Exam 1: Microsoft Windows Internet Explorer 8 : Introduction to Internet Explorer
Exam 1: Microsoft Windows Internet Explorer 8 : Introduction to Internet Explorer112 Questions
Exam 2: Office 2010 and Windows 7 : essential concepts and skills112 Questions
Exam 3: Access : Databases and Database Objects : an Introduction112 Questions
Exam 4: Access: Querying a Database224 Questions
Exam 5: Discovering Computers: Introduction to Computers112 Questions
Exam 6: Discovering Computers: the Internet and World Wide Web112 Questions
Exam 7: Discovering Computers: Application Software112 Questions
Exam 8: Discovering Computers: Operating Systems and Utility Programs112 Questions
Exam 9: Discovering Computers: Computer Security and Safety, Ethics, and Privacy112 Questions
Exam 10: Excel : Creating a Worksheet and an Embedded Chart112 Questions
Exam 11: Excel : Formulas, Functions, and Formatting112 Questions
Exam 12: Excel : What-If Analysis, Charting and Working With Large Worksheets112 Questions
Exam 13: Powerpoint : Creating and Editing a Presentation With Clip Art112 Questions
Exam 14: Powerpoint : Enhancing a Presentation With Pictures, Shapes and Wordart112 Questions
Exam 15: Powerpoint : Reusing a Presentation With Adding Media112 Questions
Exam 16: Word: Creating, Formatting, and Editing a Word Document With Pictures112 Questions
Exam 17: Word: Creating a Research Paper With Citations and References112 Questions
Exam 18: Word: Creating a Business Letter With a Letterhead and Table112 Questions
Select questions type
Each time a Web page appears in the display area, the title of the Web page is added to the ____ list.
(Multiple Choice)
4.9/5
(33)
A ____, which runs Web server software, provides resources such as text, images, files, and links to other computers on the Internet.
(Multiple Choice)
4.9/5
(37)
Case 1 Britney is preparing a presentation on security risks for the President of her company. Please answer the questions below.Britney explains the types of malicious software. The type of software that tracks the actions you take on your computer, the Web sites you visit, and the products that you buy, is called ____.
(Multiple Choice)
4.8/5
(34)
A phishing scam works by falsifying one's identity in an attempt to convince an unsuspecting victim into disclosing information such as credit card numbers, bank account information, and social security numbers.
(True/False)
4.9/5
(31)
You can clear the History List by clicking ____ on the Command Bar, clicking Delete Browsing History, verifying that a check mark appears in the History check box, and then clicking the Delete button in the Delete Browsing History dialog box.
(Multiple Choice)
4.9/5
(37)
If you designate more than one Web page as your home page, Internet Explorer will open each home page in a separate window when you open Internet Explorer.
(True/False)
4.9/5
(41)
If you would like Internet Explorer to display Web pages in full screen mode, you either can press ____ on the keyboard or select the Full Screen command on the View menu.
(Multiple Choice)
4.8/5
(30)
The ____________________ is a storage area in main memory that temporarily holds the information being copied.
(Short Answer)
4.8/5
(41)
A markup language contains text, as well as information about the text.
(True/False)
4.9/5
(35)
If you are unsure of whether the content you are viewing on a Web page is current, you should ____________________ the Web page.
(Short Answer)
4.8/5
(29)
A collection of related Web pages make up a ____________________.
(Short Answer)
4.9/5
(43)
Please match the terms below to their appropriate definition.
Premises:
Worldwide collection of networks
Responses:
phishing scams
service packs
Internet backbone
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(37)
If you encounter a Web page that does not display correctly, you may be able to correct the problem by displaying the Web page in ____ View.
(Multiple Choice)
4.9/5
(38)
The most common way to browse the World Wide Web is to obtain the URL of a Web page you want to visit and then enter it into the Address Bar.
(True/False)
4.9/5
(32)
You can click the ____________________ at the right end of the Address Bar to display a list of previously displayed Web pages.
(Short Answer)
4.9/5
(35)
Please match the terms below to their appropriate definition.
Premises:
Tracks the actions you take on your computer and sends to a third party
Responses:
spyware
service packs
network
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(39)
Please match the terms below to their appropriate definition.
Premises:
Combination of text, images, audio, video, and interactivity on the Internet
Responses:
Internet backbone
definition updates
spyware
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(43)
A software firewall blocks unauthorized connections to and from your computer.
(True/False)
4.9/5
(40)
Showing 41 - 60 of 112
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)