Computers and Technology

Question 1 (2 points) A structured set of data held in a computer, especially one that is accessible in various ways�
Question 1 options:

Personally Identifiable Information (PII)

Database

Parameter

Server
Question 2 (2 points)
An effective goal is SMART: Specific, Measurable, Achievable, Relevant, and Timed.
Question 2 options:
True
False
Question 3 (2 points)
Software that is used to detect and eliminate computer viruses.
Question 3 options:

Wi-Fi

Cable Internet

Antivirus Application

Browser
Question 4 (2 points)
Any data that could potentially identify a specific individual�
Question 4 options:

Personally Identifiable Information (PII)

Database

Parameter

Server
Question 5 (2 points)
A device that translates analog carrier signals to encode and decode digital information.
Question 5 options:

USB

Computer Virus

Intranet

Modem
Question 6 (2 points)
Copyright law is a set of laws that protects the right to control the use of creative, literary, or artistic work.
Question 6 options:
True
False
Question 7 (2 points)
IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False
Question 8 (2 points)
Transferable skills are skills that are specific to a job and are usually a requirement for obtaining that job.
Question 8 options:
True
False
Question 9 (2 points)
Technical skills are also called soft skills.
Question 9 options:
True
False
Question 10 (2 points)
A professional is someone who uses education and acquired skills to earn money in a career.
Question 10 options:
True
False
Question 11 (2 points)
Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Question 11 options:

Malicious

Algorithm

Static

Web Browser
Question 12 (2 points)
Computers that are connected through cable or Wi-Fi to share resources.
Question 12 options:

Network

Spyware

Modem

Asynchronous Communication
Question 13 (2 points)
A network of computers that provides access to information on the web.
Question 13 options:

Phishing

Internet

Antivirus Application

Modem
Question 14 (2 points)
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:

Malicious

Algorithm

Static

Web Browser
Question 15 (2 points)
A means of giving credit to a source when their information is used.
Question 15 options:

Citation

Wi-Fi

Asynchronous Communication

Malware
Question 16 (2 points)
An IT security threat is anything that might cause serious harm to a computer system.
Question 16 options:
True
False
Question 17 (2 points)
A first, typical, or preliminary model of something from which other forms are developed or copied...
Question 17 options:

Compatibility

Prototype

Packet

Static
Question 18 (2 points)
A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:

Compatibility

Prototype

Packet

Static
Question 19 (2 points)
Information technology is the systems such as computers and telecommunications, used for storing, retrieving, and exchanging information.
Question 19 options:
True
False
Question 20 (2 points)
IT law is a branch of law that provides a legal framework for collecting, storing, and distributing electronic information.
Question 20 options:
True
False
Question 21 (2 points)
A software application for accessing information on the World Wide Web...
Question 21 options:

Malicious

Algorithm

Static

Web Browser
Question 22 (2 points)
A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
Question 22 options:
True
False
Question 23 (2 points)
Time management is the ability to use time effectively.
Question 23 options:
True
False
Question 24 (2 points)
This is used to mark a web pages structure using tags so that the web browser displays the content correctly.
Question 24 options:

Antivirus Application

Ethernet Cable

Computer Virus

HTML
Question 25 (2 points)
Physical components of a computer system such as a keyboard, mouse, or modem.
Question 25 options:

Software

Network

Browser

Hardware

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 22:40, hePandaKing3689
State the parts of a variable declaration?
Answers: 2
image
Computers and Technology, 22.06.2019 21:40, tdahna0403
Develop a function to create a document in the mongodb database “city” in the collection “inspections.” be sure it can handle error conditions gracefully. a. input -> argument to function will be set of key/value pairs in the data type acceptable to the mongodb driver insert api call b. return -> true if successful insert else false (require a screenshot)
Answers: 2
image
Computers and Technology, 23.06.2019 00:00, addisonrausch
What season was better from fortnite?
Answers: 2
image
Computers and Technology, 23.06.2019 09:00, paulusl19
The first screen you see when you open word2016 what is called?
Answers: 1
Do you know the correct answer?
Question 1 (2 points) A structured set of data held in a computer, especially one that is accessib...

Questions in other subjects:

Konu
Mathematics, 17.12.2021 03:30
Konu
Mathematics, 17.12.2021 03:30