A. Red Hat Linux
B. Microsoft Office
F. Apple OSX
E. Microsoft Windows
D. Microsoft Visual Basic
Delete the text and then re-type it.
Highlight the text, and then drag it into place with the mouse.
Highlight the text, and press the up or down arrows to move it.
Highlight the text, right-click, and use the "Cut" and "Paste" functions.
Highlight the text, press ctrl-x then select the place you would like to text to appear and press ctrl-v
Do nothing. You can use this material in your essay freely.
List the website in a bibliography at the end of your essay.
Type the information in bold letters.
Type the information in italic letters.
You must download the image directly into the document.
Save the image into a folder, and then select "Insert Image" on the essay or presentation.
Right-click the image, select "Copy," then right-click in your essay or presentation and select "Paste."
Drag the image from the browser to your document.
This cannot be done, you must have the picture on your local computer to begin with.
VOIP (voice over IP internet phone service)
Accessing a huge encyclopedia like Wikipedia
Streaming high definition video
Downloading historic speeches
Physical shocks may destroy the memory of this devices
This is a hard disk drive
This device will provide random access to stored items
This is an example of solid state memory
The head on the arm moves back and forth as the disk spins, reading and/or writing data.
IR - radio transmission
Bluetooth - PDA and cell phone syncing
802.11 - Wi-Fi
Ethernet – Local Area network
Wi-Fi - Wireless networks
Visible spectrum of light (infrared through ultraviolet)
Logic gates (true / false)
Scantron (graphite mark / no graphite mark)
Punch card (hole punched or not punched)
A scanned file of sheet music
An Excel file
An original painting by Monet
A video transmission while teleconferencing
The image of your computer pictured above
A spreadsheet application
A database Application
A word processing application
A graphics application
Physical protection for a computer
Transfer data from one network to another.
A way to stay warm in a computer lab
The way tech support can know whether there is a problem with a computer or network
To protect a network from unwanted or malicious data