SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
plug- in
VoIP
System Software...
Domain name system
2. A special purpose computer that functions as a component in a larger product. Small with limited hardware
embedded computer
E- retail
preemptive multitasking
EULA
3. A server that you connect to to start a chat session.
chat client
jack
botnets
network architecture
4. A know specific pattern of virus code.
virus signature
twisted pair cable
bit
System Unit
5. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
WAN
pipelining
sleep mode
digital forensics
6. The process of dividing the disk into tracks and sectors
machine cycle
formatting
system clock
hard disk
7. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
hacker
buffer
volatile memory
8. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
router
virtual provate network
pointing stick
embedded computer
9. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
register
disk fragmenter
node
terminal
10. Instead of port - jack is used to identify audio or video ports.
wireless access point
jack
Plug and Play
disk controller
11. A vulnerable computer that is set up to entice an intruder to break into it.
nonvolatile memory
microbrowser
honeypot
W3C
12. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
trackball
cross - platform
script kiddie
pixel
13. Read only memory refers to memory chips storing permanent data and instructions (firmware)
DLP projector
ROM
embedded computer
Firewall
14. zombie
IrDA Port
compromised computer
online security service
animated Gif...
15. Completely Automated Public Turing test to tell Computers and Humans Apart.
http
cyberextortionist
GPU
CAPTCHA
16. Protective case for optical discs
multi- core processor
Home user
jewel box
digital forensics
17. Started the internet as a networking project
Servers
ARPA
coaxial cable
software suite
18. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
hibernate
density
server
network
19. Donated for public use has no copyright restrictions
L1 cache
public- domain software...
utility programs
virus
20. A system that attempts to imitate the behavior of a human brain.
Information system
unethical employees
cross - platform
neural network
21. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
PIM
parallel processing
Operating system
dot matrix printer
22. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
fault tolerant computer
L1 cache
Noise
USB hub
23. The delivery of education via some electronic method such as the internet - networks - or optical disks.
Servers
e- learning
groupware...
solid state drive
24. Encrypted data
bus network
Laser printer
ciphertext
network topology
25. A set of programs that coordinates all of the activies among computer hardware devices.
L1 cache
OSP
MICR
Operating system
26. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
cable modem
crimeware
BIOS
ALU
27. On the motherboard hold memory modules
platter
memory slots
project management software...
Point of Sale terminals
28. Case of the system unit to protect internal damage
recieving device
chasis...
newsreader
ghosting
29. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
spoofing
Memory
CPU
SIMM
30. Transmits data via infared light waves.. Both computer and device must have the port for it to work
cyberextortionist
port
site license
IrDA Port
31. Allows the processor to communicate with peripherals.
ghosting
power supply
expansion bus
driver
32. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
cloud storage
Notebook Computer
VAN
Home user
33. Random access memory- memory chips that can be read from and written to by the processor and other devices
UNIX
fault tolerant computer
RAM
corporate spies
34. Single inline memory module forms a single set of contacts
System Unit
analog
device independent
SIMM
35. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
TCP/IP
Home user
ciphertext
Dial up modems
36. Computing device small enough to hold in your hand
IM
synthesizer
Mobile Device
MICR
37. Saves any open docs or programs to hardisk before removing power
OMR
hibernate
script kiddie
digital forensics
38. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
protocol
synthesizer
Web Application
system software...
39. Universal serial bus port connects peripherals to the computer
video card
USB port
EULA
broadband internet service
40. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
Mobile Computer
wireless Internet service provider
warm boot
RAID
41. Enahnces the sound generating capabilites of a personal computer
dot matrix printer
sound card
cluster
gender changer
42. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
bus
Output
DLP projector
UNIX
43. Text version of an IP address
Domain name
hacker
memory module
OMR
44. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
wireless modem
system clock
animated Gif...
bus
45. Joins a cable and a port
solid state drive
OSP
port
connector
46. Used to gain competitive advantage
corporate spies
digital signature
Web Server
online auction
47. Hardware - software - data - people - procedures
Information system
Point of Sale terminals
macros
Software...
48. Someone who accesses a computer or network illegally. Some say they hack to improve security
hacker
client/server
web filter
warm boot
49. Obtains data directly at the location where the transaction or event takes place.
DSL
Mobile Computer
data collection device
Drive Bay
50. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
VR
hibernate
digital signature