subject

Question 1 (2 points) Saved
A structured set of data held in a computer, especially one that is accessible in various ways�
Question 1 options:

Personally Identifiable Information (PII)

Database

Parameter

Server
Question 2 (2 points)
An effective goal is SMART: Specific, Measurable, Achievable, Relevant, and Timed.
Question 2 options:
True
False
Question 3 (2 points)
Software that is used to detect and eliminate computer viruses.
Question 3 options:

Wi-Fi

Cable Internet

Antivirus Application

Browser
Question 4 (2 points)
Any data that could potentially identify a specific individual�
Question 4 options:

Personally Identifiable Information (PII)

Database

Parameter

Server
Question 5 (2 points)
A device that translates analog carrier signals to encode and decode digital information.
Question 5 options:

USB

Computer Virus

Intranet

Modem
Question 6 (2 points)
Copyright law is a set of laws that protects the right to control the use of creative, literary, or artistic work.
Question 6 options:
True
False
Question 7 (2 points)
IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Question 7 options:
True
False
Question 8 (2 points)
Transferable skills are skills that are specific to a job and are usually a requirement for obtaining that job.
Question 8 options:
True
False
Question 9 (2 points)
Technical skills are also called soft skills.
Question 9 options:
True
False
Question 10 (2 points)
A professional is someone who uses education and acquired skills to earn money in a career.
Question 10 options:
True
False
Question 11 (2 points)
Lacking in movement, action, or change, especially in a way viewed as undesirable or uninteresting�
Question 11 options:

Malicious

Algorithm

Static

Web Browser
Question 12 (2 points)
Computers that are connected through cable or Wi-Fi to share resources.
Question 12 options:

Network

Spyware

Modem

Asynchronous Communication
Question 13 (2 points)
A network of computers that provides access to information on the web.
Question 13 options:

Phishing

Internet

Antivirus Application

Modem
Question 14 (2 points)
A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:

Malicious

Algorithm

Static

Web Browser
Question 15 (2 points)
A means of giving credit to a source when their information is used.
Question 15 options:

Citation

Wi-Fi

Asynchronous Communication

Malware
Question 16 (2 points)
An IT security threat is anything that might cause serious harm to a computer system.
Question 16 options:
True
False
Question 17 (2 points)
A first, typical, or preliminary model of something from which other forms are developed or copied...
Question 17 options:

Compatibility

Prototype

Packet

Static
Question 18 (2 points)
A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:

Compatibility

Prototype

Packet

Static
Question 19 (2 points)
Information technology is the systems such as computers and telecommunications, used for storing, retrieving, and exchanging information.
Question 19 options:
True
False
Question 20 (2 points)
IT law is a branch of law that provides a legal framework for collecting, storing, and distributing electronic information.
Question 20 options:
True
False
Question 21 (2 points)
A software application for accessing information on the World Wide Web...
Question 21 options:

Malicious

Algorithm

Static

Web Browser
Question 22 (2 points)
A portfolio is a collection of materials that demonstrates your skills, abilities, achievements, and potential.
Question 22 options:
True
False
Question 23 (2 points)
Time management is the ability to use time effectively.
Question 23 options:
True
False
Question 24 (2 points)
This is used to mark a web pages structure using tags so that the web browser displays the content correctly.
Question 24 options:

Antivirus Application

Ethernet Cable

Computer Virus

HTML
Question 25 (2 points)
Physical components of a computer system such as a keyboard, mouse, or modem.
Question 25 options:

Software

Network

Browser

Hardware

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 22:20
What is a programming method that provides for interactive modules to a website?
Answers: 1
question
Computers and Technology, 24.06.2019 17:40
When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. this can be done by normalizing to values between 0 and 1, or throwing away outliers. for this program, adjust the values by subtracting the smallest value from all the values. the input begins with an integer indicating the number of integers that follow. ex: if the input is 5 30 50 10 70 65, the output is: 20 40 0 60 55
Answers: 1
question
Computers and Technology, 25.06.2019 14:00
Suppose we are performing a binary search on a sorted array called numbers initialized as follows: // index 0 1 2 3 4 5 6 7 8 9 10 11 12 13 int[] numbers = {-2, 0, 1, 7, 9, 16, 19, 28, 31, 40, 52, 68, 85, 99}; // search for the value 5 int index = binarysearch(numbers, 5); write the indexes of the elements that would be examined by the binary search (the mid values in our algorithm's code) and write the value that would be returned from the search. assume that we are using the binary search algorithm shown in lecture and section.
Answers: 3
question
Computers and Technology, 25.06.2019 15:30
How can improving one’s reasoning skills also improve one’s performance on the job?
Answers: 1
You know the right answer?
Question 1 (2 points) Saved
A structured set of data held in a computer, especially one that...
Questions
question
History, 15.12.2020 05:30
question
Mathematics, 15.12.2020 05:30
question
History, 15.12.2020 05:30
question
Mathematics, 15.12.2020 05:30
question
Mathematics, 15.12.2020 05:30
question
History, 15.12.2020 05:30
Questions on the website: 13722359