The most widely used personal computers are __ notebooks and laptops laptops smartphones tablets
What advantage does the current generation possess in the field of digital repair? a limited exposure to technology a lack of curiosity for technology an innate understanding of technology
What type of update does not allow a user to refuse or delay security updates? security preventative forced mandatory
9. Zoe wants to use an image file that will allow her to preserve all of the original information. What file format should she use? doc files JPEGS RAW files MP3s
6. Many beginners like to use program autoexposure because the camera sets up everything for them with the exception of 150, white balance, and flash functions. True False
What is the primary function of the Task Manager in Microsoft Windows systems? To install new software To create new user accounts To monitor performance and manage services To update the operating system
II. Choice part 9 __ is people who use internet to exploit younger for sexual A. Cyber bullying B Cyber predator C .Phishing D. All 10.which of the following is stoping regular user from connecting to the service? A. Denial of service B. Virus C.Keylogger D. Worms 11. Which of the following is protecting computer system on network? A. Information B Cyber security C Fire D.Worms 12. __ is enables authorised user to acess infn without any interference? A. Confidentiality B Intgrity C.Data D . Avialibility 13. __ is recording the movement on keyboard and stealing password? A. Trojan horse B Adware C Keylogger D. Phishing 14. Which of the following is not artificail threats A Botrets B. Fire C. Temprature D all 15. There are __ type of computer security A.3 B.5 C. 4 D.2
Multiple Choice Question Disk speed is measured by the __ speed. head rotational access
Which of the following elements is part of a database back-end? A. The database for the entire store B. The server hosting the data C. The interface where a user shops and makes selections D. the database management system being used
The first computer program to win the Loebner prize was named Deep Blue. True False
Cybercriminals only manually test each stolen credential and avoid automation. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product