What year was the first microprocessor with a built in mouse created ?
1974
Davids friend told him she was cyber bullied.What should DAVID NOT do?
Post mean comments to attack the bully
What was the initial purpose of the internet in the 1960s ?
To aid leaders during the cold war
HTML is an example of which of the following types of computer languages?
Web page Language
Small files stored on your computer which track the websites you visit are known
as which of the following?
cookies
The process of getting progressively smaller and more capable,which integrated circuits or microprocesors have gone through is known as which of the following?
Microminiaturizarion
Eric just purchased a new computer and would like to protect his computer from viruses. What action should Eric take?
Install an anti virus software
Mobile connections depend on the location of the cell phone and the speed of the
internet connection varies based on the service provider's data plans.
TRUE OR FALSE
True
2048 Kilobytes is equal to which of the following?
2 megabytes
To obtain copyright protection, you must file the appropriate documents with a
U.S. copyright office
TRUE OR FALSE
False
Paul Allen and Bill Gates first designed which program from the Altair 8800,which led them to starts Microsoft?
BASIC
Victoria received a semi nude picture of someone she knows through her cell phone. What is a appropriate action
Delete it immediately
Researching online can be more effective by capitalizing important words for better
recognition by search engines.
TRUE OR FALSE
False
How many characters does ASCII allow?
Cyberbullying is Internet harassment.
TRUE OR FALSE
True
Adobe created what images to be replicated on a computer screen and printed
Sharron's computer was infected by viruses .What could be a possible cause?
Sharron downloaded free movies from the internet
Complex passwords do NOT significantly contribute to improving security against
hackers.
TRUE OR FALSE
False
The process of converting a vector graphic into a bit-map image is called which
of the following?
Rendering
What is the term used to describe the illegal stealing, copying or spreading of
software, movies and music?
Pirating
What was the first Intel's first product released in 1969 which gives computers memory space for open or running programs?
RAM
What can provide protections to Nike's slogan "Just Do It"
Trademark
What is not a web browser ?
What is not an example of high level language?
Binary Code
Electronic searches and seizures are regulated by the ______ Amendment.
Fourth