__ are attempts by individuals to obtain confidential information from you by falsifying their identity.
1.Phishing trips
2.Computer viruses
3.Spyware scam
4. Viruses
_____ allows users to upload files to an online site so they can be viewed and edited from another location.
1.General-purpose applications
2.Microsoft Outlook
3.Web-hosted technoloty
4.Office Live
A program, either talk or music, that is made available in digital format for automatic download over the Internet is called a _____
1.wiki
2.broadcast
3.vodcast
4.podcast
A USB communication device that supports data encryption for secure wireless communication for notebook users is called a
1.USB wireless network adapter
2.wireless switch
3.wireless hub
4.router
A Web site's main page is called its____________
1.Home page
2.Browser page
3.Bookmark
4.None of these
A(n) _____ is special visual and audio effect applied in Powerpoint to text or content.
1.animatio
2. flash
3.wipe
4.dissolve
Codes consisting of lines of varying widths or lengths that are computer-readable are known as
1.an ASCII code
2.a magnetic tape
3.a OCR scanner
4.None of These
Computers use the ___ number system to store data and perform calculations.
1.binary
2.octal
3.decimal
4.hexadecimal
Different components on the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
1.Conductor
2. Buses
3.Connectors
4.Consecutives
Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both ____ data, including full motion video, high-speed Internet access, and videoconferencing.
1.video data and information
2.voice and nonvoice
3.music and video
4.video and audio
Personal computers can be connected together to form a
1.server
2.supercomputer
3.network
4.enterprise
Portal computer, also known as laptop computer, weighing between 4 and 10 pounds is called
1.general-purpose application
2.Internet
3.scanner
4.notebook computer
The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called a ____
1.red wire
2.blue cord
3.tower
4.modem
The simultaneous processing of two or more programs by multiple processors is _______
1.multiprogramming
2.multitasking
3.time-sharing
4.multiprocessing
The system unit____
1.coordinates input and output devices
2.is the container that houses electronic components
3.is a combination of hardware and software
4.controls and manipulates data
To access properties of an object, the mouse technique to use is _______
1.dragging
2.dropping
3.right-clicking
4.shift-clicking
What feature adjust the top and bottom margins so that the text is centered vertically on the printed page?
1.Vertical justifying
2.Vertical adjusting
3.Dual centring
4.Vertical centring
What is the name given to those applications that combine text, sound, graphics, motion video and/ or animation ?
1.motionware
2.anigraphics
3.videoscapes
4.multimedia
What is the overall term for creating, editing, formatting, storing , retrieving, and printing a text document?
1.Word processing
2.Spreadsheet desigh
3.Web design
4.Database management
Which of the following can be used to select the entire document
1.CTRL+A
2.ALT+F
3. SHIFT+A
4.CTRL+K
Which of the following is a programming language for creating special programs like applets?
1.Java
2.cable
3.domain name
4. Net
Which of the following is a program that uses a variety of different approaches to identify and eliminate spam?
1.Directory search
2.Anti-spam program
3.Web server
4.Web storefront creation package
Which of these is not a means of personal communication on the Internet?
1.chat
2.instant messaging
3.instanotes
4.electronic mail
Which PowerPoint view displays each side of the presentation as a thumbnail and is useful for rearranging slides?
1.Slide Sorter
2.Slide Show
3. Slide Master
4.Notes Page
Why is it unethical to share copyrighted files with your friends?
1.It is not unethical, because it is legal.
2.It is unethical because the files are being given for free
3.Sharing copyrighted files without permission breaks copy right laws.
4.It is not unethical because the files are being given for free.