SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who accesses a computer or network illegally. Some say they hack to improve security
optical reader
RSS 2.0
transistor
hacker
2. Privately owned and limited to a specific vendor or computer model.
cable modem
freeware...
cluster
proprietary software...
3. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
keygen
back door
backside bus
TLS
4. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
RAID
player
Latency
DVI
5. Organization that sells and manages domain names
registrar
twisted pair cable
Software...
broadband internet service
6. The number of bits in an area on a storage medium - Higher density means more storage capacity
rootkit
density
multi- core processor
disk controller
7. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
power supply
pretty good Privacy
ethernet
NAS
8. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
spooling
scanner
botnets
IP address
9. Can connect multiple types of devices that require faster data transmission speeds.
network card
chasis...
FireWire port
firmware...
10. Moving pictures experts group is a popular video compression standard
unethical employees
turnaround document
mpeg
ISP
11. The standard that outlines characteristics of how two network devices communicate
node
RAID
protocol
server
12. The code of acceptable behaviors users should follow while on the internet.
nonvolatile memory
dot matrix printer
spider
Netiquette
13. A legal agreement that permits users to install the software on multiple computers.
site license
register
digital signature
RTLS
14. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
platter
volatile memory
Dedicated line
download
15. Each computer or device on the network. often connected by cables
CERT/CC
Internet Backbone
VoIP
node
16. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
e- learning
density
kernal
program
17. A window that provides info - presents availabe options - or requests a response.
http
macros
multifunction peripheral
dialog box
18. A program that restricts access to certain material on the web
embedded operating system
system bus
compromised computer
web filter
19. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
air mouse
hot spot
device independent
disk controller
20. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
802.11
System Unit
Home user
groupware...
21. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
client/server
hacker
device dependant
online security service
22. Searches for and removes unneccessary files
disk cleanup
MRAM
spoofing
coaxial cable
23. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
EDI
disk fragmenter
embedded operating system
System Unit
24. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
virus
disk cleanup
LAN
streaming
25. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
message board
memory module
network card
program
26. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
digital modem
Desktop Computer
downloading
streaming
27. A type of system software that allows users to perform maintenence type tasks
LAN
downloading
pointing stick
utility program
28. Software used by criminals
ARPA
crimeware
Operating system
digital forensics
29. Hides within or looks like a legitimate program such as a screen saver
Notebook Computer
sending device
Trojan Horse
VAN
30. Power on self test to check the various system components and the results are compared with data in a CMOS chip
registrar
POST
preemptive multitasking
bus network
31. All computers connected to central device. Hub or switch
digital modem
PIM
star network
hacker
32. Encrypted data
Communications device
cluster
ciphertext
virus
33. Has the illusion of moving images becuase it sends a continuos stream of images
firmware...
system unit
streaming cam
Terminal
34. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
power supply
Content Aggregator
stylus
Operating system
35. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
Netbook
ergonomics
Linux
Terminal
36. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
Trojan Horse
cross - platform
Operating system
spooling
37. Anopening inside the system unit in which you can install additional equipment. Different than a slot
neural network
player
Bay
microbrowser
38. Reorganizing it so that the files are store in continous sectors
DSL
product activation
defragmenting
telesurgery
39. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
macros
RIMM
VR world
IM
40. Combines several GIF images ina single GIF file.
heat sink
Notebook Computer
animated Gif...
BIOS
41. A computer that delivers requested web pages to your computer
bandwidth
network card
Web Server
video card
42. The fastest most powerful computer
supercomputer
download
Transmission media
proxy server
43. The design of computers - devices - and media in the network
scanner
streaming
network architecture
ALU
44. A device that enables you to join a port and a connector that are both male or female
Output
gender changer
Mainframe
access time
45. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
hypertext
UNIX
pointing stick
access time
46. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
spyware
Output
Dial up modems
RTLS
47. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
plaintext
online auction
DTP
product activation
48. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
Dial up modems
Memory
IP address
Point of Sale terminals
49. Consists of electronic components that store instructions waiting to be executed (On motherboard)
traffic
system clock
Memory
disk controller
50. They consist entirely of electronic components and contain no moving parts.
solid state media
stylus
capacity
streaming