.


:




:

































 

 

 

 


Synchronous communications




a) Instant messaging, chat, and VoIP are forms of synchronous communications; the people communicating have to be online at the same time and the conversation happens in real time.

b) refers to a model in which consumers access appli‑cations from a cloud provider over the Internet, usually by using a browser.

c) (Transmission Control Protocol) breaks a message or file into packets.

d) Some cell phones, such as Droids and iPhones, can act as a WiFi hotspot by becoming the router for a wireless network.

e) As a general rule, computers on the Internet that act as servers use static IP addresses.

 

Tethering

a) Some cell phones, such as Droids and iPhones, can act as a WiFi hotspot by becoming the router for a wireless network.

b) refers to a model in which consumers access appli‑cations from a cloud provider over the Internet, usually by using a browser.

c) (Transmission Control Protocol) breaks a message or file into packets.

d) Instant messaging, chat, and VoIP are forms of synchronous communications; the people communicating have to be online at the same time and the conversation happens in real time.

e) As a general rule, computers on the Internet that act as servers use static IP addresses.

 

TCP

a) (Transmission Control Protocol) breaks a message or file into packets.

b) refers to a model in which consumers access appli‑cations from a cloud provider over the Internet, usually by using a browser.

c) Some cell phones, such as Droids and iPhones, can act as a WiFi hotspot by becoming the router for a wireless network.

d) Instant messaging, chat, and VoIP are forms of synchronous communications; the people communicating have to be online at the same time and the conversation happens in real time.

e) As a general rule, computers on the Internet that act as servers use static IP addresses.

 

127. Trace rout e

a) records a packets path in addition to its round trip speed.

b) is a short message of 140 characters or less that is posted

c) is the rate of data that is uploaded from your computer to the Internet.

d) Sales representatives and telecommuters often access corporate networks from home or from a customers office by using a secured con‑nection called a virtual private network(VPN).

e) usually referred to simply as a modemconverts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

 

Tweet

a) is a short message of 140 characters or less that is posted

b) records a packets path in addition to its round trip speed.

c) is the rate of data that is uploaded from your computer to the Internet.

d) Sales representatives and telecommuters often access corporate networks from home or from a customers office by using a secured con‑nection called a virtual private network(VPN).

e) usually referred to simply as a modemconverts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

 

Upstream speed

a) is the rate of data that is uploaded from your computer to the Internet.

b) records a packets path in addition to its round trip speed.

c) is a short message of 140 characters or less that is posted

d) Sales representatives and telecommuters often access corporate networks from home or from a customers office by using a secured con‑nection called a virtual private network(VPN).

e) usually referred to simply as a modemconverts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

 

Virtual private network

a) Sales representatives and telecommuters often access corporate networks from home or from a customers office by using a secured connection called a virtual private network(VPN).

b) records a packets path in addition to its round trip speed.

c) is a short message of 140 characters or less that is posted

d) is the rate of data that is uploaded from your computer to the Internet.

e) usually referred to simply as a modemconverts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

 

Voiceband modem

a) usually referred to simply as a modemconverts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

b) records a packets path in addition to its round trip speed.

c) is a short message of 140 characters or less that is posted

d) is the rate of data that is uploaded from your computer to the Internet.

e) Sales representatives and telecommuters often access corporate networks from home or from a customers office by using a secured con‑nection called a virtual private network(VPN).

 

VoIP

a) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

b) (Wireless Application Protocol) is a communications protocol that provides Internet access from handheld devices, such as cell phones

c) is an area in which the public can access a WiFi network that offers Internet service

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

 

WAP

a) (Wireless Application Protocol) is a com‑munications protocol that provides Internet access from handheld devices, such as cell phones

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) is an area in which the public can access a WiFi network that offers Internet service

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

 

WiFi hotspot

a) is an area in which the public can access a WiFi network that offers Internet service

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑munications protocol that provides Internet access from handheld devices, such as cell phones

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

 

Wiki

a) allows participants to modify posted material.

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑munications protocol that provides Internet access from handheld devices, such as cell phones

d) is an area in which the public can access a WiFi network that offers Internet service

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

 

WiMAX

a) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑munications protocol that provides Internet access from handheld devices, such as cell phones

d) is an area in which the public can access a WiFi network that offers Internet service

e) allows participants to modify posted material.

bsolute reference

a) never changes when you insert rows, or copy or move formulas.

b) alter a devices user interface to create an accessible environment by providing closed captions,

c) text-to-speech, speech-to-text, or large screen text.

d) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

e) an intelligent agent behaves somewhat like a robot.

 

Adaptive utilities

a) alter a devices user interface to create an accessible environment by providing closed captions,

b) text-to-speech, speech-to-text, or large screen text.

c) never changes when you insert rows, or copy or move formulas.

d) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

e) an intelligent agent behaves somewhat like a robot.

 

139. utomatic recalculation

a) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

b) never changes when you insert rows, or copy or move formulas.

c) alter a devices user interface to create an accessible environment by providing closed captions,

d) text-to-speech, speech-to-text, or large screen text.

e) an intelligent agent behaves somewhat like a robot.

 

Bot

a) an intelligent agent behaves somewhat like a robot.

b) never changes when you insert rows, or copy or move formulas.

c) alter a devices user interface to create an accessible environment by providing closed captions,

d) text-to-speech, speech-to-text, or large screen text.

e) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

 

otnet

a) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

b) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

c) in the grid can contain a value, label, or formula.

d) (like D4 and D5), numbers (like 110), formula, such as =D4-D5+((D8/B2)*110

e) is usually sold in retail stores or at Web sites.

 

BSD license

a) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) in the grid can contain a value, label, or formula.

d) (like D4 and D5), numbers (like 110), formula, such as =D4-D5+((D8/B2)*110

e) is usually sold in retail stores or at Web sites.

 

143. ell

a) in the grid can contain a value, label, or formula.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d) (like D4 and D5), numbers (like 110), formula, such as =D4-D5+((D8/B2)*110

e) is usually sold in retail stores or at Web sites.

 

ell references

a) (like D4 and D5), numbers (like 110), formula, such as =D4-D5+((D8/B2)*110

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d) in the grid can contain a value, label, or formula.

e) is usually sold in retail stores or at Web sites.

 

Commercial software

a) is usually sold in retail stores or at Web sites.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d) in the grid can contain a value, label, or formula.

e) (like D4 and D5), numbers (like 110), formula, such as =D4-D5+((D8/B2)*110

 

omputer virus

a) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

b) is a self-replicating program designed to carry out some unauthorized activity on a victims computer.

c) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

d) Most software displays, such as 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, n the context of modern usage.

 

147. omputer worm

a) is a self-replicating program designed to carry out some unauthorized activity on a victims computer.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

d) Most software displays, such as 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, n the context of modern usage.

 

148. opyright

a) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a self-replicating program designed to carry out some unauthorized activity on a victims computer.

d) Most software displays, such as 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, n the context of modern usage.

 

opyright notice

a) Most software displays, such as 2014 eCourse Corporation, on one of its screens.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a self-replicating program designed to carry out some unauthorized activity on a victims computer.

d) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

e) is simply a collection of data that is stored on one or more computers, n the context of modern usage.

 

Database

a) is simply a collection of data that is stored on one or more computers, n the context of modern usage.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a self-replicating program designed to carry out some unauthorized activity on a victims computer.

d) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

e) Most software displays, such as 2014 eCourse Corporation, on one of its screens.

 

Demoware

a) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

b) is software that helps a peripheral device establishcommunication with a computer.

c) refers to the way that all the elements of a document text, pictures, titles, and page numbersare arranged on the page.

d) (end-user license agreement) is displayed on the screen when you first install software.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

 

Device driver

a) is software that helps a peripheral device establishcommunication with a computer.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) refers to the way that all the elements of a document text, pictures, titles, and page numbersare arranged on the page.

d) (end-user license agreement) is displayed on the screen when you first install software.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

Document formatting

a) refers to the way that all the elements of a document text, pictures, titles, and page numbersare arranged on the page.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) is software that helps a peripheral device establishcommunication with a computer.

d) (end-user license agreement) is displayed on the screen when you first install software.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

 

EULA

a) (end-user license agreement) is displayed on the screen when you first install software.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) is software that helps a peripheral device establishcommunication with a computer.

d) refers to the way that all the elements of a document text, pictures, titles, and page numbersare arranged on the page.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

 

xecutable file

a) The main component of a software package, designed to be started by users or automatically launched by the operating system.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) is software that helps a peripheral device establishcommunication with a computer.

d) refers to the way that all the elements of a document text, pictures, titles, and page numbersare arranged on the page.

e) (end-user license agreement) is displayed on the screen when you first install software.

 

Field

a) holds one item of data relevant to a record.

b) is a set of letters that share a unified design.

c) text that you specify to automatically appear in the bottom margin of every page.

d) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

e) is copyrighted software thatasyou might expectis available for free.

 

Font

a) is a set of letters that share a unified design.

b) holds one item of data relevant to a record.

c) text that you specify to automatically appear in the bottom margin of every page.

d) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

e) is copyrighted software thatasyou might expectis available for free.

 

Footer

a) text that you specify to automatically appear in the bottom margin of every page.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

e) is copyrighted software thatasyou might expectis available for free.

 

Formula

a) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) text that you specify to automatically appear in the bottom margin of every page.

e) is copyrighted software thatasyou might expectis available for free.

 

Freeware

a) is copyrighted software thatasyou might expectis available for free.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) text that you specify to automatically appear in the bottom margin of every page.

e) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

 

Fully justified

a) so that the text is aligned evenly on both the right andleft margins.

b) ou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

c) (General Public License) was developed for a free operating system called GNU.

d) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that dont agree with nouns.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

 

Function

a) ou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

b) so that the text is aligned evenly on both the right andleft margins.

c) (General Public License) was developed for a free operating system called GNU.

d) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that dont agree with nouns.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

 

GPL

a) (General Public License) was developed for a free operating system called GNU.

b) so that the text is aligned evenly on both the right andleft margins.

c) ou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that dont agree with nouns.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

 

Grammar checker

a) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that dont agree with nouns

b) so that the text is aligned evenly on both the right andleft margins.

c) ou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) (General Public License) was developed for a free operating system called GNU.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

 

Graphics

a) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

b) so that the text is aligned evenly on both the right andleft margins.

c) ou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) (General Public License) was developed for a free operating system called GNU.

e) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that dont agree with nouns.

 

ash value

a) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

b) text that you specify to automatically appear in the top margin of every page.

c) pps are available from other sources, but using them requires an unauthorized change to the devices software.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

 

eader

a) text that you specify to automatically appear in the top margin of every page.

b) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

c) pps are available from other sources, but using them requires an unauthorized change to the devices software.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

 

Jailbreak

a) pps are available from other sources, but using them requires an unauthorized change to the devices software.

b) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

eyword search

a) popular with search engines such as Google, is simply a collection of words relevant to your search.

b) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d) pps are available from other sources, but using them requires an unauthorized change to the devices software.

e) is any text used to describe data.

 

Label

a) is any text used to describe data.

b) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d) pps are available from other sources, but using them requires an unauthorized change to the devices software.

e) popular with search engines such as Google, is simply a collection of words relevant to your search.

 

Leading

a) The spacing between lines of text, (pronounced LED ding).

b) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

c) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

d) spreads by sending itself to every address in the address book of an infected computer.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

 

 

172. Malicious software and alware

a) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

b) The spacing between lines of text, (pronounced LED ding).

c) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

d) spreads by sending itself to every address in the address book of an infected computer.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

 

apping application

a) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

b) The spacing between lines of text, (pronounced LED ding).

c) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

d) spreads by sending itself to every address in the address book of an infected computer.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

 

ass-mailing worm

a) spreads by sending itself to every address in the address book of an infected computer.

b) The spacing between lines of text, (pronounced LED ding).

c) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

d) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

 

athematical operators

a) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

b) The spacing between lines of text, (pronounced LED ding).

c) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

d) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

e) spreads by sending itself to every address in the address book of an infected computer.

 

obile app

a) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

b) refers to a component, suchas a word processing module.

c) is priced per copy and allows the allocated number of copies to be used simultaneously.

d) is a question stated in a language such as English, rather than anesoteric query language.

e) is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

 

 

Module

a) refers to a component, suchas a word processing module.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) is priced per copy and allows the allocated number of copies to be used simultaneously.

d) is a question stated in a language such as English, rather than anesoteric query language.

e) is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

 

ultiple-user license

a) is priced per copy and allows the allocated number of copies to be used simultaneously.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) refers to a component, suchas a word processing module.

d) is a question stated in a language such as English, rather than anesoteric query language.

e) is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

 

Natural language query

a) is a question stated in a language such as English, rather than anesoteric query language.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) refers to a component, suchas a word processing module.

d) is priced per copy and allows the allocated number of copies to be used simultaneously.

e) is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

 

ffice suite

a) is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) refers to a component, suchas a word processing module.

d) is priced per copy and allows the allocated number of copies to be used simultaneously.

e) is a question stated in a language such as English, rather than anesoteric query language.

Open source software

a) makes uncompiled program instructionsthe source codeavailable to programmers who want to modify and improve the software.

b) refers to the physical position of each element on a page.

c) refers to the horizontal position of textwhether it is aligned at the left margin, aligned at the right margin.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

 

 

Page layout

a) refers to the physical position of each element on a page.

b) makes uncompiled program instructionsthe source codeavailable to programmers who want to modify and improve the software.

c) refers to the horizontal position of textwhether it is aligned at the left margin, aligned at the right margin.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

 

Paragraph alignment

a) refers to the horizontal position of textwhether it is aligned at the left margin, aligned at the right margin.

b) makes uncompiled program instructionsthe source codeavailable to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

 

Paragraph style

a) includes the alignment of text within the margins and the space between each line of text.

b) makes uncompiled program instructionsthe source codeavailable to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) refers to the horizontal position of textwhether it is aligned at the left margin, aligned at the right margin.

e) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

 

PDF

a) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

b) makes uncompiled program instructionsthe source codeavailable to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) refers to the horizontal position of textwhether it is aligned at the left margin, aligned at the right margin.

e) includes the alignment of text within the margins and the space between each line of text.

 

irated software

a) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

b) Font size is measured, abbreviated pt.

c) is designed to run from removable storage, such as a CD or USB flash drive.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

 

 

oint size

a) Font size is measured, abbreviated pt.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) is designed to run from removable storage, such as a CD or USB flash drive.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

 

Portable software

a) is designed to run from removable storage, such as a CD or USB flash drive.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

 

Product activation

a) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is designed to run from removable storage, such as a CD or USB flash drive.

e) They are sometimes referred, because they offer features that really help get work done.

 

Productivity software

a) They are sometimes referred, because they offer features that really help get work done.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is designed to run from removable storage, such as a CD or USB flash drive.

e) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

 

Proprietary software

a) has restrictions on its use that are delineated by copyright, patents, or license agreements.

b) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

c) contains code that is suspected of being part of a virus n the context of antivirus software.

d) describes the information you want to find.

e) QBE) simply requires you to fill out a form with the type of data you want to locate.

 

Public domain software

a) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

b) has restrictions on its use that are delineated by copyright, patents, or license agreements.

c) contains code that is suspected of being part of a virus n the context of antivirus software.

d) describes the information you want to find.

e) QBE) simply requires you to fill out a form with the type of data you want to locate.

Quarantined file

a) contains code that is suspected of being part of a virus n the context of antivirus software.

b) has restrictions on its use that are delineated by copyright, patents, or license agreements.

c) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

d) describes the information you want to find.

e) QBE) simply requires you to fill out a form with the type of data you want to locate.

 

Query

a) describes the information you want to find.

b) has restrictions on its use that are delineated by copyright, patents, or license agreements.

c) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

d) contains code that is suspected of being part of a virus n the context of antivirus software.

e) QBE) simply requires you to fill out a form with the type of data you want to locate.

.

 

Query by example

a) (QBE) simply requires you to fill out a form with the type of data you want to locate.

b) has restrictions on its use that are delineated by copyright, patents, or license agreements.

c) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

d) contains code that is suspected of being part of a virus n the context of antivirus software.

e) describes the information you want to find.

 

Query language

a) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

b) holds data for a single entitya person, place, thing, or event.

c) The process, but most consumers have no need to root their mobile devices.

d) refers to software tools used to conceal malware and backdoors that have been installed on a victims computer.

e) feature to hunt down mistakes that you habitually make in your writing.

 

 

Record

a) holds data for a single entitya person, place, thing, or event.

b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

c) The process, but most consumers have no need to root their mobile devices.

d) refers to software tools used to conceal malware and backdoors that have been installed on a victims computer.

e) feature to hunt down mistakes that you habitually make in your writing.

 

 

Rooting

a) The process, but most consumers have no need to root their mobile devices.

b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

c) holds data for a single entitya person, place, thing, or event.

d) refers to software tools used to conceal malware and backdoors that have been installed on a victims computer.

e) feature to hunt down mistakes that you habitually make in your writing.

 

Rootkit

a) refers to software tools used to conceal malware and backdoors that have been installed on a victims computer.

b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

c) holds data for a single entitya person, place, thing, or event.

d) The process, but most consumers have no need to root their mobile devices.

e) feature to hunt down mistakes that you habitually make in your writing.

 

Search and Replace

a) feature to hunt down mistakes that you habitually make in your writing.

b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

c) holds data for a single entitya person, place, thing, or event.

d) The process, but most consumers have no need to root their mobile devices.

e) refers to software tools used to conceal malware and backdoors that have been installed on a victims computer.

 

Security suite

a) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

b) which usually applies to operating system updates, is a set of updates.

c) that guides you through the installation process.

d) is copyrighted software marketed under a try-before-you-buy policy.

e) goes into effect as soon as you open the packaging.

 

Service pack

a) which usually applies to operating system updates, is a set of updates.

b) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

c) that guides you through the installation process.

d) is copyrighted software marketed under a try-before-you-buy policy.

e) goes into effect as soon as you open the packaging.

 

Setup program

a) that guides you through the installation process.

b) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

c) which usually applies to operating system updates, is a set of updates.

d) is copyrighted software marketed under a try-before-you-buy policy.

e) goes into effect as soon as you open the packaging.

 

Shareware

a) is copyrighted software marketed under a try-before-you-buy policy.

b) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

c) which usually applies to operating system updates, is a set of updates.

d) that guides you through the installation process.

e) goes into effect as soon as you open the packaging.

 

 

Shrink-wrap license

a) goes into effect as soon as you open the packaging.

b) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

c) which usually applies to operating system updates, is a set of updates.

d) that guides you through the installation process.

e) is copyrighted software marketed under a try-before-you-buy policy.

 

Single-user license

a) that limits use to one person at a time.

b) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

c) is the process of placing a program into a computer so that it can be run or executed.

d) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

 

 

Site license

a) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

b) that limits use to one person at a time.

c) is the process of placing a program into a computer so that it can be run or executed.

d) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

 

Software installation

a) is the process of placing a program into a computer so that it can be run or executed.

b) that limits use to one person at a time.

c) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

d) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

 

Software license

a) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

b) that limits use to one person at a time.

c) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

d) is the process of placing a program into a computer so that it can be run or executed.

e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

 

Software update

a) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

b) that limits use to one person at a time.

c) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

d) is the process of placing a program into a computer so that it can be run or executed.

e) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

 

Software upgrade.

a) eriodically, software publishers replace older versions of a software product with a new version thats sometimes referred.

b) that marks misspelled words in a document

c) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

d) uses rows and columns of numbers to create a model or representation of a real situation.

e) is a type of program that secretly gathers personal information without the victims knowledge, usually for advertising and other commercial purposes.

 

 

Spelling checker

a) that marks misspelled words in a document.

b) eriodically, software publishers replace older versions of a software product with a new version thats sometimes referred.

c) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

d) uses rows and columns of numbers to create a model or representation of a real situation.

e) is a type of program that secretly gathers personal information without the victims knowledge, usually for advertising and other commercial purposes.

 

Spelling dictionary

a) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

b) eriodically, software publishers replace older versions of a software product with a new version thats sometimes referred.

c) that marks misspelled words in a document

d) uses rows and columns of numbers to create a model or representation of a real situation.

e) is a type of program that secretly gathers personal information without the victims knowledge, usually for advertising and other commercial purposes.

 

Spreadsheet

a) uses rows and columns of numbers to create a model or representation of a real situation.

b) eriodically, software publishers replace older versions of a software product with a new version thats sometimes referred.

c) that marks misspelled words in a document

d) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

e) is a type of program that secretly gathers personal information without the victims knowledge, usually for advertising and other commercial purposes.

 

Spyware

a) is a type of program that secretly gathers personal information without the victims knowledge, usually for advertising and other commercial purposes.

b) eriodically, software publishers replace older versions of a software product with a new version thats sometimes referred.

c) that marks misspelled words in a document

d) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

e) uses rows and columns of numbers to create a model or representation of a real situation.

 

 

System requirements

a) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

b) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

c) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

d) which deletes the softwares files from various folders on your computers hard disk.

e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

 

System utilities

a) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

c) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

d) which deletes the softwares files from various folders on your computers hard disk.

e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

 

Trojan horse

a) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

d) which deletes the softwares files from various folders on your computers hard disk.

e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

 

Uninstall routine

a) which deletes the softwares files from various folders on your computers hard disk.

b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

d) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

 

Unzipped

a) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

d) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

e) which deletes the softwares files from various folders on your computers hard disk.

 

Utility software

a) A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

b) is a number that you want to use in a calculation.

c) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

d) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

e) (or Web app) is software that is accessed with a Web browser.

 

Value

a) is a number that you want to use in a calculation.

b) A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

c) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

d) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

e) (or Web app) is software that is accessed with a Web browser.

What is Virus hoax

a) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

b) A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

c) is a number that you want to use in a calculation.

d) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

e) (or Web app) is software that is accessed with a Web browser.

 

Web application

a) (or Web app) is software that is accessed with a Web browser.

b) A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

c) is a number that you want to use in a calculation.

d) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

Word wrap

a) A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.

b) ou use spreadsheet software to create an on-screen.

c) Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

d) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

Worksheet.

a) ou use spreadsheet software to create an on-screen.

b) A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.

c) Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

d) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

Zipped

a) Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

b) A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.

c) ou use spreadsheet software to create an on-screen.

d) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

Zombie

a) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

b) A feature which determines how your text flows from line to line by automatically moving





:


: 2017-01-21; !; : 339 |


:

:

- , .
==> ...

1796 - | 1598 -


© 2015-2024 lektsii.org - -

: 0.687 .