A program, either talk or music, that is made available in digital format for automatic download over the Internet is called a _____
A USB communication device that supports data encryption for secure wireless communication for notebook users is called a
1.USB wireless network adapter
4.None of these
Codes consisting of lines of varying widths or lengths that are computer-readable are known as
1.an ASCII code
2.a magnetic tape
3.a OCR scanner
4.None of These
Different components on the motherboard of a PC unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
Fourth generation mobile technology provides enhanced capabilities allowing the transfer of both ____ data, including full motion video, high-speed Internet access, and videoconferencing.
1.video data and information
2.voice and nonvoice
3.music and video
4.video and audio
Portal computer, also known as laptop computer, weighing between 4 and 10 pounds is called
The piece of hardware that converts your computer's digital signal to an analog signal that can travel over telephone lines is called a ____
The system unit____
1.coordinates input and output devices
2.is the container that houses electronic components
3.is a combination of hardware and software
4.controls and manipulates data
What feature adjust the top and bottom margins so that the text is centered vertically on the printed page?
What is the name given to those applications that combine text, sound, graphics, motion video and/ or animation ?
What is the overall term for creating, editing, formatting, storing , retrieving, and printing a text document?
Which of the following is a programming language for creating special programs like applets?
Which of the following is a program that uses a variety of different approaches to identify and eliminate spam?
4.Web storefront creation package
Which PowerPoint view displays each side of the presentation as a thumbnail and is useful for rearranging slides?
3. Slide Master
1.It is not unethical, because it is legal.
2.It is unethical because the files are being given for free
3.Sharing copyrighted files without permission breaks copy right laws.
4.It is not unethical because the files are being given for free.
__ are attempts by individuals to obtain confidential information from you by falsifying their identity.
_____ allows users to upload files to an online site so they can be viewed and edited from another location.