11 .
__________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
A.Phishing trips
B. Computer viruses
C. Spyware scams
D.Viruses
E.Philshing scams
View AnswerAns: Phishing trips
12 .
Why is it unethical to share copyrighted files with your friends ?
A.It is not unethical, because it is legal.
B. It is unethical because files are being given for free.
C. Sharing copyrighted files without permission breaks copyright laws.
D.It is not unethical because the files are being given for free.
E.It is not unethical - anyone can access a computer
View AnswerAns: Sharing copyrighted files without permission breaks copyright laws.
13 .
Which of the following can be used to select the entire document ?
A.CTRL + A
B. ALT + F
C. SHIFT + B
D.CTRL + K
E.CTRL + H
View AnswerAns: CTRL + A
14 .
To instruct Word to fit the width of a column to the contents of a table automatically, click the button and then point to AutoFit Contents.
A.Fit to Form
B. Format
C. Autosize
D.Contents
E.Autofit
View AnswerAns: Autosize
15 .
The simultaneous processing of two or more programs by multiple processors is
A.multiprogramming
B. multitasking
C. time-sharing
D.multiprocessing
E.None of these
View AnswerAns: multiprocessing