ICS - 1st Semester Vocabulary Test

ICS - 1st Semester Vocabulary Test

9th - 12th Grade

175 Qs

quiz-placeholder

Similar activities

IT test class ix

IT test class ix

9th Grade

175 Qs

Ulangkaji Sains Komputer Tgkt 4 Bab 2&3

Ulangkaji Sains Komputer Tgkt 4 Bab 2&3

11th Grade

180 Qs

math

math

KG - University

179 Qs

Computer Science Theory

Computer Science Theory

9th Grade

172 Qs

Ulangan Administrasi Inprastruktur jarinagn

Ulangan Administrasi Inprastruktur jarinagn

11th - 12th Grade

180 Qs

anyone want to try

anyone want to try

10th Grade

176 Qs

ICS - 1st Semester Vocabulary Test

ICS - 1st Semester Vocabulary Test

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Jonathan Canton

Used 6+ times

FREE Resource

175 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Trojan Horse (Virus)
Text that has been embedded with instructions to take a web page viewer to additional information.
Wireless Protected Access 2. Wireless network encryption system. Replaces WPA and provides stronger data protection and network access control.
Development and maintenance of Web pages.
A friendly URL is a Web address that is easy to read and includes words that describe the content of the webpage. For example, a company may use the URL "www.[company].com/support/" for the support section of their website.
A type of malware program that hides inside other legitimate software.

2.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Worm (Virus)
Computer virus that makes many copies of itself resulting in consumption of system resources which slows down or actually halts tasks.
To convert code from source code (a high-level language) into machine code (a low-level language).
The bar at the top of the screen that displays the name of the current window
The ownership of intangible and non-physical goods. This includes ideas, names, designs, symbols, artwork, writings, and other creations.
A hypothetical computing machine intended to help investigate the extent and limitations of what can be computed.

3.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Ransomware
A type of malware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Software that encrypts programs and data until a ransom is paid to remove it.
The bar at the top of the screen that displays the name of the current window
The embodiment of a person or idea; an electronic image that represents and is manipulated by a computer user.
A custom URL that serves as the Web address of your profile page and can be shared and bookmarked by other users. Examples include social networking sites, membership sites various web forums. Example: http://www.website.com/username.

4.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Adware
Wireless Protected Access 3. Wireless network encryption system. Replaced WPA it provides more individualized encryption by replacing the Pre-Shared Key exchange with Simultaneous Authentication of Equals.
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
The rules for combining words into grammatically sensible sentences in a given language
Development and maintenance of Web pages.
An Excel file spreadsheet created by Microsoft Excel or another spreadsheet program, such as OpenOffice Calc or Apple Numbers. It stores data in worksheets, which contain cells arranged in a grid of rows and columns, and may also contain charts, mathematical functions, styles, and formatting.

5.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Spyware
A type of malware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Data that represented through a finite set of possible values or conditions.
A program in a high-level language before being compiled. It contains variable declarations, instructions, functions, loops, and other statements that tell the program how to function.
The successor to Wi-Fi 5 (802.11ac). It is also known as IEEE 802.11ax. It promises greater speeds and better connectivity, as well as increased support for multiple, high-bandwidth devices.
The integration of multiple forms of media. Different types of media including text, video, sound, graphics and animations.

6.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

File Format
It defines the structure and type of data stored in a file.
Data that represented through a finite set of possible values or conditions.
Organic light emitting diode. A display technology that uses electroluminescence to light red green and blue sub-pixels that not only light the display like their LED counterparts but also produce the image like the cells in a plasma display.
A relatively small proportion intended to show what the whole is like.
The embodiment of a person or idea; an electronic image that represents and is manipulated by a computer user.

7.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Open Format
The rules for combining words into grammatically sensible sentences in a given language
An Excel file spreadsheet created by Microsoft Excel or another spreadsheet program, such as OpenOffice Calc or Apple Numbers. It stores data in worksheets, which contain cells arranged in a grid of rows and columns, and may also contain charts, mathematical functions, styles, and formatting.
Wireless Protected Access 2. Wireless network encryption system. Replaces WPA and provides stronger data protection and network access control.
A file format with an openly-published specification that anyone can use. It is the opposite of a proprietary file format, which is only used by a specific software company or application.
One of the most commonly used scripting language for use in web pages.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?