A) Structural, Technical, Environmental, Mathematics B) Science, Telecommunications, Engineering, Mechanics C) Science, Technology, Engineering, Mathematics D) Software, Technology, Engineering, Medicine
A) Python B) Java C) JavaScript D) C++
A) Bit B) Gigabyte C) Megabyte D) Byte
A) Hypertext Markup Language B) Highway Traffic Management Language C) Human Technology Management Language D) Hyperlink Text Management Language
A) CPU B) RAM C) Hard drive D) Motherboard
A) To improve file storage B) To enhance graphics performance C) To block unauthorized access D) To increase internet speed
A) Bluetooth B) Fiber optics C) NFC D) Ethernet
A) Data processing B) Data visualization C) Data compression D) Data encryption
A) CPU B) Monitor C) Keyboard D) Mouse
A) Virtual Public Node B) Voice Protocol Network C) Visual Processing Node D) Virtual Private Network
A) Limited storage capacity B) Low security C) Dependence on physical servers D) Scalability and flexibility
A) Virtual memory B) Cache C) RAM D) ROM
A) Artificial intelligence B) Virtual reality C) Augmented reality D) 3D printing
A) Facilitate wireless connections B) Protect against viruses C) Translate high-level code to machine code D) Store data permanently
A) Music streaming service B) Calendar app C) Antivirus D) Video editing software
A) Copying physical objects B) Producing holographic images C) Printing documents in multiple colors D) Creating three-dimensional objects layer by layer
A) Decryption B) Encoding C) Compression D) Encryption
A) Reliable Automated Information Directory B) Remote Access Integration Device C) Random Access Information Database D) Redundant Array of Independent Disks
A) Unique Reference Link B) Uniform Resource Locator C) Universal Response Language D) User Recognition Library
A) Lean B) Waterfall C) Scrum D) Agile
A) Trackpad B) Joystick C) Keyboard D) Touchscreen
A) Coding and Design B) Central AMD Development C) Computer Architecture Development D) Computer-Aided Design
A) Freemium B) Shareware C) Trialware D) Adware
A) Quantum computing B) Cloud computing C) Virtual reality D) Blockchain
A) C++ B) Python C) JavaScript D) Ruby
A) Streaming B) Transferring C) Downloading D) Uploading
A) Screwdriver B) Multimeter C) Pliers D) Hammer
A) Coffee maker B) Smartwatch C) Television D) Microwave oven
A) Enhance graphics performance B) Increase processing speed C) Improve sound quality D) Protect against unauthorized access
A) Antivirus software B) Graphic design software C) Music production software D) Office suite
A) High-level code execution B) Violation of the programming language rules C) Hardware compatibility issue D) Intentional programming technique
A) Internet Service Provider B) Internet Speed Protocol C) Internet Software Program D) Internal Security Platform
A) Exclusive Innovation B) Simplified Development C) Specialized Adaptation D) Universal Design
A) Ethernet B) WiFi C) Near Field Communication (NFC) D) Bluetooth
A) Create wireless networks B) Block malicious websites C) Encrypt sensitive data D) Convert digital data to analog signals for transmission
A) Web browser B) Database management system C) Antivirus program D) Video editing software |