Exam 1: Computers and Digital Basics
Exam 1: Computers and Digital Basics170 Questions
Exam 2: Computer Hardware175 Questions
Exam 3: Computer Software175 Questions
Exam 4: Operating Systems and File Management175 Questions
Exam 5: Lans and Wlans175 Questions
Exam 6: The Internet175 Questions
Exam 7: The Web and E-Mail175 Questions
Exam 8: Digital Media175 Questions
Exam 9: The Computer Industry: History, Careers, and Ethics175 Questions
Exam 10: Information Systems Analysis and Design175 Questions
Exam 11: Databases175 Questions
Exam 12: Computer Programming175 Questions
Select questions type
____ is a type of password cracking software.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
D
The ____________________ is a global computer network originally developed as a military project, then handed over to the National Science Foundation for research and academic use.
Free
(Short Answer)
4.9/5
(26)
Correct Answer:
Internet
The term ____ refers to the practice of copying a file from a remote computer to a local computer.
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
C
Identify the letter of the choice that best matches the phrase or definition.
Premises:
A sequence of letters, numbers, and special characters that require a full qwerty keyboard for entry
Responses:
password
cyberspace
password manager
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(29)
A ____ computer is a type of microprocessor-based computing device that is designed to meet the needs of an individual.
(Multiple Choice)
4.8/5
(36)
Storage is the area of a computer that temporarily holds data that is waiting to be processed, stored, or output.
(True/False)
4.9/5
(34)
The term workstation cannot be applied to ordinary personal computers that are connected to a network.
(True/False)
4.9/5
(27)
Just about any personal computer can be configured to perform the work of a server.
(True/False)
4.9/5
(37)
Digital divide is a term that refers to entities that exist largely within computer networks.
(True/False)
4.7/5
(27)
A(n) ____ device works with discrete data or digits, such as 1 or 0.
(Multiple Choice)
4.7/5
(31)
Describe four different strategies in which hackers get your password, including some primitive ways and some more technological advanced methods.
(Essay)
4.8/5
(38)
____ protocols that use more than one means of identification are more secure than others.
(Multiple Choice)
4.8/5
(29)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
One of the first online social scenes
Responses:
personal computer
supercomputer
password
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(38)
____ projects that promote copying, free distribution, peer review, and user modification.
(Multiple Choice)
4.9/5
(28)
A ____ is a named collection of data that exists on a storage medium.
(Multiple Choice)
4.9/5
(30)
____ data consists of numbers that might be used in arithmetic operations.
(Multiple Choice)
5.0/5
(38)
An iPAQ, a Blackberry, and an Axim are examples of a ____ computer.
(Multiple Choice)
4.9/5
(32)
A ____ is one or more collaborative documents posted on the Web that can be viewed and changed by users.
(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 170
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)