Course Hero Logo

24 the use of the internet cell phones or other

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 5 - 7 out of 10 pages.

24.The use of the Internet, cell phones, or other devices to send or post content intended to hurt orembarrass another person.A. identity theftC.auction fraudB. snoopwareD.Cyberbullying
25.Which of the following is the most widely used wireless network encryption for home wirelessnetworks?WEPWPE
26.When copying a table from MS Excel to MS word with a link between them so that when changes madeto source file is automatically reflected in the destination file; this process is known as
27.Copying a formula from a cell in a worksheet and pasting it to other related cell whereby cell referenceschanges automatically. This happens because of
28.With internal CSS, the styling code is writtenA. in external file.C.within body tag only.B. within style element within head element.D.within each element tag.
29.Choose the correct HTML tag for inserting table in an html document.
30.Which of the following CSS code will apply theTahomafont property to theentirehtml document?
ISF21| Final ExaminationSemester 1, 2016P ag e| 6Section BTrue/False[5 Marks]There are 10 true/false questions in this section. Write True or T and False or F as your answer in theappropriate place in the answer book.1.Cloud computing is an example of social networking site.2.Packetization refers to breaking information into small parts.3.Expert systems capture the knowledge of human expert and store it in a knowledge base.4.The logical arrangement of data in a database is called the database model.5.Data redundancy can occur due to lack of data integrity.6.Data about how the present system works is collected during the preliminary investigation phase inorder to determine the requirements of the new system.7.Selecting the best system is the first step of the systems design phase of the systems life cycle.8.Do while is an example of a sequential structure.9.A condition must be met before a sequential structure can proceed to the next statement.10.Biometric scanning devices are used to scan employee identification cards.Section CCompletion[5 Marks]There are ten fill in the blank questions in this section. Select the appropriate item from the list of wordsprovided in the box below and write your answer in the appropriate place in the answer book.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 10 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture