ANSWERS11
Which of the following is a set of programs that coordinates all the activities among a computer
or mobile device's hardware? - ANSWERS -...
Any hardware component that conveys information from a computer or mobile device to one or
more people is known as a(n) ____________________. - ANSWERS -...
E-mail is a utility program. - ANSWERS -...
Which of the following facilitates the transfer of files from one computer to another over the
Internet? - ANSWERS -...
A computer keeps data, instructions and information on a register media. - ANSWERS -...
Which of the following is an electronic version of a printed book, readable on computers and
other digital devices? - ANSWERS -...
The component of the processor that direct and coordinates most of the operation in the
computer is known as which of the following? - ANSWERS -Control Unit
Which of the following is a signal that is continuous and varies in strength and quality and has
an infinite number of values? - ANSWERS -Analog
Unauthorized access is the use of a computer or its data for unapproved or possibly illegal
activities. - ANSWERS -FALSE
, What is the term for a square-shaped coded graphic that corresponds to a web address or other
information? - ANSWERS -QR Code
A collection of data organized in a manner that allows access, retrieval and use of that data is
known as which of the following? - ANSWERS -Database
The process of converting data that is readable by humans into encoded characters to prevent
unauthorized access is known as which of the following? - ANSWERS -encryption
Cache is a temporary memory source. - ANSWERS -TRUE
Which of the following is an example of software theft? - ANSWERS -ALL OF THEM
b. Intentionally erasing programs
c. Illegally register and/or activate a program
d. Illegally copying a program
The central processing unit(CPU), which interprets and carries out the basic instructions that
operate a computer is part of which computer component below? - ANSWERS -processor
Which of the following is a popular query language that allows users to manage, update and
retrieve data? - ANSWERS -SQL
Malware, short for malicious software, consists of programs that act without a user's knowledge
and deliberately alter the operations of computers and mobile devices. - ANSWERS -TRUE
In a Microsoft Access database a column is equal to a record and a row is equal to a field within
that record. - ANSWERS -FALSE