Home    Categories / Topics    Computer   Computer Literacy 101   All Questions   

Which protocol uses standard Internet connections to make phone calls over the Internet?

  1. VoIP

  2. SMTP

  3. FTP

  4. HTTP

Answer:

A

________ delivers business services online that were previously delivered locally by company-owned IT departments.

  1. Cloud computing

  2. Server-side programming

  3. Secure Sockets Layer

  4. Distributed data service

Answer:

A

Cascading style sheets have a hierarchy of styles that include all of the following EXCEPT:

  1. external

  2. independent

  3. inline

  4. embedded

Answer:

B

Being ________ means being familiar enough with computers that you understand their capabilities and limitations.

  1. technology literate

  2. computer savvy

  3. computer literate

  4. computer competent

Answer:

C

All of the following are examples of real security and privacy risks EXCEPT

  1. spam.

  2. identity theft.

  3. viruses.

  4. hackers.

Answer:

A

Unwanted electronic e-mail is called

  1. spyware.

  2. spam.

  3. software.

  4. adware.

Answer:

B

Which of the following is NOT necessarily part of being computer literate?

  1. using the Internet wisely

  2. protecting your privacy

  3. avoiding hackers and viruses

  4. being able to build a computer

Answer:

D

________ is the set of techniques used in information handling and retrieval of information automatically.

  1. RFID

  2. Database mining

  3. Information technology

  4. Computer forensics

Answer:

C

The process of searching huge amounts of data with the hope of finding a pattern is called

  1. data mining.

  2. data retrieval.

  3. data warehousing.

  4. data searching.

Answer:

A

A ________ is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package.

  1. mailing label

  2. packing label

  3. PostCode

  4. MaxiCode

Answer:

D