A) storage
B) CRM
C) email
D) ERP
Correct Answer
verified
Multiple Choice
A) Use a desktop
B) Use a server
C) Use a tablet
D) Use a network tracker
Correct Answer
verified
Multiple Choice
A) phishing
B) cyberstalking
C) pretexting
D) research spoofing
Correct Answer
verified
Multiple Choice
A) The recipient opens an email attachment.
B) The message travels along Internet routers to the recipient.
C) Hardware on the server determines the best route for the data.
D) Your Internet service provider contacts software on the outgoing mail server to retrieve the message.
Correct Answer
verified
Multiple Choice
A) Formula
B) Pivot table
C) Macro
D) Conditional formatting
Correct Answer
verified
Multiple Choice
A) read-only memory (ROM)
B) flash memory
C) random access memory (RAM)
D) hard disk
Correct Answer
verified
Multiple Choice
A) Yes; this helps to catch and quarantine new malware before it harms the computer.
B) No; automatic updates can cause create problems in security software.
C) No; automatic updates require excessive storage space and slow the computer.
D) Yes, though you must pay an additional fee for automatic updates.
Correct Answer
verified
Multiple Choice
A) External RAM
B) Programmable ROM
C) Hard drive
D) Motherboard
Correct Answer
verified
Multiple Choice
A) Unlike a data file, you can manipulate an executable file.
B) Unlike a data file, executable files contain numbers, words and pictures.
C) Unlike a data file, you cannot open and read executable files.
D) Unlike a data file, executable files can be used for a presentation.
Correct Answer
verified
Multiple Choice
A) Strong password
B) Password manager
C) Remote lockout
D) Encryption
Correct Answer
verified
Multiple Choice
A) Attach a hashtag (#) to the post.
B) "Like" their post.
C) Extend your contacts to include more individuals.
D) Share the post on your news feed.
Correct Answer
verified
Multiple Choice
A) Wi-Fi password
B) SSID
C) Access password
D) Guest access
Correct Answer
verified
Multiple Choice
A) a server on the Internet
B) your mobile device
C) an external drive
D) your desktop computer
Correct Answer
verified
Multiple Choice
A) They produce mostly inaccurate results.
B) Their results do not pertain to academic research.
C) Other search engines provide more reliable research.
D) They usually give biased results.
Correct Answer
verified
Multiple Choice
A) Being cautious about what information you post on social networking sites.
B) Storing financial information in an unsent email message.
C) Querying unfamiliar purchases found on your bank statements.
D) Shredding financial documents before you discard them.
Correct Answer
verified
Multiple Choice
A) Logo
B) Sidebar
C) Navigation Bar
D) Body
Correct Answer
verified
Multiple Choice
A) "The quick brown fox"
B) -The quick brown fox-
C) |The quick brown fox|
D) *The quick brown fox*
Correct Answer
verified
Multiple Choice
A) ChromeOS
B) Android
C) Windows
D) iOS
Correct Answer
verified
Multiple Choice
A) End user license agreement
B) Site license
C) Multiple-user license agreement
D) Public domain
Correct Answer
verified
Multiple Choice
A) Convert a different kind of port to a USB port.
B) Connect one device at a time.
C) Use a USB hub.
D) Use peripheral devices in the cloud.
Correct Answer
verified
Showing 581 - 600 of 1041