SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Used to gain competitive advantage
corporate spies
chat client
EULA
cable modem
2. Smallest unit of data the computer can process
air mouse
bit
turnaround document
Denial of Service attack
3. Saves any open docs or programs to hardisk before removing power
hibernate
DRAM
TCP/IP
Internet Backbone
4. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
router
coaxial cable
gender changer
embedded operating system
5. Uses devices that emit and sense light to detect the mouses movement
cluster
optical mouse
power supply
optical reader
6. Electrical supply drops.can cause data loss but generally not cause equipment damage
network standard
undervoltage
site license
thread
7. Device with a monitor - keyboard - and memory
USB hub
Intrusion detection software...
SIMM
Terminal
8. Uses fiber optic cable for internet connection.
OSP
MRAM
Fiber to the Premises
digital certificate
9. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
cyberextortionist
sending device
port
Application software...
10. Health care professions conduct live conferences on the computer
WAN
broadband
telemedicine
hot spot
11. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
utility programs
Netiquette
preemptive multitasking
Mobile Computer
12. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CPU
Information system
optical disc
embedded computer
13. Two main parts are processor and memory.
DSL modem
Motherboard
Home user
Netbook
14. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
optical reader
mashup
commands
USB hub
15. Pressure sensitive eraser shaped pointing device
pointing stick
Input
Notebook Computer
ROM
16. Company that provides wireless internet access to computers
wireless Internet service provider
solid state drive
Web Browser
client/server
17. A type of storage media that consists of flat disc and is written and read by a laser
RAM
rootkit
optical disc
platter
18. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
recieving device
E- commerce
network license
token ring
19. A server that you connect to to start a chat session.
BIOS
chat client
USB hub
RAID
20. Hypertext transfer protocol
http
twisted pair cable
network
L1 cache
21. A program that hides in a computer and allows someone from a remote location to take control of the computer
streaming
RTLS
adapter cards
rootkit
22. A case that contains electronic components of the computer used to process data.
turnaround document
EULA
Memory
system unit
23. Computing device small enough to hold in your hand
proprietary software...
network architecture
Mobile Device
access control
24. CA resposible for giving out digital certificate
Hot spots
certificate authority
utility program
cross - platform
25. Loses its contents when power is turned off (RAM)
volatile memory
virus signature
hibernate
access time
26. A computer that delivers requested web pages to your computer
MMS
compromised computer
Terminal
Web Server
27. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
adware
spoofing
fault tolerant computer
network card
28. Storage over an internet service
cloud storage
overvoltage
Netiquette
kernal
29. Protective case for optical discs
jewel box
digital forensics
IrDA Port
ROM
30. A cable forms a closed loop with all computers. one direction
bit
optical mouse
Hot spots
ring network
31. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
project management software...
heat pipe
Linux
turnaround document
32. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
register
Information system
noise
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
33. Combines several GIF images ina single GIF file.
DNS Server
animated Gif...
driver
peripheral
34. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
biometrics
volatile memory
TLS
business software...
35. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
File compression utility
TLS
spider
VR
36. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
liquid flow technology
Linux
compromised computer
EULA
37. Continues to operate when one of its components fails - ensuring that no data is lost
adapter card
fault tolerant computer
newsreader
GUI
38. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
access time
chat client
Domain name
39. Organization that sells and manages domain names
groupware...
cyberextortionist
registrar
rootkit
40. Text version of an IP address
fixed wireless
NAS
platter
Domain name
41. Dual inline memory module forms two sets of contact
PIM
DIMM
utility program
adware
42. A small flat rectangular pointing device that is sensitive to pressure and motion.
plaintext
warm boot
touchpad
heat sink
43. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
adapter card
product activation
GUI
ethernet
44. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
MRAM
RSS 2.0
Memory Cache
stylus
45. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
SRAM
CAM
proxy server
download
46. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
payload
power supply
noise
47. Consumer consumer e commerce.
IM
online auction
network
MAN
48. Program is one that runs the same on multiple operating systems
cross - platform
air mouse
worm
connector
49. A set of programs that coordinates all of the activies among computer hardware devices.
digital signature
supercomputer
Operating system
stylus
50. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
EULA
dot matrix printer
cold boot
Application software...