The most widely used personal computers are __ notebooks and laptops laptops smartphones tablets
What advantage does the current generation possess in the field of digital repair? a limited exposure to technology a lack of curiosity for technology an innate understanding of technology
What type of update does not allow a user to refuse or delay security updates? security preventative forced mandatory
9. Zoe wants to use an image file that will allow her to preserve all of the original information. What file format should she use? doc files JPEGS RAW files MP3s
6. Many beginners like to use program autoexposure because the camera sets up everything for them with the exception of 150, white balance, and flash functions. True False
What is the primary function of the Task Manager in Microsoft Windows systems? To install new software To create new user accounts To monitor performance and manage services To update the operating system
II. Choice part 9 __ is people who use internet to exploit younger for sexual A. Cyber bullying B Cyber predator C .Phishing D. All 10.which of the following is stoping regular user from connecting to the service? A. Denial of service B. Virus C.Keylogger D. Worms 11. Which of the following is protecting computer system on network? A. Information B Cyber security C Fire D.Worms 12. __ is enables authorised user to acess infn without any interference? A. Confidentiality B Intgrity C.Data D . Avialibility 13. __ is recording the movement on keyboard and stealing password? A. Trojan horse B Adware C Keylogger D. Phishing 14. Which of the following is not artificail threats A Botrets B. Fire C. Temprature D all 15. There are __ type of computer security A.3 B.5 C. 4 D.2
Multiple Choice Question Disk speed is measured by the __ speed. head rotational access
Which of the following elements is part of a database back-end? A. The database for the entire store B. The server hosting the data C. The interface where a user shops and makes selections D. the database management system being used
The first computer program to win the Loebner prize was named Deep Blue. True False
Question 3 If the $IPV4CIDR$ address is $73.0.5.0/17$ how many bits are reserved for the host address? 17 32 16 15
Task 2 Incident Handling Plan Create an incident handling plan for the selected attack from the top 100 B $\square $ Space used(includes formatting): 0/30000
Matching 2 points Match the definition on the left to the correct term on the right: A(n) __ disappointed is a program that translates programs to a simpler language that the computer can execute. The __ is a program that supervises operation of the entire computer. $\square $ memory operating system processor algorithm The __ is the part of a computer that follows instructions.
Which statements correctly describe the role of big cata in unsupervised, supervisec or reinforcement machine learning? Select all that apply. A. Allows the AI to identify meaningful patterns. B. Increases the Al motlel Accuracy with predictions. Determines the Al's tone and personality. a Improves the AI's decision -making over time. E. Reduces the At's need for complex alzorithms
1 . Identify List five different technologies or types of hardware that are used today in communications.
Which image type is made up of pixels and is best suited for detailed images like photographs? A Bitmap B Vector C Path D Shape
Click to add title How can you add a frame to a picture in Word? A. type "frame" B. Double click the picture, then the "frame"menu appears C. Drag the picture into the frame options window D. none of the above
To convert an image stored by a geometric formula to pixels A Vector B Bitmap C Rasterize D Smart Object
13 of 51 Determining the type and specifics of contamination is performed during the __ phase. after-attack recovery during-attack pre-attack
Which color mode is used primarily for digital displays? A RGB B CMYK C Grayscale D Indexed Color