Synchronous communications

a) Instant messaging, chat, and VoIP are forms of synchronous communications; the people communicating have to be online at the same time and the conversation happens in real time.

b) refers to a model in which consumers access appli‑cations from a cloud provider over the Internet, usually by using a browser.

c) (Transmission Control Protocol) breaks a message or file into packets.

d) Some cell phones, such as Droids and iPhones, can act as a WiFi hotspot by becoming the router for a wireless network.

e) As a general rule, computers on the Internet that act as servers use static IP addresses.

 

Tethering

a) Some cell phones, such as Droids and iPhones, can act as a WiFi hotspot by becoming the router for a wireless network.

b) refers to a model in which consumers access appli‑cations from a cloud provider over the Internet, usually by using a browser.

c) (Transmission Control Protocol) breaks a message or file into packets.

d) Instant messaging, chat, and VoIP are forms of synchronous communications; the people communicating have to be online at the same time and the conversation happens in real time.

e) As a general rule, computers on the Internet that act as servers use static IP addresses.

 

TCP

a) (Transmission Control Protocol) breaks a message or file into packets.

b) refers to a model in which consumers access appli‑cations from a cloud provider over the Internet, usually by using a browser.

c) Some cell phones, such as Droids and iPhones, can act as a WiFi hotspot by becoming the router for a wireless network.

d) Instant messaging, chat, and VoIP are forms of synchronous communications; the people communicating have to be online at the same time and the conversation happens in real time.

e) As a general rule, computers on the Internet that act as servers use static IP addresses.

 

127. Trace route

a) records a packet’s path in addition to its round trip speed.

b) is a short message of 140 characters or less that is posted

c) is the rate of data that is uploaded from your computer to the Internet.

d) Sales representatives and telecommuters often access corporate networks from home or from a customer’s office by using a secured con‑nection called a virtual private network(VPN).

e) usually referred to simply as a modem—converts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

 

Tweet

a) is a short message of 140 characters or less that is posted

b) records a packet’s path in addition to its round trip speed.

c) is the rate of data that is uploaded from your computer to the Internet.

d) Sales representatives and telecommuters often access corporate networks from home or from a customer’s office by using a secured con‑nection called a virtual private network(VPN).

e) usually referred to simply as a modem—converts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

 

Upstream speed

a) is the rate of data that is uploaded from your computer to the Internet.

b) records a packet’s path in addition to its round trip speed.

c) is a short message of 140 characters or less that is posted

d) Sales representatives and telecommuters often access corporate networks from home or from a customer’s office by using a secured con‑nection called a virtual private network(VPN).

e) usually referred to simply as a modem—converts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

 

Virtual private network

a) Sales representatives and telecommuters often access corporate networks from home or from a customer’s office by using a secured connection called a virtual private network(VPN).

b) records a packet’s path in addition to its round trip speed.

c) is a short message of 140 characters or less that is posted

d) is the rate of data that is uploaded from your computer to the Internet.

e) usually referred to simply as a modem—converts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

 

Voiceband modem

a) usually referred to simply as a modem—converts the signals from your computer into audible analog sig‑nals that can travel over telephone lines.

b) records a packet’s path in addition to its round trip speed.

c) is a short message of 140 characters or less that is posted

d) is the rate of data that is uploaded from your computer to the Internet.

e) Sales representatives and telecommuters often access corporate networks from home or from a customer’s office by using a secured con‑nection called a virtual private network(VPN).

 

VoIP

a) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

b) (Wireless Application Protocol) is a communications protocol that provides Internet access from handheld devices, such as cell phones

c) is an area in which the public can access a WiFi network that offers Internet service

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

 

WAP

a) (Wireless Application Protocol) is a com‑munications protocol that provides Internet access from handheld devices, such as cell phones

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) is an area in which the public can access a WiFi network that offers Internet service

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

 

WiFi hotspot

a) is an area in which the public can access a WiFi network that offers Internet service

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑munications protocol that provides Internet access from handheld devices, such as cell phones

d) allows participants to modify posted material.

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

 

Wiki

a) allows participants to modify posted material.

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑munications protocol that provides Internet access from handheld devices, such as cell phones

d) is an area in which the public can access a WiFi network that offers Internet service

e) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

 

WiMAX

a) which stands for Worldwide Interoperability for Microwave Access, is an Ethernet compatible network standard designated as IEEE 802.16.

b) (Voice over Internet Protocol), or Voice over IP, is a technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system.

c) (Wireless Application Protocol) is a com‑munications protocol that provides Internet access from handheld devices, such as cell phones

d) is an area in which the public can access a WiFi network that offers Internet service

e) allows participants to modify posted material.

Аbsolute reference

a) never changes when you insert rows, or copy or move formulas.

b) alter a device’s user interface to create an accessible environment by providing closed captions,

c) text-to-speech, speech-to-text, or large screen text.

d) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

e) an intelligent agent behaves somewhat like a robot.

 

Adaptive utilities

a) alter a device’s user interface to create an accessible environment by providing closed captions,

b) text-to-speech, speech-to-text, or large screen text.

c) never changes when you insert rows, or copy or move formulas.

d) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

e) an intelligent agent behaves somewhat like a robot.

 

139. Аutomatic recalculation

a) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

b) never changes when you insert rows, or copy or move formulas.

c) alter a device’s user interface to create an accessible environment by providing closed captions,

d) text-to-speech, speech-to-text, or large screen text.

e) an intelligent agent behaves somewhat like a robot.

 

Bot

a) an intelligent agent behaves somewhat like a robot.

b) never changes when you insert rows, or copy or move formulas.

c) alter a device’s user interface to create an accessible environment by providing closed captions,

d) text-to-speech, speech-to-text, or large screen text.

e) feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

 

Вotnet

a) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

b) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

c) in the grid can contain a value, label, or formula.

d) (like D4 and D5), numbers (like 110), а formula, such as =D4-D5+((D8/B2)*110

e) is usually sold in retail stores or at Web sites.

 

BSD license

a) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) in the grid can contain a value, label, or formula.

d) (like D4 and D5), numbers (like 110), а formula, such as =D4-D5+((D8/B2)*110

e) is usually sold in retail stores or at Web sites.

 

143. Сell

a) in the grid can contain a value, label, or formula.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d) (like D4 and D5), numbers (like 110), а formula, such as =D4-D5+((D8/B2)*110

e) is usually sold in retail stores or at Web sites.

 

Сell references

a) (like D4 and D5), numbers (like 110), а formula, such as =D4-D5+((D8/B2)*110

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d) in the grid can contain a value, label, or formula.

e) is usually sold in retail stores or at Web sites.

 

Commercial software

a) is usually sold in retail stores or at Web sites.

b) Like a spider in its web, the person who controls many bot-infested computers can link them together into a network.

c) originated as the Berkeley Software Distribution license for a UNIX-like operating system.

d) in the grid can contain a value, label, or formula.

e) (like D4 and D5), numbers (like 110), а formula, such as =D4-D5+((D8/B2)*110

 

Сomputer virus

a) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

b) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

c) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

d) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

 

147. Сomputer worm

a) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

d) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

 

148. Сopyright

a) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

d) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

e) is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

 

Сopyright notice

a) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

d) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

e) is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

 

Database

a)is simply a collection of data that is stored on one or more computers, іn the context of modern usage.

b) is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

c) is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer.

d) is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work.

e) Most software displays, such as © 2014 eCourse Corporation, on one of its screens.

 

Demoware

a) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

b)is software that helps a peripheral device establishcommunication with a computer.

c) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

d) (end-user license agreement) is displayed on the screen when you first install software.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

 

Device driver

a) is software that helps a peripheral device establishcommunication with a computer.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

d) (end-user license agreement) is displayed on the screen when you first install software.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

Document formatting

a) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c)is software that helps a peripheral device establishcommunication with a computer.

d) (end-user license agreement) is displayed on the screen when you first install software.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

 

EULA

a) (end-user license agreement) is displayed on the screen when you first install software.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c)is software that helps a peripheral device establishcommunication with a computer.

d) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

e) The main component of a software package, designed to be started by users or automatically launched by the operating system.

 

Еxecutable file

a) The main component of a software package, designed to be started by users or automatically launched by the operating system.

b) is distributed for free and often comes preinstalled on new computers, but it is limited in some way until you pay for it.

c)is software that helps a peripheral device establishcommunication with a computer.

d) refers to the way that all the elements of a document— text, pictures, titles, and page numbers—are arranged on the page.

e) (end-user license agreement) is displayed on the screen when you first install software.

 

Field

a) holds one item of data relevant to a record.

b) is a set of letters that share a unified design.

c) text that you specify to automatically appear in the bottom margin of every page.

d) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

e) is copyrighted software that—asyou might expect—is available for free.

 

Font

a) is a set of letters that share a unified design.

b) holds one item of data relevant to a record.

c) text that you specify to automatically appear in the bottom margin of every page.

d) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

e) is copyrighted software that—asyou might expect—is available for free.

 

Footer

a) text that you specify to automatically appear in the bottom margin of every page.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

e) is copyrighted software that—asyou might expect—is available for free.

 

Formula

a) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) text that you specify to automatically appear in the bottom margin of every page.

e) is copyrighted software that—asyou might expect—is available for free.

 

Freeware

a) is copyrighted software that—asyou might expect—is available for free.

b) holds one item of data relevant to a record.

c) is a set of letters that share a unified design.

d) text that you specify to automatically appear in the bottom margin of every page.

e) works behind the scenes to tell the computer how to use the contents ofcells in calculations.

 

Fully justified

a) so that the text is aligned evenly on both the right andleft margins.

b) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

c) (General Public License) was developed for a free operating system called GNU.

d) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

 

Function

a) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

b) so that the text is aligned evenly on both the right andleft margins.

c) (General Public License) was developed for a free operating system called GNU.

d) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

 

GPL

a) (General Public License) was developed for a free operating system called GNU.

b) so that the text is aligned evenly on both the right andleft margins.

c) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

 

Grammar checker

a) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns

b) so that the text is aligned evenly on both the right andleft margins.

c) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) (General Public License) was developed for a free operating system called GNU.

e) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

 

Graphics

a) In computer lingo refers to any picture, drawing, sketch, photograph, image, or icon thatappears on your computer screen.

b) so that the text is aligned evenly on both the right andleft margins.

c) уou can enter a formula from scratch by typing it into a cell, or you can use a built-in preset formula, provided by the spreadsheet software.

d) (General Public License) was developed for a free operating system called GNU.

e) reads through your document and points out potential grammatical trouble spots, such as incomplete sentences, run-on sentences, and verbs that don’t agree with nouns.

 

Нash value

a) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

b) text that you specify to automatically appear in the top margin of every page.

c)аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

 

Нeader

a) text that you specify to automatically appear in the top margin of every page.

b) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

c)аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

 

Jailbreak

a) аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

b) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d) popular with search engines such as Google, is simply a collection of words relevant to your search.

e) is any text used to describe data.

Кeyword search

a) popular with search engines such as Google, is simply a collection of words relevant to your search.

b) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d)аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

e) is any text used to describe data.

 

Label

a) is any text used to describe data.

b) is a unique number derived from encoding one or more datasets, such as names, serial numbers, and validation codes.

c) text that you specify to automatically appear in the top margin of every page.

d)аpps are available from other sources, but using them requires an unauthorized change to the device’s software.

e) popular with search engines such as Google, is simply a collection of words relevant to your search.

 

Leading

a) The spacing between lines of text, (pronounced “LED ding”).

b) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

c) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

d) spreads by sending itself to every address in the address book of an infected computer.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

 

 

172. Malicious softwareand Мalware

a) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

b) The spacing between lines of text, (pronounced “LED ding”).

c) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

d) spreads by sending itself to every address in the address book of an infected computer.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

 

Мapping application

a) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

b) The spacing between lines of text, (pronounced “LED ding”).

c) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

d) spreads by sending itself to every address in the address book of an infected computer.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

 

Мass-mailing worm

a) spreads by sending itself to every address in the address book of an infected computer.

b) The spacing between lines of text, (pronounced “LED ding”).

c) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

d) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

e) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

 

Мathematical operators

a) such as the multiplication symbol (*), the division symbol (/), the addition symbol, and the subtraction symbol.

b) The spacing between lines of text, (pronounced “LED ding”).

c) refer to any computer program designed to surreptitiouslyenter a computer, gain unauthorized access to data, or disrupt normalprocessing operations.

d) displays satellite, aerial, or street maps used to locate places and get directions between two addresses.

e) spreads by sending itself to every address in the address book of an infected computer.

 

Мobile app

a) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

b) refers to a component, suchas a word processing module.

c) is priced per copy and allows the allocated number of copies to be used simultaneously.

d) is a question stated in a language such as English, rather than anesoteric query language.

e)is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

 

 

Module

a) refers to a component, suchas a word processing module.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) is priced per copy and allows the allocated number of copies to be used simultaneously.

d) is a question stated in a language such as English, rather than anesoteric query language.

e)is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

 

Мultiple-user license

a) is priced per copy and allows the allocated number of copies to be used simultaneously.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) refers to a component, suchas a word processing module.

d) is a question stated in a language such as English, rather than anesoteric query language.

e)is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

 

Natural language query

a) is a question stated in a language such as English, rather than anesoteric query language.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) refers to a component, suchas a word processing module.

d) is priced per copy and allows the allocated number of copies to be used simultaneously.

e)is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

 

Оffice suite

a) is a collection of programsthat typically include word processing, spreadsheet, presentation, anddatabase modules.

b) is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.

c) refers to a component, suchas a word processing module.

d) is priced per copy and allows the allocated number of copies to be used simultaneously.

e) is a question stated in a language such as English, rather than anesoteric query language.

Open source software

a) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

b) refers to the physical position of each element on a page.

c) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

 

 

Page layout

a) refers to the physical position of each element on a page.

b) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

c) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

 

Paragraph alignment

a) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

b) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) includes the alignment of text within the margins and the space between each line of text.

e) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

 

Paragraph style

a) includes the alignment of text within the margins and the space between each line of text.

b) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

e) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

 

PDF

a) (Portable Document Format) is a standard format for exchangingfiles, so most people will assume that your computer has PDF capability.

b) makes uncompiled program instructions—the source code—available to programmers who want to modify and improve the software.

c) refers to the physical position of each element on a page.

d) refers to the horizontal position of text—whether it is aligned at the left margin, aligned at the right margin.

e) includes the alignment of text within the margins and the space between each line of text.

 

Рirated software

a) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

b) Font size is measured, abbreviated pt.

c) is designed to run from removable storage, such as a CD or USB flash drive.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

 

 

Рoint size

a) Font size is measured, abbreviated pt.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) is designed to run from removable storage, such as a CD or USB flash drive.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

 

Portable software

a) is designed to run from removable storage, such as a CD or USB flash drive.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

e) They are sometimes referred, because they offer features that really help get work done.

 

Product activation

a) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is designed to run from removable storage, such as a CD or USB flash drive.

e) They are sometimes referred, because they offer features that really help get work done.

 

Productivity software

a) They are sometimes referred, because they offer features that really help get work done.

b) People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred.

c) Font size is measured, abbreviated pt.

d) is designed to run from removable storage, such as a CD or USB flash drive.

e) is a means of protecting software from illegal copying by requiring users to enter a product key or activation code before the software can be used.

 

Proprietary software

a) has restrictions on its use that are delineated by copyright, patents, or license agreements.

b) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

c) contains code that is suspected of being part of a virus іn the context of antivirus software.

d) describes the information you want to find.

e) QBE) simply requires you to fill out a form with the type of data you want to locate.

 

Public domain software

a) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

b) has restrictions on its use that are delineated by copyright, patents, or license agreements.

c) contains code that is suspected of being part of a virus іn the context of antivirus software.

d) describes the information you want to find.

e) QBE) simply requires you to fill out a form with the type of data you want to locate.

Quarantined file

a) contains code that is suspected of being part of a virus іn the context of antivirus software.

b) has restrictions on its use that are delineated by copyright, patents, or license agreements.

c) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

d) describes the information you want to find.

e) QBE) simply requires you to fill out a form with the type of data you want to locate.

 

Query

a) describes the information you want to find.

b) has restrictions on its use that are delineated by copyright, patents, or license agreements.

c) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

d) contains code that is suspected of being part of a virus іn the context of antivirus software.

e) QBE) simply requires you to fill out a form with the type of data you want to locate.

.

 

Query by example

a) (QBE) simply requires you to fill out a form with the type of data you want to locate.

b) has restrictions on its use that are delineated by copyright, patents, or license agreements.

c) is not protected by copyright because the copyright hasexpired, or the author has placed the program in the public domain, makingit available without restriction.

d) contains code that is suspected of being part of a virus іn the context of antivirus software.

e) describes the information you want to find.

 

Query language

a) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

b) holds data for a single entity—a person, place, thing, or event.

c) The process, but most consumers have no need to root their mobile devices.

d) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer.

e) feature to hunt down mistakes that you habitually make in your writing.

 

 

Record

a) holds data for a single entity—a person, place, thing, or event.

b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

c) The process, but most consumers have no need to root their mobile devices.

d) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer.

e) feature to hunt down mistakes that you habitually make in your writing.

 

 

Rooting

a) The process, but most consumers have no need to root their mobile devices.

b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

c) holds data for a single entity—a person, place, thing, or event.

d) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer.

e) feature to hunt down mistakes that you habitually make in your writing.

 

Rootkit

a) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer.

b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

c) holds data for a single entity—a person, place, thing, or event.

d) The process, but most consumers have no need to root their mobile devices.

e) feature to hunt down mistakes that you habitually make in your writing.

 

Search and Replace

a) feature to hunt down mistakes that you habitually make in your writing.

b) such as SQL (Structured Query Language), provides a set of commands for locating and manipulating data.

c) holds data for a single entity—a person, place, thing, or event.

d) The process, but most consumers have no need to root their mobile devices.

e) refers to software tools used to conceal malware and backdoors that have been installed on a victim’s computer.

 

Security suite

a) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

b) which usually applies to operating system updates, is a set of updates.

c) that guides you through the installation process.

d) is copyrighted software marketed under a try-before-you-buy policy.

e) goes into effect as soon as you open the packaging.

 

Service pack

a) which usually applies to operating system updates, is a set of updates.

b) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

c) that guides you through the installation process.

d) is copyrighted software marketed under a try-before-you-buy policy.

e) goes into effect as soon as you open the packaging.

 

Setup program

a) that guides you through the installation process.

b) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

c) which usually applies to operating system updates, is a set of updates.

d) is copyrighted software marketed under a try-before-you-buy policy.

e) goes into effect as soon as you open the packaging.

 

Shareware

a) is copyrighted software marketed under a try-before-you-buy policy.

b) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

c) which usually applies to operating system updates, is a set of updates.

d) that guides you through the installation process.

e) goes into effect as soon as you open the packaging.

 

 

Shrink-wrap license

a) goes into effect as soon as you open the packaging.

b) integrates several security modules to protect against the most common types of malware, unauthorized access, and spam.

c) which usually applies to operating system updates, is a set of updates.

d) that guides you through the installation process.

e) is copyrighted software marketed under a try-before-you-buy policy.

 

Single-user license

a) that limits use to one person at a time.

b) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

c) is the process of placing a program into a computer so that it can be run or executed.

d) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

 

 

Site license

a) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

b) that limits use to one person at a time.

c) is the process of placing a program into a computer so that it can be run or executed.

d) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

 

Software installation

a) is the process of placing a program into a computer so that it can be run or executed.

b) that limits use to one person at a time.

c) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

d) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

 

Software license

a) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

b) that limits use to one person at a time.

c) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

d) is the process of placing a program into a computer so that it can be run or executed.

e) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

 

Software update

a) (sometimes called a software patch) is a small section of program code that replaces part of the software you currently have installed.

b) that limits use to one person at a time.

c) is generally priced at a flat rate and allows software to be used on all computers at a specific location.

d) is the process of placing a program into a computer so that it can be run or executed.

e) or license agreement, is a legal contract that defines the ways in which you may use a computer program.

 

Software upgrade.

a) рeriodically, software publishers replace older versions of a software product with a new version that’s sometimes referred.

b) that marks misspelled words in a document

c) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

d) uses rows and columns of numbers to create a model or representation of a real situation.

e) is a type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes.

 

 

Spelling checker

a) that marks misspelled words in a document.

b) рeriodically, software publishers replace older versions of a software product with a new version that’s sometimes referred.

c) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

d) uses rows and columns of numbers to create a model or representation of a real situation.

e) is a type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes.

 

Spelling dictionary

a) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

b) рeriodically, software publishers replace older versions of a software product with a new version that’s sometimes referred.

c) that marks misspelled words in a document

d) uses rows and columns of numbers to create a model or representation of a real situation.

e) is a type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes.

 

Spreadsheet

a) uses rows and columns of numbers to create a model or representation of a real situation.

b) рeriodically, software publishers replace older versions of a software product with a new version that’s sometimes referred.

c) that marks misspelled words in a document

d) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

e) is a type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes.

 

Spyware

a) is a type of program that secretly gathers personal information without the victim’s knowledge, usually for advertising and other commercial purposes.

b) рeriodically, software publishers replace older versions of a software product with a new version that’s sometimes referred.

c) that marks misspelled words in a document

d) A spelling checker works by comparing each word from your document to a list of correctly spelled words stored in a data file.

e) uses rows and columns of numbers to create a model or representation of a real situation.

 

 

System requirements

a) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

b) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

c) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

d) which deletes the software’s files from various folders on your computer’s hard disk.

e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

 

System utilities

a) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

c) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

d) which deletes the software’s files from various folders on your computer’s hard disk.

e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

 

Trojan horse

a) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

d) which deletes the software’s files from various folders on your computer’s hard disk.

e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

 

Uninstall routine

a) which deletes the software’s files from various folders on your computer’s hard disk.

b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

d) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

e) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

 

Unzipped

a) As part of the installation process, this downloaded file must be reconstituted into the original collection of files.

b) specify the operating system and minimum hardware capacities necessary for a software product to work correctly.

c) that can track down and fix disk errors, repair corrupted files, and give your device a performance-enhancing tune-up.

d) (sometimes simply called a Trojan) is a computer program that seems to perform one function while actually doing something else.

e) which deletes the software’s files from various folders on your computer’s hard disk.

 

Utility software

a) A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

b) is a number that you want to use in a calculation.

c) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

d) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

e) (or Web app) is software that is accessed with a Web browser.

 

Value

a) is a number that you want to use in a calculation.

b) A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

c) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

d) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

e) (or Web app) is software that is accessed with a Web browser.

What is Virus hoax

a) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

b) A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

c) is a number that you want to use in a calculation.

d) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

e) (or Web app) is software that is accessed with a Web browser.

 

Web application

a) (or Web app) is software that is accessed with a Web browser.

b) A type of system software thatis designed to help you monitor and configure settings for yourdigital gear, its operating system, or application software.

c) is a number that you want to use in a calculation.

d) Virus signatures and other information that antivirus software uses to identify and eradicate malware are stored in one or more files usually referred (or a virus database).

e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

Word wrap

a) A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.

b) уou use spreadsheet software to create an on-screen.

c) Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

d) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

Worksheet.

a) уou use spreadsheet software to create an on-screen.

b) A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.

c) Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

d) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

Zipped

a) Usually all the files needed for the new software, consolidate them into one large file, which is compressed to decrease its size and reduce the download time.

b) A feature which determines how your text flows from line to line by automatically movingwords down to the next line as you reach the right margin.

c) уou use spreadsheet software to create an on-screen.

d) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

e) usually arrives as an e-mail message containing dire warnings about a supposedly new virus on the loose.

 

Zombie

a) A computer under the control of a bad bot is sometimes referred, because it carries out instructions from a malicious leader.

b) A feature which determines how your text flows from line to line by automatically moving