This document appears to be a quiz containing questions about basic computer hardware and software components. It asks the student to identify the function of a computer mouse, the software needed to create slideshows, whether a microphone is an input device, whether a scanner is an output device, and to identify a logo. The document also collects the student's name, grade level, section, and contact number at the top.
This document appears to be a quiz containing questions about basic computer hardware and software components. It asks the student to identify the function of a computer mouse, the software needed to create slideshows, whether a microphone is an input device, whether a scanner is an output device, and to identify a logo. The document also collects the student's name, grade level, section, and contact number at the top.
This document appears to be a quiz containing questions about basic computer hardware and software components. It asks the student to identify the function of a computer mouse, the software needed to create slideshows, whether a microphone is an input device, whether a scanner is an output device, and to identify a logo. The document also collects the student's name, grade level, section, and contact number at the top.
a) To move a cursor b) Keep your computer clean and save c) Make a sound d) To show an output
2. What software is needed to create slideshows?
a) answer choices b) Microsoft Words c) Windows XP d) Microsoft Powerpoint Presentation
3. A microphone is used an input device.
a) True b) False 4. A scanner is an output device. a) True b) False 5. What is this logo? a. Linux b. Android Using the image, answer the following questions
What thoughts and feelings immediately come to mind when you look at this photo?
Describe exactly what you see in this photo?
What does this image remind you of in your life?
Video Reflection What do you think of this video? Hate it – Love it
Kali Linux - An Ethical Hacker's Cookbook - Second Edition: Practical recipes that combine strategies, attacks, and tools for advanced penetration testing, 2nd Edition