SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Encrypted data
CERT/CC
worm
ciphertext
program
2. Internet Service Provider- a regional or national access provider
ISP
back door
DLP projector
Top level domain
3. A unique number that identifies the location of a byte in memory
address
CPU
DRAM
cable modem
4. Human speech is bc of its continous signal that vary in strength and quality
chat client
analog
broadband
Mobile Device
5. Hardware - software - data - people - procedures
peripheral
cyberterrorist
Information system
wireless modem
6. The discovery - collection adn analysis of evidence found on computers and networks
recieving device
TCP/IP
digital forensics
plug- in
7. Internet connections using regular copper telephone lines.
DSL
cloud storage
cracker
system clock
8. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
access control
hibernate
VAN
image processing
9. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
virus
Linux
hot plugging
system software...
10. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
Storage Device
access time
parallel processing
network architecture
11. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
Communications device
hibernate
download
network standard
12. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
turnaround document
script kiddie
fixed wireless
Home user
13. Any data or instructions entered into the memory of the computer
Bay
cyberextortionist
adapter card
Input
14. Read only memory refers to memory chips storing permanent data and instructions (firmware)
trackball
Operating system
compromised computer
ROM
15. A socket in the motherboard that can hold an adapter card
Denial of Service attack
Application software...
expansion slot
nonvolatile memory
16. A device that enables you to join a port and a connector that are both male or female
compromised computer
gender changer
Desktop Computer
business software...
17. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
freeware...
bus network
Linux
18. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
mashup
EDI
Latency
stored program concept
19. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
DSL modem
Web Browser
solid state drive
cross - platform
20. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
FireWire port
ethernet
Intrusion detection software...
player
21. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
cracker
optical reader
certificate authority
RAM
22. They can execute more than one instruction per clock cycle
Application software...
utility program
VR world
superscalar
23. The delivery of education via some electronic method such as the internet - networks - or optical disks.
ISP
IM
IM
e- learning
24. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
transistor
CU
Bluetooth
EULA
25. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
back door
broadband internet service
communications
multifunction peripheral
26. Single chip with two or more processor cores.
volatile memory
cable modem
multi- core processor
router
27. Started the internet as a networking project
biometrics
ARPA
stylus
Mobile Computer
28. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
recieving device
VAN
MICR
TLS
29. Graphics processing unit controls the manipulation and display of graphics on the display device.
solid state drive
system software...
GPU
Fiber to the Premises
30. Two or more computers transfer data - instructions - and information.
communications
Bluetooth
network
disk fragmenter
31. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
twisted pair cable
Hot spots
neural network
communications
32. Case of the system unit to protect internal damage
register
virtual provate network
back door
chasis...
33. A special purpose computer that functions as a component in a larger product. Small with limited hardware
commands
transistor
embedded computer
ALU
34. Dish shaped antenna for internet connection
Processor
VAN
fixed wireless
GUI
35. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
broadband internet service
Personal Computers
sending device
buffer
36. Used to gain competitive advantage
corporate spies
IrDA Port
Storage Device
IM
37. Determines the number of bits that can be transmitted at one time
client
Web conference
bus width
capacity
38. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
network license
proprietary software...
botnets
nonvolatile memory
39. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
adapter card
memory module
firmware...
kernal
40. Universal serial bus port connects peripherals to the computer
commands
network card
USB port
DVI
41. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
VR world
adware
wireless modem
Fiber to the Premises
42. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
analog
chat client
worm
Linux
43. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
PIM
IP address
integrated circuit
Dial- up access
44. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
access time
nonvolatile memory
virus signature
jewel box
45. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
utility program
System Software...
Dial up modems
driver
46. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
program
sound card
ALU
cyberterrorist
47. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
digital forensics
undervoltage
RAM
preemptive multitasking
48. Software used by criminals
software suite
scanner
RAID
crimeware
49. Local area network- network tat connects computers and devices in a limited geographical area such as a home
TLS
LAN
device independent
VoIP
50. Most computers (on and off)
freeware...
document management software...
digital
newsreader