Book Title
Computer Concepts-Illustrated Complete 6th Edition

COSC 96051

August 6, 2017
A library's card catalog is a typical use of a spreadsheet program.
Telecommuters tend to be less productive than those on-site.
Describe some of the threats to computer systems and data that should be considered
when developing a risk management plan.
A(n) ____________________ factor is a requirement that serves as part of a checklist
for a development project.
____________________ is a way to deliver audio over the Internet using RSS feed
Bots are harder to detect than viruses or worms.
A(n) ____________________ key is a field that contains data unique to a record.
A filename extension can tell you valuable information, such as the file format.
The devices shown in the above figure are all examples of solid state storage.
The device shown in the figure above is a wireless network card.
A printer is a type of input device.
A(n) ____________________ is the association between data stored in different record
Color depth is the number of colors a monitor and graphics card can display.
Third-generation computers were possible after the development of
____________________ circuits.

Subscribe Now

Sign up to view full document

View Document