SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Program that euns only on a specific type or make of computer
RAID
crimeware
business software...
device dependant
2. The role of memory to store both data and programs
biometrics
adware
stored program concept
Dial Up line
3. The destructive event or prank the program intended to deliver
groupware...
MRAM
payload
chasis...
4. A know specific pattern of virus code.
Netiquette
virus signature
ring network
Motherboard
5. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
keygen
Processor
newsreader
USB port
6. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
server
virus
online auction
superscalar
7. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
unethical employees
virus
E- retail
8. A vulnerable computer that is set up to entice an intruder to break into it.
honeypot
DRAM
ergonomics
bandwidth
9. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
token ring
integrated circuit
network license
Memory
10. A part of the motherboard and connects the processor to main memory
system bus
Application software...
system clock
PIM
11. Hypertext transfer protocol
device dependant
Information system
http
buffer
12. When turning on a computer that has been turned off completly
expansion bus
system on a chip
buffer
cold boot
13. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
image processing
Web Browser
CMOS
Web Application
14. A special purpose computer that functions as a component in a larger product. Small with limited hardware
power supply
wordwrap
embedded computer
formatting
15. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
Content Aggregator
ASCII
cold boot
cyberterrorist
16. Surgeon performs operation by controlling robot when not in the same area as patient.
telesurgery
NAS
digital
driver
17. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
CAD
drive bay
network card
download
18. Major carriers of network traffic
Internet Backbone
driver
UNIX
Communications device
19. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
digital
Servers
scanner
VR
20. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
DRAM
hot plugging
plaintext
compromised computer
21. Power on self test to check the various system components and the results are compared with data in a CMOS chip
POST
system bus
project management software...
VR
22. Single chip with two or more processor cores.
FireWire port
IrDA Port
multi- core processor
DRAM
23. zombie
sending device
compromised computer
Plug and Play
virus signature
24. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
PNG
phishing
defragmenting
solid state drive
25. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
Dial up modems
virtual provate network
Plug and Play
DNS Server
26. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
optical disc
TLS
Web Browser
27. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
plaintext
biometrics
chat client
28. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
OSP
network license
Latency
system bus
29. PGP an encryption program
peer to peer network
hot spot
compromised computer
pretty good Privacy
30. A system that attempts to imitate the behavior of a human brain.
Mobile Computer
DIMM
neural network
RTLS
31. Dish shaped antenna for internet connection
project management software...
Software...
fixed wireless
bit
32. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
image processing
biometrics
Personal Computers
Desktop Computer
33. Initiates an instruction to transmit data - instructions - or information.
data collection device
IM
sending device
SIMM
34. Msot retail stores use POS to record purchases - process cards - and update inventory
audit trail
access time
Point of Sale terminals
USB port
35. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
Terminal
virus
Linux
phishing
36. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
adapter card
overvoltage
cyberterrorist
streaming
37. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
http
Netiquette
broadband internet service
cracker
38. A socket in the motherboard that can hold an adapter card
GUI
gender changer
payload
expansion slot
39. The number of bits in an area on a storage medium - Higher density means more storage capacity
VR
stylus
server
density
40. Single inline memory module forms a single set of contacts
SIMM
PIM
server
e- learning
41. Protective case for optical discs
jewel box
Latency
client/server
platter
42. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
chasis...
product activation
superscalar
freeware...
43. A type of storage media that consists of flat disc and is written and read by a laser
access control
peer to peer network
ARPA
optical disc
44. Computing device small enough to hold in your hand
Point of Sale terminals
system on a chip
Mobile Device
connector
45. Obtains data directly at the location where the transaction or event takes place.
SIMM
optical mouse
data collection device
e- learning
46. A web application that combines services from two or more sources creating a new application.
expansion slot
warm boot
mashup
bus network
47. One or more computers on the network request services from the server. 10 or more computers
CAD
client/server
RFID
gender changer
48. Copyrighted software provided at no cost by company that retains all rights to software
drive bay
freeware...
scanner
MICR
49. Graphic file (JPEG - GIF) slowly replacing GIF
Bay
SMTP
PNG
optical mouse
50. Digital light processor uses tiny mirrors to reflect light
Linux
DLP projector
cyberterrorist
Storage Device