i
hoctot
Fragen und a
Top -Listen
Token
Stichworte
Fragen und a
Top -Listen
Token
Stichworte
Stichworte: COMPUTER BILD VIP-CLUB
This network device sends the data packet from a computer to all devices connected to it.
Windows Fotoanzeige Das Bild kann nicht angezeigt werden, da möglicherweise nicht genügend
To communicate with another computer on a network your computer sends a message called an
The _____ is the part of a computer that executes the instructions of a computer program.
Which cleaning tool should be used to remove dust from components inside a computer case?
Wie viele likes hat das meist gelikte bild auf instagram
Wer ist die tv total stimme
What is a computer that is designed to request information from a server group of answer choices?
Is an external device that attaches to a mobile computer or device which contains a power connection and provides connections to peripheral devices?
What card converts computer output into a signal that travels through a cable to the monitor which displays an image on the screen?
What address is a unique number that identifies a computer server or device connected to the Internet?
What is a number that uniquely identifies each computer or device connected to the Internet?
What is another name for a collection of data or computer instructions that tell the computer how do you work?
What do you call for the storage device that contains the operating system application software files user files and many other parts of the computer?
What do you call for the storage device that contains the operating system application software files user files and many other files of the computer?
Was bedeutet die kleine Uhr bei WhatsApp
A ______ is a program that takes complete control of your computer without your knowledge.
Which of the following is not a difference that is introduced when an entity uses the computer in processing its transactions?
Which of the following interprets program instructions and processes data in the computer?
Is a type of artificial system that enables computer to change how it functions to situations based on feedback it receives?
What type of computer system can recognize and act on patterns or trends that it detects in large sets of data and is developed to operate like the hu?
Which of the following is a computer system that can simulate the functioning of a human brain?
What is a computer based information system that keeps track of the transactions needed to conduct business?
An extremely fast computer that can perform hundreds of millions of instructions per second
Physical and mechanical components of a computer such as the monitor, mouse, chips, keyboard, etc.
Is a series of instructions that tells the hardware of a computer what to do and how do you do it?
What do you call the computer software which you configure before installing the operating system OS?
What type of hardware that is used to output the result process by the computer is called?
Is systematic way to explore the consequences of specific choices using computer software?
Which software gathers information about a computer without the users knowledge or consent?
Which of the following is a type of software that is placed on users computers without consent or knowledge while using the Internet?
What is the term for a file that attaches itself to a program then moves from computer to computer?
What do you call a software that is designed to exploit a computer system and is a broad term covering computer viruses worms Trojan etc?
Is a software or hardware device designed to gain administrator level control over a computer system without being detected?
What is the piece of programming code disguised as something else to cause an undesirable event called?
What malicious program that is disguised as a useful program but once downloaded leaves your computer on protected?
What type of malware installed on a computer without the knowledge or permission of the user and replicates itself on the computer or throughout a network?
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?
What are the required information to record on the patients chart or to enter into the computer?
Which of the following term is used to describe a vulnerable computer that is set up to entice an intruder to break into it?
Is recorded media that users can download or stream to a computer or portable media player.
Is the process of copying and archiving the computer data so that it may be used to restore its original data after a data loss event?
Club der guten laune ganze folge
What is a printed circuit board containing the principal components of a computer or other device?
What type of acquisition is done if the computer has an encrypted drive and the password or passphrase is available?
What will translate a personal characteristic into a digital code that is used to compare with a digital code stored in the computer?
Will translate a personal characteristic into a digital code that is used to compare with a digital code stored in the computer?
What are the current trends in computer hardware platform choose one of those to further analyze
Is a sequence of numbers that uniquely identifies each computer or device connected to the Internet
A software developer is the person with the training to design, create, and test computer programs.
What do you call the device that allow to communicate with the other computer through telephone lines or radio frequency?
What is the component of the processor that directs and coordinates operations in the computer?
What is the term that refers to the sequence in which a computer executes program instructions?
What type of hardware component refers to any hardware device that sends data to a computer allowing you to interact *?
Who accesses a computer or network illegally but has the intent of destroying data stealing information or other malicious action?
Which of the following is one of the downsides of a computer-based training (cbt) approach?
Vorherige
1
2
3
4
5
6
Nächste
Werbung
NEUESTEN NACHRICHTEN
A set of formalized rules and standards that describe what a company expects
1 Jahrs vor
. durch
AffiliatedTicker
How do you protect against a similar incident occurring again in the future?
1 Jahrs vor
. durch
EducationalBonus
Wann blockiert das Hinterrad beim Motorrad?
1 Jahrs vor
. durch
All-whiteBattery
Antrag auf Erhöhung des Grades der Behinderung Sachsen
1 Jahrs vor
. durch
RainyRegulator
Wer ist englischer meister geworden
1 Jahrs vor
. durch
MainCatholicism
Was macht der nat typ für einen unterschied
1 Jahrs vor
. durch
Million-dollarOverseer
Using threats or intimidation to persuade someone is which influence tactic?
1 Jahrs vor
. durch
AbandonedDispatcher
Wie spät ist es Schreib die Uhrzeit auf?
1 Jahrs vor
. durch
WealthyHearth
Süßigkeiten die es nicht mehr gibt
1 Jahrs vor
. durch
GovernmentalCutter
Was hilft gegen Migräne mit Aura
1 Jahrs vor
. durch
InsatiableEarnings
Werbung
Populer
Werbung
home
en
de
fr
ko
pt
zh
it
th
tr
Urheberrechte © © 2024
i
hoctot
Inc.