ASCII is a coding system that provides_____________
(A) 256 different characters
(B) 512 different characters
(C) 1024 different characters
(D) 128 different characters
___________is the process of dividing the disk into tracks and sectors
(A) Tracking
(B) Formatting
(C) Crashing
(D) Allotting
The process of transferring files from a computer on the Internet to your computer is called_____________
(A) Downloading
(B) uploading
(C) FTP
(D) JPEG
A DVD is an example of a (n)___________
(A) hard disk
(B) optical disc
(C) output device
(D) solid-state storage device
To access properties of an object, the mouse technique to use is_____________
(A) Dragging
(B) dropping
(C) right-clicking
(D) shift-clicking
A person who used his or her expertise to gain access to other people’s computers to get information illegally or do damage is a____________
(A) Hacker
(B) spammer
(C) instant messenger
(D) programmer
A device that connects to a network without the use of cables is said to be___________
(A) Distributed
(B) free
(C) centralized
(D) none of these
Why is it unethical to share copyrighted files with your friends
(A) It is not unethical, because it is legal.
(B) It is unethical because the files are being given for free.
(C) Sharing copyrighted files without permission breaks copyright laws.
(D) It is not unethical because the files are being given for fre