SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Case of the system unit to protect internal damage
Trojan Horse
Information system
chasis...
shareware...
2. Pressure sensitive eraser shaped pointing device
memory module
network
token ring
pointing stick
3. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
hypermedia
chasis...
Linux
script kiddie
4. Graphic file (JPEG - GIF) slowly replacing GIF
CPU
ISP
PNG
pipelining
5. Surgeon performs operation by controlling robot when not in the same area as patient.
Processor
telesurgery
nonvolatile memory
ISP
6. The last section of the domain name
business software...
Netiquette
Top level domain
registrar
7. Used to track and identify the location of high risk or high value items.
streaming cam
RTLS
BIOS
network license
8. Someone who uses internet to destroy or damage computers for political reasons.
broadband internet service
cyberterrorist
Linux
Bluetooth
9. Copyrighted software that is distributed at no cost for a trial period
rootkit
Domain name system
shareware...
chat client
10. Universal serial bus port connects peripherals to the computer
USB port
telesurgery
capacity
honeypot
11. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
bit
File compression utility
spyware
firmware...
12. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
ethernet
cracker
hot plugging
FireWire port
13. The number of bytes a storage medium can hold
capacity
Drive Bay
star network
firmware...
14. Errors that can be recognized by automatic update
cyberterrorist
CERT/CC
IM
bugs
15. On the motherboard hold memory modules
memory slots
video card
sleep mode
integrated circuit
16. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
RAID
Storage Media
DRAM
hibernate
17. Online service provider- has many members features along with internet access such as IM or Web browsers.
sending device
wireless modem
OSP
NAS
18. The destructive event or prank the program intended to deliver
payload
firmware...
traffic
IM
19. Hides within or looks like a legitimate program such as a screen saver
ethernet
Trojan Horse
network topology
sound card
20. Single chip with two or more processor cores.
disk fragmenter
multi- core processor
SMTP
Firewall
21. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
cluster
program
cable modem
shareware...
22. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
Storage Device
hot spot
gender changer
token ring
23. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
motherboard
botnets
commands
Netiquette
24. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
address
project management software...
system bus
power supply
25. Company that provides wireless internet access to computers
Output
wireless Internet service provider
Internet Backbone
firmware...
26. Someone who accesses a computer or network illegally. Some say they hack to improve security
disk fragmenter
compromised computer
hacker
bus network
27. Internet Service Provider- a regional or national access provider
MICR
PIM
ISP
memory module
28. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
crimeware
FireWire port
RSS 2.0
Communications device
29. The process if a computer or device recieveing info info from the server on the internet
POP3
downloading
solid state media
script kiddie
30. They consist entirely of electronic components and contain no moving parts.
chat client
system on a chip
recieving device
solid state media
31. Most computers (on and off)
cluster
digital
CPU
OCR
32. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
token ring
project management software...
Personal Computers
spider
33. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
multi- core processor
System Unit
online security service
heat sink
34. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
IM
undervoltage
WAN
35. Extends the capabilites of a browser.
plug- in
Servers
Operating system
disk cleanup
36. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
IP address
motherboard
site license
37. Graphics processing unit controls the manipulation and display of graphics on the display device.
address
Trojan Horse
GPU
ARPA
38. A real time internet communications service where you can talk to people online.
IM
spyware
VR
UNIX
39. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
transistor
proxy server
token ring
SRAM
40. Copyrighted software provided at no cost by company that retains all rights to software
hibernate
hacker
multifunction peripheral
freeware...
41. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
RAID
DNS Server
server
coaxial cable
42. Can be peropheral or chip - creates sound from digital instructions.
RSS 2.0
drive bay
synthesizer
scanner
43. Moving pictures experts group is a popular video compression standard
RAID
mpeg
downloading
cyberterrorist
44. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
rootkit
wireless modem
application software...
Software...
45. Electrical supply drops.can cause data loss but generally not cause equipment damage
Memory
DVI
E- retail
undervoltage
46. Processor begins to fetch a second instruction before it completes the full machine cycle
disk fragmenter
pipelining
gender changer
device independent
47. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
ALU
pixel
digital certificate
virtual provate network
48. Anopening inside the system unit in which you can install additional equipment. Different than a slot
system unit
Bay
RAID
SRAM
49. Program that euns only on a specific type or make of computer
ISP
device dependant
bugs
program
50. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
VR world
Point of Sale terminals
streaming
PIM