subject

1. Software used to search a database using keywords or phrases entered by the user. A) Navigation Tracking
B) Network
C) Search Engine
D) Ethernet Cable

2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly.

A) Antivirus application
B) Ethernet cable
C) Computer virus
D) HTML

3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.

A) Modem
B) USB
C) Intranet
D) Desktop Interface

4. software that the owner maintains exclusive control over how it is modified and distributed

A) proprietary
B) navigation tracking
C) Spyware
D) operating system

5. set of principles that help users determine what is right or wrong in regards to computers.

A) modem
B) HTML
C) navigation tracking
D) Computer ethics

6. spyware that manages all of the installed applications and hardware on a computer or device.

A) Computer virus
B) operating system
C) citation
D) HTML

7. physical components of a computer system such as computer, mouse, or modem.

A) software
B) Network
C) browser
D) hardware

8. A malicious software program that spies on the user and share the information with a third-party.

A) antivirus application
B) malware
C) spyware
D) Desktop interface

9. icons and menus on the computer that allow the user to interact with the operating system.

A) Desktop interface
B) intranet
C) navigation tracking
D) Computer ethics

10. A tool that provides directions using satellites

A) asynchronous communication
B) navigation tracking
C) Ethernet cable
D) HTML

11. A restricted private network used by organizations to communicate.

A) asynchronous communication
B) navigation tracking
C) intranet
D) browser

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 13:00
Which part of the cpu accepts data?
Answers: 1
question
Computers and Technology, 24.06.2019 00:30
Afiling system in which an intermediary source of reference, such as a file card, must be consulted to locate specific files is called a(n) system. a. shelf filing b. direct filing c. indirect filing d. shingling
Answers: 1
question
Computers and Technology, 24.06.2019 15:00
In excel, what happens to the cell contents when you click and drag a cell into multiple cells?
Answers: 1
question
Computers and Technology, 24.06.2019 21:30
Suppose a router has built up the routing table shown in the table. subnet number 128.96.39.00 28.96.39.128 128.96.40.00 192.4.153.0 default) subnet mask 255.255.255.128 255.255.255.128 255.255.255.128 255.255.255.192 nexthop interface 0 interface 1 r2 r3 r4. the router can deliver packets directly over interfaces 0 and 1, or it can forward packets to routers r2, r3, or r4. describe what the router does with a packet addressed to each of the following destinations: (a) 128.96.39.10 (b) 128.96.40.12 (c) 128.96.40.151 (d) 192.4.153.17 (e) 192.4.153.90
Answers: 3
You know the right answer?
1. Software used to search a database using keywords or phrases entered by the user. A) Navigation...
Questions
question
Mathematics, 25.03.2021 18:50
question
Arts, 25.03.2021 18:50
question
Mathematics, 25.03.2021 18:50
question
Mathematics, 25.03.2021 18:50
Questions on the website: 13722363