1. Question: Match the term "hibernate" with their definitions

    A
    a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission

    B
    copies itself repeatedly using up system resources and possibly shutting the system down

    C
    saves any open documents and programs to a hard disk before removing power from the computer

    D
    hides within or looks like a legitimate program such as a screen saver

    E
    saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state

    F
    an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once

    Note: Not available
    1. Report
  2. Question: Match the term "virus" with their definitions

    A
    a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission

    B
    copies itself repeatedly using up system resources and possibly shutting the system down

    C
    saves any open documents and programs to a hard disk before removing power from the computer

    D
    hides within or looks like a legitimate program such as a screen saver

    E
    saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state

    F
    an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once

    Note: Not available
    1. Report
  3. Question: Match the term "worm" with their definitions

    A
    potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission

    B
    copies itself repeatedly using up system resources and possibly shutting the system down

    C
    saves any open documents and programs to a hard disk before removing power from the computer

    D
    hides within or looks like a legitimate program such as a screen saver

    E
    saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state

    F
    an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once

    Note: Not available
    1. Report
  4. Question: Match the term "spam" with their definitions

    A
    a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission

    B
    copies itself repeatedly using up system resources and possibly shutting the system down

    C
    saves any open documents and programs to a hard disk before removing power from the computer

    D
    hides within or looks like a legitimate program such as a screen saver

    E
    saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state

    F
    an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once

    Note: Not available
    1. Report
  5. Question: An ergonomic keyboard _______.

    A
    has a design that reduces wrist and hand injuries

    B
    transmits data using wireless technology

    C
    is used to enter data into a biometric device

    D
    is built into the top of a handheld computer

    Note: Not available
    1. Report
  6. Question: A _______ is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.

    A
    touch screen

    B
    stylus

    C
    trackball

    D
    pointing stick

    Note: Not available
    1. Report
  7. Question: Architects, mapmakers, designers, artists, and home users create drawings and sketches on a _______.

    A
    trackball

    B
    smart terminal

    C
    graphics tablet

    D
    touchpad

    Note: Not available
    1. Report
  8. Question: ______ is the computer’s capability of distinguishing spoken words.

    A
    Voice input

    B
    VoIP

    C
    MIDI

    D
    Voice recognition

    Note: Not available
    1. Report
  9. Question: RFID is a technology that uses _______ to communicate with a tag placed in or attached to an object, an animal, or a person.

    A
    a thin wire

    B
    pixels

    C
    laser signals

    D
    light waves

    Note: Not available
    1. Report
  10. Question: The speed of an ink-jet printer is measured by the number of _______ it can print.

    A
    lines per page (lpp)

    B
    dots per inch (dpi)

    C
    characters per second (cps)

    D
    pages per minute (ppm)

    Note: Not available
    1. Report
Copyright © 2025. Powered by Intellect Software Ltd