How can a user demonstrate that their computer or device is malware free? By periodically performing real time scanning on system for malware that might have been missed by malware shield. 3. What are the steps necessary to establish a malware free computer or device Installing anti-malware software, Scanning and Auditing of system, and removal of malware. 4.
Secure the Telecommuters computers before they are distributed. Use data encryption for customer data. | | Telecommuters try to repair or troubleshoot their own computers instead of calling technical support or taking the computer in for service. | Computers become inoperable and job duties can’t be performed or are late. | H | H | Require employees come to the office to complete work and turn in computers to IT for repair | Phoebe | Require computers with performance issues to be brought into the IT department, or configure remote desktop for routine maintenance at regular intervals.
Lesson 5 Connecting to a Network Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________. firewall 2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7.
A _____ image enables a workstation to boot from a disk and connect to a WDS server. Discover True / False T | F | 1. To perform a Windows 7 deployment using ZTI, you must have a SQL Server on your network. | T | F | 2. To create a capture image, you use the Deployment Workbench console.
A. used for short-term memory E. is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter? A. The CPU tells the RAM which address holds the data that the CPU wants to read 6.
5. Romote Desktop allows you to connect to a server remotely to run programs just as if you were sitting in front of the computer. 6. For many security mechanisms to work, your computer needs to have the correct data and time. 7.
(Choose two answers.) a. Used for short-term memory e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of the following is true about the process of read data, as described in the chapter?
protects the computer from voltage surges * provides backup power from an internal battery protects the computer from sudden voltage spikes gives the user time to phone the electrical company * gives the user time to safely shut down the computer if the power fails provides backup power through a generator provided by the wall outlet 9) What is a word processor? It is a physical computer component. * It is a program designed to perform a specific
The power lines in the system bus transfer power from the motherboard’s connection to the power supply to the integrated circuits (ICs or chips) and expansion boards connected to the motherboard. The control lines in the system bus controls the transmission and movement of information between devices connected to the motherboard. The address bus is used to “pick up” information from the correct memory location among the gigabytes of RAM in computer systems and “deliver” new programs and changes to the
The unit can compare numbers, letters, or special characters. The computer can then take action based on the result of the comparison. It then has a memory unit which allows the CPU via the operating system to calculate the amount of memory needing to be allocated to each programme and where to put the memory in use if unallocated. The processor can also control backing storage this is sometimes knows as secondary storage this is the name for all other data storage devices in computer i.e. a hard drive, etc.