NAME

Question types


Start with


Question limit

of 225 available terms

Advertisement
Print test

5 Written questions

5 Matching questions

  1. Identity theft
  2. Shift
  3. The Internet
  4. Reply all
  5. architecture
  1. a ____ occurs when someone obtains enough information about a person to be able to masquerade as that person.
    Select one:
    a. Spoofing
    b. Pharming
    c. Identity theft
    d. Data theft
  2. b The way a network is designed to communicate is known as its ____.
    Select one:
    a. architecture
    b. protocol path
    c. topology
    d. latency
  3. c ____ is the most well-known computer network in the world.
    Select one:
    a. Skynet
    b. Telnet
    c. The Internet
    d. AOL
  4. d To select a series of adjacent files, click the first desired file, press and hold the _____ key, then click the last desired file.
    Select one:
    a. Shift
    b. Tab
    c. Ctrl
    d. Windows
  5. e If you receive an email message that includes multiple recipients, and you wish to respond back to the same list of recipients, use the _______ command.
    Select one:
    a. Forward
    b. Forward all
    c. Reply
    d. Reply all

5 Multiple choice questions

  1. To change which area of the workspace is visible in the program window, you can use the _______.
    Select one:
    a. zoom bars
    b. scroll bars
    c. resolution setting
    d. ScreenFilter
  2. Case-Based Critical Thinking Questions

    Case 5-1
    The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole.

    AT&T, Comcast are ____.
    Select one:
    a. ISPs
    b. software companies
    c. key Internet organizations
    d. ASPs
  3. IP addresses and their corresponding ____ identify computers available through the Internet.
    Select one:
    a. HTML codes
    b. TCP/IP routes
    c. ring topographies
    d. domain names
  4. If you are using a monitor set to a lower resolution and you can't find a ribbon button, you might need to click _______ first.
    Select one:
    a. Close
    b. the taskbar
    c. the group button
    d. the scroll bar
  5. As you click different links on Web pages, the _______ in the Address bar change(s).
    Select one:
    a. URL
    b. history tiles
    c. protocol
    d. pins

5 True/False questions

  1. MANMicrosoft and Google have created large networks known as ____ to provide free or low-cost Internet access to area residents.
    Select one:
    a. PANs
    b. LANs
    c. MANs
    d. WANs

          

  2. cloudWindows Live SkyDrive is an example of _____ storage.
    Select one:
    a. NAS
    b. SAN
    c. cloud
    d. direct

          

  3. 255The term memory when referring to computers usually means _____.
    Select one:
    a. ROM
    b. BIOS
    c. RAM
    d. RAID

          

  4. Opting outThe _____ is the main processing device for a computer.
    Select one:
    a. CPU
    b. cache
    c. USB
    d. FPU

          

  5. spoofed____ browsing allows you to open multiple Web pages at one time.
    Select one:
    a. Webbed
    b. Threaded
    c. Tabbed
    d. Reticulated