assume that files attached to emails are safe. However, this assumption is false. While these security measures can reduce the risk of malware and spam, they are not foolproof. Hackers can still find ways to bypass these protections and send malicious files through emails. Therefore, it is important to exercise caution and not automatically assume that all attachments are safe.

    Rate this question:

  • 19. 

    Which of the following does not affect the use of bandwidth?

    • A.

      Streaming audio

    • B.

      Watching videos

    • C.

      Running tickers

    • D.

      None of the above

    Correct Answer
    D. None of the above
    Explanation
    All of the options listed in the question (streaming audio, watching videos, running tickers) can affect the use of bandwidth. Therefore, the correct answer is "None of the above" as it implies that none of the options listed affect the use of bandwidth.

    Rate this question:

  • 20. 

    Your email password should not be the same as your drawbridge password.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is important to have different passwords for different accounts to ensure better security. Using the same password for both your email and drawbridge accounts increases the risk of unauthorized access. If a hacker gains access to one account, they could potentially gain access to the other account as well, leading to potential breaches of personal information or sensitive data. Therefore, it is advisable to have unique and strong passwords for each account to enhance security.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 22, 2014
    Quiz Created by
    Jenny Hartman
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.