SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
certificate authority
virus signature
CERT/CC
E- commerce
2. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
E- commerce
Noise
router
solid state drive
3. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
Latency
power supply
ciphertext
buffer
4. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
spyware
OSP
recieving device
script kiddie
5. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
wireless modem
E- retail
communications
groupware...
6. Builds and maintains lists of words found on websites. Useful for search engines
Dial- up access
E- commerce
spider
hypertext
7. Electrical supply drops.can cause data loss but generally not cause equipment damage
phishing
undervoltage
capacity
multifunction peripheral
8. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
Transmission media
web filter
density
9. Privately owned and limited to a specific vendor or computer model.
utility program
chasis...
proprietary software...
jewel box
10. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
neural network
Laser printer
bus
System Software...
11. When businesses use the internet to sell products
IM
download
E- retail
system bus
12. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
bus
bandwidth
trackball
Storage Device
13. Circuit boards tjay provide connections and functions not built into the motherboard
machine cycle
mashup
crimeware
adapter cards
14. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
hash
virus
pretty good Privacy
15. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
Software...
chip
Dial- up access
database
16. Contain permanently writeen data - instructions - and information
fiber optic cable
firmware...
IM
script kiddie
17. A rectangular opeining that typically holds disk drives.
Communications device
Drive Bay
adapter card
system clock
18. Serves as the interface between the user - the app software - and the computers hardware
jack
digital forensics
system software...
hypertext
19. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
proprietary software...
TCP/IP
token ring
worm
20. The last section of the domain name
Top level domain
Internet Backbone
scanner
CAPTCHA
21. Transmits data via infared light waves.. Both computer and device must have the port for it to work
capacity
DRAM
IrDA Port
star network
22. Personal information manager is application software that includes features to help users organize personal info
jack
PIM
IP address
spoofing
23. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
mpeg
streaming cam
power supply
cyberterrorist
24. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
ROM
IM
byte
25. 8 bits grouped together. basic storage unit in memory. Each byte has an address
drive bay
SMTP
Dial up modems
byte
26. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Software...
back door
hacker
System Unit
27. A special purpose computer that functions as a component in a larger product. Small with limited hardware
newsgroup
SIMM
embedded computer
spider
28. A program that restricts access to certain material on the web
proprietary software...
web filter
jewel box
OCR
29. Pressure sensitive eraser shaped pointing device
pointing stick
Operating system
motherboard
Desktop Computer
30. A real time internet communications service where you can talk to people online.
IM
downloading
utility programs
address
31. Digital light processor uses tiny mirrors to reflect light
hypertext
volatile memory
Noise
DLP projector
32. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
adapter card
kernal
embedded computer
cyberextortionist
33. Most computers (on and off)
digital
pointing stick
virus signature
utility program
34. Perpetrator attempts to obtain your personal or financial info.
liquid flow technology
registrar
hibernate
phishing
35. A socket in the motherboard that can hold an adapter card
adware
WAN
expansion slot
Desktop Computer
36. On software is infinitie space and depth for VR
VR world
botnets
DSL modem
Memory
37. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
backside bus
DTP
worm
ALU
38. A communications device that sends and recieves data and info to and from digital line
Dedicated line
hash
Firewall
digital modem
39. A legal agreement that allows multiple users to access the software on the server simutaneously
Noise
drive bay
coaxial cable
network license
40. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Dedicated line
Point of Sale terminals
download
site license
41. Media transmit multiple signals simutaneously. Download faster than upload
air mouse
terminal
broadband
adapter card
42. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
streaming cam
player
cracker
corporate spies
43. Unencrypted readable data
plaintext
star network
mashup
FireWire port
44. Single chip with two or more processor cores.
newsgroup
disk fragmenter
multi- core processor
chat client
45. Does not require a newsreader - easier to use than a newsgroup
message board
protocol
database
trackball
46. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
stored program concept
Content Aggregator
turnaround document
EULA
47. The use of computer or network with out permission
mpeg
hot plugging
unauthorized access
site license
48. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
network
hard disk
DLP projector
device dependant
49. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
GPU
IM
fault tolerant computer
video card
50. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
SMTP
hot plugging
integrated circuit
access control