Describe an IP address
Give this one a try later!
Referred to as a dotted qua, identifies a website and identifies any
computer connecting to the Internet
,Data
Give this one a try later!
the representation of a fact, a figure, or an idea.
How does a search engine work?
Give this one a try later!
searches the web for keywords and returns a list of the sites on which those
words are found
How can I use biometric authentication devices to protect my data?
Give this one a try later!
Use a physical attribute that is not easily duplicated to control access to
data files or computing devices
How are devices connected to the computer?
Give this one a try later!
, - USB Port
- Firewire ports
- Thunderbolt port
- HDMI port
What do you need to get wireless Internet access at home?
Give this one a try later!
Wireless router
Gigabyte (GB)
Give this one a try later!
About 1 billion bytes
A social engineering technique in which you create a scenario to gain someone's trust
is known as
Give this one a try later!
pretexting
How does firewall keep my computer safe from hackers?
, Give this one a try later!
Designed by using personal firewall you can close to invaders, open
logical ports and potentially make your computer invisible to other
computers on the internet
In the URL http://www.whitehouse.gov/blog, which part is considered the path or
subdirectory?
Give this one a try later!
/blog
E-mail and instant messaging - synchronous or asynchronous
Give this one a try later!
E-mail is asynchronous and instant messaging is synchronous
What exactly is a computer?
Give this one a try later!
Devices that process data. Help organize, sort and categorize data to turn
it into information.
Give this one a try later!
Referred to as a dotted qua, identifies a website and identifies any
computer connecting to the Internet
,Data
Give this one a try later!
the representation of a fact, a figure, or an idea.
How does a search engine work?
Give this one a try later!
searches the web for keywords and returns a list of the sites on which those
words are found
How can I use biometric authentication devices to protect my data?
Give this one a try later!
Use a physical attribute that is not easily duplicated to control access to
data files or computing devices
How are devices connected to the computer?
Give this one a try later!
, - USB Port
- Firewire ports
- Thunderbolt port
- HDMI port
What do you need to get wireless Internet access at home?
Give this one a try later!
Wireless router
Gigabyte (GB)
Give this one a try later!
About 1 billion bytes
A social engineering technique in which you create a scenario to gain someone's trust
is known as
Give this one a try later!
pretexting
How does firewall keep my computer safe from hackers?
, Give this one a try later!
Designed by using personal firewall you can close to invaders, open
logical ports and potentially make your computer invisible to other
computers on the internet
In the URL http://www.whitehouse.gov/blog, which part is considered the path or
subdirectory?
Give this one a try later!
/blog
E-mail and instant messaging - synchronous or asynchronous
Give this one a try later!
E-mail is asynchronous and instant messaging is synchronous
What exactly is a computer?
Give this one a try later!
Devices that process data. Help organize, sort and categorize data to turn
it into information.