Tb143 Unit 5-7 Study Guide

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Gregbeal
G
Gregbeal
Community Contributor
Quizzes Created: 1 | Total Attempts: 59
| Attempts: 59 | Questions: 32
Please wait...
Question 1 / 32
0 %
0/100
Score 0/100
1. The ______________   type of backup stores only those files that changed since the last backup?

Explanation

Page 5-13

Submit
Please wait...
About This Quiz
Tb143 Unit 5-7 Study Guide - Quiz


If you fancy yourself a computer fanatic and are up to answering specifically designed questions that gauge your knowledge on TB143. It is a simple set of questions... see moreand therefore, it will be easy to answer. see less

2. While trying out a registry hack, you find that you have made a major mistake. Windows won't finish its startup process, and you can't get into the registry to undo your mistake. You decide to press F8 as you reboot, the _______________________ would be a first choice tool to fix the system?

Explanation

Page 5-22 to 5-25

Submit
3. The process of verifying that the person typing is the actual authorized user is called ______________________.

Explanation

Page 6-8

Submit
4. What is the most effective way to protect a computer from malware?

Explanation

Page 6-22, 6-23

Submit
5. How often should you backup data?

Explanation

Page 5-9

Submit
6. What is a hacker most likely not going to steal from a networked computer?

Explanation

Page 6-4 to 6-5

Submit
7. If I am having a problem with a computer, a USENET newsgroup, or a manufacturer's forum, would be a good place to find if others are having the same problem. 

Explanation

Page 7-6

Submit
8. You are into your second day of trying to figure out why a vital application will not start on your computer. In the meantime, your deadline is approaching and no progress is being made. You should: 

Explanation

Page 7-5

Submit
9. Your three-week old computer is hit with a nasty virus. You have secured your data files on a separate hard drive, but the system partition has an enormous amount of data corruption. Which of the following tools would be the best choice to fix this system?

Explanation

Page 5-22 thru 5-25

Submit
10. A software program is recording your keystrokes in an attempt to gather your password for your online bank. This type of program is usually described as:

Explanation

Pages 6-19, 6-20

Submit
11. You receive an urgent e-mail message from your online bank, warning you that without immediate action, your account is going to be disabled. If you click the provided link, then verify your account information, your money will be safe. Such a warning is most likely an example of Phishing.

Explanation

Page 6-24

Submit
12. What is the purpose of a strong password?

Explanation

Pages 6-10, 6-14

Submit
13. A possible danger following a blackout is a:  

Explanation

Page 7-13

Submit
14. What is the purpose of a signed driver?

Explanation

Pages 5-15, 5-16

Submit
15. What is the most reliable and secure way to share resources between computers?

Explanation

page 6-15

Submit
16. What could be a warning sign that your computer power supply is about to fail?

Explanation

Page 7-15

Submit
17. It is possible to use a USB or IEEE-1394 device to boot a computer and bypass its internal security devices. 

Explanation

Page 5-32

Submit
18. Which of the following will allow you to recover the data when a computer has been stolen from an office?

Explanation

Page 5-22 thru 5-28

Submit
19. A computer that reboots at random times and intervals is most likely experiencing:  

Explanation

Page 7-4

Submit
20. What type of virus uses the programming and scripting features found in applications?

Explanation

Page 6-18

Submit
21. Often problems can be predicted ahead of time by comparing the current system performance against:

Explanation

Page 7-11

Submit
22. Which file system can be used by all Microsoft operating systems?

Explanation

Page 5-3

Submit
23. Creating a backup of your data files can be made easier if you:

Explanation

Page 5-4

Submit
24. Which of the following file types will save the most file space after you compress them?  

Explanation

Page 5-7 Text files are highly compressible

Submit
25. Renaming the Administrator account would:

Explanation

Pages 6-1, 6-2

Submit
26. Microsoft's term for an account on a computer that is not attached to a network is:

Explanation

Page 6-2

Submit
27. All of the USB connectors on the front of your desktop are in use, but you need a file from your flash drive. You run an extension USB cable from a connector that is never used on the back of the computer, but the USB port does not work. Which of the following would be most important when describing this problem to tech support?  

Explanation

Page 7-2

Submit
28. Windows uses an update process to patch program code problems. Which update setting will automatically download patches but wait for you to install them?  

Explanation

Pages 5-18, 5-19

Submit
29. A surge suppressor is designed to provide uninterruptible power to a system.

Explanation

False, designed to remove power spikes. Page 7-14

Submit
30. How much current can a USB port on the back of a computer supply?  

Explanation

Page 5-28

Submit
31. Which of the following redundancy techniques is best fulfilled by a thorough and periodic backup strategy?  

Explanation

Page 7-10

Submit
32. Preventing failures altogether, and thus improving up time, is the goal of:

Explanation

Environment, Page 7-10

Submit
View My Results

Quiz Review Timeline (Updated): Jun 7, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 07, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 26, 2011
    Quiz Created by
    Gregbeal
Cancel
  • All
    All (32)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The ______________   type of backup stores only those files...
While trying out a registry hack, you find that you have made a major...
The process of verifying that the person typing is the actual...
What is the most effective way to protect a computer from malware?
How often should you backup data?
What is a hacker most likely not going to steal from a networked...
If I am having a problem with a computer, a USENET newsgroup, or...
You are into your second day of trying to figure out why a vital...
Your three-week old computer is hit with a nasty virus. You have...
A software program is recording your keystrokes in an attempt to...
You receive an urgent e-mail message from your online bank, warning...
What is the purpose of a strong password?
A possible danger following a blackout is a:  
What is the purpose of a signed driver?
What is the most reliable and secure way to share resources between...
What could be a warning sign that your computer power supply is about...
It is possible to use a USB or IEEE-1394 device to boot a computer and...
Which of the following will allow you to recover the data when a...
A computer that reboots at random times and intervals is most likely...
What type of virus uses the programming and scripting features found...
Often problems can be predicted ahead of time by comparing the current...
Which file system can be used by all Microsoft operating systems?
Creating a backup of your data files can be made easier if you:
Which of the following file types will save the most file space after...
Renaming the Administrator account would:
Microsoft's term for an account on a computer that is not attached to...
All of the USB connectors on the front of your desktop are in use, but...
Windows uses an update process to patch program code problems. Which...
A surge suppressor is designed to provide uninterruptible power to a...
How much current can a USB port on the back of a computer...
Which of the following redundancy techniques is best fulfilled by a...
Preventing failures altogether, and thus improving up time, is the...
Alert!

Advertisement