SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
cracker
Netiquette
Storage Media
botnets
2. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
proxy server
wireless access point
EDI
drive bay
3. The discovery - collection adn analysis of evidence found on computers and networks
digital forensics
Laser printer
VR
jack
4. Holds one or more disk drives
drive bay
gender changer
newsreader
Trojan Horse
5. A window that provides info - presents availabe options - or requests a response.
payload
cold boot
liquid flow technology
dialog box
6. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
streaming
download
chasis...
Content Aggregator
7. CA resposible for giving out digital certificate
DIMM
honeypot
web filter
certificate authority
8. Surgeon performs operation by controlling robot when not in the same area as patient.
backside bus
telesurgery
system on a chip
DNS Server
9. A web application that combines services from two or more sources creating a new application.
mashup
Memory Cache
superscalar
worm
10. Human speech is bc of its continous signal that vary in strength and quality
gender changer
system clock
analog
Noise
11. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
ALU
VAN
proxy server
Plug and Play
12. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
network standard
Domain name system
ergonomics
MRAM
13. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
Bay
cyberextortionist
CPU
Output
14. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
multi- core processor
power supply
driver
site license
15. Can be peropheral or chip - creates sound from digital instructions.
synthesizer
spyware
digital signature
bandwidth
16. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
sound card
digital signature
network
Information system
17. Smaller than heat sink cools processors in notebook comps
jack
chasis...
DTP
heat pipe
18. They consist entirely of electronic components and contain no moving parts.
solid state media
DTP
USB hub
bit
19. Online service provider- has many members features along with internet access such as IM or Web browsers.
OSP
pointing stick
stylus
touchpad
20. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
memory slots
online auction
L2 cache
ALU
21. Extends the capabilites of a browser.
plug- in
integrated circuit
L1 cache
bus width
22. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
MAN
CAPTCHA
Operating system
network topology
23. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
ciphertext
recieving device
image processing
download
24. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
broadband internet service
turnaround document
Software...
token ring
25. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
business software...
Storage Device
broadband
Dial- up access
26. They can execute more than one instruction per clock cycle
analog
payload
superscalar
USB port
27. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
access time
virus signature
biometrics
File compression utility
28. Electrical supply drops.can cause data loss but generally not cause equipment damage
Terminal
undervoltage
back door
network
29. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
MRAM
IM
scanner
bugs
30. Dynamic ram- chips must be re energized constantly or they lose their contents.
recieving device
ring network
network
DRAM
31. Retains existing application software and data files even if you can change computer models or vendors
bus network
data collection device
device independent
Dial Up line
32. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
network architecture
Bluetooth
Top level domain
proxy server
33. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
stylus
Dial- up access
Dedicated line
cross - platform
34. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
cyberextortionist
Noise
multi- core processor
twisted pair cable
35. The technology of authenticating a persons identity by verifying a personal characteristic.
DLP projector
RSS 2.0
biometrics
PIM
36. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
database
TLS
macros
NAS
37. Is an online area in which isers have wrtten discussions about a particular subject.
stored program concept
spoofing
newsgroup
DVI
38. Computer aided design software assists a professional user in creating designs
plug- in
heat sink
port
CAD
39. Saves any open documents and programs to RAM and places computer into a low power state
node
OCR
sleep mode
analog
40. Universal serial bus port connects peripherals to the computer
virus
USB port
Software...
Web Server
41. A communications device that enables a computer or device that does not have a built in networking capability to access a network
VoIP
optical reader
ROM
network card
42. Pressure sensitive eraser shaped pointing device
pointing stick
system software...
ciphertext
PIM
43. A number that uniquely identifies each computer or device connected to the internet (0-255)
pipelining
OSP
CAM
IP address
44. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
peripheral
botnets
keygen
L1 cache
45. The use of computer or network with out permission
stylus
router
unauthorized access
coaxial cable
46. Program is one that runs the same on multiple operating systems
bus network
cross - platform
DRAM
ARPA
47. Mathematical formula that generates a code from the contents of the message
IrDA Port
hash
Web Server
system unit
48. A small metal or plastic device that uses pressure instead of ink.
keygen
client
twisted pair cable
stylus
49. The amount of data - instructions - and information that can travel over communications channel
Mobile Device
bandwidth
nonvolatile memory
bus network
50. A small flat rectangular pointing device that is sensitive to pressure and motion.
touchpad
TLS
twisted pair cable
utility program
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests