1) A set of steps for solving problems. a) Algorithm b) Stored Program c) Ethernet Cable d) Virtual Reality 2) A model inspired by the human brain. a) Checksum b) Artificial Neural Network c) Heat Sink d) Virtual Reality 3) Instructions saved in a computer's memory. a) Algorithm b) Ethernet Cable c) Stored Program d) Decimal System 4) Fast storage for frequently accessed data. a) Malware b) Gigabyte c) DevOps d) Cache Memory 5) Used to detect errors in data transmission. a) Checksum b) Cyber Attack c) Access Control: d) Client-Server 6) Protecting data by converting it into code. a) Data Encryption b) Ethernet Cable c) Binary Number System d) Bandwidth 7) An attempt to harm computer systems a) Cyber Attack: b) Runtime c) Machine Code d) Hash Function 8) An electronic proof of identity. a) Virtual Reality b) Digital Certificate c) Binary Number System d) Benchmark 9) Connects devices in a network. a) Ethernet Cable b) Heat Sink c) Bitrate d) Boot 10) Helps keep electronic components cool. a) Bus b) Benchmark c) Cloud Storage d) Heat Sink 11) Measures system performance under heavy use. a) Cloud Storage b) Binary Number System c) Load Testing d) Benchmark 12) Updating software to fix bugs. a) Cookie b) Access Control c) Heat Sink d) Patch Management 13) Virtual Reality a) Compiler b) Virtual Reality c) Phishing d) Data Science 14) Limits who can enter or use resources. a) Quantum Computing b) Bytecode c) Throughput d) Access Control: 15) Uses only 0s and 1s. a) RAM b) Scraping c) Binary Number System d) ROM 16) The standard number system based on 10. a) Decimal System b) Bytecode c) Load Balancing d) Benchmark 17) Maximum data transfer capacity. a) Malware b) Computer System c) Cookie d) Bandwidth 18) Benchmark a) Phishing b) Runtime c) Benchmark d) Scraping 19) Rate of data transmission per second. a) Cloud Storage b) Bitrate c) Compiler d) Digital Signature 20) A secure, decentralized digital ledger. a) Semiconductor Memory b) Bus c) Deep Learning d) Blockchain 21) Start up a computer system. a) Edge Computing b) Boot c) Data Science d) Cookie 22) Transfers data between computer components. a) Semaphore b) DevOps c) Bus d) Cloud Storage 23) Intermediate code executed by a virtual machine. a) Digital Signature: b) Client-Server c) Cookie d) Bytecode 24) Network model with a service provider and requestor. a) RAM b) Gigabyte c) Client-Server d) Deep Learning 25) Saving data on the internet. a) Scraping b) Cloud Storage c) Hash Function d) Command Prompt 26) Interface for typing text-based commands. a) Quantum Computing b) Malware c) Semaphore d) Command Prompt 27) Converts code into machine language. a) Load Balancing b) Algorithm c) Compiler d) Semiconductor 28) Small data file stored on a browser. a) Edge Computing b) RAM c) Cookie d) Deep Learning 29) Memory using semiconductor materials. a) Semiconductor Memory b) Load Balancing c) Spoofing d) Phishing 30) Analyzing and interpreting complex data. a) Computer System b) Machine Code c) Deep Learning d) Data Science 31) Advanced AI technique for pattern recognition. a) Quantum b) Multi-threading c) Deep Learning d) Machine Code 32) Integrating software development and operations. a) DevOps b) RAM c) Malware d) Load Balancing 33) Electronic form of signing documents. a) Load Balancing b) Malware c) Multi-threading d) Digital Signature 34) Processing data near the source. a) Cache Memory b) Machine Code c) Phishing d) Edge Computing 35) An integrated set of hardware and software. a) Runtime b) Multi-threading c) Cyber Attack d) Computer System 36) Memory used for temporary data storage. a) Machine Code b) Hash Function c) Phishing d) RAM 37) Memory for permanent data storage. a) Blockchain b) Hash Function c) Quantum Computing d) ROM 38) Equal to 1,024 megabytes. a) Data Encryption: b) Virtual Reality c) Cyber Attack d) Gigabyte 39) Maps data to a fixed size. a) Phishing b) Hash Function c) Quantum Computing d) Machine Code 40) Distributing network traffic evenly. a) Binary Number System b) Heat Sink c) Load Balancing d) Malware 41) Binary instructions executed by a CPU. a) Patch Management b) Load Balancing c) Ethernet Cable d) Machine Code 42) Malicious software designed to damage systems. a) Command Prompt b) Blockchain c) Malware d) Checksum 43) Running multiple tasks simultaneously. a) Stored Program b) Digital Certificate c) Load Testing d) Multi-threading 44) Trick users into revealing personal information. a) Cache Memory b) Phishing c) Data Encryption d) Algorithm 45) Uses quantum mechanics for computation. a) Blockchain b) Bandwidth c) Bytecode d) Quantum Computing 46) The period when a program is running. a) Blockchain b) Cyber Attack c) Runtime d) Bitrate 47) Extracting data from websites. a) Command Prompt b) Patch Management c) Ethernet Cable d) Scraping 48) Controls access to shared resources. a) Boot b) Semaphore c) Benchmark d) Decimal System 49) Faking identity to deceive. a) Patch Management b) Spoofing c) Bandwidth d) Blockchain 50) The rate of successful data processing. a) Artificial Neural Network b) Binary Number System c) Bandwidth d) Throughput

Papan Peringkat

Gaya visual

Pilihan

Berganti templat

Pulihkan simpan otomatis: ?