Exam 7: Computer History and Components
Exam 1: Access 2019587 Questions
Exam 2: Excel 2019503 Questions
Exam 3: Outlook 2019540 Questions
Exam 4: Powerpoint 2019351 Questions
Exam 5: Windows 10 - 2019269 Questions
Exam 6: Word 2019539 Questions
Exam 7: Computer History and Components1 k Questions
Select questions type
Alexis changed a few default settings on a program she was using on her computer. Afterward, however, she did not like the results and preferred to get it back to default settings. Unfortunately, Alexis does not remember exactly what she changed. Which of the following types of tools could help her in this scenario?
(Multiple Choice)
4.7/5
(32)
Lauren is proofing an HTML file before publishing the webpage to her website. She sees the following code: Visit Facebook What content appears in the browser?
(Multiple Choice)
4.8/5
(37)
Hayne is starting his own business as a psychotherapist and needs to post a website advertising his services, contact information, and some tips on what clients can expect in therapy. What kind of website would best suit Hayne's needs?
(Multiple Choice)
4.7/5
(32)
What rules should guide your behavior when you interact with friends and coworkers on social media?
(Multiple Choice)
4.7/5
(36)
For keywords pertaining to academic research, Google returns more relevant and reliable results than Google Scholar, since Google Scholar is a subsidiary of Google.
(True/False)
4.8/5
(44)
Mario is looking for an official website where he can find information about how to file his federal income taxes. Four URLs in his search results seem interesting, though each has a different three-letter extension. Which of these TLDs most likely indicates the best website for Mario's needs?
(Multiple Choice)
4.9/5
(33)
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
(Multiple Choice)
4.9/5
(33)
Technology in daily life can increase productivity, convenience, safety, and security. Which of the following uses of technology is most often used to address security concerns?
(Multiple Choice)
4.9/5
(42)
Jodi is travelling to San Francisco for a conference. She has stored her PowerPoint slides on Microsoft's web app. What could be of concern to her while presenting her slides?
(Multiple Choice)
4.9/5
(31)
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
(Multiple Choice)
4.9/5
(46)
Ricky's social media account was recently hacked. His bank accounts and email accounts use the same password as his social media account, and within a week, they were also hacked. What could Ricky have used to prevent the original attack from affecting so many accounts?
(Multiple Choice)
5.0/5
(42)
The Unicode coding scheme supports a variety of characters including those for Chinese, Japanese, and Arabic languages.
(True/False)
4.8/5
(42)
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
(Multiple Choice)
4.8/5
(34)
A(n) _____ is a small picture that represents a program, file, or hardware device.
(Multiple Choice)
5.0/5
(33)
Branston is shopping for a laptop he can coordinate with his iPhone. Which laptop operating system should he choose?
(Multiple Choice)
4.8/5
(49)
Digital media content like animations, video, and audio are stored as bits and bytes.
(True/False)
4.8/5
(28)
Which of the following is NOT a leading provider of PaaS and IaaS services?
(Multiple Choice)
4.8/5
(39)
What type of window do you open to display a list of files?
(Multiple Choice)
4.8/5
(39)
Showing 561 - 580 of 1042
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)