| 21. | Which of the following is an example of connectivity? |
| a. | Internet |
| b. | |
| c. | |
| d. | Data |
| 22. | The primary purpose of software is to turn data into _____ |
| a. | |
| b. | Information |
| c. | Programs |
| d. | Objects |
| 23. | To what temporary area can you store text and other data, and later paste them to another location? |
| a. | |
| b. | ROM |
| c. | |
| d. |
| 24. | _____is the science that attempts to produce machines that display the same type of intelligence that humans do. |
| a. | Nano science |
| b. | Nanotechnology |
| c. | Simulation |
| d. |
| 25. | Changing an existing document is called _____ the document. |
| a. | Creating |
| b. | Editing |
| c. | Modifying |
| d. | Adjusting |
| 26. | When sending an e-mail, the _____ line describes the contents of the message. |
| a. | To |
| b. | Subject |
| c. | Contents |
| d. | CC |
| 27. | The _____ tells the computer how to use its components. |
| a. | Utility |
| b. | Network |
| c. | |
| d. |
| 28. | What is backup? |
| a. | Adding more components to your network |
| b. | Protecting data by copying it from the original source to a different destination |
| c. | Filtering old data from the new data |
| d. | Accessing data on tape |
| 29. | One advantage of dial-up-internet access is ___ |
| a. | |
| b. | |
| c. | |
| d. |
| 30. | What is the term used for unsolicited e-mail? |
| a. | |
| b. | |
| c. | Backbone |
| d. | Spam |
