A set of rules that determine how a computer connects to a network or the Internet is:
A computer virus that attacks and often disables anti-virus software is a (an):
1. A programming language that is used to encode web pages is:
1. A term or phrase that is created to describe a webpage, so that it can be found in a search engine is a:
1. To provide a computer security system with the proper identification to use the computer one should:
1. It provides a way for a user to interact with a computer.
1. It’s an open source software package similar to Microsoft Office.
1. To __________ information is to block it from being viewed.
1. A person who uses computers and the Internet to commit crimes such as identity theft and fraud is a:
1. FAQ stands for:
1. The process of stealing another person's personal information and using it for personal gain is:
1. The use of a computer to design things such as machines or buildings is:
The use of the Internet for software and other resources is:
1. __________ means something is easy to access and use.
1. A video format that is used to compress videos into smaller files is:
1. A computer virus that copies its code over and destroys the files of the original data is a (an):
The probability that something will function properly and without any failures is:
1. A system that can use many different types of machines is an:
The use of phrases from normal speech in search engines is:
1. A personal website that is maintained by an individual is a (an):
A display on a computer that shows commonly or recently used files and programs is a (an):
To __________ something is to add a new component or program to a computer or system.
If something responds to a user's commands it is:
1. A piece of code that is used to fix a flaw in a computer program is a:
1. A person who exploits computer hardware and software for their own purposes is a (an):
1. A group of commands to be carried out automatically is a:
A word, phrase, or image that includes a hyperlink and can be used for navigation is a (an):
A way to alter the look of text on web pages is:
1. Someone who builds a website is a:
1. If something is__________, it occurs at the end of a project or job.
A flaw in a computer program is a:
To __________ a website is to change, add, or delete certain elements, but keep others.
1. __________ isn’t an operating system.
SaaS stands for:
1. A process wherein the security of a website is determined in order to help computer users know whether or not the website is safe is:
A computer virus that becomes part of a file or disk drive but does nothing until activated by a trigger event is a (an):
1. A computer program that appears to be beneficial but is actually malicious is:
1. A small application that is embedded in a webpage is a (an):
A scripting language that is used to create dynamic web pages is:
1. A media format that can be used to add videos, animations, and other media to a website is:
1. A specific type of computer operating system is:
1. A collection of software for Linux is a:
1. The process of organizing computer files in an orderly way is:
1. A storage disc that is read by a laser and can store media tiles such as videos and images is:
1. A program that is used to create and change files is an:
1. A device that allows the user to view the electrical voltage of a machine is a (an):
A set of rules that must be followed for the sake of security is:
1. The process of preparing a document, magazine or book to be printed on a large scale is:
1. A tiny device in a person's body that releases specific amounts of medicine is a (an):
1. A webpage that displays information gathered from several different places is a:
1. The part of the computer that presents the visuals on the screen is the:
1. A service offered for any users on the Internet is a:
1. The main directory of a file system where all other branches of the system come from is the:
1. A section of common questions with their answers is:
1. A high-speed network that links computers together is a (an):
1. A computer system that has a computer virus attached to it is a (an):
1. A document that shows a person's education, work history and qualifications and is used when applying for jobs is a (an):
1. A type of computer virus that is created to gain total control over a computer system by overwriting parts of its operating system is a:
1. A type of trojan virus that tracks what keystrokes are entered into a computer is a:
1. It prevents harmful software from entering a network.
1. To __________ a website is to prevent it from loading all the way.
To __________ something is to place it in complete isolation where it cannot access or infect anything else.
1. If information is updated or shown in __________, it is updated or shown at the same time as new information is received.
1. An agreement between an advertising company and a client that outlines which types of advertisements are to be used, where they are to be placed, and how long they will appear is a:
A person whose job is to manage and maintain a computer system is a (an):
1. It destroys computer viruses, removing them from the files they have infected.
1. An advertisement that suddenly appears in a new window in an Internet browser is a:
1. The practice of labeling things with different colors in order to tell them apart is:
To __________ something is to discover it.
1. Any type of media used on a webpage, including images, animations, and videos is:
1. A device that reads and records identification labels on medications is a (an):
1. An online application that displays and organizes messages from users is a (an):
1. To delete files or data from a computer means to:
HTML stands for:
A program that restricts access on a network is a (an):
1. A synonym to “data” is:
A type of line used by businesses that connects many users at once to the Internet is:
A company that provides space for a website is called a:
1. A software application for accessing information on the World Wide Web is called a:
A search that locates all information of a specific type in a database is called a:
1. A unit of measurement that measures the speed of a CPU is called:
1. A data storage method that stores data on the hard drive is called:
1. The main Windows background screen is called a:
Programs, files and folders represented on the desktop by small images are called:
1. Double-clicking the mouse causes the program, file or folder to:
A keyboard key or combination of keys that allows you to switch between open programs is (are):
1. An application program for performing calculations using formulas is a:
1. Reducing a window until it becomes a button on the taskbar is called to:
Microsoft Office is the example of:
1. How many backspaces are available on the keyboard?
Створюйте онлайн-тести
для контролю знань і залучення учнів
до активної роботи у класі та вдома