Sie sind auf Seite 1von 3

NAME :

I. IDENTIFICATION

1. Contains a group of computers that can be accessed and


administered with a common set of rules

2. Is software, consisting of programs and data, that runs on


computers and manages computer hardware resources and
provides common services for efficient execution of various
application software.

3. Is a hardware device that routes data from a local area


network (LAN) to another network connection. Acts like a
coin sorting machine, allowing only authorized machines to
connect to other computer

4. Is usually a numerical label assigned to each device (e.g.,


computer, printer) participating in a computer network that
uses the Internet Protocol for communication. Serves two
principal functions: host or network interface identification
and location addressing.

5. Use to identify the computer and is useful in connecting to


shared folders and devices.

6. Is the address of a specific Web site or file on the Internet.

7. Is a computer program which reproduces. The term is


commonly used to refer to a range of malware. To distribute
itself, it needs to execute or otherwise be interpreted. Often
hide themselves inside other programs to be executed. It
reproduces by making, possibly evolved, copies of itself in
the computer's memory, storage, or over a net.

8. Is a private computer network that uses Internet protocols,


network connectivity, and possibly the public
telecommunication system to securely share part of an
organization's information or operations with its employees.

9. Is the most common cable used in computer networking. It is


a variant of twisted pair cabling. Are often called ethernet
cables after Ethernet, the most common data networking
standard.
10. Is a group of computers and associated devices that share a
common communications line or wireless link.

11.Is a name that uniquely identifies someone on a computer


system

12.Is a string of characters used for authenticating a user on a


computer
system.

13.the command line interpreter in Windows operating systems

14.is a part of the Microsoft Windows graphical user interface


which allows users to view and manipulate basic system
settings and controls via applets, such as adding hardware,
adding and removing software, controlling user accounts,
and changing accessibility options.

15.Is a software application for retrieving, presenting, and


traversing information resources on the World Wide Web. An
information resource is identified by a Uniform Resource
Identifier (URI) and may be a web page, image, video, or
other piece of content.

16.Is a device or set of devices designed to permit or deny


network transmissions based upon a set of rules and is
frequently used to protect networks from unauthorized
access while permitting legitimate communications to pass.

17.Shows installed printers and fax printers and helps you add
new ones

18.Change the appearance of your desktop , such as the


background , screen saver, fonts, sizes and screen
resolution .

19.Configures administrative settings for your computer

20.Add, removes and configures Open Database Connectivity


databases sources and drives.

II. INDICATE THE SHORTCUT KEYS OF THE FOLLOWING COMMONLY USED


CONTROL KEYS :
1. Cut selected item

2. Copy selected item

3. Paste selected item

4. Select All item

5. Show Desktop

6. Lock Computer

7. Italics

8. Bold

9. Underline

10.Capture snapshot of desktop

11.Capture snapshot of current window

12.File Menu Options

13.Goes to end of document

14.Goes to beginning of document

15.Switch Between Open Applications

Das könnte Ihnen auch gefallen