Search Header Logo

ICS - 1st Semester Vocabulary Test

Authored by Jonathan Canton

Computers

9th - 12th Grade

Used 6+ times

ICS - 1st Semester Vocabulary Test
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

175 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Trojan Horse (Virus)

Text that has been embedded with instructions to take a web page viewer to additional information.
Wireless Protected Access 2. Wireless network encryption system. Replaces WPA and provides stronger data protection and network access control.
Development and maintenance of Web pages.
A friendly URL is a Web address that is easy to read and includes words that describe the content of the webpage. For example, a company may use the URL "www.[company].com/support/" for the support section of their website.
A type of malware program that hides inside other legitimate software.

2.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Worm (Virus)

Computer virus that makes many copies of itself resulting in consumption of system resources which slows down or actually halts tasks.
To convert code from source code (a high-level language) into machine code (a low-level language).
The bar at the top of the screen that displays the name of the current window
The ownership of intangible and non-physical goods. This includes ideas, names, designs, symbols, artwork, writings, and other creations.
A hypothetical computing machine intended to help investigate the extent and limitations of what can be computed.

3.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Ransomware

A type of malware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Software that encrypts programs and data until a ransom is paid to remove it.
The bar at the top of the screen that displays the name of the current window
The embodiment of a person or idea; an electronic image that represents and is manipulated by a computer user.
A custom URL that serves as the Web address of your profile page and can be shared and bookmarked by other users. Examples include social networking sites, membership sites various web forums. Example: http://www.website.com/username.

4.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Adware

Wireless Protected Access 3. Wireless network encryption system. Replaced WPA it provides more individualized encryption by replacing the Pre-Shared Key exchange with Simultaneous Authentication of Equals.
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
The rules for combining words into grammatically sensible sentences in a given language
Development and maintenance of Web pages.
An Excel file spreadsheet created by Microsoft Excel or another spreadsheet program, such as OpenOffice Calc or Apple Numbers. It stores data in worksheets, which contain cells arranged in a grid of rows and columns, and may also contain charts, mathematical functions, styles, and formatting.

5.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Spyware

A type of malware that collects data about the user and transmits it over the Internet without the user's knowledge or permission.
Data that represented through a finite set of possible values or conditions.
A program in a high-level language before being compiled. It contains variable declarations, instructions, functions, loops, and other statements that tell the program how to function.
The successor to Wi-Fi 5 (802.11ac). It is also known as IEEE 802.11ax. It promises greater speeds and better connectivity, as well as increased support for multiple, high-bandwidth devices.
The integration of multiple forms of media. Different types of media including text, video, sound, graphics and animations.

6.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

File Format

It defines the structure and type of data stored in a file.
Data that represented through a finite set of possible values or conditions.
Organic light emitting diode. A display technology that uses electroluminescence to light red green and blue sub-pixels that not only light the display like their LED counterparts but also produce the image like the cells in a plasma display.
A relatively small proportion intended to show what the whole is like.
The embodiment of a person or idea; an electronic image that represents and is manipulated by a computer user.

7.

MULTIPLE CHOICE QUESTION

45 sec • 3 pts

Open Format

The rules for combining words into grammatically sensible sentences in a given language
An Excel file spreadsheet created by Microsoft Excel or another spreadsheet program, such as OpenOffice Calc or Apple Numbers. It stores data in worksheets, which contain cells arranged in a grid of rows and columns, and may also contain charts, mathematical functions, styles, and formatting.
Wireless Protected Access 2. Wireless network encryption system. Replaces WPA and provides stronger data protection and network access control.
A file format with an openly-published specification that anyone can use. It is the opposite of a proprietary file format, which is only used by a specific software company or application.
One of the most commonly used scripting language for use in web pages.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?