SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
ALU
USB port
newsgroup
Storage Device
2. Obtains data directly at the location where the transaction or event takes place.
OMR
data collection device
disk fragmenter
stylus
3. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
overvoltage
Fiber to the Premises
EDI
device independent
4. The technology of authenticating a persons identity by verifying a personal characteristic.
ALU
Denial of Service attack
cyberextortionist
biometrics
5. A type of system software that allows users to perform maintenence type tasks
ALU
unauthorized access
digital
utility program
6. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
CU
ISP
e- learning
cable modem
7. The amount of data - instructions - and information that can travel over communications channel
POP3
database
bandwidth
RAM
8. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
tactile output
message board
embedded operating system
MAN
9. Electrical supply drops.can cause data loss but generally not cause equipment damage
drive bay
cable modem
undervoltage
analog
10. Graphical User interface - interact with software using text - graphics - and icons
pretty good Privacy
parallel processing
system clock
GUI
11. Screen savors were made to prevent this - which etched images permanently onto the screen
pretty good Privacy
hibernate
hard disk
ghosting
12. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
project management software...
Latency
TLS
13. On the motherboard hold memory modules
memory slots
POP3
backside bus
bus width
14. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
crimeware
POP3
access time
CERT/CC
15. Connects the processor to cache.
VR
backside bus
mpeg
formatting
16. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
POP3
mpeg
network topology
17. Local area network- network tat connects computers and devices in a limited geographical area such as a home
star network
digital
LAN
http
18. A legal agreement that allows multiple users to access the software on the server simutaneously
network license
shareware...
honeypot
virtual provate network
19. Operating system on mobile devices that generally resides on ROM
E- retail
script kiddie
CPU
embedded operating system
20. Picure messaging can occur from mobile to mobile and mobile to email
MMS
DSL
fault tolerant computer
botnets
21. The discovery - collection adn analysis of evidence found on computers and networks
digital forensics
download
protocol
MICR
22. The use of computer or network with out permission
unauthorized access
expansion slot
system bus
newsreader
23. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
connector
dialog box
Denial of Service attack
Web conference
24. Internet teephony- enables users to speak to other users over the internet
RAM
POP3
POST
VoIP
25. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
CERT/CC
terminal
Storage Device
Processor
26. Personal information manager is application software that includes features to help users organize personal info
sending device
PIM
player
ROM
27. Graphic file (JPEG - GIF) slowly replacing GIF
fault tolerant computer
register
adapter card
PNG
28. A small metal or plastic device that uses pressure instead of ink.
stylus
broadband internet service
telemedicine
Latency
29. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
supercomputer
TLS
OSP
RIMM
30. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
PNG
botnets
NAS
Web Server
31. Any unwanted signal usually varying quickly
ROM
Hot spots
Noise
DSL
32. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
air mouse
router
peer to peer network
digital
33. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
virus
air mouse
botnets
DSL modem
34. When turning on a computer that has been turned off completly
network
Servers
communications
cold boot
35. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
utility program
MRAM
chasis...
firmware...
36. The design of computers - devices - and media in the network
Information system
product activation
biometrics
network architecture
37. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
GUI
Storage Media
Firewall
optical disc
38. May break in to computer to exploit security weakness. financial gains - revenge.
unethical employees
Noise
Processor
scanner
39. Device with a monitor - keyboard - and memory
shareware...
Terminal
proxy server
ring network
40. A number that uniquely identifies each computer or device connected to the internet (0-255)
CMOS
Dial- up access
Dedicated line
IP address
41. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
cyberextortionist
SRAM
Servers
RFID
42. Software used by criminals
IrDA Port
crimeware
Output
hacker
43. Fetching - decoding - executing - storing
biometrics
system unit
Software...
machine cycle
44. Computing device small enough to hold in your hand
DNS Server
cross - platform
Mobile Device
pretty good Privacy
45. Human speech is bc of its continous signal that vary in strength and quality
access time
nonvolatile memory
analog
CMOS
46. Has the illusion of moving images becuase it sends a continuos stream of images
Storage Media
streaming cam
public- domain software...
Netiquette
47. Graphics processing unit controls the manipulation and display of graphics on the display device.
memory module
WAN
GPU
Linux
48. Used to gain competitive advantage
VAN
access time
certificate authority
corporate spies
49. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
utility program
Web conference
power supply
50. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
dialog box
Dial Up line
access time
Servers