correctly answered to pass
Where can I find the Windows file compression utility? - correct answer ✔✔Right click any Desktop file
or folder icon and the option appears (Send to)
How can Scandisk remedy a computer problem? - correct answer ✔✔It relocates files in damaged areas
onto secure areas
The utility Backup & Restore can be found in - correct answer ✔✔Control Panel
The #1 resource of every computer is - correct answer ✔✔Data
I downloaded new drivers for the printer and now my printer and Internet do not work. What can I do to
remedy the problem? - correct answer ✔✔System Restore
What problem can the Disk Defragmenter resolve? - correct answer ✔✔rearranged data stored in non-
consecutive sectors to optimize access time.
How do files get fragmented? - correct answer ✔✔because of head crashes
What does Disk Cleanup do? - correct answer ✔✔identifies expendable files and provides an option to
delete them
I deleted a file from A: and now can't find it in the Recycle Bin. Why? - correct answer ✔✔duh, files
deleted from A: do not enter the Recycle Bin
Organizations on the Internet that promotes the creation and dissemination of the Maleware are called -
correct answer ✔✔Enablers
, Which of the following was NOT identifies as a cyber criminal - correct answer ✔✔cyber thug
What is the browser of choice is the Deep Web? - correct answer ✔✔TOR
Which virus category includes virus designed to only disrupt sub-programs or modules within a
program? - correct answer ✔✔Macro
Every Malware is designed for a particular or intended damage. What is term that identifies the intended
damage? - correct answer ✔✔payload
"Time bombs" and Logic bombs" belong to what type of virus? - correct answer ✔✔Dormant
Which virus category includes virus intended to damage the area where your computer startup files are
stored? - correct answer ✔✔Boot Sector
Which Malware occupies all space RAM until the computer freezes or locks-up and no longer able to
functions - correct answer ✔✔Worm
Which of the following is FALSE concerning the Deep Web? - correct answer ✔✔the Surface Web is in
the Deep Web but not the Dark Web
Which category of viruses is involved in extortion? - correct answer ✔✔Ransomware
How are web filters generally activated - correct answer ✔✔through browser settings
How does a computer become a Zombie - correct answer ✔✔Rootkit infection
When an IP address is altered and forwarded to a website masquerading to be legitimate, this illicit
action is called - correct answer ✔✔Spoofing
Spam: - correct answer ✔✔is unsolicited junk email