subject

Question 1 (2 points) A structured set of data held in a computer, especially one that is accessible in various ways�
Question 1 options:

Personally Identifiable Information (PII)

Database

Parameter

Server
Question 2 (2 points)
An effective goal is SMART: Specific, Measurable, Achievable, Relevant, and Timed.
Question 2 options:
True
False
Question 3 (2 points)
Software that is used to detect and eliminate computer viruses.
Question 3 options:

Wi-Fi

Cable Internet

Antivirus Application

Browser
Question 4 (2 points)
Any data that could potentially identify a specific individual�
Question 4 options:

Personally Identifiable Information (PII)

Database

Parameter

Server
Question 5 (2 points)
A device that translates analog carrier signals to encode and decode digital information.
Question 5 options:

USB

Computer Virus

Intranet

Modem
Question 6 (2 points)
Copyright law is a set of laws that protects the right to control the use of creative, literary, or artistic work.
Question 6 options:
True
False
Question 7 (2 points)
IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False
Question 8 (2 points)
Transferable skills are skills that are specific to a job and are usually a requirement for obtaining that job.
Question 8 options:
True
False
Question 9 (2 points)
Technical skills are also called soft skills.
Question 9 options:
True
False
Question 10 (2 points)
A professional is someone who uses education and acquired skills to earn money in a career.
Question 10 options:
True
False
Question 11 (2 points)
Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Question 11 options:

Malicious

Algorithm

Static

Web Browser
Question 12 (2 points)
Computers that are connected through cable or Wi-Fi to share resources.
Question 12 options:

Network

Spyware

Modem

Asynchronous Communication
Question 13 (2 points)
A network of computers that provides access to information on the web.
Question 13 options:

Phishing

Internet

Antivirus Application

Modem
Question 14 (2 points)
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:

Malicious

Algorithm

Static

Web Browser
Question 15 (2 points)
A means of giving credit to a source when their information is used.
Question 15 options:

Citation

Wi-Fi

Asynchronous Communication

Malware
Question 16 (2 points)
An IT security threat is anything that might cause serious harm to a computer system.
Question 16 options:
True
False
Question 17 (2 points)
A first, typical, or preliminary model of something from which other forms are developed or copied...
Question 17 options:

Compatibility

Prototype

Packet

Static
Question 18 (2 points)
A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:

Compatibility

Prototype

Packet

Static
Question 19 (2 points)
Information technology is the systems such as computers and telecommunications, used for storing, retrieving, and exchanging information.
Question 19 options:
True
False
Question 20 (2 points)
IT law is a branch of law that provides a legal framework for collecting, storing, and distributing electronic information.
Question 20 options:
True
False
Question 21 (2 points)
A software application for accessing information on the World Wide Web...
Question 21 options:

Malicious

Algorithm

Static

Web Browser
Question 22 (2 points)
A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
Question 22 options:
True
False
Question 23 (2 points)
Time management is the ability to use time effectively.
Question 23 options:
True
False
Question 24 (2 points)
This is used to mark a web pages structure using tags so that the web browser displays the content correctly.
Question 24 options:

Antivirus Application

Ethernet Cable

Computer Virus

HTML
Question 25 (2 points)
Physical components of a computer system such as a keyboard, mouse, or modem.
Question 25 options:

Software

Network

Browser

Hardware

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 14:30
The “rule of 72” is used to approximate the time required for prices to double due to inflation. if the inflation rate is r%, then the rule of 72 estimates that prices will double in 72/r years. for instance, at an inflation rate of 6%, prices double in about 72/6 or 12 years. write a program to test the accuracy of this rule. for each interest rate from 1% to 20%, the program should display the rounded value of 72/r and the actual number of years required for prices to double at an r% inflation rate. (assume prices increase at the end of each year.)
Answers: 1
question
Computers and Technology, 23.06.2019 08:00
The managing director of a company sends a christmas greeting to all his employees through the company email. which type of network does he use? he uses an .
Answers: 3
question
Computers and Technology, 24.06.2019 13:00
Why should you evaluate trends when thinking about a career path?
Answers: 1
question
Computers and Technology, 24.06.2019 15:30
What is the total number of time zones that can be configured to show by default in a calendar in outlook 2016?
Answers: 1
You know the right answer?
Question 1 (2 points) A structured set of data held in a computer, especially one that is accessib...
Questions
question
Computers and Technology, 03.11.2020 22:40
question
Mathematics, 03.11.2020 22:40
question
Mathematics, 03.11.2020 22:40
question
Mathematics, 03.11.2020 22:40
question
History, 03.11.2020 22:40
question
Arts, 03.11.2020 22:40
question
Physics, 03.11.2020 22:40