Deck 20: Computers
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/48
Play
Full screen (f)
Deck 20: Computers
1
Firefox, Safari and Windows Explorer are examples of:
A)Network servers
B)Internet search engines
C)Web browsing applications
D)Anti-virus software packages
A)Network servers
B)Internet search engines
C)Web browsing applications
D)Anti-virus software packages
Web browsing applications
2
A surge protector is a device that protects:
A)A pocket from pen ink
B)Electronics from voltage anomalies
C)An Internet access point from service disruptions
D)Telephone landlines from service disruption
A)A pocket from pen ink
B)Electronics from voltage anomalies
C)An Internet access point from service disruptions
D)Telephone landlines from service disruption
Electronics from voltage anomalies
3
The digital device used referred to as a "jump drive" or "thumb drive" is used for what purpose?
A)Wireless Internet connection
B)Data storage and transport
C)Booting a frozen or non-responsive hard drive
D)roviding power to laptops or notebook computers when they are not connected to a power source
A)Wireless Internet connection
B)Data storage and transport
C)Booting a frozen or non-responsive hard drive
D)roviding power to laptops or notebook computers when they are not connected to a power source
Data storage and transport
4
What type of digital file ends with a . jpg extension?
A)A graphic or image
B)A text document
C)A spreadsheet
D)An audio file
A)A graphic or image
B)A text document
C)A spreadsheet
D)An audio file
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
5
What is the difference between the email addressee settings "Cc" and "Bcc"?
A)A recipient on the "Cc" list will have forwarding permissions but a recipient on the "Bcc" list will not.
B)A recipient on the "Cc" list will not be listed as a recipient on the message.
C)A recipient on the "Bcc" list will not see any of the sender's information.
D)A recipient on the "Bcc" list will not be listed as a recipient on the message.
A)A recipient on the "Cc" list will have forwarding permissions but a recipient on the "Bcc" list will not.
B)A recipient on the "Cc" list will not be listed as a recipient on the message.
C)A recipient on the "Bcc" list will not see any of the sender's information.
D)A recipient on the "Bcc" list will not be listed as a recipient on the message.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
6
External storage devices allow computer users to share, transport or backup digital copies of data. Which of the following data storage devices is no longer widely used?
A)CD ROM
B)Floppy disk
C)External hard disk drive
D)USB flash drive
A)CD ROM
B)Floppy disk
C)External hard disk drive
D)USB flash drive
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
7
Web addresses that end in a two-letter domain name like '.ca', '.se', and '.fr' are generally used by:
A)Countries
B)U)S. government offices and organizations
C)Offices and organizations of international bodies or alliances (like NATO)
D)Non-profit agencies
A)Countries
B)U)S. government offices and organizations
C)Offices and organizations of international bodies or alliances (like NATO)
D)Non-profit agencies
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
8
Why is it critical to download authorized updates for computer anti-virus software on a routine basis?
A)Occasionally, anti-virus software infects a computer with a virus even when it's trying to establish preventative care.
B)Computer viruses can spontaneously "pop up" in a system if the computer experiences multiple glitches in a short period of time.
C)User licenses for anti-virus software only last for short periods of time so that users must re-read the user agreements frequently to ensure they remain well informed.
D)Virus authors are constantly writing new viruses, and the anti-virus software definitions that identify a virus must similarly be written and updated constantly to remain effective.
A)Occasionally, anti-virus software infects a computer with a virus even when it's trying to establish preventative care.
B)Computer viruses can spontaneously "pop up" in a system if the computer experiences multiple glitches in a short period of time.
C)User licenses for anti-virus software only last for short periods of time so that users must re-read the user agreements frequently to ensure they remain well informed.
D)Virus authors are constantly writing new viruses, and the anti-virus software definitions that identify a virus must similarly be written and updated constantly to remain effective.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
9
What type of digital file ends with a .xls extension?
A)A graphic or image
B)A text document
C)A spreadsheet
D)An audio file
A)A graphic or image
B)A text document
C)A spreadsheet
D)An audio file
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
10
What qualities make .pdf files unique from other files?
A).pdf files are the only type of documents that can be successfully transferred with audio embedded in the body of the document.
B)All U.S. government information and paperwork is released in .pdf attachments.
C).pdf files save all of the settings and aesthetic values of a document and make them readable by users who may not have the same programs or formatting elements the author used in the file.
D).pdf files are the only type of documents that can be successfully transferred with videos embedded in the body of the document.
A).pdf files are the only type of documents that can be successfully transferred with audio embedded in the body of the document.
B)All U.S. government information and paperwork is released in .pdf attachments.
C).pdf files save all of the settings and aesthetic values of a document and make them readable by users who may not have the same programs or formatting elements the author used in the file.
D).pdf files are the only type of documents that can be successfully transferred with videos embedded in the body of the document.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
11
Which is the bigger unit of space in a computer drive's memory, a gigabyte or megabyte?
A)Gigabytes and megabytes are actually equal in size, but they store different types of files. Megabytes are the units in which text is stored; gigabytes are the units in which images are stored. Images are more complex files and therefore bigger, but gigabytes themselves are no larger than megabytes.
B)A gigabyte is larger because it contains the space of one billion bytes whereas a megabyte contains the space of one million bytes.
C)A megabyte is larger because it contains the space of one billion bytes whereas a gigabyte contains the space of one million bytes.
D)Gigabytes and megabytes do not measure the same type of file capacity and are therefore incomparable.
A)Gigabytes and megabytes are actually equal in size, but they store different types of files. Megabytes are the units in which text is stored; gigabytes are the units in which images are stored. Images are more complex files and therefore bigger, but gigabytes themselves are no larger than megabytes.
B)A gigabyte is larger because it contains the space of one billion bytes whereas a megabyte contains the space of one million bytes.
C)A megabyte is larger because it contains the space of one billion bytes whereas a gigabyte contains the space of one million bytes.
D)Gigabytes and megabytes do not measure the same type of file capacity and are therefore incomparable.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
12
What does the most common USB port (like the one into which a user would connect a digital media player or flash drive) look like?
A)Flat, horizontal rectangle about 3/4-inch long
B)A circle
C)A triangle
D)A long rounded rectangle with a bar of many small holes in its center
A)Flat, horizontal rectangle about 3/4-inch long
B)A circle
C)A triangle
D)A long rounded rectangle with a bar of many small holes in its center
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
13
To rearrange spreadsheet entries in a particular order, which program function can be used?
A)Enumerating
B)Alphabetizing
C)Ordering
D)Sorting
A)Enumerating
B)Alphabetizing
C)Ordering
D)Sorting
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
14
A piece of data sent back and forth between a user's computer and a website documenting user habits and preferences is a:
A)Cookie
B)Plug-in
C)Worm
D)Virus
A)Cookie
B)Plug-in
C)Worm
D)Virus
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
15
When a computer is in the process of powering on and initializing the operating system it is:
A)Actualizing
B)Booting
C)Prompting
D)Originating
A)Actualizing
B)Booting
C)Prompting
D)Originating
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
16
If the 'beta' version of a program is available for download, what does that communicate about the software that has been made available?
A)It is a trial version of the program that developers are testing and allowing users to download for free so they may provide feedback about the program.
B)It is the most advanced and cutting edge version of that program on the market.
C)It has been verified as completely virus-proof and will absolutely not be infected by a virus.
D)It is "tester" software that may end up available for wide circulation in the future, but will likely never be published for mass use.
A)It is a trial version of the program that developers are testing and allowing users to download for free so they may provide feedback about the program.
B)It is the most advanced and cutting edge version of that program on the market.
C)It has been verified as completely virus-proof and will absolutely not be infected by a virus.
D)It is "tester" software that may end up available for wide circulation in the future, but will likely never be published for mass use.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
17
Software that adds new abilities or increases the abilities of software already installed on a computer is called:
A)A bonus
B)A cookie
C)A beta
D)A plug-in
A)A bonus
B)A cookie
C)A beta
D)A plug-in
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
18
What is safe mode?
A)The state of the computer when all of the critical programs and files are encrypted and password protected
B)The state of the computer when all of the files are backed-up properly
C)The diagnostic mode of an operating system
D)A computer's default setting once a virus has been detected
A)The state of the computer when all of the critical programs and files are encrypted and password protected
B)The state of the computer when all of the files are backed-up properly
C)The diagnostic mode of an operating system
D)A computer's default setting once a virus has been detected
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
19
What purpose does a firewire serve?
A)It blocks users on a network from accessing Internet content that the network administrator deems inappropriate.
B)It is a cord that connects two or more computers and allows for peer-to-peer communication between devices.
C)It connects a USB device to the computer.
D)It is the most critical wire in a computer and channels all of the incoming energy to the necessary internal structures.
A)It blocks users on a network from accessing Internet content that the network administrator deems inappropriate.
B)It is a cord that connects two or more computers and allows for peer-to-peer communication between devices.
C)It connects a USB device to the computer.
D)It is the most critical wire in a computer and channels all of the incoming energy to the necessary internal structures.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
20
Email users have the option of adding a saved text entry to the end of each email. What is the term for that entry?
A)The closing
B)The signature
C)The ending
D)The stamp
A)The closing
B)The signature
C)The ending
D)The stamp
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
21
Which two characters compose binary code, the two-character language in which computer instructions are written?
A)1s and 0s (ones and zeroes)
B)Xs and Os
C)Dots and dashes
D)Xs and Ys
A)1s and 0s (ones and zeroes)
B)Xs and Os
C)Dots and dashes
D)Xs and Ys
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following email entries might cause a recipient's email account to interpret the message as spam and filter it out of their Inbox before the recipient knows it's there?
A)Discussing products that are often advertised through email campaigns
B)Using vulgar language in the body of the message
C)Leaving a signature or closing off the end of the message
D)A subject line in all-caps with a lot of exclamation marks
A)Discussing products that are often advertised through email campaigns
B)Using vulgar language in the body of the message
C)Leaving a signature or closing off the end of the message
D)A subject line in all-caps with a lot of exclamation marks
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
23
The symbols inserted into a text document to separate pieces of information in list format, such as information in an outline, are called:
A)Hyperlinks
B)Manual breaks
C)Bullets
D)Margins
A)Hyperlinks
B)Manual breaks
C)Bullets
D)Margins
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
24
What is the common term for trying to solve a computer malfunction?
A)Strategizing
B)Brainstorming
C)Rationalizing
D)Troubleshooting
A)Strategizing
B)Brainstorming
C)Rationalizing
D)Troubleshooting
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
25
QuickTime, Winamp and Rhythmbox are examples of:
A)DVD-writing programs
B)Music-writing software
C)Peer-to-peer file-sharing programs
D)Computer desktop multimedia players
A)DVD-writing programs
B)Music-writing software
C)Peer-to-peer file-sharing programs
D)Computer desktop multimedia players
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
26
A piece of software that facilitates communication between a computer and an external device like a printer is a:
A)Plug-in
B)Firewall
C)Driver
D)Beta
A)Plug-in
B)Firewall
C)Driver
D)Beta
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
27
When a cursor changes from an arrow or formatting mark into an hourglass, it indicates that:
A)The user is working too slowly.
B)The computer is about to crash.
C)The computer is in the middle of a task and cannot act on any new commands.
D)The power source is about to run out.
A)The user is working too slowly.
B)The computer is about to crash.
C)The computer is in the middle of a task and cannot act on any new commands.
D)The power source is about to run out.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following is a widely used open-source software package that users can download to avoid the financial expense of purchasing an office suite at retail value?
A)Microsoft Office
B)OpenOffice
C)iWork
D)Adobe Creative Studio
A)Microsoft Office
B)OpenOffice
C)iWork
D)Adobe Creative Studio
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
29
'Ctrl' + 'S', 'Shift' + 'C' + '4', and 'Ctrl' + 'Alt' + 'Delete' are examples of:
A)Drivers
B)Cursors
C)Applications
D)Keystroke shortcuts
A)Drivers
B)Cursors
C)Applications
D)Keystroke shortcuts
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
30
Where on a computer can a user gain access to basic system functions such as "Add/Remove Programs"?
A)Login
B)Favorites
C)Control Panel
D)Start Menu
A)Login
B)Favorites
C)Control Panel
D)Start Menu
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
31
In terms of digital data stored on a computer, what is an extension?
A)A set of numbers that occur at the beginning of a file name which specify when the file was created
B)The three-to-six character ending to a file name which specifies what type of file it is
C)Any software upgrade that extends the lifetime of a program on the computer
D)Extra storage space for files
A)A set of numbers that occur at the beginning of a file name which specify when the file was created
B)The three-to-six character ending to a file name which specifies what type of file it is
C)Any software upgrade that extends the lifetime of a program on the computer
D)Extra storage space for files
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
32
What purpose does a firewall serve?
A)It blocks users in a network from accessing websites or other content that a network administrator has categorized as "off limits."
B)It protects users in a network from viruses or worms that might attempt to infiltrate their systems from outside the network.
C)It protects users in a network from viruses or worms that might attempt to infiltrate their systems from inside the network.
D)It keeps network users from causing damage to any of the network components due to excessive, prolonged or intense use.
A)It blocks users in a network from accessing websites or other content that a network administrator has categorized as "off limits."
B)It protects users in a network from viruses or worms that might attempt to infiltrate their systems from outside the network.
C)It protects users in a network from viruses or worms that might attempt to infiltrate their systems from inside the network.
D)It keeps network users from causing damage to any of the network components due to excessive, prolonged or intense use.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
33
What happens when a user places a file in the Recycle Bin?
A)The file is organized according to the operating system defaults, losing its custom settings.
B)The file is reverted to its earliest setting, when it was first created.
C)The file is stripped of unwanted material to make more space available for use.
D)The file remains in the Recycle Bin until the user manually empties it, deleting the file permanently, or until the bin is purged on its next routine emptying, as set by the user.
A)The file is organized according to the operating system defaults, losing its custom settings.
B)The file is reverted to its earliest setting, when it was first created.
C)The file is stripped of unwanted material to make more space available for use.
D)The file remains in the Recycle Bin until the user manually empties it, deleting the file permanently, or until the bin is purged on its next routine emptying, as set by the user.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
34
Folders in a computer system serve what basic purpose?
A)Organization
B)Virus protection
C)Maintaining a log of user data
D)Secondary backup for selected data
A)Organization
B)Virus protection
C)Maintaining a log of user data
D)Secondary backup for selected data
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
35
An element in or on a webpage that takes the viewer to another position in the document or to another document or site altogether when the viewer clicks it is called:
A)A hyperlink
B)A megalink
C)An autolink
D)An extension
A)A hyperlink
B)A megalink
C)An autolink
D)An extension
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
36
A file that is included in an e-mail message but is not part of the body of the email is called:
A)An e-file
B)A macro
C)A transport
D)An attachment
A)An e-file
B)A macro
C)A transport
D)An attachment
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
37
Which type of file is specifically intended to store other files?
A)Trojan horse
B)Network
C)Labyrinth
D)Directory
A)Trojan horse
B)Network
C)Labyrinth
D)Directory
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
38
What file setting in a desktop publishing program should a user select if they want to share a file with another person but don't want to receiver to change the document?
A)Default formatting
B)Paste special
C)Read-only
D)Export
A)Default formatting
B)Paste special
C)Read-only
D)Export
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
39
What is the difference between freeware and shareware?
A)Shareware allows users to amend the software as they discover bugs, defects or potential improvements which other users can download as an update; freeware cannot be changed and redistributed.
B)Freeware is software for users to download and use in full for free; shareware is software that users can try for free but must pay to have long-term, full access to the whole software package.
C)Shareware is software that must be shared among members of the same network; freeware is software that a single person can use.
D)Shareware is software for users to download and use in full for free; freeware is software that users can try for free but must pay in order to have long-term full access to the whole software package.
A)Shareware allows users to amend the software as they discover bugs, defects or potential improvements which other users can download as an update; freeware cannot be changed and redistributed.
B)Freeware is software for users to download and use in full for free; shareware is software that users can try for free but must pay to have long-term, full access to the whole software package.
C)Shareware is software that must be shared among members of the same network; freeware is software that a single person can use.
D)Shareware is software for users to download and use in full for free; freeware is software that users can try for free but must pay in order to have long-term full access to the whole software package.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
40
To use the same formatting for numerous documents, user can create what type of file to use as the framework of each document?
A)Template
B)Skeleton
C)Text foundation
D)Blueprint
A)Template
B)Skeleton
C)Text foundation
D)Blueprint
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following programs allows users to create charts and graphs within a document or as a standalone document?
A)Microsoft Outlook Express and Apple's iWork
B)Adobe Flash and Microsoft Word
C)Open Office and Adobe Reader
D)Microsoft Word and Microsoft Excel
A)Microsoft Outlook Express and Apple's iWork
B)Adobe Flash and Microsoft Word
C)Open Office and Adobe Reader
D)Microsoft Word and Microsoft Excel
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following is an Internet-based telephone service that allows PC and Mac users to place telephone calls between any two geographic locations worldwide for free?
A)Face Time
B)Windows Messenger
C)Skype
D)AOL Instant Messenger
A)Face Time
B)Windows Messenger
C)Skype
D)AOL Instant Messenger
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
43
What prefix to a website name indicates that the site is open for user modification or public entry?
A)Public domain
B)Wiki
C)Free
D)Open
A)Public domain
B)Wiki
C)Free
D)Open
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following websites is not run by the U.S. government?
A)dotgov.gov
B)whitehouse.gov
C)whitehouse.com
D)All of the websites belong to the U.S. government.
A)dotgov.gov
B)whitehouse.gov
C)whitehouse.com
D)All of the websites belong to the U.S. government.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
45
What is the difference between a CD-R and a CD-RW?
A)CD-R is for personal computers; a CD-RW is for Macs.
B)A CD-RW is a writable compact disc onto which a user can permanently burn digital data one time; a CD-R is a rewritable compact disc onto which a user can burn digital data repeatedly or replace data previously stored on the disc.
C)A CD-RW simply has more space than a CD-R.
D)A CD-R is a writable compact disc onto which a user can permanently burn digital data one time; a CD-RW is a rewritable compact disc onto which a user can burn digital data repeatedly or replace data previously stored on the disc.
A)CD-R is for personal computers; a CD-RW is for Macs.
B)A CD-RW is a writable compact disc onto which a user can permanently burn digital data one time; a CD-R is a rewritable compact disc onto which a user can burn digital data repeatedly or replace data previously stored on the disc.
C)A CD-RW simply has more space than a CD-R.
D)A CD-R is a writable compact disc onto which a user can permanently burn digital data one time; a CD-RW is a rewritable compact disc onto which a user can burn digital data repeatedly or replace data previously stored on the disc.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
46
What is the difference between a virus and a worm?
A)A worm is a computer program designed to harm a computer once the user has opened it; a virus is a single file that works through a computer or network.
B)A virus can potentially cause a lot of damage to a computer system; a worm only monitors a user's online activity without their knowledge but does not damage any files.
C)A virus is a computer program designed to harm a computer once the user has opened it; a worm is a single file that works through a computer or network.
D)Damage caused by a virus can be repaired; damage caused by a worm is always irreparable.
A)A worm is a computer program designed to harm a computer once the user has opened it; a virus is a single file that works through a computer or network.
B)A virus can potentially cause a lot of damage to a computer system; a worm only monitors a user's online activity without their knowledge but does not damage any files.
C)A virus is a computer program designed to harm a computer once the user has opened it; a worm is a single file that works through a computer or network.
D)Damage caused by a virus can be repaired; damage caused by a worm is always irreparable.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
47
If a user wants to replicate or move text from one location (like a document or webpage) to another location on the same computer, the most efficient method for achieving this is to:
A)Export as .pdf
B)Highlight, copy and paste
C)Selection mode, block, drag and drop
D)Transcribe the text by typing it in a word processing document then merging it into the new location
A)Export as .pdf
B)Highlight, copy and paste
C)Selection mode, block, drag and drop
D)Transcribe the text by typing it in a word processing document then merging it into the new location
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
48
The flashing vertical line in a word processing program and the arrow that moves in relation to a user's mouse movements are examples of:
A)Cursors
B)Special characters
C)Graphics
D)Desktop icons
A)Cursors
B)Special characters
C)Graphics
D)Desktop icons
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck