The unauthorized copying of software is referred to as: - CORRECT ANS-Pirated Software
There are images online that you want to use. The website states
... [Show More] that the images are not copyrighted. You think you can use these without breaking the law. These images are referred to being in NOCTI Practice Test (Latest 2023 – 2024) With Complete the what? - CORRECT ANS-Public Domain
The best security for passwords is: - CORRECT ANS-Memorize it
Eight bits equal how many bytes? - CORRECT ANS-1
One megabyte equals how many bytes? - CORRECT ANS-1,048,576
Storing data for the long term is called what? - CORRECT ANS-Archiving
A logical series of instructions given to a computer is called a what? - CORRECT ANS-Program
A technician can run a program or file on your computer that performs commonly repeated tasks. What is this program or file called? - CORRECT ANS-Script
What is one piece of hardware that can be used to prevent Carpal Tunnel Syndrome? - CORRECT ANS-Wrist Rest
Which of the following fire extinguishers should be used to put out an electrical fire? - CORRECT ANS-Class C
Of the following printers, which one actually touches the paper to print? - CORRECT ANS-Impact
What is the most popular port that can connect peripheral devices like printers? - CORRECT ANS-USB
A single-sided, single density DVD recordable has a capacity of what? - CORRECT ANS-4.7 GB
In Excel, the intersection of a row and a column is called what? - CORRECT ANS-Cell
A database file that contains all the information about a single entity is called what? - CORRECT ANS-Record
Margin, spacing, and font size are all examples of what? - CORRECT ANS-Formatting
Combining address file data with a form letter is called what? - CORRECT ANS-Mail Merge
What type of a network would you set up for use in a single building? - CORRECT ANS-LAN
A network set up where each computer could be a server or a workstation is called what? - CORRECT ANS-Peer to peer
What is the most common networking protocol? - CORRECT ANS-TCP/IP
The wireless encryption of _______ is the weakest encryption used. - CORRECT ANS-WEP [Show Less]