



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The process of copying files from a network server to your own computer is referred to as _____ - ANSWERdownloading Which of the following is a type of computer memory that holds the operating system? - ANSWERRAM When you start a program, it is loaded from a disk into _____? - ANSWERRAM Computer _____ is whatever is typed into, submitted to, or transmitted to a computer system. - ANSWERinput Which of the following pointing devices is the most similar to a mouse? - ANSWERtrackball Which of the following keys is used in conjunction with other keys to invoke keyboard shortcuts? - ANSWERctrl
Typology: Exams
1 / 7
This page cannot be seen from the preview
Don't miss anything!
The process of copying files from a network server to your own computer is referred to as _____ - ANSWERdownloading Which of the following is a type of computer memory that holds the operating system? - ANSWERRAM When you start a program, it is loaded from a disk into _____? - ANSWERRAM Computer _____ is whatever is typed into, submitted to, or transmitted to a computer system. - ANSWERinput Which of the following pointing devices is the most similar to a mouse? - ANSWERtrackball Which of the following keys is used in conjunction with other keys to invoke keyboard shortcuts? - ANSWERctrl What technology is used by most mice? - ANSWERoptical technology A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with battery backup power during a power outage. - ANSWERUPS What is the color depth for True Color? - ANSWER24-bit What is the most obvious computer malfunction? - ANSWERfailure to power up Android is a mobile operating system developed by _____. - ANSWERa company purchased from Google Ethan is preparing a lecture about the software available for working with photos, videos, music, and other media. He asks James, who is an expert in computers, some questions. Choose the best aswer to each question. Ethan asks James what is the correct term used for movies, photos, music, and other content that is stored digitally? - ANSWERdigital media All of the following are Linux operating system distributions, except _____. - ANSWERUnix _____ software is designed to automate specialized tasks in a specific market or business. - ANSWERvertical market
_____ can be used to keep track of the pages you view at a site, the merchandise you select, and other profile information. - ANSWERcookies Which of the following is a major online privacy threat today? - ANSWERspyware What is the name of the process that changes the firmware? - ANSWERflashing Which of the following provides the fastest access to data? - ANSWERsolid-state drive Most ink jet printers use _____ color. - ANSWERCMYK Windows includes troubleshooters for all of the following, except _____. - ANSWERexternal hard drives Which of the following helps to classify the person, organization, or business that is responsible for a Web site? - ANSWERtop-level domain If your browser is properly configured, when you move the pointer over a link, the link's URL is displayed in the _____. - ANSWERstatus bar Which of the following can raise the quality rating of a Web site? - ANSWERinformation originates at the site Which of the following is the opposite of a gateway? - ANSWERfirewall Modern antivirus software attempts to locate viruses by watching for a virus _____. - ANSWERsignature A(n) _____ worm makes use of information on an infected computer to mail itself to everyone listed in your e-mail address book. - ANSWERmass-mailing Encryption utilities scramble the data in a file by using a _____ key. - ANSWERmulti- digit The original wireless encryption was called _____ because it was designed to provide a level of confidentiality similar to that of a wired network. - ANSWERWEP Typically, infected attachments look like _____ files, and they infect your computer when you open them. - ANSWERexecutable A surge protector cannot protect your equipment from _____. - ANSWERdust and dirt Which of the following technologies produces on-screen images by manipulating light within a layer of liquid crystal cells? - ANSWERLCD
All of the following are vector graphics file types, except _____. - ANSWERPNG Which of the following types of video files is used by QuickTime? - ANSWERMOV GPL stands for _____. - ANSWERgeneral public license LibreOffice Writer is _____ software. - ANSWERword-processing got a message "Access to online application denied." Which of the following is the most frequent reason for that? - ANSWERYour user ID and password do not match the one stored in your account information. Search for _____ to determine which version of Windows is installed on your computer.
When software is uninstalled or removed from the system, the _____ files have to be modified accordingly. - ANSWERregistry Which of the following is another term for a network license? - ANSWERvolume license Which of the following devices is NOT limited to a single app store? - ANSWERAndroid Most software is distributed under a(n) _____ license. - ANSWERsingle user A router's wired _____ port can connect to a modem for Internet access. - ANSWERuplink A virtual private network (VPN) is a type of _____ that allows remote users to connect to a private network using a public communications system such as the Internet. - ANSWERextranet Some versions of Windows also include an encryption utility called _____. - ANSWEREFS Which of the following organizations works to stop illegal software distribution? - ANSWERSIIA Which of the following is the domain name of the following Web address: www.msu.edu/infotech? - ANSWERmsu.edu SSID stands for _____. - ANSWERservice set identifier Fast Internet connections, called broadband, blaze away at _____ or more. - ANSWER100 Mbps When you sign up for a Webmail account, you should create a password. A password _____ helps you to select a strong password. - ANSWERmeter Another name for a Web bug is a _____. - ANSWERclear gif Some Trojan horses contain a virus or a worm, which can replicate and spread. Virus experts call this a(n) _____ threat because it combines more than one type of malicious code. - ANSWERblended