NAME

Question types


Start with


Question limit

of 90 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. All of the following are photo-editing software applications EXCEPT _____.
  2. There is hope that WiMAX technology will help resolve the _____ problem.
  3. A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus is called a _____ computer.
  4. A(n) _____ may be used to control unnecessary data from coming into a business over the Internet.
  5. A _____ card is a common netwrk device found in most laptop computers today.
  1. a Adobe Illustrator
  2. b zombie
  3. c firewall
  4. d last mile
  5. e network interface

5 Multiple choice questions

  1. .xls
    (.tif, .jpg, .gif)
  2. visualization
  3. User
  4. coaxial
  5. pagers

5 True/False questions

  1. Through the use of _____, data is secured when it is stored and transported over a network.encryption

          

  2. An example of a vector graphics software application is _____.PowerPoint

          

  3. Vector graphics software is used widely by _____.hertz

          

  4. Interactive media typically combine all of the following EXCEPT _____.blogs

          

  5. A popular encryption method used to protect data that travels over a network is _____.geotagging

          

Create Set