ITE8 - Chapter 3 Terms

ITE8 - Chapter 3 Terms

12th Grade

97 Qs

quiz-placeholder

Similar activities

Informatika 7_17112022

Informatika 7_17112022

12th Grade

100 Qs

Principles of Information Technology EOC 2021

Principles of Information Technology EOC 2021

9th - 12th Grade

95 Qs

JS- Animation Basics - Intro to Programming - KhanAcademy

JS- Animation Basics - Intro to Programming - KhanAcademy

9th - 12th Grade

100 Qs

Computer Science Principals Final

Computer Science Principals Final

9th - 12th Grade

102 Qs

Computers and E-safety Quizz

Computers and E-safety Quizz

9th - 12th Grade

95 Qs

SOAL IFRC 2024 TRY OUT 1

SOAL IFRC 2024 TRY OUT 1

12th Grade

100 Qs

Python List

Python List

8th Grade - University

100 Qs

Computer Science  Vocabulary Practice

Computer Science Vocabulary Practice

9th - 12th Grade

100 Qs

ITE8 - Chapter 3 Terms

ITE8 - Chapter 3 Terms

Assessment

Quiz

Computers

12th Grade

Medium

Created by

PHILLIP VEET

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

97 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

aspect ratio

A device that electronically captures a person's signature.
An interface that allows the operating system to control power management. Replaces Advanced Power Management (APM). Allows technicians to create power management schemes to get the best performance from a laptop.
A snapshot that contains information about a computer's operating system, installed programs, and Registry settings.
The horizontal to vertical measurement of the viewing area of a monitor.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

basic input/output system (BIOS)

An older version of computer firmware that is responsible for hardware initialization, the power-on self-test (POST), and locating the Master Boot Record (MBR).
An in-person attack in which an attacker rummages through trash bins to discover confidential documents.
In a virtual machine, the memory needed for the host OS to meet the requirements of each VM and its guest OS.
A key that is used with asymmetric key encryption and that is paired with a public key. Public and private keys are paired for secure communication, such as email. The private key is kept by an individual and must not be disclosed to any other party.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

beep codes

An audible reporting system for errors the BIOS finds during the POST.
Hypertext Transfer Protocol; a protocol that provides a set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.
Trojan Malware that actively attempts to steal confidential information, such as credit card numbers, by recording keystrokes entered into a web form.
A printer in which a pulse of electrical current is applied to heating chambers around the nozzles to create a bubble of steam in the chamber. The steam forces ink out through the nozzle and onto the paper.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

blackout

A single integrated circuit that contains more than one CPU core.
A Windows component that shows the history of application, security, and Windows system events.
A complete loss of AC power.
A measurement of the difference in intensity of light between the brightest point (white) and the darkest point (black).

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

boot loader program

A card that provides additional USB ports to connect a computer to peripheral devices.
A program that is configured to locate and load an operating system from the boot device.
A drive that makes it possible to access a single file, specific folders, or an entire drive between different operating systems over a network.
The electronic version of PHI, which includes patient names, addresses, dates of visits, telephone and fax numbers, and email addresses.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

boot order

The sequence in which a computer should check devices for the operating system's boot files.
A feature in Windows 7, 8, 8.1, and 10 that enables a user to minimize all windows that are not being used by clicking and holding the title bar of one window and shaking it with the mouse. Repeat the action to maximize all of the windows.
A device that is similar to a smartwatch but that is limited to monitoring a person's physical activity, sleep, and exercise.
A security feature that is used to find a lost or stolen device.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

booting

A transmission technique that uses different frequencies to send multiple signals over the same medium.
The backbone of a computer. It is a printed circuit board (PCB) that contains buses, or electrical pathways, that interconnect electronic components.
The process of turning on a device and beginning the startup sequence, verifying hardware, and loading operating system software.
A single CPU with six cores inside it.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?