SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Determines the number of bits that can be transmitted at one time
animated Gif...
CAM
bus width
register
2. Is a security measure that defines who can access it and what actions they can take while acessing the computer
chasis...
Trojan Horse
access control
adware
3. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
MICR
e- learning
spoofing
downloading
4. A type of storage media that consists of flat disc and is written and read by a laser
hacker
disk controller
optical disc
superscalar
5. Digital light processor uses tiny mirrors to reflect light
phishing
DLP projector
supercomputer
EULA
6. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
SIMM
system bus
VR
Dial- up access
7. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
CMOS
fixed wireless
FireWire port
SMTP
8. Used to track and identify the location of high risk or high value items.
RTLS
cross - platform
crimeware
capacity
9. Transmits data via infared light waves.. Both computer and device must have the port for it to work
Noise
mpeg
IrDA Port
client
10. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
IM
parallel processing
overvoltage
11. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
hypermedia
digital certificate
hacker
turnaround document
12. Media transmit multiple signals simutaneously. Download faster than upload
TLS
UNIX
VoIP
broadband
13. A unique number that identifies the location of a byte in memory
network card
address
SMTP
pipelining
14. Mathematical formula that generates a code from the contents of the message
cable modem
hash
Communications device
system bus
15. Used to gain competitive advantage
corporate spies
OCR
gender changer
system on a chip
16. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
biometrics
worm
multi- core processor
cracker
17. One or more computers on the network request services from the server. 10 or more computers
neural network
client/server
project management software...
adapter card
18. A set of programs that coordinates all of the activies among computer hardware devices.
RSS 2.0
PIM
Personal Computers
Operating system
19. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
LAN
spoofing
phishing
air mouse
20. Internet Service Provider- a regional or national access provider
virus signature
integrated circuit
ISP
Bay
21. Joins a cable and a port
IP address
payload
connector
Dedicated line
22. Single chip with two or more processor cores.
File compression utility
multi- core processor
Mobile Device
DSL modem
23. A personal computer you can carry from place to place
Mobile Computer
cyberterrorist
terminal
DLP projector
24. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
superscalar
peripheral
solid state media
CERT/CC
25. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
optical reader
sound card
IM
memory module
26. The destructive event or prank the program intended to deliver
ethernet
payload
utility program
recieving device
27. Initiates an instruction to transmit data - instructions - or information.
pretty good Privacy
defragmenting
sending device
cracker
28. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
online auction
overvoltage
bugs
Operating system
29. Single inline memory module forms a single set of contacts
VAN
network architecture
SIMM
synthesizer
30. Instead of port - jack is used to identify audio or video ports.
jack
mashup
freeware...
kernal
31. A device that enables you to join a port and a connector that are both male or female
bus width
gender changer
OMR
VAN
32. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
dot matrix printer
System Unit
memory slots
volatile memory
33. Loses its contents when power is turned off (RAM)
Input
device dependant
volatile memory
Dial Up line
34. The original article and all subsequent related replies
stylus
pipelining
Bay
thread
35. Other computers and mobile devices on the networ that rely on the server for its resources
client
bugs
VR world
Point of Sale terminals
36. World wide web consortium oversees research and sets standards for many areas of the internet
GUI
Laser printer
capacity
W3C
37. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
TLS
Mainframe
Mobile Device
router
38. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
thread
Information system
gender changer
DNS Server
39. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
ALU
802.11
LAN
corporate spies
40. Contains 10 or fewer comps - with similar reponsibilities and capabilities
peer to peer network
newsreader
Latency
proprietary software...
41. (laptop computer) portable personal computer often able to fit in your lap
bit
pipelining
hibernate
Notebook Computer
42. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
USB port
access control
device dependant
Firewall
43. Connects the processor to cache.
backside bus
Linux
ARPA
bus network
44. A family member on a computer
communications
PNG
digital modem
Home user
45. A rectangular opeining that typically holds disk drives.
memory slots
Denial of Service attack
access time
Drive Bay
46. Designed for mobile devices
sound card
hot spot
plug- in
microbrowser
47. Internet connections using regular copper telephone lines.
network card
certificate authority
DSL
neural network
48. A real time internet communications service where you can talk to people online.
botnets
Drive Bay
neural network
IM
49. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
noise
hard disk
Personal Computers
optical disc
50. Consumer consumer e commerce.
shareware...
online auction
peer to peer network
scanner