Exam 13: Appendix: Discovering Computers
Exam 1: Digital Literacy181 Questions
Exam 2: The Internet181 Questions
Exam 3: Computers and Mobile Devices181 Questions
Exam 4: Programs and Apps181 Questions
Exam 5: Digital Safety and Security181 Questions
Exam 6: Inside Computers and Mobile Devices181 Questions
Exam 7: Input and Output181 Questions
Exam 8: Digital Storage181 Questions
Exam 9: Operating Systems181 Questions
Exam 10: Communications and Networks181 Questions
Exam 11: Information and Data Management181 Questions
Exam 12: Information Systems and Program Development181 Questions
Exam 13: Appendix: Discovering Computers179 Questions
Select questions type
Which of the following kinds of backup is another name for a selective backup?
(Multiple Choice)
4.7/5
(32)
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
(Multiple Choice)
4.9/5
(32)
You are using a technology to enable two devices to share contacts when they touch. What is the name for this technology?
(Multiple Choice)
4.8/5
(32)
Who can establish standard user accounts that allow alterations to security settings?
(Multiple Choice)
4.8/5
(35)
Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?
(Multiple Choice)
4.9/5
(37)
In large companies, users write a formal request for a new or modified information system, which is called which of the following?
(Multiple Choice)
4.9/5
(26)
Which of the following refers to an environment of servers that house and provide access to resources users access via the Internet?
(Multiple Choice)
4.9/5
(38)
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following, or programs that act without a user's knowledge and deliberately alter the computer's operations?
(Multiple Choice)
4.9/5
(43)
What is the real-time exchange of messages, files, audio, and/or video with another online user called?
(Multiple Choice)
4.8/5
(36)
Which of the following is a touch-sensitive display device that users interact with by touching the screen with a finger or a stylus?
(Multiple Choice)
4.8/5
(30)
Which of the following tools searches for and removes unnecessary files?
(Multiple Choice)
4.9/5
(35)
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
(Multiple Choice)
4.8/5
(43)
Which of the following roles is responsible for designing and developing an information system?
(Multiple Choice)
4.9/5
(30)
Which of the following is not true of communications software?
(Multiple Choice)
4.8/5
(31)
Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?
(Multiple Choice)
4.7/5
(38)
Which of the following is a website that offers a variety of Internet services from a single, convenient location?
(Multiple Choice)
4.9/5
(36)
Which of the following identifies the quality of data in a database?
(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 179
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)