A computer terminal can be described as which of the following? Show
Choose one answer.
. . A workstation can be described as which of the following? Choose one answer.
. . Laptop computers, also called notebook computers: Choose one answer.
. . Mainframes are also used as which of the following? Choose one answer.
. . The operating system (OS) is software that performs which of the following tasks? Choose one answer.
. . What is the function of computer software? Choose one answer.
. . What is the most important use of a computer’s hardware? Choose one answer.
. . Which of the following cannot be accomplished using a computer? Choose one answer.
. . Which of the following defines microcomputer? Choose one answer.
. . Which of the following statements best describes one of the main components that makes computers work? Choose one answer.
. . If e-mail is checked infrequently, the email provider may do which of the following? Choose one answer.
. . In an effort to protect your online information, which of the following should you not do? Choose one answer.
. . Search engines are most suitable when searching for: Choose one answer.
. . The advantages of an e-mail client include which of the following? Choose one answer.
. . The invisible web can be described as: Choose one answer.
. . The use of e-mail allows users to: Choose one answer.
. . What are some of the habits that users should develop in protecting their privacy online? Choose one answer.
. . What is the most important use of e-mail? Choose one answer.
. . Which of the following are examples of web search engines? Choose one answer.
. . Which statement best defines the World Wide Web? Choose one answer.
. . Describe a “cold start” check of the computer. Choose one answer.
. . How often should computer users perform preventative maintenance on their computers? Choose one answer.
. . In performing computer maintenance, users should do which of the following? Choose one answer.
. . In the event of a power surge and the computer does not power on, what is the next step you should take? Choose one answer.
. . Online performance checks refer to which of the following? Choose one answer.
. . What does the term “hacker” mean when referring to security issues? Choose one answer.
. . What is one of the benefits of “surge protection”? Choose one answer.
. . What is the main motivation for people who steal online personal information? Choose one answer.
. . Which of the following is one of the core items that is part of a computer “health check”? Choose one answer.
. . Which of the following is the most important step you can take to work safely online? Choose one answer.
. . What is it called when computers talk to each other?Using the Internet, computers connect and communicate with one another, primarily using the TCP/IP (Transmission Control Protocol / Internet Protocol). Think of TCP/IP as a book of rules, a step-by-step guide that each computer uses to know how to talk to another computer.
Which of the following statements best describes the relationship between the Internet and the World Wide Web WWW )?Which of the following best describes the relationship between the World Wide Web and the Internet? The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.
Which of the following best describes how a Web browser and a Web server interact with each other?What best describes how a web browser and a web server interact with each other? A web server is a vast network of interconnected computers that store information. When a client uses a web browser, the information found on the internet can be found and displayed.
Which of the following best explains what happens when a device is connected to the Internet?Which of the following best explains what happens when a new device is connected to the Internet? An Internet Protocol (IP) address is assigned to the device.
|