'Module 7: Securing Your System - Protecting Your
Digital Data and Devices'. You have time 00:30:00.
1. For complete protection when backing up your files, you should use a program that creates a(n) _ of
your entire system.
'Module 6: Networking - Connecting Computing
Devices'. You have time 00:30:00.
1. Normal telephone wire is composed of _ cable, which consists of copper wires wrapped around each
other and covered in a plastic jacket.
Keeping your data safe
Cybercrime: criminal action perpetrated primarily through the use of a computer.
Cybercriminals are individuals who use computer, networks and the internet to
The internet crime complaint center (IC3) is
A computer network is 2 or more computers that are connected via software and
hardware so that they can communicate with each other.
Each device is connected to a network is referred to as a node, it can be a peripheral,
Topic 1: Information technology, the Internet and You
1. A _ is used for analyzing and summarizing numerical data.
b- database management system
d- word processor
2. Which of the following is NOT a part of hardware?