A) Phone number
B) Full name
C) Student ID number
D) Birth date
Correct Answer
verified
Multiple Choice
A) Acceptable use policy (AUP)
B) Knowledge base
C) Code of conduct
D) Warranty
Correct Answer
verified
Multiple Choice
A) On an optical disc
B) On a flash drive
C) Preinstalled in an operating system
D) Online
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) online banking sites
B) online shopping sites
C) social media sites
D) private business sites
Correct Answer
verified
Multiple Choice
A) program window
B) active window
C) minimized window
D) restored window
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) My Verizon VPN
B) Starbucks Wi-Fi
C) Jenn's iPhone
D) xfinitywifi
Correct Answer
verified
Multiple Choice
A) Blog
B) Search site
C) Media sharing
D) Wiki
Correct Answer
verified
Multiple Choice
A) to promote company events and products
B) to allow employees to share, edit, and comment on documents
C) to take classes or earn a degree online
D) to perform work that is too dangerous, detailed, or monotonous for a single person
Correct Answer
verified
Multiple Choice
A) Voice recognition
B) Read-aloud technology
C) Computer-aided technology
D) MIDI technology
Correct Answer
verified
Multiple Choice
A) Mobile first design
B) Cross-platform development
C) Structured Query Language (SQL)
D) What-if analysis
Correct Answer
verified
Multiple Choice
A) original
B) viral
C) fake
D) concurrent
Correct Answer
verified
Multiple Choice
A) Speech recognition programs
B) Audio books
C) Graphic organizer
D) Screen reader
Correct Answer
verified
Multiple Choice
A) in a storage area located on a server
B) on your hard drive
C) on a flash drive
D) at the Microsoft Office website
Correct Answer
verified
Multiple Choice
A) Skype
B) Flipboard
C) Dropbox
D) GoFundMe
Correct Answer
verified
Multiple Choice
A) He can use the network only for a limited time.
B) The network connection is probably not secure.
C) He cannot connect to the Internet from the network.
D) The network most likely uses a firewall for protection.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) transferred from the hard drive to the RAM
B) transferred from the RAM to the hard drive
C) installed on the motherboard
D) updated on the ROM chip
Correct Answer
verified
Multiple Choice
A) robotics
B) artificial intelligence (AI)
C) virtual reality (VR)
D) embedded computers
Correct Answer
verified
Showing 761 - 780 of 1042