SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Latest version of Post office Protocol
telesurgery
UNIX
POP3
System Software...
2. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
Linux
Netiquette
Bluetooth
cracker
3. Storage over an internet service
cloud storage
microbrowser
solid state media
plaintext
4. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
ASCII
DIMM
Personal Computers
preemptive multitasking
5. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
fixed wireless
star network
biometrics
DTP
6. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
L2 cache
chasis...
bus network
Firewall
7. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
network card
site license
system bus
OCR
8. Software used by criminals
digital certificate
byte
OSP
crimeware
9. Graphical User interface - interact with software using text - graphics - and icons
port
GUI
trackball
streaming
10. Acts as an electronic switch that opens or closes the circuit for electrical charges
transistor
Memory
star network
stored program concept
11. Loses its contents when power is turned off (RAM)
Trojan Horse
star network
volatile memory
network
12. Communications activity. Handled by NSFnet.
communications
traffic
peer to peer network
site license
13. Smallest element in an electronic image
chip
DLP projector
pixel
port
14. Universal serial bus port connects peripherals to the computer
USB port
connector
undervoltage
utility program
15. A program that hides in a computer and allows someone from a remote location to take control of the computer
streaming cam
twisted pair cable
cyberterrorist
rootkit
16. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
Desktop Computer
multi- core processor
ASCII
turnaround document
17. Provids mobile users with a secure connection to the company server as if the user has a private line.
ROM
L2 cache
plaintext
virtual provate network
18. ...
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
fiber optic cable
Hot spots
Output
19. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
data collection device
DTP
cable modem
disk fragmenter
20. A personal computer you can carry from place to place
freeware...
DSL
online auction
Mobile Computer
21. Picure messaging can occur from mobile to mobile and mobile to email
PNG
MMS
message board
bus
22. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
hot plugging
Personal Computers
player
Communications device
23. A special purpose computer that functions as a component in a larger product. Small with limited hardware
embedded computer
MICR
Dial Up line
Mobile Computer
24. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
registrar
network topology
System Software...
EULA
25. A number that uniquely identifies each computer or device connected to the internet (0-255)
DTP
IP address
buffer
VoIP
26. Digital light processor uses tiny mirrors to reflect light
DLP projector
program
Communications device
coaxial cable
27. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
synthesizer
System Unit
Point of Sale terminals
28. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
communications
honeypot
preemptive multitasking
IrDA Port
29. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
traffic
worm
L2 cache
Domain name
30. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
VoIP
bit
overvoltage
spoofing
31. 8 bits grouped together. basic storage unit in memory. Each byte has an address
byte
traffic
access time
network architecture
32. The design of computers - devices - and media in the network
Plug and Play
client/server
network architecture
Application software...
33. An instruction that causes a program to perform a specific action.
commands
digital certificate
fault tolerant computer
site license
34. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
VAN
spider
system bus
hot plugging
35. A notcie that guarantees a user or web site is legit. E- commerce use it often
stored program concept
digital certificate
device independent
parallel processing
36. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
utility program
drive bay
adware
37. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
peripheral
System Unit
http
E- commerce
38. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
ring network
botnets
memory slots
39. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
DTP
thread
File compression utility
RIMM
40. Processor begins to fetch a second instruction before it completes the full machine cycle
warm boot
Memory Cache
pipelining
DSL
41. A communications device that sends and recieves data and info to and from digital line
digital modem
L1 cache
Storage Device
VAN
42. PGP an encryption program
embedded computer
device dependant
kernal
pretty good Privacy
43. zombie
compromised computer
web filter
UNIX
formatting
44. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
ergonomics
drive bay
L2 cache
script kiddie
45. Allows the processor to communicate with peripherals.
corporate spies
expansion bus
formatting
plug- in
46. System board- is the main circuit board of the system unit.
backside bus
peer to peer network
cloud storage
motherboard
47. Single inline memory module forms a single set of contacts
Dial Up line
SIMM
CAPTCHA
program
48. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
coaxial cable
IP address
pipelining
MRAM
49. Consists of electronic components that store instructions waiting to be executed (On motherboard)
Memory
bus width
OCR
ASCII
50. Holds one or more disk drives
drive bay
IM
document management software...
router