IT2
問題一覧
1
program or software
2
application or app
3
application or app
4
operating system
5
retail custom web app mobile app mobile web app shareware freeware open source public domain
6
productivity applications
7
word processing presentation spreadsheet database note taking calendar and contact management project management accounting personal finance legal tax preparation document management enterprise computing
8
create a project edit a project format a project save a project distribute a project
9
word processing software
10
word processing software
11
presentation software
12
spreadsheet software
13
project management sofware
14
database
15
backing up
16
accounting software
17
back up
18
digital signature
19
personal finance software
20
legal software
21
information privacy
22
off-site backups
23
document management software
24
selective backup
25
enterprise
26
full differential incremental selective continuous data protection cloud
27
human resources software accounting software engineering or product development software manufacturing software marketing software sales software distribution software customer service software software for information technology staff
28
digital certificate
29
computer-aided design (CAD) software desktop publishing software paint/image software photo editing and photo management software video and audio editing software
30
multimedia authoring software
31
cookie
32
secure site
33
website authoring software
34
media player
35
allow for personalization store user names and or passwords assist with online shopping track how often users visit a site target advertisement
36
uninstaller
37
full backup
38
differential backup
39
disk cleanup files
40
hardware theft
41
disk defragmenter
42
phishing
43
screen saver
44
file compression tool
45
recovery
46
PC maintenance tool
47
clickjacking
48
backup tool
49
hardware vandalism
50
restore tool
51
social engineering
52
software suite
53
physical access controls alarm system physical security devices device tracking app
54
calendar and contact management software
55
incremental backup
56
continuous data protection(CDP)
57
note taking software
58
database software
59
employee monitoring
60
surge protector uninterruptable power supply or UPS duplicate components or duplicate computers fault-tolerant computer
61
disc burning software
62
lifestyle applications medical applications entertainment applications convenience applications education applications
63
backup
64
content filtering
65
blog browsing chat online discussion email file transfer internet phone instant messaging mobile messaging videoconference web feeds
66
personal firewall
67
web filtering software
68
cloud backup
69
antivirus program
70
spyware
71
wireless access
72
technology ethics
73
adware
74
spyware remover
75
intellectual property
76
adware remover
77
intellectual property rights
78
copyright
79
file manager
80
digital rights management or DRM
81
search tool
82
image viewer
83
code of conduct
84
green computing
85
two-step verification
86
firewall
87
law enforcement criminal prosecutors military intelligence insurance agencies information security departments
88
unauthorized access
89
digital forensics
90
steals software media intentionally erases program illegally registers and/or activates a program illegally copies a program
91
unauthorized use
92
access controls
93
product activation
94
passphrase
95
software theft
96
license agreement
97
passcode or PIN (personal identification number)
98
possessed object
99
information theft
100
encryption
STS 5
STS 5
Lady Rose Joy Domalanta · 316問 · 2年前STS 5
STS 5
316問 • 2年前HPC 3
HPC 3
Lady Rose Joy Domalanta · 128問 · 2年前HPC 3
HPC 3
128問 • 2年前HPC 3
HPC 3
Lady Rose Joy Domalanta · 75問 · 2年前HPC 3
HPC 3
75問 • 2年前HPC 3
HPC 3
Lady Rose Joy Domalanta · 8問 · 2年前HPC 3
HPC 3
8問 • 2年前IT
IT
Lady Rose Joy Domalanta · 35問 · 2年前IT
IT
35問 • 2年前STS 2
STS 2
Lady Rose Joy Domalanta · 289問 · 2年前STS 2
STS 2
289問 • 2年前STS 4
STS 4
Lady Rose Joy Domalanta · 339問 · 2年前STS 4
STS 4
339問 • 2年前HPC3 1
HPC3 1
Lady Rose Joy Domalanta · 49問 · 2年前HPC3 1
HPC3 1
49問 • 2年前HPC 3
HPC 3
Lady Rose Joy Domalanta · 26問 · 2年前HPC 3
HPC 3
26問 • 2年前HPC 3
HPC 3
Lady Rose Joy Domalanta · 30問 · 2年前HPC 3
HPC 3
30問 • 2年前HPC 3
HPC 3
Lady Rose Joy Domalanta · 29問 · 2年前HPC 3
HPC 3
29問 • 2年前HPC 3
HPC 3
Lady Rose Joy Domalanta · 100問 · 2年前HPC 3
HPC 3
100問 • 2年前HPC 3
HPC 3
Lady Rose Joy Domalanta · 28問 · 2年前HPC 3
HPC 3
28問 • 2年前HPC3
HPC3
Lady Rose Joy Domalanta · 180問 · 2年前HPC3
HPC3
180問 • 2年前FUNDAMENTALS
FUNDAMENTALS
Lady Rose Joy Domalanta · 201問 · 2年前FUNDAMENTALS
FUNDAMENTALS
201問 • 2年前Supply chain
Supply chain
Lady Rose Joy Domalanta · 157問 · 2年前Supply chain
Supply chain
157問 • 2年前Supply chain
Supply chain
Lady Rose Joy Domalanta · 20問 · 2年前Supply chain
Supply chain
20問 • 2年前supply chain
supply chain
Lady Rose Joy Domalanta · 20問 · 2年前supply chain
supply chain
20問 • 2年前supply chain
supply chain
Lady Rose Joy Domalanta · 251問 · 2年前supply chain
supply chain
251問 • 2年前IT2
IT2
Lady Rose Joy Domalanta · 35問 · 2年前IT2
IT2
35問 • 2年前IT3
IT3
Lady Rose Joy Domalanta · 35問 · 2年前IT3
IT3
35問 • 2年前IT4
IT4
Lady Rose Joy Domalanta · 36問 · 2年前IT4
IT4
36問 • 2年前IT5
IT5
Lady Rose Joy Domalanta · 38問 · 2年前IT5
IT5
38問 • 2年前IT COPY
IT COPY
Lady Rose Joy Domalanta · 48問 · 2年前IT COPY
IT COPY
48問 • 2年前IT
IT
Lady Rose Joy Domalanta · 192問 · 2年前IT
IT
192問 • 2年前IT3
IT3
Lady Rose Joy Domalanta · 42問 · 2年前IT3
IT3
42問 • 2年前IT2
IT2
Lady Rose Joy Domalanta · 41問 · 2年前IT2
IT2
41問 • 2年前MACRO
MACRO
Lady Rose Joy Domalanta · 112問 · 2年前MACRO
MACRO
112問 • 2年前supply chain
supply chain
Lady Rose Joy Domalanta · 30問 · 2年前supply chain
supply chain
30問 • 2年前xh
xh
Lady Rose Joy Domalanta · 7問 · 2年前xh
xh
7問 • 2年前Supply chain
Supply chain
Lady Rose Joy Domalanta · 31問 · 2年前Supply chain
Supply chain
31問 • 2年前MACRO 2
MACRO 2
Lady Rose Joy Domalanta · 21問 · 2年前MACRO 2
MACRO 2
21問 • 2年前Supply chain
Supply chain
Lady Rose Joy Domalanta · 74問 · 2年前Supply chain
Supply chain
74問 • 2年前MACRO 3
MACRO 3
Lady Rose Joy Domalanta · 31問 · 2年前MACRO 3
MACRO 3
31問 • 2年前MACRO 1
MACRO 1
Lady Rose Joy Domalanta · 30問 · 2年前MACRO 1
MACRO 1
30問 • 2年前MACRO
MACRO
Lady Rose Joy Domalanta · 53問 · 2年前MACRO
MACRO
53問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 244問 · 2年前RIZAL
RIZAL
244問 • 2年前PE
PE
Lady Rose Joy Domalanta · 79問 · 2年前PE
PE
79問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 34問 · 2年前RIZAL
RIZAL
34問 • 2年前PE
PE
Lady Rose Joy Domalanta · 15問 · 2年前PE
PE
15問 • 2年前PE
PE
Lady Rose Joy Domalanta · 15問 · 2年前PE
PE
15問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 127問 · 2年前RIZAL
RIZAL
127問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 34問 · 2年前RIZAL
RIZAL
34問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 58問 · 2年前RIZAL
RIZAL
58問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 100問 · 2年前RIZAL
RIZAL
100問 • 2年前PE
PE
Lady Rose Joy Domalanta · 186問 · 2年前PE
PE
186問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 78問 · 2年前RIZAL
RIZAL
78問 • 2年前PE
PE
Lady Rose Joy Domalanta · 186問 · 2年前PE
PE
186問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 33問 · 2年前RIZAL
RIZAL
33問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 32問 · 2年前RIZAL
RIZAL
32問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 32問 · 2年前RIZAL
RIZAL
32問 • 2年前RIZAL
RIZAL
Lady Rose Joy Domalanta · 32問 · 2年前RIZAL
RIZAL
32問 • 2年前FL
FL
Lady Rose Joy Domalanta · 200問 · 2年前FL
FL
200問 • 2年前問題一覧
1
program or software
2
application or app
3
application or app
4
operating system
5
retail custom web app mobile app mobile web app shareware freeware open source public domain
6
productivity applications
7
word processing presentation spreadsheet database note taking calendar and contact management project management accounting personal finance legal tax preparation document management enterprise computing
8
create a project edit a project format a project save a project distribute a project
9
word processing software
10
word processing software
11
presentation software
12
spreadsheet software
13
project management sofware
14
database
15
backing up
16
accounting software
17
back up
18
digital signature
19
personal finance software
20
legal software
21
information privacy
22
off-site backups
23
document management software
24
selective backup
25
enterprise
26
full differential incremental selective continuous data protection cloud
27
human resources software accounting software engineering or product development software manufacturing software marketing software sales software distribution software customer service software software for information technology staff
28
digital certificate
29
computer-aided design (CAD) software desktop publishing software paint/image software photo editing and photo management software video and audio editing software
30
multimedia authoring software
31
cookie
32
secure site
33
website authoring software
34
media player
35
allow for personalization store user names and or passwords assist with online shopping track how often users visit a site target advertisement
36
uninstaller
37
full backup
38
differential backup
39
disk cleanup files
40
hardware theft
41
disk defragmenter
42
phishing
43
screen saver
44
file compression tool
45
recovery
46
PC maintenance tool
47
clickjacking
48
backup tool
49
hardware vandalism
50
restore tool
51
social engineering
52
software suite
53
physical access controls alarm system physical security devices device tracking app
54
calendar and contact management software
55
incremental backup
56
continuous data protection(CDP)
57
note taking software
58
database software
59
employee monitoring
60
surge protector uninterruptable power supply or UPS duplicate components or duplicate computers fault-tolerant computer
61
disc burning software
62
lifestyle applications medical applications entertainment applications convenience applications education applications
63
backup
64
content filtering
65
blog browsing chat online discussion email file transfer internet phone instant messaging mobile messaging videoconference web feeds
66
personal firewall
67
web filtering software
68
cloud backup
69
antivirus program
70
spyware
71
wireless access
72
technology ethics
73
adware
74
spyware remover
75
intellectual property
76
adware remover
77
intellectual property rights
78
copyright
79
file manager
80
digital rights management or DRM
81
search tool
82
image viewer
83
code of conduct
84
green computing
85
two-step verification
86
firewall
87
law enforcement criminal prosecutors military intelligence insurance agencies information security departments
88
unauthorized access
89
digital forensics
90
steals software media intentionally erases program illegally registers and/or activates a program illegally copies a program
91
unauthorized use
92
access controls
93
product activation
94
passphrase
95
software theft
96
license agreement
97
passcode or PIN (personal identification number)
98
possessed object
99
information theft
100
encryption