Microsoft Word, Google Chrome, iTunes, and Adobe Photoshop are examples of ____________

a. Applications
b. Mobile devices
c. Operating systems
d. Internet service providers


Answer: d.  Internet service providers

Computer Science & Information Technology

You might also like to view...

An attacker is trying to discover the contents of encrypted messages that he can easily intercept. The attacker attempts to break messages by intercepting and substituting his own messages in a communications stream between two parties. This type of attack is known as:

a. Unknown plaintext b. Known ciphertext c. Man in the middle d. Replay

Computer Science & Information Technology

A(n) ________ presents data in a series of rows and columns

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ organize, analyze, and graph numeric data such as budgets and financial reports.

A. Databases B. Presentation programs C. Word processors D. Spreadsheet programs

Computer Science & Information Technology

While checking the print queue, a technician determines that a print job at the top of the queue requires a paper size not loaded in the printer. Which of the following is the BEST option to get the other print jobs to print until the issue can be resolved?

A. Force the job to print on the paper that is loaded in the printer. B. Lower the priority of the jammed print job. C. Delete all print jobs and have all the users resubmit the print jobs. D. Increase the priority of all other jobs in the print queue.

Computer Science & Information Technology