Question
Question 25 A desktop computer is also known as a CPU True False 2 points Question 26 In the following URL, what portion represents the
Question 25
-
A desktop computer is also known as a CPU
True
False
2 points
Question 26
-
In the following URL, what portion represents the root directory?
http://www.yourdomain.com/myfiles/sample.html
/myfiles/
sample.html
http://
www.yourdomain.com/
2 points
Question 27
-
Put into the proper order what happens when a computer is turned on
Loads OS
Loads ROM and performs POST
-
Loads BIOS
2 points
Question 28
-
Chart Elements include:
chart titles, legends and data labels.
pieces, parts and wiki's
pies, bars and scattergraphs
sums, averages and max
2 points
Question 29
-
Used as separators [delimiters] when specifiying directory and file information
Backslashes \
Forward Slash or Slashes
Scrolling
Switches
2 points
Question 30
-
Which system of encryption does not need to send anything secret over an insecure channel?
Public Key Encryption
Asymmetric Key Encryption
Symmetric Key Encryption
Double Key Encryption
2 points
Question 31
-
The command ATTRIB -R C:\DOCUMENTS\*.DOC does what?
Turns off the read only attribute on all txt files in the documents directory of drive F
Attributes all doc files to the remove group in the documents directory of Drive C
Turns off the read only attribute on all doc files in the documents directory of drive C
Sets the permissions to doc files in the documents directory of Drive C so that files cannot be read
2 points
Question 32
-
Select all of the recommended methods for good password security
Use a password manager
Use encrypted connections whenever possible
Use three-factor authentication
Use Strong Passwords
Keep each password on a piece of paper hidden under your keyboard.
2 points
Question 33
-
Hardware
The portion of a filename following the final point which indicates the kind of data stored in the file.
The physical machine and its peripherals
Disk Operating System
An organizational unit or container used to organize folders and files into a hierarchical structure.
2 points
Question 34
-
What is a cookie?
A delicious treat
A binary file stored on your computer used to identify you
A text file stored on your computer holding information from your browser
A malicious file that can erase the data on your computer.
2 points
Question 35
-
A Batch File must have a ___ file extension.
,exe
.txt
.com
.bat
2 points
Question 36
-
CLI stands for:
Correct Line Intrepreter
Command Line Intrepreter
Command Linux Interpreter
Correct Linux Input
2 points
Question 37
-
Which of the following is not a type of HTML List?
Ordered List
Cascading List
Unordered List
Definition List
2 points
Question 38
-
DOS requires that you use a specific set of rules, or _______ when you issue commands
syntax
semantics
pragmatics
morphology
2 points
Question 39
-
A type of malware that accesses your system to display pop-up information when it should not
Adware
Botnet
Trojan Horse
Spyware
2 points
Question 40
-
This section describes the page but isn't displayed by the browser
Displays the name of the page in the browser bar
Encloses a paragraph of text
Information inside of this tag is displayed by the browser
Moves the text to the next line. Similar to pressing enter in a word processor
2 points
Question 41
-
What is the MOST secure for of Wi-Fi encryption?
WPA2 + AES
WPA + TKIP
WEP
WPA2 + TKIP
2 points
Question 42
-
What is an index file?
A file that displays a listing of all pages on your website.
The main data storage file for the website
The file that visitors will see by default when they navigate to a specific directory on your website.
The last file in your website
2 points
Question 43
-
We begin our batch files with @ ECHO OFF in the header. The command ECHO,
duplicates previous commands.
displays a message up to 122 characters long.
requires user input.
stops the screen.
2 points
Question 44
-
Motherboards can support more than one type and range of CPU
True
False
2 points
Question 45
-
The syntax for the copy command is:
copy source destination
copy *.* /?
copy destination source
2 points
Question 46
-
What best describes attributes?
Attributes are statistical information about a web page such as its height, width, background color, etc.
Each html element has an attribute tag to set it to display or be hidden.
Special code words used inside of an HTML tag to control what it does
A special section inside of the header tag to control page layout functions.
2 points
Question 47
-
What is the advantage of using Stylesheets?
They make our code smaller by reusing components from other developers
They allow us to separate the visual style of our web page from the html code giving greater control over the appearance of our pages.
They allow our code to flow easily (Cascade) from one web page to another.
They allow us to highlight all of our html code in blue to make it easier to work with the code inside of a text editor.
2 points
Question 48
-
A type of malware that disguises itself as a legitimate file
Virus
Trojan Horse
Rootkit
Ransomware
2 points
Question 49
-
Which of the following style commands allows you to set a font to normal, bold, bolder or lighter?
font-weight
font-type
font-style
font-thickness
2 points
Question 50
-
Which of the following represent a switch
/Q
-s
*C
//
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started