This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Which of the following networks had these two goals: a) allowing scientists to work
together on scientific projects; and, b) functioning even if part of the network was
destroyed by a nuclear attack?
a. W3C
b. IBMNet
c. ARPANET
d. NSFnet
In a business letter, the ____, if present, begins two lines below the last line of the
inside address.
a. salutation
b. date line
c. message
d. complimentary close
You are looking for a general-purpose port to connect two devices together. Which of
the following is your best bet?
a. Thunderbolt
b. DVI
c. HDMI
d. Mini HDMI
Windows, Mac OS, and which other operating system constitute three desktop
operating systems?
a. DOS
b. Linux
c. Amazon
d. Internet Explorer
Which of the following gestures would you use if you want to zoom out on your new
tablet and see less detail on a map, for example?
a. stretch
b. slide
c. pinch
d. swipe
Which of the following would allow you to capture a series of images with your camera
in rapid succession?
a. rapid mode
b. burst mode
c. quick mode
d. shooting mode
The text in the accompanying figure shows shapes inserted and formatted.
a. True
b. False
Which law states that it is not illegal to intercept or access an electronic communication
made through an electronic communication system that is configured so that such
electronic communication is readily accessible to the general public?
a. CAN-SPAM Act
b. Computer Abuse Amendments Act
c. COPPA
d. Electronic Communication Privacy Act
Which of the following does your daughter's daycare use to verify the identity of
parents who pick up their children?
a. face recognition system
b. iris recognition system
c. hand geometry system
d. digital forensics system
Which of the following allows access to high-speed Internet services through the cable
television network?
a. cable transceiver
b. cable modem
c. cable receiver
d. cable dialer
An IT code of conduct is a written guideline that helps determine whether a specific
computer action is which of the following?
a. practical
b. permissible
c. acceptable
d. ethical
In the encryption process, the unencrypted, readable data.
Which of the following are valid formulas?
a. =3 ^ 4
b. =H3/H11
c. =11+9
d. =22-F15
Which of the following are uses for application software?
a. to make users more productive
b. to serve as the interface between the user and the computer hardware
c. to assist users with controlling or maintaining the operation of a computer
d. to make business activities more difficult and, therefore, more secure
To delete record PLI22 shown in the accompanying figure, tap or click the record
selector in the datasheet for the record on which the client number is PLI22 and then
press ____.
a. CTRL+D
b. DELETE
c. CTRL+DELETE
d. CTRL+Y
Which of the following statements is not true about intellectual property rights?
a. The term fair use refers to the rights which creators are entitled for their work.
b. Intellectual property refers to unique and original works such as ideas, inventions,
company logos, and more.
c. A copyright protects any tangible form of expression.
d. Digital rights management is a strategy designed to prevent illegal distribution of
digital content.
To start a new line in a cell, press the ____ keys.
a. CTRL+ENTER
b. TAB+ENTER
c. ALT+ENTER
d. SHIFT+ENTER
Your server room has ample floor space. Which of the following are you most likely to
choose as a result?
a. tower server
b. blade server
c. rack server
d. bay server
Contrast is the difference between the darkest and lightest areas of an image.
a. True
b. False
A ____ is someone who develops programs and apps or writes the instructions that
direct the computer or mobile device to process data into information.
a. computer manufacturer
b. software developer
c. troubleshooter
d. computer developer
A PowerPoint ____ can help you deliver a dynamic, professional-looking message to an
audience.
a. calendar
b. worksheet
c. presentation
d. database
Which of the following terms is used to describe a program that hides in a computer
and allows someone from a remote location to take full control of the computer?
a. a virus
b. a worm
c. a Trojan horse
d. a rootkit
RSS and Atom are popular specifications used to distribute content, such as web feeds,
to subscribers.
a. True
b. False
Color cast occurs when a digital camera measure the tone correctly.
a. True
b. False
Which of the following is the path to the Send Backward button?
a. (SHAPE TOOLS FORMAT tab | Send group)
b. (PICTURE TOOLS FORMAT tab | Arrange group)
c. (PICTURE TOOLS FORMAT tab | Styles group)
d. (OBJECT TOOLS SEND tab | Back group)
Worksheet titles and subtitles should be as wordy as possible.
a. True
b. False
It is not possible to add a shadow to text.
a. True
b. False
Which of the following terms refers to any application that combines text with graphics,
animation, audio, video, and/or virtual reality?
a. portal
b. web app
c. multimedia
d. Java applet
A search engine displays a list of webpage names that contain the search text. What is
the term for that list?
a. keywords
b. icons
c. hits
d. pulls
In fixed-width files, each record is on a separate line and the fields are separated by a
special character.
a. True
b. False
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.