SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cables - telephone lines - radio networks - satellites
Input
Transmission media
node
connector
2. A communications device that sends and recieves data and info to and from digital line
digital modem
nonvolatile memory
neural network
POP3
3. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
system unit
RSS 2.0
proxy server
cyberterrorist
4. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
Notebook Computer
Drive Bay
MMS
trackball
5. Errors that can be recognized by automatic update
audit trail
newsgroup
bugs
connector
6. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
embedded computer
router
DNS Server
disk controller
7. Other computers and mobile devices on the networ that rely on the server for its resources
TCP/IP
client
DLP projector
network
8. A temporary connection that uses one or more analog telphone lines for communications.
RFID
utility program
Dial Up line
network architecture
9. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
token ring
Input
Content Aggregator
cluster
10. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Software...
Netbook
touchpad
DVI
11. The code of acceptable behaviors users should follow while on the internet.
DSL
Dial- up access
Netiquette
IM
12. Universal serial bus port connects peripherals to the computer
TLS
Memory
USB port
UNIX
13. Hypertext transfer protocol
noise
http
machine cycle
Intrusion detection software...
14. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
device independent
wireless modem
Firewall
DTP
15. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
cross - platform
script kiddie
VoIP
Web Browser
16. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
adapter cards
Denial of Service attack
IM
wireless modem
17. The design of computers - devices - and media in the network
network architecture
crimeware
FireWire port
IM
18. The standard that outlines characteristics of how two network devices communicate
spoofing
protocol
EDI
plaintext
19. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
animated Gif...
digital
802.11
system on a chip
20. A colection of individual programs available together as a unit. lower cost and ease of use
IM
software suite
communications
CAPTCHA
21. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
driver
turnaround document
NAS
video card
22. Rambus inline memory module house RDRAM chips
hot plugging
RIMM
freeware...
Application software...
23. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
plaintext
ALU
warm boot
ghosting
24. Determines the number of bits that can be transmitted at one time
peer to peer network
bus width
spoofing
program
25. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
RIMM
digital signature
buffer
CU
26. Operating system on mobile devices that generally resides on ROM
ARPA
embedded operating system
WAN
network topology
27. Short for key generator creats software registration numbers and sometimes activation codes.
software suite
EULA
IM
keygen
28. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
proprietary software...
machine cycle
bus network
utility programs
29. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
Domain name system
DVI
POST
OSP
30. Internet Service Provider- a regional or national access provider
access control
ISP
newsreader
DIMM
31. PGP an encryption program
image processing
volatile memory
pretty good Privacy
Memory Cache
32. Accepts the transmission of data - instructions - or info
recieving device
adapter card
Dial up modems
access control
33. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
pixel
CAM
cracker
network standard
34. Read only memory refers to memory chips storing permanent data and instructions (firmware)
application software...
supercomputer
payload
ROM
35. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
application software...
virus
online security service
Denial of Service attack
36. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
disk fragmenter
Bluetooth
wireless access point
37. Method that the internet uses to store domain names and their corressponding IP addresses
Dial Up line
rootkit
stored program concept
Domain name system
38. Single inline memory module forms a single set of contacts
SIMM
corporate spies
ghosting
GUI
39. Computer aided design software assists a professional user in creating designs
router
bus width
formatting
CAD
40. Internet connections using regular copper telephone lines.
RTLS
superscalar
Drive Bay
DSL
41. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
pointing stick
unethical employees
web filter
System Software...
42. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
Storage Device
router
botnets
device dependant
43. Computer automatically can configure adapter cards and other peripherals as you install them
Plug and Play
digital
bus width
access time
44. Each computer or device on the network. often connected by cables
dot matrix printer
Noise
system unit
node
45. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
disk fragmenter
volatile memory
driver
Point of Sale terminals
46. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
spoofing
business software...
Servers
stylus
47. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
freeware...
heat sink
CMOS
download
48. Storage over an internet service
router
cloud storage
buffer
virtual provate network
49. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
proprietary software...
token ring
macros
Domain name system
50. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
ciphertext
System Unit
PIM
application software...