Which of the following display standards has a resolution of 1920 1200 pixels with a 16:10 screen aspect ratio
Which of the following display standards has a resolution of 1920 1200 pixels with a 16:10 screen
aspect ratio?
Which of the following are the most likely causes of a virus attack?
Which of the following are the most likely causes of a virus attack? Each correct answer represents a
complete solution. Choose all that apply.
Which of the following is an acoustic-to-electric transducer or sensor that converts sound into an electrical
Which of the following is an acoustic-to-electric transducer or sensor that converts sound into an
electrical signal?
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monit
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard
or monitor of an employee’s computer?
Which of the following refers to the number of times a computer CRT monitor screen image is renewed in a minut
Which of the following refers to the number of times a computer CRT monitor screen image is
renewed in a minute?
Which of the following buses has a maximum data transfer rate of 2400 Mbps?
Which of the following buses has a maximum data transfer rate of 2400 Mbps?
what is displayed directly on the screen rather than indirectly with a mouse or touchpad?
Which of the following enables users to interact with what is displayed directly on the screen
rather than indirectly with a mouse or touchpad?
Which of the following data busses is used by a 168-pin Dual Inline Memory Module (DIMM)?
Which of the following data busses is used by a 168-pin Dual Inline Memory Module (DIMM)?
Which of the following is the maximum cable length supported by USB 2.0?
Which of the following is the maximum cable length supported by USB 2.0?
Which of the following actions can he take to protect his computer from unauthorized access, adware, and malwa
Mark purchases a new computer and installs the Windows 2000 Professional operating system on it.
He wants to connect the computer to the
Internet. Which of the following actions can he take to protect his computer from unauthorized
access, adware, and malware?
Each correct answer represents a complete solution. Choose two.