1) A set of steps for solving problems. a) Algorithm b) Stored Program c) Ethernet Cable d) Virtual Reality 2) A model inspired by the human brain. a) Checksum b) Artificial Neural Network c) Heat Sink d) Virtual Reality 3) Instructions saved in a computer's memory. a) Algorithm b) Ethernet Cable c) Stored Program d) Decimal System 4) Fast storage for frequently accessed data. a) Malware b) Gigabyte c) DevOps d) Cache Memory 5) Used to detect errors in data transmission. a) Checksum b) Cyber Attack c) Access Control: d) Client-Server 6) Protecting data by converting it into code. a) Data Encryption b) Ethernet Cable c) Binary Number System d) Bandwidth 7) An attempt to harm computer systems a) Cyber Attack: b) Runtime c) Machine Code d) Hash Function 8) An electronic proof of identity. a) Virtual Reality b) Digital Certificate c) Binary Number System d) Benchmark 9) Connects devices in a network. a) Ethernet Cable b) Heat Sink c) Bitrate d) Boot 10) Helps keep electronic components cool. a) Bus b) Benchmark c) Cloud Storage d) Heat Sink 11) Measures system performance under heavy use. a) Cloud Storage b) Binary Number System c) Load Testing d) Benchmark 12) Updating software to fix bugs. a) Cookie b) Access Control c) Heat Sink d) Patch Management 13) Virtual Reality a) Compiler b) Virtual Reality c) Phishing d) Data Science 14) Limits who can enter or use resources. a) Quantum Computing b) Bytecode c) Throughput d) Access Control: 15) Uses only 0s and 1s. a) RAM b) Scraping c) Binary Number System d) ROM 16) The standard number system based on 10. a) Decimal System b) Bytecode c) Load Balancing d) Benchmark 17) Maximum data transfer capacity. a) Malware b) Computer System c) Cookie d) Bandwidth 18) Benchmark a) Phishing b) Runtime c) Benchmark d) Scraping 19) Rate of data transmission per second. a) Cloud Storage b) Bitrate c) Compiler d) Digital Signature 20) A secure, decentralized digital ledger. a) Semiconductor Memory b) Bus c) Deep Learning d) Blockchain 21) Start up a computer system. a) Edge Computing b) Boot c) Data Science d) Cookie 22) Transfers data between computer components. a) Semaphore b) DevOps c) Bus d) Cloud Storage 23) Intermediate code executed by a virtual machine. a) Digital Signature: b) Client-Server c) Cookie d) Bytecode 24) Network model with a service provider and requestor. a) RAM b) Gigabyte c) Client-Server d) Deep Learning 25) Saving data on the internet. a) Scraping b) Cloud Storage c) Hash Function d) Command Prompt 26) Interface for typing text-based commands. a) Quantum Computing b) Malware c) Semaphore d) Command Prompt 27) Converts code into machine language. a) Load Balancing b) Algorithm c) Compiler d) Semiconductor 28) Small data file stored on a browser. a) Edge Computing b) RAM c) Cookie d) Deep Learning 29) Memory using semiconductor materials. a) Semiconductor Memory b) Load Balancing c) Spoofing d) Phishing 30) Analyzing and interpreting complex data. a) Computer System b) Machine Code c) Deep Learning d) Data Science 31) Advanced AI technique for pattern recognition. a) Quantum b) Multi-threading c) Deep Learning d) Machine Code 32) Integrating software development and operations. a) DevOps b) RAM c) Malware d) Load Balancing 33) Electronic form of signing documents. a) Load Balancing b) Malware c) Multi-threading d) Digital Signature 34) Processing data near the source. a) Cache Memory b) Machine Code c) Phishing d) Edge Computing 35) An integrated set of hardware and software. a) Runtime b) Multi-threading c) Cyber Attack d) Computer System 36) Memory used for temporary data storage. a) Machine Code b) Hash Function c) Phishing d) RAM 37) Memory for permanent data storage. a) Blockchain b) Hash Function c) Quantum Computing d) ROM 38) Equal to 1,024 megabytes. a) Data Encryption: b) Virtual Reality c) Cyber Attack d) Gigabyte 39) Maps data to a fixed size. a) Phishing b) Hash Function c) Quantum Computing d) Machine Code 40) Distributing network traffic evenly. a) Binary Number System b) Heat Sink c) Load Balancing d) Malware 41) Binary instructions executed by a CPU. a) Patch Management b) Load Balancing c) Ethernet Cable d) Machine Code 42) Malicious software designed to damage systems. a) Command Prompt b) Blockchain c) Malware d) Checksum 43) Running multiple tasks simultaneously. a) Stored Program b) Digital Certificate c) Load Testing d) Multi-threading 44) Trick users into revealing personal information. a) Cache Memory b) Phishing c) Data Encryption d) Algorithm 45) Uses quantum mechanics for computation. a) Blockchain b) Bandwidth c) Bytecode d) Quantum Computing 46) The period when a program is running. a) Blockchain b) Cyber Attack c) Runtime d) Bitrate 47) Extracting data from websites. a) Command Prompt b) Patch Management c) Ethernet Cable d) Scraping 48) Controls access to shared resources. a) Boot b) Semaphore c) Benchmark d) Decimal System 49) Faking identity to deceive. a) Patch Management b) Spoofing c) Bandwidth d) Blockchain 50) The rate of successful data processing. a) Artificial Neural Network b) Binary Number System c) Bandwidth d) Throughput
0%
COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
공유
공유
공유
만든이
Leanthai02
TH
THCS
THPT
Đại học
Giáo dục nghề nghiệp
Công nghệ
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?