NAME

Question types


Start with


Question limit

of 90 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. An example of a vector graphics software application is _____.
  2. Digital video _____ involves analyzing each frame of the video and storing only the pixels that change from frame to frame.
  3. High end radio waves include infrared light and _____.
  4. Which of the following is NOT a safe and vigiland behavior to ensure Internet security?
  5. The Internet infrastructure and Internet service providers are burdened by _____, which takes up significant amounts of bandwidth and storage space.
  1. a PowerPoint
  2. b spam
  3. c all of the above
    (microwaves, gamma rays, x-rays)
  4. d compression
  5. e Avoid client/server networks.

5 Multiple choice questions

  1. ripping
  2. memory
  3. imaging
  4. WPA
  5. WiMAX

5 True/False questions

  1. Digitized sound can be _____ for secure communications.encrypted

          

  2. Through the use of _____, data is secured when it is stored and transported over a network.pagers

          

  3. A military commander enters the wrong GPS position for enemy troops into the computer; this is an example of _____.a data-entry error

          

  4. Devices attached to a network are identified as _____.clip art

          

  5. _____ software allows you to improve the look of your captured image.updates