Академический Документы
Профессиональный Документы
Культура Документы
Violation of Privacy
credit reports, tax records, etc. It is crucial that personal and confidential records
be protected properly. In many instances, where these records were not properly
protected, individuals have found their privacy violated and identities stolen.
entire industry with hundreds of thousands of new jobs, the skills of millions of
workers and managers have been replaced by computers. Thus, it is crucial that
workers keep their education up-to-date. A separate impact on the labor force is
that some companies are outsourcing jobs to foreign countries instead of keeping
Servicing,NC II
Installing and
Configuring Computer
Systems
Date Developed:
March 2,2016
Date Revised:
Page 13 of 96
Developed by:
Donald B. Mandac
Revision # 0
3. Health Risks
the hands, wrists, elbows, eyes, necks, and back. Computer users can protect
themselves from these health risks through proper workplace design, good
posture while at the computer, and appropriately spaced work breaks. Another
health risk, called computer addiction, occurs when someone becomes obsessed
disorder.
4. Public Safety
Adults, teen, and children around the world are using computers to share
publicly their photos, videos, journals, music, and other personal information.
from these criminals by being cautious. For example, do not share information
5. Impact on Environment
Computer manufacturing processes and computer waste are depleting
car. When computers are discarded in landfills, they release toxic materials and
Servicing,NC II
Installing and
Configuring Computer
Systems
Date Developed:
March 2,2016
Date Revised:
Issued by:
Page 14 of 96
Developed by:
Donald B. Mandac
Revision # 0
A. IDENTFICATION
Direction:
CPU.
4. With an effective cooling fan, the CPU can overheat and cause
be required.
B. MATCHING TYPE
Direction:
the statement. Write the letter of your answer on the space provided.
A. Violation of Privacy
C. Public Safety
D. Health Risk
Servicing,NC II
Installing and
Configuring Computer
Systems
Date Developed:
March 2,2016
Date Revised:
Issued by:
Page 15 of 96
Developed by:
Donald B. Mandac
Revision # 0
computers.
properly.
4. Adults, teen, and children around the world are using computers to
personal information.
Compare your answers with the Answer Key on the next page. If you
get 80% and above, then you may proceed to the next activity but if
Installing and
Configuring Computer
Systems
Date Developed:
March 2,2016
Date Revised:
Issued by:
Page 16 of 96
Developed by:
Donald B. Mandac
Revision # 0
A. IDENTIFICATION
1. TRUE
2. FALSE
3. TRUE
4. FALSE