subject

Question 1 (2 points) Saved
A structured set of data held in a computer, especially one that is accessible in various ways�
Question 1 options:

Personally Identifiable Information (PII)

Database

Parameter

Server
Question 2 (2 points)
An effective goal is SMART: Specific, Measurable, Achievable, Relevant, and Timed.
Question 2 options:
True
False
Question 3 (2 points)
Software that is used to detect and eliminate computer viruses.
Question 3 options:

Wi-Fi

Cable Internet

Antivirus Application

Browser
Question 4 (2 points)
Any data that could potentially identify a specific individual�
Question 4 options:

Personally Identifiable Information (PII)

Database

Parameter

Server
Question 5 (2 points)
A device that translates analog carrier signals to encode and decode digital information.
Question 5 options:

USB

Computer Virus

Intranet

Modem
Question 6 (2 points)
Copyright law is a set of laws that protects the right to control the use of creative, literary, or artistic work.
Question 6 options:
True
False
Question 7 (2 points)
IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False
Question 8 (2 points)
Transferable skills are skills that are specific to a job and are usually a requirement for obtaining that job.
Question 8 options:
True
False
Question 9 (2 points)
Technical skills are also called soft skills.
Question 9 options:
True
False
Question 10 (2 points)
A professional is someone who uses education and acquired skills to earn money in a career.
Question 10 options:
True
False
Question 11 (2 points)
Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Question 11 options:

Malicious

Algorithm

Static

Web Browser
Question 12 (2 points)
Computers that are connected through cable or Wi-Fi to share resources.
Question 12 options:

Network

Spyware

Modem

Asynchronous Communication
Question 13 (2 points)
A network of computers that provides access to information on the web.
Question 13 options:

Phishing

Internet

Antivirus Application

Modem
Question 14 (2 points)
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:

Malicious

Algorithm

Static

Web Browser
Question 15 (2 points)
A means of giving credit to a source when their information is used.
Question 15 options:

Citation

Wi-Fi

Asynchronous Communication

Malware
Question 16 (2 points)
An IT security threat is anything that might cause serious harm to a computer system.
Question 16 options:
True
False
Question 17 (2 points)
A first, typical, or preliminary model of something from which other forms are developed or copied...
Question 17 options:

Compatibility

Prototype

Packet

Static
Question 18 (2 points)
A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:

Compatibility

Prototype

Packet

Static
Question 19 (2 points)
Information technology is the systems such as computers and telecommunications, used for storing, retrieving, and exchanging information.
Question 19 options:
True
False
Question 20 (2 points)
IT law is a branch of law that provides a legal framework for collecting, storing, and distributing electronic information.
Question 20 options:
True
False
Question 21 (2 points)
A software application for accessing information on the World Wide Web...
Question 21 options:

Malicious

Algorithm

Static

Web Browser
Question 22 (2 points)
A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
Question 22 options:
True
False
Question 23 (2 points)
Time management is the ability to use time effectively.
Question 23 options:
True
False
Question 24 (2 points)
This is used to mark a web pages structure using tags so that the web browser displays the content correctly.
Question 24 options:

Antivirus Application

Ethernet Cable

Computer Virus

HTML
Question 25 (2 points)
Physical components of a computer system such as a keyboard, mouse, or modem.
Question 25 options:

Software

Network

Browser

Hardware

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 03:00, SKYBLUE1015
What are the different parts of computer
Answers: 2
image
Computers and Technology, 23.06.2019 21:00, kkpsmith
Alcohol’s affects on the cornea and lens of the eye make it more difficult
Answers: 1
image
Computers and Technology, 24.06.2019 11:00, iloveballet1857
Each row in a database is a set of unique information called a(n) ? a.) table. b.) record. c.) object. d.) field.
Answers: 2
image
Computers and Technology, 24.06.2019 14:00, youcandoit13
In simple terms, how would you define a protocol?
Answers: 2
You know the right answer?
Question 1 (2 points) Saved
A structured set of data held in a computer, especially one that...

Questions in other subjects:

Konu
Physics, 08.05.2021 23:20
Konu
Mathematics, 08.05.2021 23:20
Konu
Computers and Technology, 08.05.2021 23:30
Konu
Mathematics, 08.05.2021 23:30