Identify the letter of the choice that best matches the phrase or definition.

A. The practice of sharing or pooling computing resources, such as servers
B. Typically has one program running at a time, though others may be running in the background
C. A proprietary mobile operating system
D. Saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state
E. Saves any open documents and programs to an internal hard drive before removing power from the computer or device
F. Enables user to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer, mobile device, or network
G. A unique combination of characters that identifies a specific user
H. A private combination of characters associated with the user name that allows access to certain computer resources
I. Android app store that provides access to apps, songs, books, and movies
J. Define who can access certain resources and when they can access those resources
K. If application software has stopped responding and the hard disk's LED blinks repeatedly, the operating system probably is doing this
L. Technology that allows two devices to share information by touching
M. An iOS app that provides a centralized location for coupons
N. When working with a command-line interface, the set of commands entered into the computer is called this
O. A Windows Phone app that provides a centralized location for coupons
P. Microsoft's cloud server
Q. A popular, multitasking UNIX-based operating system
R. You should run exactly one of this kind of application on your computer
S. Enables you to sync mail, calendars, contacts, and other items on iOS
T. For each user, a network administrator establishes this, which enables the user to access, or sign in to, a computer or to a network


A. virtualization
B. mobile operating system
C. Blackberry
D. sleep mode
E. hibernate
F. administrator account
G. user name
H. password
I. Google Play
J. permissions
K. thrashing
L. NFC
M. Passbook
N. command language
O. Wallet
P. SkyDrive
Q. Linux
R. antivirus
S. iCloud
T. account

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Prior to functional programming, you typically determined what you wanted to accomplish, then specified the precise steps to accomplish that task. b. Using a loop to iterate over a collection of elements is known as external iteration and requires accessing the elements sequentially. Such iteration also requires mutable variables. External iteration is easier to parallelize. c. Letting the library determine how to iterate over a collection of elements is known as internal iteration. d. Functional programming focuses on immutability—not modifying the data source being processed or any other program state.

Computer Science & Information Technology

The courts have determined that there are two conditions that must be met before evidence can be considered relevant. What are those two conditions?

a. It must be material. b. It must be probative. c. It must be truthful. d. It must be collected by an authorized law enforcement official.

Computer Science & Information Technology

WSUS is a server-based component that enables you to provide update services to computers on a corporate network without the need for individual computers to go online to the Microsoft Windows Update website to check for updates

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____ allows hardware to communicate with Windows and other software applications.

A. driver B. legacy device C. port D. charm

Computer Science & Information Technology