Internet Vocabulary Notebook Check #2 - CTEA

Internet Vocabulary Notebook Check #2 - CTEA

12th Grade

11 Qs

quiz-placeholder

Similar activities

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

คำถาม เรื่อง การวิเคราะห์ข้อมูลเชิงพรรณนา

คำถาม เรื่อง การวิเคราะห์ข้อมูลเชิงพรรณนา

12th Grade

15 Qs

ZOOM QUIZ

ZOOM QUIZ

1st - 12th Grade

10 Qs

loop while/do while

loop while/do while

7th - 12th Grade

10 Qs

Chapter 6 Part 2 - 4

Chapter 6 Part 2 - 4

11th - 12th Grade

11 Qs

Ulangan harian 1 Algoritma dan Pemrograman

Ulangan harian 1 Algoritma dan Pemrograman

12th Grade - University

13 Qs

EMPTECH L4 Q3

EMPTECH L4 Q3

12th Grade

10 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Internet Vocabulary Notebook Check #2 - CTEA

Internet Vocabulary Notebook Check #2 - CTEA

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Mr. Martin

Used 25+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

is the method used to transfer Web pages to your computer. With hypertext, a word or phrase can contain a link to another Web site.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • an addressing system that manages the paths used to send data to distant computers

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • a reliable transmission system that sends and tracks data (in binary sequences) that are split into small packets sent separately

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • The hierarchical addressing protocol that is human-readable.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

  • the protocol that is commonly used to transfer e-mails is called this .

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

an attack that consists of sending a lot of requests to a server at the same time (for instance, requests for a web page or some data). This can overload the server's network bandwidth.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An attack, in which the attacker first uses viruses (or similar self-spreading software) to take control of many (sometimes tens of thousands of) computers around the world.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?