Exam 13: Appendix: Discovering Computers

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following kinds of backup is another name for a selective backup?

(Multiple Choice)
4.7/5
(32)

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

(Multiple Choice)
4.9/5
(32)

What separates the components of a domain name?

(Multiple Choice)
4.9/5
(40)

Which of the following is NOT an example of malware?

(Multiple Choice)
4.8/5
(41)

You are using a technology to enable two devices to share contacts when they touch. What is the name for this technology?

(Multiple Choice)
4.8/5
(32)

Who can establish standard user accounts that allow alterations to security settings?

(Multiple Choice)
4.8/5
(35)

Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?

(Multiple Choice)
4.9/5
(37)

In large companies, users write a formal request for a new or modified information system, which is called which of the following?

(Multiple Choice)
4.9/5
(26)

Which of the following refers to an environment of servers that house and provide access to resources users access via the Internet?

(Multiple Choice)
4.9/5
(38)

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following, or programs that act without a user's knowledge and deliberately alter the computer's operations?

(Multiple Choice)
4.9/5
(43)

What is the real-time exchange of messages, files, audio, and/or video with another online user called?

(Multiple Choice)
4.8/5
(36)

Which of the following is a touch-sensitive display device that users interact with by touching the screen with a finger or a stylus?

(Multiple Choice)
4.8/5
(30)

Which of the following tools searches for and removes unnecessary files?

(Multiple Choice)
4.9/5
(35)

What numbering system uses only the numbers 0 and 1?

(Multiple Choice)
5.0/5
(35)

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

(Multiple Choice)
4.8/5
(43)

Which of the following roles is responsible for designing and developing an information system?

(Multiple Choice)
4.9/5
(30)

Which of the following is not true of communications software?

(Multiple Choice)
4.8/5
(31)

Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?

(Multiple Choice)
4.7/5
(38)

Which of the following is a website that offers a variety of Internet services from a single, convenient location?

(Multiple Choice)
4.9/5
(36)

Which of the following identifies the quality of data in a database?

(Multiple Choice)
4.8/5
(37)
Showing 61 - 80 of 179
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)