Technical terms
Grade:10
Technical Terms Questions
1.
A
type of program which is used to detect and remove malicious program.
2.
Set
of rules and procedures that govern transmission of message.
3.
The
law which protects intellectual properties and stop computer crime.
4.
A
type of media which is used of transmitting data and information from one
location to another with use of cable.
5.
A
technology which is used for storing text, sound, picture, animation etc. as a
digital medium.
6.
A
type of virus that infect document or template of processing package or
spreadsheet package.
7.
A
company that provides e-mail and internet to users.
8.
Sending
and receiving message, chatting to each other locally.
9.
A
device which is used for connecting two different types of computer
networks.
10. A type of harmful program that
infects master boot record of a disk.
11. A type of system which is used to
support multimedia technology.
12. Number of bits that can be
transferred per second over a given transmission media.
13. A card which is used to connect
networking cable to computer.
14. A secret code that gives the user
to access particular program and system.
15. Meeting between two or more
people located at different location in the world.
16. All computers act as both client
and server.
17. Use in computer to protect data, programs,
etc. from unauthorized persons.
18. A device which connects network
using a different communication protocol.
19. Plan formulated by the government
for the development of IT sector.
20. A system which enables voice
communication through internet.
21. A type of computer network where
two or more components are connected together via cable connection.
22. The moral dilemmas caused by the
use of computer.
23. The universe of environments,
such as the internet, in which people interact by means of connected
computers
24. The process of collecting all the
scattered files to contiguous sectors on a hard disk to increase the speed
of a computer.
25. To supply regulated power to
computer even at the time of power cut.
26. A set of programs.
27. Plan formulated by the government
for the development of IT sector.
28. A technology that makes
teaching-learning easier in a classroom.
29. A device that boosts up weak
signal and forward them.
30. Visual communication of parties
around the world.
31. The pattern of network formed by
the connection of devices on a LAN.
32. A powerful computer which
controls and co-ordinates all computers connected in a network.
33. The volume of bits that can be
transferred per second through the communication media.
34. Making duplicate copy of file or
data.
35. Illegal activities committed
through the use of computer and internet.
36. The device which is used to
connect two dissimilar network topology.
37. Committing crime using computer
and internet.
38. The process of sending file from
user's computer to web server.
39. The integration of text, audio
and animation.
40. The physical layout of local area
network.
41. The business conducted through
internet.
42. The law which controls the crime
which is done with the help of computer and internet.
43. A computer or device which
provides different services to other computers connected to the network.
44. A type of network in which every
computer works as both client and server.
45. Protocol used to receive e-mail
from the main server.
46. The moving graphic images.
47. The law that controls
cybercrime.
48. A program that can disinfect a
file from virus.
49. A person who steals or destroys
other's data, information, files and program.
50. A company which provides the
internet facilities.
51. A computer which provides
services to other computers in a network.
52. Physical layout of LAN.
53. A card through which a computer
is connected to the network.
54. Network of networks.
55. The moral principles that control
cybercrime.
56. The data carrying capacity of
communication channel.
57. An integration of text, audio,
graphics and video.
58. Network sharing and exchanging
information between different people.
59. Secret groups of character which
helps to protect file from unauthorized person.
60. A set of rules and procedures
that govern transmission of messages.
61. Learning through the electronic
media.
62. A program that can disinfect a
file from virus.
63. A person who steals or destroys
other's data, information and program.
64. A company that provides internet
services.
65. A computer in a network which can
provide services to other computers.
66. The integration of text,
graphics, audio and video.
67. A spare copy of important program
and documents.
68. Law that governs the legal issues
related to internet.
69. The method of consolidating
fragmented files on the computer.
70. The software that protects
computer from virus.
71. Physical layout of LAN.
72. A secret word that gives user
access to a particular program or computer system.
73. The data carrying capacity of
communication channel.
74. Hub or switch based network
topology.
75. A computer virus that damages the
documents created in MS-Word & MS-Excel.
76. The moral principles that control
cybercrime.
77. The device used to connect PC
with telephone line.
78. The rules that make the network
communication possible.
79. A program that effect the normal
functioning of computer.
80. A main computer in the computer
network.
81. A device which can convert analog
signal to digital codes and vice versa.
82. A company that provides the
internet facility.
83. An electric device that supply
electric current when electricity is cut off.
84. An internet tool that helps to
upload/download the file.
85. Making duplicate copy of file for
security purpose.
86. A set of rules that governs how
computer exchange information over computer network.
87. An integration of audio, video,
graphics and text.
88. Making extra copies of data or
program.
89. A card used to connect network
cable to computer.
90. Device used for power
protection.
91. Program used to detect and
eliminate computer virus.
92. Rules and format to accept and
transfer data in computer network.
93. Moral rules to be followed by
computer and other professionals.
94. Making an extra copy of data and
software.
95. A virus that corrupts system
files of operating system.
96. A secret code that gives the user
to access particular program and system.
97. The rules and regulations to
systematize the computer related technology.
98. A computer network limited within
a room.
99. A program that destroys other programs.
Technical Terms Answers
1.
antivirus
2.
protocol
3.
cyber
law
4.
bounded/wired/ guided
media
5.
multimedia
6.
macro
virus
7.
ISP
8.
IRC
9.
Router
10. Boot virus
11. Multimedia system
12. Bitrate
13. NIC
14. Password
15. Video conference
16. Peer to Peer
17. Password
18. Gateway
19. ICT policy
20. VoIP
21. LAN
22. Ethical hacking
23. Cyberspace
24. Defragmentation
25. UPS
26. Software
27. IT policy
28. Interactive white board
29. Repeater
30. Video conference
31. Star topology
32. Server
33. Bandwidth
34. Data Backup
35. Cybercrime
36. Router
37. Cybercrime
38. FTP
39. Multimedia
40. Network topology
41. Ecommerce
42. Cyber law
43. Server
44. Peer to Peer
45. POP
46. Animation
47. Cyber law
48. Antivirus
49. Hacker
50. ISP
51. Server
52. Network topology
53. NIC
54. Internet
55. Cyber Law
56. bandwidth
57. Multimedia
58. Computer networking
59. Encryption / decryption key
(Passcode)
60. Protocol
61. E-learning
62. Antivirus
63. Hacker
64. ISP
65. Server
66. Multimedia
67. Backup
68. Cyber Law
69. Defrag
70. Antivirus
71. Network Topology
72. Password
73. Bandwidth
74. Star topology
75. Macro virus
76. Cyber Law
77. MODEM
78. Protocol
79. Computer virus
80. Server
81. Modem
82. ISP
83. UPS
84. FTP
85. Backup
86. Protocol
87. Multimedia
88. Backup
89. NIC
90. UPS
91. Antivirus
92. Protocol
93. Computer ethics
94. Backup
95. Boot sector virus
96. Encryption/decryption/passcode
97. Protocol
98. LAN
99. Virus