Getting into someone else's computer without their permission is...
Which of these is the best way to find websites containing...
What does multitasking mean?
Adding your comments to a blog or forum is called
Which of the following is an example of an image file?
MP3 and WAV files are examples of:
AltaVista, Excite, InfoSeek, Lycos, Google, Snap, Dogpile -AT and...
Clickable words on a Web page that direct you to another Web page...
When you try to access the Internet, you get error messages stating...
The process of making readable data into unreadable...
When you change the color and background of a chart in a...
You have asked students to write a report on "How the Civil...
Copying copyright protected software and giving it to others for free...
A student locates a story online, copies it, and submits it to the...
An uninstaller is a utility program that:
In the Internet address "www.canton.edu," the...
Symbols such as :) (smile), :( (frown), :\ (undecided), and...
Plagiarism is:
When you save a document from a webpage to your computer it...
Which of the following is unacceptable use of the computer network?
What is a web browser plug-in?
The connecting of computers so that information can be shared...
When planning a database, what is the first step?
The part of a computer that controls the flow of information...
The blinking line, box, or arrow on the computer screen is called the:
Which of the following information is safe to share in a...
What is similar to a copy machine, except that it creates a digital...
Word-wrap allows you to type text that continuously flows to the...
Software programs or hardware devices setup to protect...
To run power hungry programs such as video editing software...
To change from Times New Roman to Arial, you must change the:
Which of the following are examples of how to use the Internet safely?
Computer-based models of real-life situations are called:
This word processing feature allows information to be organized in...
A file that records a user's website visits and preferences is...
What does .edu in an e-mail address or URL indicate?
Which of the following activities would be best accomplished using...
Which of the following types of files CANNOT be opened in a...
Which of the following is an output device:
Ethical use of the Internet states users DO NOT send spam, which is...
The part if a word processing document used to display...
Your document has not come out of the printer. Which of these...
Which of the following would you use to compute the average score...
What software would you most likely use to compare the...
Which of the following is always legal when you buy a computer...
The default page setup that prints the document vertically is called:
To find the average daily amount of rainfall over a four-week...
The simulation of a real or imagined environment that appears as...
Which feature of your word processing program would you use to...
When searching for a topic using a web search engine, which are...
The first thing to consider when developing a multimedia...
Which of the following activities would be best accomplished using...
Which of the following would be the most reliable source of...
To investigate the impact of the Ice Age on the formation of the...
The instructions written in code that tell a web page how to...
A computer virus is transmitted MOST often through:
Personal copyright protection usually lasts for
Guidelines written to protect the original work of others:
Software that blocks access to certain websites is called...