Kalinga National High School: S V S V S - V V V S S S V S S V S
Kalinga National High School: S V S V S - V V V S S S V S S V S
I. MODIFIED TRUE OR FALSE: Write SECURITY if the statement makes it true and VIRUS
if it is makes the statement a false.
1. Computer and network security help keep data and equipment safe by giving limited
access to appropriate people. S
2. Damage or loss of equipment doesn’t affect the productivity of the network. V
3. Theft, loss, network intrusion, and physical damage are some of the ways a network or
computer can be harmed. S
4. Repairing and replacing equipment can save the company time and money. V
5. Unauthorized use of a network can expose confidential information and reduce network
resources. S
6. Threats to security can come only outside an organization, and the level of potential
damage can vary greatly. V
7. Malicious threats are when the user damages data or equipment unintentionally. V
8. Threats against data are never changing as attackers find new ways to gain entry and
commit their crimes. V
9. A virus is transferred to another computer through e-mail, file transfers, and instant
messaging. S
10. A firewall is a way of protecting a computer from intrusion through the ports. S
11. A network has multiple layers of security, including physical, wireless, and data. S
12. Virus protection software can help prevent attackers from monitoring or recording traffic
between resources and computers. V
13. Threats to security can come from inside and outside the organization. S
14. Computer and network security help keep data and equipment safe. S
15. A technician’s secondary responsibilities include data and network security. V
16. Preventive maintenance can be described as maintenance of equipment or systems
before fault occurs. S
17. Condition Based Maintenance is a scheduled service visit carried out by a competent and
suitable agent, to ensure that an item of equipment is operating correctly to avoid any
unscheduled breakdown and downtime of an equipment. V
18. Planned Maintenance dictates that maintenance should only be performed when certain
indicators show decreasing performance or upcoming failure. V
19. In preparing maintenance procedure, you also have to consider designing a systematic
plan for hardware. V
20. This saves time, money and frustration and ensures safe conditions to prevent injury to
people and damage to computer equipment. S
21. A systematic maintenance plan for hardware includes moving the computer only when it is
turned off and unplugged. S
22. A systematic maintenance plan for hardware includes placing your computer in a well-
ventilated area. S
23. A systematic maintenance plan for hardware includes designing a monitoring, evaluating
and updating plan. S
24. A systematic maintenance plan for hardware includes backup your files. V
25. A systematic maintenance plan for hardware includes scheduling the use of computer for its
longer life. V
26. A systematic maintenance plan for software includes Installing or securing passwords. S
27. A systematic maintenance plan for software includes treating your computer properly. V
28. A systematic maintenance plan for software deleting temporary files. S
29. A systematic maintenance plan for software Updating anti-virus and spyware. S
30. Installing passwords makes your files more vulnerable into data hacking. V
31. Place your computer in a well-ventilated area. S
32. Schedule the use of computer for its longer life. S
33. You can move the computer even if it is turned off and plugged. V
34. PCs and laptops should be properly turned off. S
35. Do systematic maintenance plan for your computer software. S
36. Back-up your files. S
37. Regularly update your anti-virus for your computer protection against viruses. S
38. Deleting the temporary files on your computer will enhance its speed and will create more
disk space for your files. S
39. Install or secure passwords. S
40. Back-up your files when it is needed. V
41. A fatal error results in data loss, damage to your computer and/or its ability to function,
hardware failure, or other serious issues. S
42. Preventing failure means making sure your computer is physically clean in its operations. S
43. Dust can reduce performance and cause overheating. S
44. It’s okay not to know your computer's specifications and its limits. V
45. RAM runs even the PC is running idly. S
46. Make sure that your anti-virus software is updated to be able to scan unnecessary files that
enter your PC. S
47. You can install programs that you’re not familiar with or if do not fully trust. V
48. When something is not working properly, either diagnose the problem yourself and fix it, to
prevent further damage or contact a professional and have them look at it for you. S
49. Take advantage of warranties on parts if they fail. S
50. If the same error message shows up every time you log in, be sure to investigate it. Although
unlikely, these errors could be important. S
51. Give your computer a break. S
52. It’s okay not to get a warranty to protect your hardware, so it can be replaced in case of
failure. V
53. Run regular backup of your important files to other disks, computers, or an online backup
service. S
54. If your PC fails to function, diagnose the problem. S
55. If you know how to fix it, do it, to avoid further damage but if not then seek for professional
help. S
56. Unplugged or loose network cables are one of the most common reasons why you might
suddenly find yourself unable to connect to the Internet. S
57. Ensure your wired or wireless network hardware is switched off and plugged in. V
58. Before assuming your Internet connection is faulty, try visiting several popular Web sites
rather than just one. S
59. If your computer and another on the network both have different IP address, the conflict
between them will prevent either from working properly online. V
60. If your network uses static IP addresses, automatically change your IP to a different number.
V
61. If you have recently installed or upgraded software firewalls on your computer, temporarily
disable them to determine whether it may be the cause of Internet connection problems. S
62. Whenever you are unable to reach the access point, you also cannot connect to the Internet,
obviously. S
63. Firewall hardware running on most computers is intended to prevent unwanted network
traffic from disrupting its operation. V
64. The nearer a Wi-Fi device is, the slower the local connection generally runs, until it breaks
altogether. V
65. Wi-Fi networks with encryption options like WPA or WEP turned on require computers to
use matching security keys when connecting. S
66. Internet Service Providers (ISPs) can choose to block access from your account if you fail to
make payment or otherwise violate the provider's Terms of Service . S
67. Failures in the operating system software that control the adapter, on the other hand, can
seldom occur especially with computers that are heavily used. V
68. Linux is an open source free operating system which is not widely used by schools at
present, though it may be suitable for schools who are aware of its capabilities. S
69. Ubuntu is still the most common and recommended OS found in schools that meets their
general needs very well and is recommended for schools. V
70. The processor is the brain and heart of the computer. S