Microsoft Word, Google Chrome, iTunes, and Adobe Photoshop are examples of ____________
a. Applications
b. Mobile devices
c. Operating systems
d. Internet service providers
Answer: d. Internet service providers
You might also like to view...
An attacker is trying to discover the contents of encrypted messages that he can easily intercept. The attacker attempts to break messages by intercepting and substituting his own messages in a communications stream between two parties. This type of attack is known as:
a. Unknown plaintext b. Known ciphertext c. Man in the middle d. Replay
A(n) ________ presents data in a series of rows and columns
Fill in the blank(s) with correct word
________ organize, analyze, and graph numeric data such as budgets and financial reports.
A. Databases B. Presentation programs C. Word processors D. Spreadsheet programs
While checking the print queue, a technician determines that a print job at the top of the queue requires a paper size not loaded in the printer. Which of the following is the BEST option to get the other print jobs to print until the issue can be resolved?
A. Force the job to print on the paper that is loaded in the printer. B. Lower the priority of the jammed print job. C. Delete all print jobs and have all the users resubmit the print jobs. D. Increase the priority of all other jobs in the print queue.