CIS 105 QUIZ CHAPTER 1
CIS 105 Quiz Chapter 1
CIS105 QUIZ CHAPTER 1
|
1.
|
________ is one of the primary operations of a computer.
|
|
|
|
|
|||
|
2.
|
Any fact or set of facts, such as the words in a letter to a friend or
the notes in a song, can become computer ________ .
|
|
|
|
|
|||
|
3.
|
The term ________ refers to the programs or instructions used to tell a
computer what to do, and allow people to use a computer to perform specific
tasks.
|
|
|
|
|
|||
|
4.
|
The fourth generation of computers was marked by the introduction of
________ .
|
|
|
|
|
|||
|
5.
|
A device that must be connected to a network to perform processing or
storage tasks is referred to as a ________ .
|
|
|
|
|
|||
|
6.
|
________ generally run one program at a time, as fast as possible.
|
|
|
|
|
|||
|
7.
|
________ is the most well-known computer network in the world.
|
|
|
|
|
|||
|
8.
|
IP addresses and their corresponding ________ identify computers
available through the Internet.
|
|
|
|
|
|||
|
9.
|
An email address consists of a ________
, followed by an @ symbol, followed by the domain name of the mail server.
|
|
|
|
|
|||
|
10.
|
________ browsing allows you to open
multiple Web pages at one time.
|
|
|
|
|
|||
|
11.
|
Web browsers maintain a(n) ________
list, a record of all Web pages visited during a specified period of time.
|
|
|
|
|
|||
|
12.
|
________ is the colloquial term for
unsolicited emails.
|
|
|
|
|
|||
|
13.
|
________ software is rights-protection
software used to control the use of a work.
|
|
|
|
|
|||
|
14.
|
Presenting someone else's work as your
own is ________ .
|
|
|
|
|
|||
|
15.
|
The majority of discarded computer
equipment sent to recyclers in developed nations ends up ________ .
|
||
No comments:
Post a Comment