A) Science, Technology, Engineering, Mathematics B) Software, Technology, Engineering, Medicine C) Structural, Technical, Environmental, Mathematics D) Science, Telecommunications, Engineering, Mechanics
A) Python B) Java C) C++ D) JavaScript
A) Byte B) Bit C) Megabyte D) Gigabyte
A) Hyperlink Text Management Language B) Hypertext Markup Language C) Highway Traffic Management Language D) Human Technology Management Language
A) Hard drive B) RAM C) CPU D) Motherboard
A) To increase internet speed B) To enhance graphics performance C) To block unauthorized access D) To improve file storage
A) Ethernet B) Fiber optics C) NFC D) Bluetooth
A) Data compression B) Data encryption C) Data processing D) Data visualization
A) Mouse B) Keyboard C) CPU D) Monitor
A) Visual Processing Node B) Voice Protocol Network C) Virtual Public Node D) Virtual Private Network
A) Low security B) Limited storage capacity C) Scalability and flexibility D) Dependence on physical servers
A) RAM B) Virtual memory C) Cache D) ROM
A) Virtual reality B) Augmented reality C) 3D printing D) Artificial intelligence
A) Translate high-level code to machine code B) Store data permanently C) Protect against viruses D) Facilitate wireless connections
A) Calendar app B) Music streaming service C) Antivirus D) Video editing software
A) Creating three-dimensional objects layer by layer B) Copying physical objects C) Printing documents in multiple colors D) Producing holographic images
A) Encryption B) Compression C) Decryption D) Encoding
A) Redundant Array of Independent Disks B) Remote Access Integration Device C) Reliable Automated Information Directory D) Random Access Information Database
A) Unique Reference Link B) Universal Response Language C) User Recognition Library D) Uniform Resource Locator
A) Lean B) Agile C) Scrum D) Waterfall
A) Trackpad B) Keyboard C) Touchscreen D) Joystick
A) Central AMD Development B) Computer-Aided Design C) Computer Architecture Development D) Coding and Design
A) Trialware B) Freemium C) Adware D) Shareware
A) Virtual reality B) Cloud computing C) Quantum computing D) Blockchain
A) JavaScript B) Ruby C) Python D) C++
A) Transferring B) Downloading C) Streaming D) Uploading
A) Multimeter B) Screwdriver C) Pliers D) Hammer
A) Smartwatch B) Coffee maker C) Microwave oven D) Television
A) Protect against unauthorized access B) Increase processing speed C) Enhance graphics performance D) Improve sound quality
A) Music production software B) Office suite C) Antivirus software D) Graphic design software
A) Hardware compatibility issue B) Violation of the programming language rules C) High-level code execution D) Intentional programming technique
A) Internet Service Provider B) Internet Software Program C) Internal Security Platform D) Internet Speed Protocol
A) Simplified Development B) Specialized Adaptation C) Universal Design D) Exclusive Innovation
A) Near Field Communication (NFC) B) Bluetooth C) Ethernet D) WiFi
A) Encrypt sensitive data B) Convert digital data to analog signals for transmission C) Block malicious websites D) Create wireless networks
A) Antivirus program B) Web browser C) Database management system D) Video editing software |