Con cuál de los siguientes métodos podemos seleccionar todo el texto del documento? Usando el atajo Ctrl+C Dando un clic en el margen izquierdo Usando el atajo Ctrl+A Triple clic en el documento
What technology is being used when you are sent an email saying you can track your package? A. Scan code B. LMS C. CAM D. M2M
Which of the following acts involve a computer that may not be illegal, but can be considered unethical? a) Computer crime b) Computer trademark infringement c) Violating copyright d) Computer abuse
True or False: You can only have one user account on a Windows computer. square False
Programming is an activity of which phase of development? requirements design implementation testing
Select the correct answer. Which is a requirement for the position of a certified coding associate (CCA)? A. a bachelor's degree in coding and programming B. specialized knowledge in healthcare administration C. knowledge of standard coding systems in health care D. a high school diploma with a certification in data security
Which type of access control system often employs mechanisms like locks, key cards, or biometric scanners to restrict entry? Digital access system Mechanical access system Physical access system Electronic access system Answer instructions
Which of the following best describes a communication system capable of identifying the numbe and location of the phone from which a caller is calling? A) Data display 911 B) Priority dispatch 911 C) Enhanced 911 D) Advanced 911
Ad trackers are used to display personalized cookies. True False
Moving a folder makes a copy of the folder and places it in another location. Yes No
Cybercriminals only manually test each stolen credential and avoid automation. True False
What must ethical hackers obtain before testing a system? the admin usernames and passwords legal authorization written consent from members of the pen testing organization explicit written permission
Use the __ dialog to add tables or queries. Join properties Show table Add field Query wizard
In Windows, how can the IP configuration for an Ethernet adapter be set? Either using the GUI Properties dialog or netsh commands Using netsh commands only Neither using the GUI Properties dialog nor netsh commands Using the GUI Properties dialog only
__ stores electronic files on the Internet instead of a local computer. Direct storage Digital storage Instant storage Cloud storage
If a standard user tries to perform an administrative task, they will be prompted to enter administrative credentials. Which security option is responsible for this prompting? User account control Network security Interactive login Secure desktop
Calculate the pixel size given these variables: $Matrixsize=512\times 512$ $Field-of-View(FOV)=12cm$ $Milliamperes(mA)=5$ $Kilovoltage\quad peak\quad (kVp)=78$ 0.000046 cm 0.023 cm 0.117 cm 42 cm
Computer __ is responsible for holding data and programs as they are being processed by the CPU. processor storage signals memory
What type of malware activates through a downloaded file and then can replicate on its own? Ransomware Virus Spyware Worm
What is clean computing? Multiple Choice a subset of sustainable MIS that refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment bulit using environment friendly materials and designed to save energy a company's acknowledged responsibility to society reuses or refurbishes ewaste and creates a new product