
ICS - 1st Semester Vocabulary Test
Authored by Jonathan Canton
Computers
9th - 12th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
175 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 3 pts
Trojan Horse (Virus)
Text that has been embedded with instructions to take a web page viewer to additional information.
Wireless Protected Access 2. Wireless network encryption system. Replaces WPA and provides stronger data protection and network access control.
Development and maintenance of Web pages.
A friendly URL is a Web address that is easy to read and includes words that describe the content of the webpage. For example, a company may use the URL "www.[company].com/support/" for the support section of their website.
A type of malware program that hides inside other legitimate software.
2.
MULTIPLE CHOICE QUESTION
45 sec • 3 pts
Worm (Virus)
Computer virus that makes many copies of itself resulting in consumption of system resources which slows down or actually halts tasks.
To convert code from source code (a high-level language) into machine code (a low-level language).
The bar at the top of the screen that displays the name of the current window
The ownership of intangible and non-physical goods. This includes ideas, names, designs, symbols, artwork, writings, and other creations.
A hypothetical computing machine intended to help investigate the extent and limitations of what can be computed.
3.
MULTIPLE CHOICE QUESTION
45 sec • 3 pts
Ransomware
A type of malware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Software that encrypts programs and data until a ransom is paid to remove it.
The bar at the top of the screen that displays the name of the current window
The embodiment of a person or idea; an electronic image that represents and is manipulated by a computer user.
A custom URL that serves as the Web address of your profile page and can be shared and bookmarked by other users. Examples include social networking sites, membership sites various web forums. Example: http://www.website.com/username.
4.
MULTIPLE CHOICE QUESTION
45 sec • 3 pts
Adware
Wireless Protected Access 3. Wireless network encryption system. Replaced WPA it provides more individualized encryption by replacing the Pre-Shared Key exchange with Simultaneous Authentication of Equals.
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
The rules for combining words into grammatically sensible sentences in a given language
Development and maintenance of Web pages.
An Excel file spreadsheet created by Microsoft Excel or another spreadsheet program, such as OpenOffice Calc or Apple Numbers. It stores data in worksheets, which contain cells arranged in a grid of rows and columns, and may also contain charts, mathematical functions, styles, and formatting.
5.
MULTIPLE CHOICE QUESTION
45 sec • 3 pts
Spyware
A type of malware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Data that represented through a finite set of possible values or conditions.
A program in a high-level language before being compiled. It contains variable declarations, instructions, functions, loops, and other statements that tell the program how to function.
The successor to Wi-Fi 5 (802.11ac). It is also known as IEEE 802.11ax. It promises greater speeds and better connectivity, as well as increased support for multiple, high-bandwidth devices.
The integration of multiple forms of media. Different types of media including text, video, sound, graphics and animations.
6.
MULTIPLE CHOICE QUESTION
45 sec • 3 pts
File Format
It defines the structure and type of data stored in a file.
Data that represented through a finite set of possible values or conditions.
Organic light emitting diode. A display technology that uses electroluminescence to light red green and blue sub-pixels that not only light the display like their LED counterparts but also produce the image like the cells in a plasma display.
A relatively small proportion intended to show what the whole is like.
The embodiment of a person or idea; an electronic image that represents and is manipulated by a computer user.
7.
MULTIPLE CHOICE QUESTION
45 sec • 3 pts
Open Format
The rules for combining words into grammatically sensible sentences in a given language
An Excel file spreadsheet created by Microsoft Excel or another spreadsheet program, such as OpenOffice Calc or Apple Numbers. It stores data in worksheets, which contain cells arranged in a grid of rows and columns, and may also contain charts, mathematical functions, styles, and formatting.
Wireless Protected Access 2. Wireless network encryption system. Replaces WPA and provides stronger data protection and network access control.
A file format with an openly-published specification that anyone can use. It is the opposite of a proprietary file format, which is only used by a specific software company or application.
One of the most commonly used scripting language for use in web pages.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?