Technical terms

Grade:10

Technical Terms Questions 

1.      A type of program which is used to detect and remove malicious program. 

2.      Set of rules and procedures that govern transmission of message. 

3.      The law which protects intellectual properties and stop computer crime. 

4.      A type of media which is used of transmitting data and information from one location to another with use of cable. 

5.      A technology which is used for storing text, sound, picture, animation etc. as a digital medium. 

6.      A type of virus that infect document or template of processing package or spreadsheet package. 

7.      A company that provides e-mail and internet to users. 

8.      Sending and receiving message, chatting to each other locally. 

9.      A device which is used for connecting two different types of computer networks. 

10.  A type of harmful program that infects master boot record of a disk. 

11.  A type of system which is used to support multimedia technology. 

12.  Number of bits that can be transferred per second over a given transmission media. 

13.  A card which is used to connect networking cable to computer. 

14.  A secret code that gives the user to access particular program and system.

15.  Meeting between two or more people located at different location in the world. 

16.  All computers act as both client and server. 

17.  Use in computer to protect data, programs, etc. from unauthorized persons.

18.  A device which connects network using a different communication protocol. 

19.  Plan formulated by the government for the development of IT sector. 

20.  A system which enables voice communication through internet. 

21.  A type of computer network where two or more components are connected together via cable connection. 

22.  The moral dilemmas caused by the use of computer. 

23.  The universe of environments, such as the internet, in which people interact by means of connected computers 

24.  The process of collecting all the scattered files to contiguous sectors on a hard disk to increase the speed of a computer. 

25.  To supply regulated power to computer even at the time of power cut.

26.  A set of programs. 

27.  Plan formulated by the government for the development of IT sector. 

28.  A technology that makes teaching-learning easier in a classroom. 

29.  A device that boosts up weak signal and forward them. 

30.  Visual communication of parties around the world. 

31.  The pattern of network formed by the connection of devices on a LAN.

32.  A powerful computer which controls and co-ordinates all computers connected in a network. 

33.  The volume of bits that can be transferred per second through the communication media. 

34.  Making duplicate copy of file or data. 

35.  Illegal activities committed through the use of computer and internet. 

36.  The device which is used to connect two dissimilar network topology. 

37.  Committing crime using computer and internet. 

38.  The process of sending file from user's computer to web server. 

39.  The integration of text, audio and animation. 

40.  The physical layout of local area network. 

41.  The business conducted through internet. 

42.  The law which controls the crime which is done with the help of computer and internet. 

43.  A computer or device which provides different services to other computers connected to the network. 

44.  A type of network in which every computer works as both client and server. 

45.  Protocol used to receive e-mail from the main server. 

46.  The moving graphic images. 

47.  The law that controls cybercrime. 

48.  A program that can disinfect a file from virus. 

49.  A person who steals or destroys other's data, information, files and program. 

50.  A company which provides the internet facilities. 

51.  A computer which provides services to other computers in a network.

52.  Physical layout of LAN. 

53.  A card through which a computer is connected to the network. 

54.  Network of networks. 

55.  The moral principles that control cybercrime. 

56.  The data carrying capacity of communication channel. 

57.  An integration of text, audio, graphics and video. 

58.  Network sharing and exchanging information between different people. 

59.  Secret groups of character which helps to protect file from unauthorized person. 

60.  A set of rules and procedures that govern transmission of messages.

61.  Learning through the electronic media. 

62.  A program that can disinfect a file from virus. 

63.  A person who steals or destroys other's data, information and program.

64.  A company that provides internet services. 

65.  A computer in a network which can provide services to other computers.

66.  The integration of text, graphics, audio and video. 

67.  A spare copy of important program and documents. 

68.  Law that governs the legal issues related to internet. 

69.  The method of consolidating fragmented files on the computer. 

70.  The software that protects computer from virus.

71.  Physical layout of LAN. 

72.  A secret word that gives user access to a particular program or computer system. 

73.  The data carrying capacity of communication channel. 

74.  Hub or switch based network topology. 

75.  A computer virus that damages the documents created in MS-Word & MS-Excel. 

76.  The moral principles that control cybercrime.  

77.  The device used to connect PC with telephone line. 

78.  The rules that make the network communication possible. 

79.  A program that effect the normal functioning of computer. 

80.  A main computer in the computer network. 

81.  A device which can convert analog signal to digital codes and vice versa. 

82.  A company that provides the internet facility. 

83.  An electric device that supply electric current when electricity is cut off. 

84.  An internet tool that helps to upload/download the file. 

85.  Making duplicate copy of file for security purpose. 

86.  A set of rules that governs how computer exchange information over computer network.

87.  An integration of audio, video, graphics and text. 

88.  Making extra copies of data or program. 

89.  A card used to connect network cable to computer. 

90.  Device used for power protection. 

91.  Program used to detect and eliminate computer virus. 

92.  Rules and format to accept and transfer data in computer network.

93.  Moral rules to be followed by computer and other professionals. 

94.  Making an extra copy of data and software. 

95.  A virus that corrupts system files of operating system. 

96.  A secret code that gives the user to access particular program and system. 

97.  The rules and regulations to systematize the computer related technology. 

98.  A computer network limited within a room. 

99.  A program that destroys other programs. 

Technical Terms Answers 


1.      antivirus 

2.      protocol 

3.      cyber law 

4.      bounded/wired/ guided media

5.      multimedia

6.      macro virus

7.      ISP

8.      IRC

9.      Router

10.  Boot virus

11.  Multimedia system

12.  Bitrate

13.  NIC

14.  Password

15.  Video conference

16.  Peer to Peer

17.  Password

18.  Gateway

19.  ICT policy

20.  VoIP

21.  LAN

22.  Ethical hacking

23.  Cyberspace

24.  Defragmentation

25.  UPS

26.  Software

27.  IT policy

28.  Interactive white board

29.  Repeater

30.  Video conference

31.  Star topology

32.  Server

33.  Bandwidth

34.  Data Backup

35.  Cybercrime

36.  Router

37.  Cybercrime

38.  FTP

39.  Multimedia

40.  Network topology

41.  Ecommerce

42.  Cyber law

43.  Server

44.  Peer to Peer

45.  POP

46.  Animation

47.  Cyber law

48.  Antivirus

49.  Hacker

50.  ISP

51.  Server

52.  Network topology

53.  NIC

54.  Internet

55.  Cyber Law

56.  bandwidth

57.  Multimedia

58.  Computer networking

59.  Encryption / decryption key (Passcode)

60.  Protocol

61.  E-learning

62.  Antivirus

63.  Hacker

64.  ISP

65.  Server

66.  Multimedia

67.  Backup

68.  Cyber Law

69.  Defrag

70.  Antivirus

71.  Network Topology

72.  Password

73.  Bandwidth

74.  Star topology

75.  Macro virus

76.  Cyber Law

77.  MODEM

78.  Protocol

79.  Computer virus

80.  Server

81.  Modem

82.  ISP

83.  UPS

84.  FTP

85.  Backup

86.  Protocol

87.  Multimedia

88.  Backup

89.  NIC

90.  UPS

91.  Antivirus

92.  Protocol

93.  Computer ethics

94.  Backup

95.  Boot sector virus

96.  Encryption/decryption/passcode

97.  Protocol

98.  LAN

99.  Virus

 


 


Popular posts from this blog

Computer

Sequential Programs