ITE8 - Module 10 Terms

ITE8 - Module 10 Terms

12th Grade

71 Qs

quiz-placeholder

Similar activities

CTEC IT Revision

CTEC IT Revision

12th Grade

74 Qs

Intro to Technology Software Pop Quiz

Intro to Technology Software Pop Quiz

9th - 12th Grade

70 Qs

Y11 Architecture & Primary Homework

Y11 Architecture & Primary Homework

12th Grade

75 Qs

Kiến thức về mạng máy tính

Kiến thức về mạng máy tính

12th Grade - University

69 Qs

Systemy operacyjne 2

Systemy operacyjne 2

12th Grade

76 Qs

ÔN TẬP KIỂM TRA GKI - TIN HỌC 12 - KNTT - ICT

ÔN TẬP KIỂM TRA GKI - TIN HỌC 12 - KNTT - ICT

12th Grade

67 Qs

Topic 4.2, 4.3, 4.4, 4.5

Topic 4.2, 4.3, 4.4, 4.5

12th Grade

66 Qs

Informatika_XII

Informatika_XII

12th Grade - University

75 Qs

ITE8 - Module 10 Terms

ITE8 - Module 10 Terms

Assessment

Quiz

Computers

12th Grade

Medium

Created by

PHILLIP VEET

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

71 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

active partition

The electronic version of PHI, which includes patient names, addresses, dates of visits, telephone and fax numbers, and email addresses.
On MBR disks, the partition used to store and boot an operating system.
Apps for mobile devices that can monitor app activity and prevent connections to specific ports or IP addresses.
In virtual computing, space for very large files, such as operating systems, applications, and all the VM data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Administrator account

An account that has complete control over a computer and that can change settings globally, install programs, and get through User Account Control (UAC) when elevation to perform a task is required.
To view Windows desktop icons that are behind open windows by placing your cursor over the Show Desktop button at the right edge of the taskbar.
A point in a network where there are no backup servers to handle the failure.
A contract that outlines the legal use or redistribution of software.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

answer file

A term to describe the international, regional, country, and state laws that affect computer security professionals.
Software that relies on code signatures, which are files containing a sample of the code used by viruses and malware. Based on these signature files, the software scans the contents of a computer disk, comparing the contents of the files stored on the disk with the samples stored in the signature file.
Applications; programs that are executed on mobile devices. Mobile devices come with a number of different apps preinstalled to provide basic functionality.
A file that contains simple text that instructs Windows Setup how to configure and install the OS.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

applications

A Windows Control Panel item that allows all users to view basic system information, access tools, and configure advanced system settings.
Software programs that enable you to perform specific tasks, such as word processors, databases, spreadsheets, and games.
A connection that uses a satellite dish for two-way communication. The dish transmits and receives signals to and from a satellite that relays these signals back to a service provider.
A Windows utility that is used to perform backups.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

application programming interface (API)

An interface that allows the operating system to control power management. Replaces Advanced Power Management (APM). Allows technicians to create power management schemes to get the best performance from a laptop.
The Windows Control Panel item where many of the most commonly used file and folder options can be found.
A set of guidelines that programmers follow to ensure that a new application is compatible with an OS.
A technique used to make a processor work at a faster speed than its original specification.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

basic disk

A type of DoS attack that exploits the TCP three-way handshake. The attacker sends continuous false SYN requests to the target. The target is eventually overwhelmed and unable to establish valid SYN requests, creating a DoS attack.
The default disk type in Windows, which contains partitions such as primary and extended as well as logical drives that are formatted for data storage.
Radio frequency identification; a form of wireless communication that uses the frequencies in the 125 MHz to 960 MHz range to uniquely identify items.
A standardized physical network interface for connecting telecommunications or data equipment. The most common twisted-pair connector is an 8-position, 8-contact (8P8C) modular plug and jack.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

clean install

An OS installation in which all components of any previous version of the software are removed prior to installation.
A database that contains settings for Windows and for applications that use the Registry.
Encryption that ensures the confidentiality of a message by requiring both sides of an encrypted conversation to use an encryption key to encode and decode the data.The sender and receiver must use identical keys.
A compiled language that needs to be converted into executable code using a compiler. It is a low-level programming language that adds object-oriented features to its base language C.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?