Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
New Perspectives Microsoft Office 365 and Access 2019 Comprehensive
Quiz 7: Computer History and Components
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 661
True/False
Phishing emails are disguised as emails from a trusted source and sent by hackers; they deceive the recipient by getting them to reveal personal or financial information.
Question 662
True/False
Using speech recognition software, a device can identify the words in your speech and display them on the screen.
Question 663
True/False
The practice of social curation is when a website provides links to other relevant websites in its field.
Question 664
True/False
Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced it.
Question 665
True/False
You can use a cloud server to back up your data.
Question 666
Multiple Choice
What type of cyberattack is used to trick a user into giving valuable information to an attacker?
Question 667
Multiple Choice
Rita is designing a digital card on her cellphone for her mother's birthday. She wants to crop out certain portions of her mother's photograph to use on the card. Which of these apps can she use to do this?