Professional Documents
Culture Documents
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. The amount of data that you can transfer to your computer
b. the speed of the device
c. How easy to carry / transport your computer
d. how shiny the device is
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is the process of copying and archiving the computer data so that it may be used to
restore its original data after a data loss event.
Select one:
a. Software Update
b. Defragmentation
c. Back-up
d. Disk Cleanup
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the Lecture of Lesson 1.
1970
Answer:
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and accessible
from a public cloud storage provider.
Select one:
True
False
Question 6
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Select one:
True
False
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Application
Answer Layer serves as the window for users and applications process to access
the network services.
Question 9
Complete
Mark 1.00 out of 1.00
Remove flag
Question text
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium
Question 11
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Product Engineering Software
b. Enterprise Infrastructure Software
c. Simulation Software
d. Media Development Software
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Honey Pot is a software application that scans your whole computer’s hard drives and
folders for possible malware or virus infections.
Select one:
True
False
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Question 14
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Ransomware
b. Driver
c. Adware
d. Patch
Question 15
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a.
Ethernet Port
b.
Power Button
c.
USB Port
d.
Serial Port
Question 16
Complete
Mark 1.00 out of 1.00
Remove flag
Question text
Select one:
a. Memo Data Type
b. String Data Type
c. Text Data Type
d. CLOB Data Type
Question 17
Complete
Mark 1.00 out of 1.00
Remove flag
Question text
Select one:
a. Prevent Data Anomalies
b. Remove redundant information
c. Add additional related tables
d. Performance
Question 18
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What is software?
Select one:
a. the video card on the monitor
b. any collection of instructions telling the hardware what to do
c. the operating system
d. the monitor and computer case
Question 19
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Blue
Windows 8.1 (codename:Answer ) is an upgrade for Windows 8, a version of
Windows NT, a computer operating system released by Microsoft.
Question 20
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is the metal and plastic box which contains the computer's main components including
the motherboard, central processing unit ( CPU), and power supply.
Select one:
a. Keyboard
b. Monitor
c. Mouse
d. Computer Case
Question 21
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. It's all they understand
b. It's quicker
c. Computers are made up of electronic switches
d. Computers only read 1's and 0's because it's all they can do
Question 22
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. OSI Model
b. Peer-to-Peer Model
c. Client-Server Model
d. TCP/IP Model
Question 23
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. DHCP Server
b. DNS Server
c. Router
d. Firewall
Question 24
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What type of computers in a client-server system are client computers (most of the time).
Select one:
a.
Mainframe
b.
PDA
c.
Microcomputer
d.
Minicomputer
Question 25
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Select one:
True
False
Question 26
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 27
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Blackcomb
Windows 7 (codename:Answer ) is a personal computer operating system and
was released to manufacturing on July 22, 2009.
Question 28
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.
Select one:
True
False
Question 29
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Raw data are the unprocessed facts including text, numbers, images and sounds.
Select one:
True
False
Question 30
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Architecture
b. Connectivity
c. Protocol
d. Standards
Question 31
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:
True
False
Question 32
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Question 33
Complete
Mark 1.00 out of 1.00
Remove flag
Question text
It is a graphical representation of the elements that make up the overall database design.
Select one:
a. Pie Chart
b. Data Model
c. Fishbone Diagram
d. Flow Chart
Question 34
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 35
Complete
Mark 1.00 out of 1.00
Remove flag
Question text
Select one:
a. Oracle
b. PostgreSQL
c. MySQL
d. Python
Question 36
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
data link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.
Question 37
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:
True
False
Question 38
Complete
Mark 1.00 out of 1.00
Remove flag
Question text
It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:
a. Records
b. Data
c. Information
d. Database
Question 39
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Hardware are the equipment used to process the data and create useful information.
Select one:
True
False
Question 40
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Firewall is the process of converting a data or information into another form also known as
cipher text.
Select one:
True
False
Question 41
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Content Access Software
b. Entertainment Software
c. Educational Software
d. Information Worker Software
Question 42
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Question 44
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1890
Answer:
Question 45
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Security software is designed to protect computers from the variety of viruses and
unwanted intrusions
Select one:
True
False
Question 46
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Whistler
Windows XP (codename:Answer ) is a personal computer operating system
produced by Microsoft as part of the Windows NT Family of operating system.
Question 47
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Select one:
a. Needs turning on of the computer to maintain data
b. All of the given
c. Memory available to use while the computer is running for the operating system,
programs, and processes.
d. The data is not written permanently in RAM (volatile memory)
Question 48
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Massachusetts Institute of Technology in 1960’s had a time sharing operating system they
MULTICS
calledAnswer .
Question 49
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:
True
False
Question 50
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
a. System Unit Component
b. Input and Output Component
c. Storage Component
Question 1
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Question 2
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 3
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Netw ork
Answer Layer controls the operations of the subnet, deciding which physical path
the data takes.
Question 4
Complete
Question text
a. Device Drivers
c. Operating System
Question 5
Complete
Flag question
Question text
It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:
c. Entertainment Software
d. Educational Software
Question 6
Complete
Flag question
Question text
c. TCP/IP Model
d. Network Topology
Question 8
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
Select one:
True
False
Question 9
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Service Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products.
Select one:
True
False
Question 10
Complete
Flag question
Question text
It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:
c. Mobile Applications
Question 11
Complete
Remove flag
Question text
a. MS Paint
b. Microsoft Visio
c. Microsoft Word
d. Notepad++
Question 13
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Information is the result of processing a raw data.
Select one:
True
False
Question 15
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Session
Answer Layer allows session establishment between processes running on
different stations
Question 16
Complete
Flag question
Question text
It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:
a. Pharming
b. Malware
c. Phishing
d. Spyware
Question 17
Complete
Remove flag
Question text
a. Oval
b. Rectangle
c. Circle
d. Cylinder
Question 18
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
It is used by the first IBM personal computer
as the Operating System
1981
Answer:
Question 19
Complete
Flag question
Question text
Select one:
a. network
b. digital device
c. expansion board
d. peripheral
Question 20
Complete
Question text
Which three components are most important in Gaming computer when it comes to
performance?
Select one:
Question 22
Complete
Flag question
Question text
Select one:
a. System Software
b. Application Software
Question 23
Complete
Flag question
Question text
b. How long does one reasonably expect the storage media to last
Question 24
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
One of the developer of the
ENIAC
1944
Answer:
Question 25
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Bell Labs
The use of UNIX spread around the country and initiallyAnswer gave it away free.
Question 26
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Processor is the heart and brain of the computer because without this computer cannot do
anything.
Select one:
True
False
Question 27
Complete
Flag question
Question text
It is a hacking activity wherein hackers make use of e-mail or other method to get secure
data from a person such as bank account number, username and password, security PIN
and or even credit card number.
Select one:
a. Malware
b. Spyware
c. Phishing
d. Pharming
Question 28
Complete
Flag question
Question text
Select one:
c. a faster battery
Question 29
Complete
Flag question
Question text
It is the term used to describe an individual’s anonymity and how safe they feel in a website
location.
Select one:
a. Defragmentation
b. Disk Cleanup
c. Computer Privacy
d. Software Update
Question 30
Complete
Question text
A system of tools that package up all three components into a single application so that we
can develop within.
Select one:
c. Spreadsheets
Question 31
Complete
Flag question
Question text
a. Client-Server Model
b. Peer-to-Peer Model
c. Business-to-Business Model
d. Machine-to-Machine Model
Question 32
Complete
Flag question
Question text
a. Adware
b. Driver
c. Patch
d. Ransomware
Question 33
Complete
Flag question
Question text
b. Simulation Software
c. Product Engineering Software
Question 34
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 35
Complete
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 36
Complete
Flag question
Question text
One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:
a. TCP/IP Model
b. Client-Server Model
c. Peer-to-Peer Model
d. OSI Model
Question 37
Complete
Flag question
Question text
This type of software includes a variety of PC utilities for managing and optimizing your
computer systems
Select one:
a. Device Drivers
b. Operating System
Question 38
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Blu-ray Disc is the next generation optical disc that can hold high-definition video due to its
high capacity.
Select one:
True
False
Question 39
Complete
Flag question
Question text
Question 40
Complete
Remove flag
Question text
A collection of computers and network resources connected via a network over a
geographic area.
Select one:
c. Home Network
Question 41
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 42
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 43
Complete
Flag question
Question text
Select one:
a. Charles Babbage
b. Simur Cray
c. Allen Turing
d. Augusta Adaming
Question 44
Complete
Flag question
Question text
Select one:
b.
How easy that device can be damaged
d.
Question 45
Complete
Flag question
Question text
a. Simulation Software
Question 46
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Software is a program that consists of step-by-step instructions that tells the computer how
to do its work.
Select one:
True
False
Question 47
Complete
Question text
A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:
a. Trojans
b. Rootkits
c. Worms
d. Key Loggers
Question 48
Complete
Flag question
Question text
Select one:
a. A computer engineer
d.
A network which brings people together
Question 49
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Read-Only Memory is a memory chip that stores information or data in it and usually data
written to or programmed to a ROM by the manufacturer or the computer engineer.
Select one:
True
False
Question 50
Complete
Flag question
Question text
b. Educational Software
c. Entertainment Software
Question 1
Complete
Flag question
Question text
d. Memory available to use while the computer is running for the operating system,
programs, and processes.
Question 2
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Grace Hopper develops the first
computer language
1953
Answer:
Question 3
Complete
Flag question
Question text
A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:
a. Objects
b. Field Names
c. Record
d. Normalization
Question 4
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Procedure is the guidelines for people to follow when using the software, hardware and
data.
Select one:
True
False
Question 6
Complete
Flag question
Question text
It is a category of Application Software that is related to content access software but has the
content and/or features adapted for use in by educators or students.
Select one:
a. Entertainment Software
c. Educational Software
Question 7
Complete
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the Lecture of Lesson 1.
1970
Answer:
Question 8
Complete
Flag question
Question text
How do you explain the CPU (Central Processing Unit) inside a computer?
Select one:
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 10
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1944
Answer:
Question 11
Complete
Flag question
Question text
Which of these governs the interaction process between the user and the operating system?
Select one:
a. User interface
b. Screen saver
c. Language translator
d. Platform
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Linus Torvalds
A college student in Finland,Answer , developed a version of UNIX as an
operating system for personal computer. He called it Linux.
Question 13
Complete
Flag question
Question text
c. Entertainment Software
d. Educational Software
Question 14
Complete
Question text
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Patch
b. Ransomware
c. Adware
d. Driver
Question 15
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1946
Answer:
Question 16
Complete
Flag question
Question text
Select one:
a. System Software
b. Application Software
Question 17
Complete
Flag question
Question text
Select one:
d. a faster battery
Question 18
Complete
Flag question
Question text
It is a type of software application that is used for surveillance wherein attackers make use
of this to record or gather the keystroke made by the users of the infected computer.
Select one:
a. Key Loggers
b. Rootkits
c. Trojans
d. Worms
Question 19
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Application
Answer Layer serves as the window for users and applications process to access
the network services.
Question 20
Complete
Flag question
Question text
d. Your computer slows down, as everything has to be loaded from the hard drive
Question 21
Complete
Flag question
Question text
b. Home Network
Question 22
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Data link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.
Question 24
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Service Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products.
Select one:
True
False
Question 25
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1975
Answer:
Question 26
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:
True
False
Question 27
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:
True
False
Question 28
Complete
Flag question
Question text
It is a category of Application Software that simulates physical or abstract system for
research, training or entertainment purposes.
Select one:
c. Simulation Software
Question 29
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:
True
False
Question 30
Complete
Question text
This are set of rules that governs a communication or the exchange of information.
Select one:
a. Connectivity
b. Architecture
c. Protocol
d. Standards
Question 31
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
True
False
Question 32
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium
Question 33
Complete
Flag question
Question text
It is a software application that brings potential harm to your computer because it disrupt
your computer operation by installing Trojan, viruses, worms, spyware, adware and other
software that does malicious intent.
Select one:
a. Phishing
b. Malware
c. Spyware
d. Pharming
Question 34
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 35
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 36
Complete
Flag question
Question text
It is a simple toggling property in the column of the table in MySQL or SQL that make the
field required.
Select one:
a. Not Null
b. Blank
c. Not Empty
d. Required
Question 37
Complete
Flag question
Question text
Select one:
c.
How easy that device can be damaged
Question 38
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 39
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What happens to the Main Memory / RAM data when we turn off the power?
Select one:
b.
All data is lost
Question 41
Complete
Flag question
Question text
It is a network created when two or more PCs are connected and share resources without
going through a separate server computer.
Select one:
a. Machine-to-Machine Model
b. Peer-to-Peer Model
c. Client-to-Server Model
d. Business-to-Business Model
Question 42
Complete
Flag question
Question text
a. DNS Server
b. Router
c. DHCP Server
d. Firewall
Question 43
Complete
Flag question
Question text
Question 44
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 45
Complete
Flag question
Question text
a. Cylinder
b. Rectangle
c. Circle
d. Oval
Question 47
Complete
Flag question
Question text
a. Patch
b. Ransomware
c. Driver
d. Adware
Question 48
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 49
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
Question 50
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.
Question 1
Complete
Flag question
Question text
This type of software includes a variety of PC utilities for managing and optimizing your
computer systems
Select one:
a. Device Drivers
b. Operating System
Question 2
Complete
Flag question
Question text
Select one:
a. It's quicker
b. Computers only read 1's and 0's because it's all they can do
Question 3
Complete
Flag question
Question text
Question 4
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
True
False
Question 5
Complete
Flag question
Question text
What happens to the Main Memory / RAM data when we turn off the power?
Select one:
a.
All data is lost
Question 6
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:
True
False
Question 7
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
Honey Pot is a software application that scans your whole computer’s hard drives and
folders for possible malware or virus infections.
Select one:
True
False
Question 8
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 10
Complete
Flag question
Question text
Select one:
a. Technology which contains all of a business' important information
c. A computer engineer
d.
A network which brings people together
Question 11
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:
True
False
Question 12
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Raw data are the unprocessed facts including text, numbers, images and sounds.
Select one:
True
False
Question 13
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 14
Complete
Question text
b. Performance
Question 15
Complete
Flag question
Question text
Select one:
Question 16
Complete
Flag question
Question text
It is a network created when two or more PCs are connected and share resources without
going through a separate server computer.
Select one:
a. Machine-to-Machine Model
b. Peer-to-Peer Model
c. Business-to-Business Model
d. Client-to-Server Model
Question 17
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:
True
False
Question 18
Complete
Flag question
Question text
c. Network Topology
d. TCP/IP Model
Question 19
Complete
Flag question
Question text
a.
Both computers have the same speed
b.
Minicomputer operates more efficiently than Microcomputer.
c.
The speeds of both of these machines cannot be compared to advanced speeds
d.
Microcomputer operate faster than minicomputer
Question 20
Complete
Flag question
Question text
Select one:
a. System Software
b. Application Software
Question 21
Complete
Flag question
Question text
b. Simulation Software
Question 23
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 24
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 25
Complete
Question text
a. Entertainment Software
b. Educational Software
Question 26
Complete
Flag question
Question text
It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:
a. Information
b. Data
c. Records
d. Database
Question 27
Complete
Flag question
Question text
One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:
a. OSI Model
b. TCP/IP Model
c. Peer-to-Peer Model
d. Client-Server Model
Question 28
Complete
Flag question
Question text
a. Peer-to-Peer Model
b. Client-Server Model
c. Business-to-Business Model
d. Machine-to-Machine Model
Question 29
Complete
Flag question
Question text
b. Entertainment Software
d. Educational Software
Question 30
Complete
Flag question
Question text
What is software?
Select one:
Question 31
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Blu-ray Disc is the next generation optical disc that can hold high-definition video due to its
high capacity.
Select one:
True
False
Question 32
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:
True
False
Question 33
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1981
Answer:
Question 34
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 35
Complete
Remove flag
Question text
One piece of information that you can use to identify exactly one record, with absolutel no
ambiguity.
Select one:
a. Natural Key
b. Primary Key
c. Foreign Key
d. Composite Key
Question 36
Complete
Flag question
Question text
It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:
a. Phishing
b. Malware
c. Pharming
d. Spyware
Question 37
Complete
Flag question
Question text
Choose Trueif the Statement is True and False if the statement is False
False
Question 38
Complete
Flag question
Question text
a. Simulation Software
Question 39
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Processor is the heart and brain of the computer because without this computer cannot do
anything.
Select one:
True
False
Question 40
Complete
Flag question
Question text
Select one:
c.
d.
How easy that device can be damaged
Question 41
Complete
Question text
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Patch
b. Adware
c. Ransomware
d. Driver
Question 42
Complete
Flag question
Question text
Flag question
Question text
a. Firewall
b. DNS Server
c. DHCP Server
d. Router
Question 44
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 45
Complete
Flag question
Question text
It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:
d. Mobile Applications
Question 46
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 47
Complete
Flag question
Question text
b. Home Network
Question 48
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and accessible
from a public cloud storage provider.
Select one:
True
False
Question 49
Complete
Remove flag
Question text
It is a language used to instruct the database management system, to create new tables, to
insert and update data, and to retrieve information across multiple tables.
Select one:
a. C-sharp
b. Java
Question 50
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1946
Answer:
Question 1
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:
True
False
Question 2
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.
Question 3
Complete
Flag question
Question text
d. Difficult to maintain, requiring multiple reads and writes to update records and keep
thing in sync.
Question 4
Complete
Flag question
Question text
It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:
a. Entertainment Software
d. Educational Software
Question 5
Complete
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1937
Answer:
Question 6
Complete
Flag question
Question text
It is a language used to instruct the database management system, to create new tables, to
insert and update data, and to retrieve information across multiple tables.
Select one:
a. Java
b. C-sharp
Question 7
Complete
Flag question
Question text
c. Simulation Software
Question 8
Complete
Flag question
Question text
a. Worms
b. Rootkits
c. Key Loggers
d. Trojans
Question 9
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 10
Complete
Flag question
Question text
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Patch
b. Adware
c. Ransomware
d. Driver
Question 11
Complete
Remove flag
Question text
a. Cardinality
b. Uniqueness
c. Entity
d. Link
Question 12
Complete
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium
Question 13
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Netw ork
Answer Layer controls the operations of the subnet, deciding which physical path
the data takes.
Question 14
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Data Link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.
Question 15
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
Select one:
True
False
Question 16
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Linux
Fedora is aAnswer based operating system developed and supported by the
Fedora Project as a partnership with Red Hat and volunteer contributors.
Question 18
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 19
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:
True
False
Question 20
Complete
Remove flag
Question text
Which of the following are not included in the Database Development Life Cycle?
Select one:
a. Planning
b. Testing
c. Requirement Gathering
d. Logical Design
Question 21
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Transport
Answer Layer ensures that message are delivered error-free in sequence and
with no losses or duplications.
Question 22
Complete
Flag question
Question text
It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:
a. Mobile Applications
Question 23
Complete
Question text
It is a network created when two or more PCs are connected and share resources without
going through a separate server computer.
Select one:
a. Machine-to-Machine Model
b. Client-to-Server Model
c. Peer-to-Peer Model
d. Business-to-Business Model
Question 24
Complete
Flag question
Question text
b. Operating System
d. Device Drivers
Question 25
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 26
Complete
Remove flag
Question text
b. Plus
c. Concatenation
d. Adding
Question 27
Complete
Flag question
Question text
One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:
a. OSI Model
b. Client-Server Model
c. TCP/IP Model
d. Peer-to-Peer Model
Question 28
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 29
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Session
Answer Layer allows session establishment between processes running on
different stations
Question 30
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 31
Complete
Flag question
Question text
d. Simulation Software
Question 32
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A type of wireless transmission that uses electromagnetic waves to transmit data through
air. Transmission is usually measured in Hertz and One Hertz is equivalent to one cycle per
second.
Select one:
a. Infrared
b. Radio Frequency
c. Fiber-Optic
d. Satellite
Question 33
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:
True
False
Question 34
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 35
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Laser Printers are printers that used the same technology as to photocopying machines. It
uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:
True
False
Question 36
Complete
Flag question
Question text
A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:
a. Field Names
b. Objects
c. Normalization
d. Record
Question 37
Complete
Question text
Fill in the Blanks: Write the correct word to complete the statement.
mobile operating s
AAnswer is a software that allows smartphones, tablet PCs and other devices
to run applications and programs.
Question 38
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:
True
False
Question 39
Complete
Question text
It is a software application that brings potential harm to your computer because it disrupt
your computer operation by installing Trojan, viruses, worms, spyware, adware and other
software that does malicious intent.
Select one:
a. Malware
b. Phishing
c. Pharming
d. Spyware
Question 40
Complete
Flag question
Question text
It is a category of Application Software that generates print and electronic media for other
to consume, most often in a commercial or educational settings.
Select one:
a. Simulation Software
Question 41
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
True
False
Question 42
Complete
Flag question
Question text
It is a category of Application Software that is related to content access software but has the
content and/or features adapted for use in by educators or students.
Select one:
c. Entertainment Software
Question 43
Complete
Flag question
Question text
c. Educational Software
d. Entertainment Software
Question 44
Complete
Flag question
Question text
a. System Software
b. Application Software
Question 45
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Serial Advanced Technology Attachment (SATA) Hard Disk is a standard electronic interface
used between a computer motherboard’s data paths or bus and the computer’s disk storage
devices.
Select one:
True
False
Question 46
Complete
Question text
a. Router
b. Firewall
c. DNS Server
d. DHCP Server
Question 47
Complete
Flag question
Question text
Choose Trueif the Statement is True and False if the statement is False
True
False
Question 48
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:
a. Phishing
b. Pharming
c. Malware
d. Spyware
Question 49
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1970
Answer:
Question 50
Complete
Flag question
Question text
a. TCP/IP Model
b. Client-Server Model
c. OSI Model
d. Peer-to-Peer Model
Question 1
Complete
Flag question
Question text
It is an additional type of Database that is useful in any database design because they help
support the business rules that you established while gathering the requirements for the
system.
Select one:
a. Information Table
b. Address Table
c. Data Table
d. Lookup Table
Question 2
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
People are the commonly overlook part of the information system. And the reason why
systems are created is to make end-user (people) more productive.
Select one:
True
False
Question 3
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Data link
Answer Layer provides error-free transfer of data frames from one node to
another over Physical layer.
Question 4
Complete
Remove flag
Question text
What do you call the user groups that will need to interact with the new system?
Select one:
a. Actor
b. Staff
c. Vendor
d. Proponents
Question 5
Complete
Flag question
Question text
It is a category of Application Software that allows the user to create and manage
information, usually for individual projects within a department, in contrast to enterprise
management.
Select one:
a. Content Access Software
b. Educational Software
d. Entertainment Software
Question 6
Complete
Flag question
Question text
Select one:
a.
A network which brings people together
d. A computer engineer
Question 7
Complete
Remove flag
Question text
Which of the following is NOT a characteristic of Relational database?
Select one:
b. Values inside a table are atomic and cannot or should not be split apart into smaller
components
Question 8
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Session
Answer Layer allows session establishment between processes running on
different stations
Question 9
Complete
Flag question
Question text
It is the metal and plastic box which contains the computer's main components including
the motherboard, central processing unit ( CPU), and power supply.
Select one:
a. Keyboard
b. Computer Case
c. Mouse
d. Monitor
Question 10
Complete
Flag question
Question text
a. PostgreSQL
b. Oracle
c. Python
d. MySQL
Question 11
Complete
Question text
It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:
a. Phishing
b. Malware
c. Spyware
d. Pharming
Question 12
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1946
Answer:
Question 13
Complete
Flag question
Question text
a. Memory available to use while the computer is running for the operating system,
programs, and processes.
Question 14
Complete
Flag question
Question text
It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:
a. Database
b. Information
c. Data
d. Records
Question 15
Complete
Flag question
Question text
Which of these governs the interaction process between the user and the operating system?
Select one:
a. Platform
b. Language translator
c. User interface
d. Screen saver
Question 16
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Service Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products.
Select one:
True
False
Question 17
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1944
Answer:
Question 18
Complete
Question text
d. Your computer slows down, as everything has to be loaded from the hard drive
Question 19
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Question 20
Complete
Flag question
Question text
Desktop Computer is a personal computer which can be moved easily and used in a variety
of locations.
Select one:
True
False
Question 21
Complete
Flag question
Question text
Select one:
Question 22
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 23
Complete
Flag question
Question text
It is a network created when two or more PCs are connected and share resources without
going through a separate server computer.
Select one:
a. Client-to-Server Model
b. Business-to-Business Model
c. Peer-to-Peer Model
d. Machine-to-Machine Model
Question 24
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 25
Complete
Flag question
Question text
It is a type of software application that is used for surveillance wherein attackers make use
of this to record or gather the keystroke made by the users of the infected computer.
Select one:
a. Worms
b. Rootkits
c. Key Loggers
d. Trojans
Question 26
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
Question 27
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Network Security is the process of taking physical and software preventative measure to
protect the underlying networking infrastructure from unauthorized access, misuse,
malfunctions, modification, destruction or improper disclosure, thereby creating a secure
platform for computers, users and programs to perform their permitted critical functions
within a secure environment.
Select one:
True
False
Question 28
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Blackcomb
Windows 7 (codename:Answer ) is a personal computer operating system and
was released to manufacturing on July 22, 2009.
Question 29
Complete
Flag question
Question text
Which of the following are not included in the Database Development Life Cycle?
Select one:
a. Logical Design
b. Testing
c. Requirement Gathering
d. Planning
Question 30
Complete
Flag question
Question text
It will be the guidepost that the database designer can always refer back to in order to make
sure that the development process is proceeding on course.
Select one:
a. Policy
b. Scopes and Limitations
d. Mission Statement
Question 31
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
Select one:
True
False
Question 32
Complete
Flag question
Question text
a. System Software
b. Application Software
Question 33
Complete
Flag question
Question text
a. Circle
b. Rectangle
c. Oval
d. Cylinder
Question 34
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Personal Cloud storage is the combination of public and private cloud storage where some
critical data resides in the enterprise’s private cloud while other data is stored and accessible
from a public cloud storage provider.
Select one:
True
False
Question 35
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Question 36
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.
Select one:
True
False
Question 37
Complete
Flag question
Question text
A type of wireless transmission that uses electromagnetic waves to transmit data through
air. Transmission is usually measured in Hertz and One Hertz is equivalent to one cycle per
second.
Select one:
a. Infrared
b. Satellite
c. Fiber-Optic
d. Radio Frequency
Question 38
Complete
Flag question
Question text
b. Entertainment Software
c. Educational Software
Question 39
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Firewall is the process of converting a data or information into another form also known as
cipher text.
Select one:
True
False
Question 40
Complete
Question text
Select one:
a. Application Software
b. System Software
Question 41
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Raw data are the unprocessed facts including text, numbers, images and sounds.
Select one:
True
False
Question 42
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1937
Answer:
Question 43
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Presentation
Answer Layer formats the data to be presented to application layer. It can be
viewed as the translator for the network
Question 44
Complete
Mark 1.00 out of 1.00
Flag question
Question text
a. Microsoft Visio
b. MS Paint
c. Notepad++
d. Microsoft Word
Question 45
Complete
Flag question
Question text
It is a category of Application Software that is related to content access software but has the
content and/or features adapted for use in by educators or students.
Select one:
a. Entertainment Software
b. Educational Software
Flag question
Question text
a. TCP/IP Model
b. Peer-to-Peer Model
c. Client-Server Model
d. OSI Model
Question 47
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Massachusetts Institute of Technology in 1960’s had a time sharing operating system they
MULTICS
calledAnswer .
Question 48
Complete
Flag question
Question text
Select one:
b. a faster battery
Question 49
Complete
Flag question
Question text
A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:
a. Trojans
b. Rootkits
c. Worms
d. Key Loggers
Question 50
Complete
Flag question
Question text
Select one:
a. System Software
b. Application Software
Question 1
Complete
Flag question
Question text
b. Flash Drive
c. Scanner
d. Keyboard
Question 2
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 3
Complete
Flag question
Question text
a. MS Paint
b. Microsoft Visio
c. Microsoft Word
d. Notepad++
Question 4
Complete
Flag question
Question text
Select one:
b. Computers only read 1's and 0's because it's all they can do
d. It's quicker
Question 5
Complete
Question text
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Adware
b. Patch
c. Ransomware
d. Driver
Question 6
Complete
Flag question
Question text
Select one:
a. a faster battery
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 8
Complete
Flag question
Question text
A Type of Network that is being utilized nowadays by individuals for their homes and
apartments. This network allows all users to connect and share resources.
Select one:
d. Home Network
Question 9
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the Lecture of Lesson 1.
1970
Answer:
Question 10
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 11
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 12
Complete
Question text
a. DNS Server
b. Router
c. DHCP Server
d. Firewall
Question 13
Complete
Flag question
Question text
c. Simulation Software
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 15
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.
Select one:
True
False
Question 16
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 17
Complete
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 18
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Shugart leads the creation of this
external storage
1971
Answer:
Question 19
Complete
Flag question
Question text
A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:
a. Worms
b. Rootkits
c. Trojans
d. Key Loggers
Question 21
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 22
Complete
Flag question
Question text
It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it to
the attacker or the hacker.
Select one:
a. Pharming
b. Malware
c. Phishing
d. Spyware
Question 23
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Bell Labs
The use of UNIX spread around the country and initiallyAnswer gave it away free.
Question 24
Complete
Flag question
Question text
b. Entertainment Software
c. Educational Software
Question 25
Complete
Question text
These can be used for connecting almost any computer type including mice, keyboards,
printers, and digital cameras.
Select one:
a. Monitor Port
b. Audio Out
c. Audio In
d. USB Port
Question 26
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:
True
False
Question 27
Complete
Flag question
Question text
It is a language used to instruct the database management system, to create new tables, to
insert and update data, and to retrieve information across multiple tables.
Select one:
b. Java
c. C-sharp
Question 28
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Bootstrap Loader is a part of the BIOS that test the computer hardware and make sure that
no errors exist before loading the operating system.
Select one:
True
False
Question 29
Complete
Flag question
Question text
It is the fast-growing area of crime because more and more criminals are exploiting the
speed, convenience and anonymity of the internet to commit a diverse range of criminal
activities.
Select one:
a. Cyber Crime
b. Backup
c. Ethical Hacking
d. Disk Cleanup
Question 30
Complete
Flag question
Question text
It is the term used to describe an individual’s anonymity and how safe they feel in a website
location.
Select one:
a. Defragmentation
b. Computer Privacy
c. Software Update
d. Disk Cleanup
Question 31
Complete
Flag question
Question text
What happens to the Main Memory / RAM data when we turn off the power?
Select one:
d.
All data is lost
Question 32
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:
True
False
Question 33
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
session
Answer Layer allows session establishment between processes running on
different stations
Question 34
Complete
Question text
b. Educational Software
d. Entertainment Software
Question 35
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 36
Complete
Flag question
Question text
This hardware is commonly known as the Layer 3 Hardware because it uses logical
addresses to forward the information from the sender to its destination.
Select one:
a. DNS Server
b. Firewall
c. Router
d. DHCP Server
Question 37
Complete
Flag question
Question text
Identify whether the said program is a System Software or an Application Software.
Select one:
a. System Software
b. Application Software
Question 38
Complete
Flag question
Question text
a. How long does one reasonably expect the storage media to last
Question 39
Complete
Question text
What type of computers in a client-server system are client computers (most of the time).
Select one:
a.
Minicomputer
b.
Mainframe
c.
PDA
d.
Microcomputer
Question 40
Complete
Flag question
Question text
a. Oracle
b. MySQL
c. PostgreSQL
d. Python
Question 41
Complete
Flag question
Question text
It is a collection of individual data items that are stored in a highly structured way that
represetnts a model of reality.
Select one:
a. Data
b. Database
c. Information
d. Records
Question 42
Complete
Flag question
Question text
a. Application Software
b. System Software
Question 43
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.
Question 44
Complete
Flag question
Question text
Question 45
Complete
Flag question
Question text
It is the metal and plastic box which contains the computer's main components including
the motherboard, central processing unit ( CPU), and power supply.
Select one:
a. Keyboard
b. Computer Case
c. Mouse
d. Monitor
Question 46
Complete
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Ubuntu
Answer is an open source Debian-based Linux distribution sponsored by
Canonical Ltd.
Question 47
Complete
Flag question
Question text
One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:
a. OSI Model
b. TCP/IP Model
c. Client-Server Model
d. Peer-to-Peer Model
Question 48
Complete
Question text
It is the process of copying and archiving the computer data so that it may be used to
restore its original data after a data loss event.
Select one:
a. Software Update
b. Disk Cleanup
c. Defragmentation
d. Back-up
Question 49
Complete
Flag question
Question text
c. Memory available to use while the computer is running for the operating system,
programs, and processes.
Flag question
Question text
c. Operating System
d. Device Drivers
Question 1
Complete
Flag question
Question text
Select one:
a.
USB Port
b.
Power Button
c.
Serial Port
d.
Ethernet Port
Question 2
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Software and Hardware manufacturer provides procedure manuals for their products and it
can be in printed or electronic copy.
Select one:
True
False
Question 3
Complete
Question text
What is software?
Select one:
Question 4
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 5
Complete
Flag question
Question text
It is a type of software application that is used for surveillance wherein attackers make use
of this to record or gather the keystroke made by the users of the infected computer.
Select one:
a. Key Loggers
b. Rootkits
c. Worms
d. Trojans
Question 6
Complete
Flag question
Question text
It is a language used to instruct the database management system, to create new tables, to
insert and update data, and to retrieve information across multiple tables.
Select one:
b. Java
c. C-sharp
Question 7
Complete
Flag question
Question text
It is a hacking activity that redirects the website visitor from their legitimate websites into
fraudulent website without them knowing it.
Select one:
a. Phishing
b. Malware
c. Spyware
d. Pharming
Question 8
Complete
Question text
What happens to the Main Memory / RAM data when we turn off the power?
Select one:
a.
All data is lost
Question 9
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the Lecture of Lesson 1.
1970
Answer:
Question 10
Complete
Flag question
Question text
d. Memory available to use while the computer is running for the operating system,
programs, and processes.
Question 11
Complete
Flag question
Question text
a. Rootkits
b. Key Loggers
c. Worms
d. Trojans
Question 12
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1953
Answer:
Question 13
Complete
Flag question
Question text
a. DNS Server
b. Router
c. DHCP Server
d. Firewall
Question 14
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Netw ork
Answer Layer controls the operations of the subnet, deciding which physical path
the data takes.
Question 15
Complete
Flag question
Question text
A maintenance utility included in Microsoft Windows that is used to free up disk spaces on
the computer hard drive.
Select one:
a. Software Updates
b. Defragmentation
c. Disk Cleanup
d. Backup
Question 16
Complete
Flag question
Question text
a. Microsoft Visio
b. Microsoft Word
c. Notepad++
d. MS Paint
Question 17
Complete
Flag question
Question text
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Patch
b. Ransomware
c. Adware
d. Driver
Question 18
Complete
Flag question
Question text
a. Business-to-Business Model
b. Machine-to-Machine Model
c. Client-Server Model
d. Peer-to-Peer Model
Question 19
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Linux
Fedora is aAnswer based operating system developed and supported by the
Fedora Project as a partnership with Red Hat and volunteer contributors.
Question 20
Complete
Flag question
Question text
One of the greatest contribution of ISO in the Computer networking industry because it is
used by company as their references.
Select one:
a. OSI Model
b. Client-Server Model
c. TCP/IP Model
d. Peer-to-Peer Model
Question 21
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 22
Complete
Flag question
Question text
Select one:
a. Charles Babbage
b. Allen Turing
c. Augusta Adaming
d. Simur Cray
Question 23
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It is the main program running on a computer. It manages the memory and processes of the
computer, and all of its software and hardware.
Select one:
a.
Hardware
b.
Software
c.
Operating System
d.
Application Software
Question 24
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Information Technology is just a part of an Information System and Information Technology
is much more focus in the use of the said computer technology.
Select one:
True
False
Question 25
Complete
Flag question
Question text
Select one:
a. A computer engineer
d.
A network which brings people together
Question 26
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Honey Net is the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders.
Select one:
True
False
Question 27
Complete
Flag question
Question text
Select one:
a.
science, technology, engineering, math
b.
state hypothesis, collect data, test, and conclude
c.
input, process, output, store
d.
prophase, metaphase, anaphase, telophase
Question 28
Complete
Mark 1.00 out of 1.00
Flag question
Question text
What do you call the user groups that will need to interact with the new system?
Select one:
a. Vendor
b. Proponents
c. Staff
d. Actor
Question 29
Complete
Flag question
Question text
How do you explain the CPU (Central Processing Unit) inside a computer?
Select one:
Question 30
Complete
Flag question
Question text
a. Simulation Software
Question 31
Complete
Flag question
Question text
a. Python
b. MySQL
c. PostgreSQL
d. Oracle
Question 32
Complete
Flag question
Question text
a. TCP/IP Model
b. Network Topology
Question 33
Complete
Flag question
Question text
Choose Trueif the Statement is True and False if the statement is False
Information Technology involves the development, maintenance and use of computer
systems, software and networks for the processing and distribution of data.
Select one:
True
False
Question 34
Complete
Flag question
Question text
Which of these governs the interaction process between the user and the operating system?
Select one:
a. Platform
b. User interface
c. Language translator
d. Screen saver
Question 35
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Whistler
Windows XP (codename:Answer ) is a personal computer operating system
produced by Microsoft as part of the Windows NT Family of operating system.
Question 36
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 37
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Laser Printers are printers that used the same technology as to photocopying machines. It
uses a laser light beam to produce images with excellent letter and graphics quality.
Select one:
True
False
Question 38
Complete
Flag question
Question text
This hardware is commonly known as the Layer 3 Hardware because it uses logical
addresses to forward the information from the sender to its destination.
Select one:
a. Firewall
b. Router
c. DHCP Server
d. DNS Server
Question 39
Complete
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
Application
Answer Layer serves as the window for users and applications process to access
the network services.
Question 40
Complete
Flag question
Question text
a. Performance
Question 41
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
True
False
Question 42
Complete
Flag question
Question text
It is the process of copying and archiving the computer data so that it may be used to
restore its original data after a data loss event.
Select one:
a. Software Update
b. Back-up
c. Defragmentation
d. Disk Cleanup
Question 43
Complete
Flag question
Question text
Which of the following are not included in the Database Development Life Cycle?
Select one:
a. Requirement Gathering
b. Logical Design
c. Testing
d. Planning
Question 44
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Build the first computer that does
simultaneous solving of equations
1937
Answer:
Question 45
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
mobile operating s
AAnswer is a software that allows smartphones, tablet PCs and other devices
to run applications and programs.
Question 46
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 47
Complete
Flag question
Question text
a. Values inside a table are atomic and cannot or should not be split apart into smaller
components
Question 48
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:
a. Objects
b. Record
c. Normalization
d. Field Names
Question 49
Complete
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
Designs the Punch Card System
1890
Answer:
Question 50
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Blue
Windows 8.1 (codename:Answer ) is an upgrade for Windows 8, a version of
Windows NT, a computer operating system released by Microsoft.
Question 1
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Bell Labs
The use of UNIX spread around the country and initiallyAnswer gave it away free.
Question 2
Complete
Flag question
Question text
It is a special type of application that prevents its user to access the computer system
without paying its creator or subscribing/buying to its creator’s product or services.
Select one:
a. Ransomware
b. Adware
c. Patch
d. Driver
Question 3
Complete
Flag question
Question text
a. DNS Server
b. DHCP Server
c. Firewall
d. Router
Question 4
Complete
Flag question
Question text
a. Patch
b. Ransomware
c. Adware
d. Driver
Question 5
Complete
Flag question
Question text
It is a category of Application Software that is used primarily to access a content without
editing but may include software that allows for content editing.
Select one:
c. Entertainment Software
d. Educational Software
Question 6
Complete
Flag question
Question text
a. Link
b. Entity
c. Uniqueness
d. Cardinality
Question 7
Complete
Question text
Select one:
a. Simur Cray
b. Allen Turing
c. Augusta Adaming
d. Charles Babbage
Question 8
Complete
Flag question
Question text
Select one:
a. Application Software
b. System Software
Question 9
Complete
Flag question
Question text
A Type of Network that is being utilized nowadays by individuals for their homes and
apartments. This network allows all users to connect and share resources.
Select one:
a. Home Network
Question 10
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
60
Answer Million of Windows 8 licenses have been sold through January 2013, a
number which includes both upgrades and sales to OEM for new PCs.
Question 11
Complete
Flag question
Question text
It is a software application installed in your computer that is spying in your data, meaning
this software gets information from your computer without you knowing it and sends it to
the attacker or the hacker.
Select one:
a. Malware
b. Pharming
c. Phishing
d. Spyware
Question 12
Complete
Flag question
Question text
Select one:
a.
Modem
b.
CD Drive
c.
NIC Card
d.
Joystick
Question 13
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
Procedure is the guidelines for people to follow when using the software, hardware and
data.
Select one:
True
False
Question 14
Complete
Flag question
Question text
Which of the following stores output from a computer:
Select one:
a. Keyboard
c. Flash Drive
d. Scanner
Question 15
Complete
Flag question
Question text
What is software?
Select one:
Question 16
Complete
Question text
a. Cylinder
b. Rectangle
c. Oval
d. Circle
Question 17
Complete
Flag question
Question text
Select one:
a.
science, technology, engineering, math
b.
state hypothesis, collect data, test, and conclude
c.
prophase, metaphase, anaphase, telophase
d.
input, process, output, store
Question 18
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Copywright is a legal right credited by law of a country that grants the creator of an original
work exclusive rights to its use and distribution, usually for a limited time.
Select one:
True
False
Question 19
Complete
Flag question
Question text
a. System Software
b. Application Software
Question 20
Complete
Flag question
Question text
Select one:
Question 21
Complete
Question text
Choose True if the Statement is True and False if the statement is False.
Processor is the heart and brain of the computer because without this computer cannot do
anything.
Select one:
True
False
Question 22
Complete
Flag question
Question text
a. PostgreSQL
b. Python
c. MySQL
d. Oracle
Question 23
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Using the picture and the clue given, Guess the Proper Year it is appropriated to, Based on
the lecture of Lesson 1.
1953
Answer:
Question 24
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 25
Complete
Flag question
Question text
It is the main program running on a computer. It manages the memory and processes of the
computer, and all of its software and hardware.
Select one:
a.
Application Software
b.
Hardware
c.
Software
d.
Operating System
Question 26
Complete
Question text
This are set of rules that governs a communication or the exchange of information.
Select one:
a. Connectivity
b. Standards
c. Architecture
d. Protocol
Question 27
Complete
Flag question
Question text
Which of these governs the interaction process between the user and the operating system?
Select one:
a. Language translator
b. Platform
c. Screen saver
d. User interface
Question 28
Complete
Flag question
Question text
What type of computers in a client-server system are client computers (most of the time).
Select one:
a.
PDA
b.
Minicomputer
c.
Microcomputer
d.
Mainframe
Question 29
Complete
Flag question
Question text
Desktop Computer is a personal computer which can be moved easily and used in a variety
of locations.
Select one:
True
False
Question 30
Complete
Flag question
Question text
Fill in the Blanks: Write the missing word to complete the sentence.
physical
Answer Layer is concerned with the transmission and reception of the
unstructured raw bit stream over the physical medium
Question 31
Complete
Flag question
Question text
A special type of software that is used to hide malware, bots and worms. This software
should be installed in the target computer.
Select one:
a. Trojans
b. Key Loggers
c. Worms
d. Rootkits
Question 32
Complete
Flag question
Question text
Fill in the Blanks: Write the correct word to complete the statement.
Whistler
Windows XP (codename:Answer ) is a personal computer operating system
produced by Microsoft as part of the Windows NT Family of operating system.
Question 33
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Computer Security is very important to learn because it enables the people to carry out their
jobs, education and research, it supports critical business process and lastly it protects
personal and sensitive information.
Select one:
True
False
Question 34
Complete
Flag question
Question text
It is the metal and plastic box which contains the computer's main components including
the motherboard, central processing unit ( CPU), and power supply.
Select one:
a. Mouse
b. Keyboard
c. Monitor
d. Computer Case
Question 35
Complete
Flag question
Question text
A Type of Wireless Area Network that works within a very small area – your immediate
surroundings.
Select one:
Question 36
Complete
Flag question
Question text
Identify the following whether it is a System Unit, Input and Output or Storage Component.
Choose whether the said Picture is a System Unit Component, Input and Output
Components or Storage Components.
Select one:
c. Storage Component
Question 37
Complete
Flag question
Question text
It is a category of Application Software that is related to content access software but has the
content and/or features adapted for use in by educators or students.
Select one:
c. Entertainment Software
d. Educational Software
Question 38
Complete
Flag question
Question text
Graphical User Interface ( GUI) has made computers easier to use because:
Select one:
Question 39
Complete
Flag question
Question text
It is a category of Application Software that are originally offered for general productivity
and information retrieval including email, calendar, contacts, stock market and weather
information
Select one:
b. Mobile Applications
Question 40
Complete
Flag question
Question text
It is a category of Application Software that simulates physical or abstract system for
research, training or entertainment purposes.
Select one:
b. Simulation Software
Question 41
Complete
Flag question
Question text
It is a type of software that operates and controls a particular type of device that is attached
to a computer.
Select one:
b. Operating System
d. Device Drivers
Question 42
Complete
Question text
a. Operating System
d. Device Drivers
Question 43
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False
True
False
Question 44
Complete
Mark 1.00 out of 1.00
Flag question
Question text
A series of rules that your databases table structure must pass in order to be considered a
good relational design.
Select one:
a. Normalization
b. Field Names
c. Record
d. Objects
Question 45
Complete
Flag question
Question text
b. How long does one reasonably expect the storage media to last
Flag question
Question text
a. Joining
b. Concatenation
c. Plus
d. Adding
Question 49
Complete
Flag question
Question text
Question 50
Complete
Flag question
Question text
Choose True if the Statement is True and False if the statement is False.
Service Pack or Updates are piece of software release by software vendors, mainly to
address security vulnerabilities in their existing products.
Select one:
True
False