1.Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ….
A.integrated software packages
B.software suites
C.software processing packages
D.personal information managers
Click for answer
B.software suites
2.A data warehouse is which of the following?
A.Can be updated by the end users
B.Contains numerous naming conventions and formats
C.Organized around important subject areas
D.Contains only current data
Click for answer
C.Organized around important subject areas
3.______________ servers store and manages files for network users.
A.Authentication
B.File
C.Main
D.Web
Click for answer
B.File
4.All of the following are examples of real security and privacy risks Except _____
A.hackers
B. viruses
C.identify theft
D.spam
Click for answer
D.spam
5.___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
A.Data
B.Query
C.(Point-of-sale (POS)
D.Sales
Click for answer
D.Sales
6.System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
A.management.
B.application.
C.utility
D.processing
Click for answer
B.application.
7.________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
A.Servers.
B.Robotic computers
C.Mainframes
D.Embedded computers.
Click for answer
D.Embedded computers.
8.The following are all computing devices , except………
A.notebook computers
B.cellular telephones.
C.personal digital assistants
D.digital scanners.
Click for answer
D.digital scanners
A.integrated software packages
B.software suites
C.software processing packages
D.personal information managers
Click for answer
B.software suites
A.Can be updated by the end users
B.Contains numerous naming conventions and formats
C.Organized around important subject areas
D.Contains only current data
Click for answer
C.Organized around important subject areas
A.Authentication
B.File
C.Main
D.Web
Click for answer
B.File
A.hackers
B. viruses
C.identify theft
D.spam
Click for answer
D.spam
A.Data
B.Query
C.(Point-of-sale (POS)
D.Sales
Click for answer
D.Sales
A.management.
B.application.
C.utility
D.processing
Click for answer
B.application.
A.Servers.
B.Robotic computers
C.Mainframes
D.Embedded computers.
Click for answer
D.Embedded computers.
A.notebook computers
B.cellular telephones.
C.personal digital assistants
D.digital scanners.
Click for answer
D.digital scanners
very nice works mitra...keep it up..
ReplyDelete