(Reaction Time/Reaction Precision Tester) Create a Web page that moves an image around the screen. The user moves the mouse to catch and click on the shape. The shape’s speed and size can be varied. Keep statistics on how much time the user typically takes to catch a shape of a given size. The user will probably have more difficulty catching faster-moving, smaller shapes.
What will be an ideal response?
```
1
2
3
4
5
6
7
8
9
The term ____ refers to a collection of technologies that work together to ensure that copyrighted content can be viewed only by the person who purchased it.
A. EEC B. XPM C. DRM D. ASM
Case WD 7-2Tim is creating some new tables to show the sales of pet toys at his pet store.As Tim works on the data, he realizes that his columns are not wide enough. What can Tim do to widen the columns?
A. Start the chart over, it is too difficult to widen the columns. B. Position the pointer on top of a gridline and drag the border line to resize the column. C. Position the pointer outside the chart and right-click to get a column width dialog box. D. None of the above.
Match each term in the second column with its correct definition in the first column by writing the letter of the term on the blank line in front of the correct definition.
_____ 1. Two or more computers that share resources. _____ 2. A personal computer that connects to a server. _____ 3. A network that has all connected devices or nodes located in the same physical location. _____ 4. Standards that define the way data is transmitted over a local area network. _____ 5. Creates a private network through the public network (Internet), allowing remote users to access a local area network (LAN) securely without needing dedicated lines. _____ 6. A device that connects two or more networks together. _____ 7. The rules for communication between devices. _____ 8. The act of gaining unauthorized access to a computer system or network. _____ 9. Email messages and IMs that appear to be from those you do business with, designed to trick you into revealing information, such as usernames and passwords for your accounts. _____ 10. A situation in which sensitive data is stolen or viewed by someone who is not authorized to do so. A Client B Computer network C Data breach D Ethernet E Hacking F Local area network (LAN) G Phishing H Protocols I Router J Virtual private network (VPN)