ITE8 - Module 9 Terms

ITE8 - Module 9 Terms

12th Grade

31 Qs

quiz-placeholder

Similar activities

general knowledge

general knowledge

5th - 12th Grade

26 Qs

Navigation Internet

Navigation Internet

9th - 12th Grade

27 Qs

Arduino and Programming Errors

Arduino and Programming Errors

12th Grade

26 Qs

Chapters 1-3

Chapters 1-3

10th - 12th Grade

27 Qs

AP CS A CH 1 Review

AP CS A CH 1 Review

10th - 12th Grade

27 Qs

Evaluación Diagnóstica Google Sheets

Evaluación Diagnóstica Google Sheets

12th Grade

27 Qs

Examen Final Compiladores

Examen Final Compiladores

1st Grade - University

27 Qs

Video Games

Video Games

KG - University

28 Qs

ITE8 - Module 9 Terms

ITE8 - Module 9 Terms

Assessment

Quiz

Computers

12th Grade

Easy

Created by

PHILLIP VEET

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

broad network access

A high-quality, fast printer that uses a laser beam to create an image.
A type of network access in which capabilities are available over the network and can be accessed using smartphones, tablets, laptops, and workstations.
A device in the cloud that allows network administrators to manage network devices.
A command that is used to work with system images before they are deployed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

client-side emulator

Communication with a hardware component in a computer, which is governed by a device driver.
Both hardware and software that can be used to behave like or imitate a different system. Some uses are running an OS on a hardware platform for which it was not designed, running a Windows program on a Mac, and more.
A current that changes direction at a uniformly repetitive rate. This type of electricity typically is provided by a utility company and is accessed through wall sockets.
An iOS search field that shows suggestions from many sources, including the device itself, the Internet, iTunes, the App Store, and nearby locations.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

cloud computing

A technology that separates applications from hardware and provides on-demand delivery of computing services over the network.
A tool for transferring selected files, folders, profiles, and applications from an old Windows PC to a Windows 10 PC.
Ways to accomplish authentication, including using passwords, two-factor authentication, tokens, biometrics, and OTP.
A virus that attacks device firmware.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

cloud computing services

An option that starts Windows and loads the command prompt instead of the GUI.
The delivery of computing services that are owned and hosted by service providers.
A command used to change the current directory to the path specified after the command in Linux, Microsoft CLI, PowerShell, and other CLIs.
An iOS search field that shows suggestions from many sources, including the device itself, the Internet, iTunes, the App Store, and nearby locations.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

cloud service provider

A company that provides various services tailored to meet customer requirements.
A collection of tools and technologies designed to help deploy Microsoft Windows operating system images.
A device that increases the functionality of a computer by adding controllers for specific devices or by replacing malfunctioning ports.
Another term for an expansion card.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

community cloud

A technician who is typically more knowledgeable and experienced than a level one technician or who has been working for the company for a longer period of time and receives an escalated work order with the description of the problem and then calls the customer back to ask any additional questions and resolves the problem.
A cloud for exclusive use by specific entities or organizations that is customized for the community.
Distributed denial of service; an attack that completely overwhelms a target device by having many infected hosts called zombies send false requests to create a denial of service condition for legitimate users.
An Internet standard that extends the text-based email format to include other formats, such as pictures and word processor documents and that is normally used in conjunction with SMTP.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

guest operating system (guest OS)

A protocol that allows networking devices to send their system messages across the network to syslog servers.
An extension to Secure Shell (SSH) protocol that can be used to establish a secure file transfer session.
The operating system that is running in a VM.
A backlight that shines through an LED screen and illuminates the display.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?