If the web site has an author and looks professional



A. You should expect good research

B. You should research the author only

C. You should look at the domain

D. You should research the author, look at the domain, check the links, check for errors, look for bias, etc. *

E. You can be sure that it’s a popular site

 

What is Cloud Computing replacing?

A. Corporate data centers

B. Expensive personal computer hardware

C. Expensive software upgrades

D. All answers are correct*

E. Your personal computer

 

276. "Cloud" in cloud computing represents what?

A. Wireless

B. Hard drives

C. People

D. Internet *

E. Software

 

Cloud Computing has below layers

A. User, Software, Platform, Infrastructure, Server

B. Client, Application, Platform, Infrastructure, Server *

C. Software, Application, Platform, Infrastructure, Server

D. Software, Hardware, Operating System, Server

E. Platform, Infrastructure, Server

 

Deployment Models are

A. Public Cloud, Protected Cloud, Default Cloud and Private Cloud

B. Community Cloud, Hybrid Cloud, Protected Cloud and Default Cloud

C. Public Cloud, Community Cloud, Hybrid Cloud and Private Cloud *

D. Default Cloud, Community Cloud, Protected Cloud

E. All of the above

 

Which of these should a company consider before implementing cloud computing technology?

A. Employee satisfaction

B. Potential cost reduction

C. Information sensitivity

D. All of the above *

E. All answers are incorrect

 

What is the number one concern about cloud computing?

A. Too expensive

B. Security concerns *

C. Too many platforms

D. Accessability

E. All of the above

 

281. The term "Cloud" in cloud computing represents what

A. People

B. Computer

C. Wireless Device

D. Internet *

E. All of the above

 

What is Cloud Computing replacing?

A. Corporate data centers

B. Expensive personal computer hardware

C. Expensive software upgrades

D. All of the above *

E. No correct answer

 

283. E-commerce is:

A. Business-to-Business transactions and Business-to-Consumer transactions *

B. Getting money from your computer online

C. Selling your home on the Internet

D. A revolution in business practices

E. All of the above

 

What is telemedicine?

A. Something that gives people access to the expertise of specialties in urban hospitals through the use of multimedia and computer networks *

B. A computer game that allows people to pretend to be doctors

C. A database that lists and explains all known medicines

D. An advertisement for the local grocery store's pharmacy

E. All of the above

 

What are the benefits of groupware?

A. Member of the group can feel like they can belong

B. Members of the group can share programs, computer files, and other resources *

C. Members of the group can read e-mails sent to other group members

D. Members of the group can rely on the other people in the group to do their work

E. All of the above

 

How does multimedia help school-age children?

A. It replaces direct textbook reading

B. It helps students learn in new and stimulating ways and allows them to apply their knowledge creatively *

C. It allows students to control all their learning

D. It replaces teacher lectures

E. All of the above

 

What did ARPA do?

A. Developed facsimile equipment

B. Linked several computers into a network called ARPANET *

C. Laid the first transatlantic communication cables

D. Created the first server-based email

E. All of the above

 

What are some examples of multimedia?

A. Video games, movies, and television *

B. Television series

C. Computer-generated graphics

D. Digital pictures

E. All of the above

 

To protect your privacy online fill out forms only when the website displays

A. Http://

B. Ftps://

C. Ftp://

D. Https: *

E. All of the above

 

290. An individual's ability to restrict or eliminate the collection, use, and sale of his/her confidential personal information

A. Protection

B. Privacy *

C. Ethics

D. Anonymity

E. All of the above

 

Activities committed using the Internet that violate state, federal, or international laws.

A. Hacker

B. Spector

C. Computer crime

D. Cybercime *

E. Criminal

 

An area of law dedicated to computer crime

A. Cyberlaw *

B. Cyberstalking

C. Cybercrime

D. Cyberbulling

E. Cyberdealer

 

Passwords should consist of _______

A. Numbers

B. Lowercase letters

C. Special characters

D. Uppercase letters

E. All of the above *

 


Дата добавления: 2019-02-22; просмотров: 1214; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!