SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
system bus
rootkit
Top level domain
access time
2. Anopening inside the system unit in which you can install additional equipment. Different than a slot
volatile memory
pipelining
Bay
address
3. Uses radio waves to transmit data between two devices.
Transmission media
Bluetooth
optical reader
system clock
4. Smaller than heat sink cools processors in notebook comps
heat pipe
Storage Device
MAN
disk fragmenter
5. The delivery of education via some electronic method such as the internet - networks - or optical disks.
shareware...
e- learning
groupware...
network
6. A number that uniquely identifies each computer or device connected to the internet (0-255)
IP address
ergonomics
hot spot
Desktop Computer
7. Loses its contents when power is turned off (RAM)
port
ROM
honeypot
volatile memory
8. Fetching - decoding - executing - storing
player
machine cycle
warm boot
telesurgery
9. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
corporate spies
Top level domain
Firewall
W3C
10. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
cable modem
ASCII
scanner
ciphertext
11. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
system clock
network
optical reader
analog
12. Random access memory- memory chips that can be read from and written to by the processor and other devices
machine cycle
drive bay
RAM
newsgroup
13. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
RSS 2.0
UNIX
Point of Sale terminals
memory module
14. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
WAN
freeware...
ROM
CAD
15. A communications device that enables a computer or device that does not have a built in networking capability to access a network
DLP projector
platter
network card
scanner
16. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
Latency
embedded operating system
Noise
PNG
17. A vulnerable computer that is set up to entice an intruder to break into it.
DSL modem
chip
honeypot
Noise
18. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
Operating system
system clock
script kiddie
gender changer
19. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
mpeg
ergonomics
Trojan Horse
message board
20. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
spyware
DSL
solid state drive
jewel box
21. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
video card
thread
Mainframe
disk controller
22. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
hypermedia
VR world
synthesizer
802.11
23. Instead of port - jack is used to identify audio or video ports.
disk cleanup
jack
Laser printer
digital forensics
24. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
OCR
USB port
SIMM
hypertext
25. Dual inline memory module forms two sets of contact
DIMM
digital modem
utility program
spider
26. A real time internet communications service where you can talk to people online.
power supply
digital
data collection device
IM
27. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
CPU
hot spot
Linux
VR world
28. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
Trojan Horse
Dedicated line
liquid flow technology
network standard
29. A case that contains electronic components of the computer used to process data.
system unit
ARPA
database
OSP
30. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
digital forensics
digital signature
access time
FireWire port
31. Determines the number of bits that can be transmitted at one time
peer to peer network
unethical employees
IP address
bus width
32. A notcie that guarantees a user or web site is legit. E- commerce use it often
site license
digital certificate
http
TLS
33. (laptop computer) portable personal computer often able to fit in your lap
Storage Media
Netbook
Notebook Computer
CAD
34. Mathematical formula that generates a code from the contents of the message
program
hacker
hash
proprietary software...
35. Perpetrator attempts to obtain your personal or financial info.
trackball
phishing
Memory
IM
36. Someone who accesses a computer or network illegally. Some say they hack to improve security
streaming
hacker
platter
device independent
37. One or more computers on the network request services from the server. 10 or more computers
802.11
digital certificate
client/server
Mobile Device
38. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Content Aggregator
ASCII
Laser printer
image processing
39. They consist entirely of electronic components and contain no moving parts.
solid state media
nonvolatile memory
utility program
heat pipe
40. A part of the motherboard and connects the processor to main memory
Noise
air mouse
system bus
system unit
41. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
fixed wireless
multifunction peripheral
cracker
W3C
42. The use of computer or network with out permission
program
peer to peer network
digital signature
unauthorized access
43. Hardware - software - data - people - procedures
Information system
Trojan Horse
server
fault tolerant computer
44. Started the internet as a networking project
payload
ARPA
Information system
expansion bus
45. Sends digital data and info from a comp to a DSL line
802.11
Linux
network
DSL modem
46. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
product activation
EDI
CERT/CC
ISP
47. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
VR
commands
Drive Bay
Desktop Computer
48. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
EULA
network
Communications device
honeypot
49. PGP an encryption program
pretty good Privacy
IrDA Port
payload
register
50. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
Fiber to the Premises
twisted pair cable
worm