HRS - Ask. Learn. Share Knowledge. Logo

Questions in computers-and-technology

[Done] b. Reflections 1. What safety measures can you take to protect your personal information and privacy online? 2. What are some examples of respectful and disrespectful online behavior?

[Done] 1. What is Website security? a. The protection of personal and organizational public-facing websites from cyberattacks. b. The protection of personnel and user public-facing websites from cyberattacks. c. Both A & B 2. What is Cloud Computing? a. It's a connection between two servers b. It enables remote access, primarily through the Internet, to shared resources; (e.g., services) typically being maintained by a third-party (the cloud provider). c. It's a Virtual Private Network d. It's a database that provides information on software and hardware listing

[Done] 1. HTML tags are enclosed in ____. 2. ____ tags have both opening tag and closing tag. 3. ____ tags contain only the opening tag. 4. The ____ tag defines the header section of web page. 5. HTML stands for ____. 6. HTML files are saved with a ____ file extension. 7. The ____ tag contains the content that is displayed on the web page. 8. ____ markup language used to create web page. 9. ____ tag used to define what is to be shown on the title bar when the web page is opened. 10. ____ is a collection of web pages. 11. Write the output:

[Done] 1. Write any four features of a computer: i. ii. iii. Automation iv. Storage capacity 2. What is software? 3. Why does a computer need software? 4. Name any four application software: i. ii. iii. iv. 5. What do you mean by formatting?

[Done] 3. The colourful image on your desktop is known as: a. Icon b. Pointer c. Wallpaper d. Screen Saver 4. This button resizes the window back. a. Restore down b. Close c. Maximize d. Minimize 5. Mouse pointer is known as a. Tool activator b. Symbol of wait c. Tool magnifier d. Delta

[Done] A. Tick the correct option. 1. Which of these is a moving pattern or animation on the screen? a. Background b. Screen saver c. Icon d. Clock 2. Which of these is a long bar at the bottom of the desktop? a. Clock b. Taskbar c. Start button d. Menu bar 3. Which of these is a mouse pointer used for pointing and selecting? a. Busy arrow b. Normal c. Text select d. Four-headed B. Match the following mouse pointer shapes with their functions: 1. a. Used for pointing, and dragging the items 2. b. Used for moving pictures. 3. c. Computer is busy and wants you to wait 4. d. Used for inserting text in a document

[Done] You've been asked to help build a presentation, but you don't normally have access to presentation software. You've used the free version of a different presentation software at home. What should you do? A. Read the software's Terms & Conditions carefully to ensure the information you will include in the presentation is protected. B. Use the free software for this project and confirm it with IT later. C. Send the information to your personal email and then create the presentation on your home computer. D. Ask IT what the approved presentation software is and submit a request to gain access to it.

[Done] The CCPA does not apply to which of the following? A. Biometric information about a consumer B. A consumer's internet or electronic network activity C. A consumer's geolocation data D. Medical information about a consumer governed by the Confidentiality of Medication Information Act

[Done] What is the main goal of the fifth generation of computers? Your father wants to buy a device for your younger brother to help him learn counting. Which calculating device would you suggest?

[Done] Which of the following types of threat intelligence provides information about specific threats against an organization? A. Operational threat intelligence B. Dynamic threat intelligence C. Tactical threat intelligence D. Strategic threat intelligence