SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The role of memory to store both data and programs
CMOS
botnets
rootkit
stored program concept
2. All computers connected to central device. Hub or switch
script kiddie
star network
ring network
solid state drive
3. A program that restricts access to certain material on the web
streaming
warm boot
NAS
web filter
4. Acts as an electronic switch that opens or closes the circuit for electrical charges
transistor
cluster
wordwrap
byte
5. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
utility programs
fiber optic cable
solid state drive
supercomputer
6. Can be peropheral or chip - creates sound from digital instructions.
unauthorized access
neural network
telemedicine
synthesizer
7. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
CU
wordwrap
firmware...
thread
8. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
image processing
Trojan Horse
plug- in
wireless modem
9. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
program
Dial- up access
hash
bugs
10. A type of system software that allows users to perform maintenence type tasks
utility program
Mobile Computer
DTP
motherboard
11. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
disk controller
platter
Mobile Device
E- commerce
12. A unique number that identifies the location of a byte in memory
address
communications channel
RAID
NAS
13. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
FireWire port
rootkit
parallel processing
14. Online service provider- has many members features along with internet access such as IM or Web browsers.
back door
OSP
bugs
hibernate
15. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
site license
NAS
capacity
CAD
16. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
NAS
utility program
certificate authority
nonvolatile memory
17. Any data or instructions entered into the memory of the computer
solid state drive
Input
bus width
IP address
18. CA resposible for giving out digital certificate
PIM
digital certificate
honeypot
certificate authority
19. Internet teephony- enables users to speak to other users over the internet
USB hub
network topology
VoIP
transistor
20. Two or more computers transfer data - instructions - and information.
Content Aggregator
chip
communications
digital
21. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
bit
motherboard
utility program
overvoltage
22. Communications activity. Handled by NSFnet.
system software...
VR world
embedded operating system
traffic
23. Copyrighted software provided at no cost by company that retains all rights to software
Laser printer
communications channel
freeware...
bandwidth
24. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
product activation
communications
Motherboard
optical mouse
25. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
coaxial cable
client
twisted pair cable
PNG
26. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CPU
bugs
turnaround document
access time
27. When turning on a computer that has been turned off completly
telemedicine
cold boot
buffer
Bay
28. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
rootkit
Domain name
RAID
29. Initiates an instruction to transmit data - instructions - or information.
sending device
USB hub
hypermedia
dialog box
30. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
plaintext
Transmission media
File compression utility
DVI
31. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
DTP
port
terminal
project management software...
32. A set of programs that coordinates all of the activies among computer hardware devices.
access time
Operating system
BIOS
MMS
33. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
DRAM
NAS
access time
unauthorized access
34. Graphical User interface - interact with software using text - graphics - and icons
nonvolatile memory
GUI
DSL modem
multi- core processor
35. Pressure sensitive eraser shaped pointing device
analog
animated Gif...
pointing stick
network architecture
36. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
disk cleanup
motherboard
VAN
client/server
37. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
superscalar
expansion bus
volatile memory
cracker
38. The standard that outlines characteristics of how two network devices communicate
utility programs
data collection device
protocol
System Unit
39. Holds one or more disk drives
integrated circuit
multifunction peripheral
payload
drive bay
40. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
heat sink
network topology
DSL modem
access time
41. The smallest unit of disk space that stores data and info
hibernate
ethernet
cluster
fiber optic cable
42. Used to gain competitive advantage
WAN
corporate spies
VR world
spyware
43. The destructive event or prank the program intended to deliver
system unit
kernal
payload
power supply
44. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
image processing
proxy server
sleep mode
Storage Device
45. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
Firewall
disk cleanup
Personal Computers
VR
46. A collection of computers and devices connected together - via communications devices and transmissions media.
Storage Media
network
Operating system
node
47. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
DSL
back door
hash
database
48. Saves any open documents and programs to RAM and places computer into a low power state
byte
server
sleep mode
proprietary software...
49. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
preemptive multitasking
adware
GUI
Point of Sale terminals
50. Hardware - software - data - people - procedures
bus network
cyberterrorist
Point of Sale terminals
Information system