SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. On the motherboard hold memory modules
wordwrap
network card
memory slots
digital modem
2. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
CU
Processor
hot spot
heat pipe
3. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
botnets
MRAM
BIOS
Netbook
4. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
Point of Sale terminals
IM
CU
buffer
5. A unique number that identifies the location of a byte in memory
token ring
Internet Backbone
touchpad
address
6. Random access memory- memory chips that can be read from and written to by the processor and other devices
registrar
RAM
bandwidth
density
7. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
bus width
CU
SRAM
kernal
8. Mathematical formula that generates a code from the contents of the message
hash
shareware...
digital forensics
spoofing
9. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
digital
Web Browser
IM
system bus
10. Is a security measure that defines who can access it and what actions they can take while acessing the computer
port
utility program
terminal
access control
11. 8 bits grouped together. basic storage unit in memory. Each byte has an address
byte
proxy server
hot spot
stylus
12. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
Mainframe
back door
system software...
System Unit
13. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
undervoltage
W3C
CAM
utility program
14. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
digital
peripheral
solid state drive
newsreader
15. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
project management software...
Firewall
Operating system
Motherboard
16. A server that you connect to to start a chat session.
chat client
warm boot
drive bay
embedded operating system
17. Online service provider- has many members features along with internet access such as IM or Web browsers.
DSL modem
OSP
ARPA
Netiquette
18. Transmission media on which the data - instructions - information travel.
cyberextortionist
Terminal
cross - platform
communications channel
19. Is an online area in which isers have wrtten discussions about a particular subject.
Content Aggregator
broadband internet service
analog
newsgroup
20. A device that enables you to join a port and a connector that are both male or female
Mobile Computer
gender changer
virus signature
multi- core processor
21. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Dial- up access
product activation
server
L2 cache
22. Joins a cable and a port
connector
coaxial cable
Internet Backbone
rootkit
23. Provide Wi Fi to mobile computers or devices
SMTP
Input
Terminal
Hot spots
24. Popular for LAN. single central cable.
pixel
worm
Web Browser
bus network
25. Errors that can be recognized by automatic update
bugs
Motherboard
warm boot
Linux
26. Universal serial bus port connects peripherals to the computer
Information system
USB port
Bluetooth
buffer
27. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
RAID
optical disc
mashup
Denial of Service attack
28. A collection of data organized in a manner that allows access retrieval and use of that data
Operating system
MICR
database
project management software...
29. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
Transmission media
System Software...
compromised computer
MAN
30. Smallest element in an electronic image
ring network
TCP/IP
sound card
pixel
31. The smallest unit of disk space that stores data and info
Bluetooth
Intrusion detection software...
volatile memory
cluster
32. Obtains data directly at the location where the transaction or event takes place.
transistor
MRAM
CERT/CC
data collection device
33. The design of computers - devices - and media in the network
network architecture
preemptive multitasking
connector
scanner
34. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
network license
back door
Input
DTP
35. Copyrighted software provided at no cost by company that retains all rights to software
freeware...
nonvolatile memory
site license
adware
36. Small capacity built directly in the processor chip
unauthorized access
L1 cache
optical disc
unethical employees
37. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
pretty good Privacy
EDI
Storage Device
program
38. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
Bluetooth
802.11
Web conference
platter
39. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
turnaround document
broadband internet service
coaxial cable
ISP
40. A system that attempts to imitate the behavior of a human brain.
business software...
neural network
device dependant
ASCII
41. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
hash
warm boot
solid state drive
proxy server
42. Smaller than heat sink cools processors in notebook comps
telemedicine
IrDA Port
heat pipe
port
43. Unencrypted readable data
plaintext
Netbook
air mouse
Memory
44. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
stylus
CPU
Linux
video card
45. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
audit trail
L2 cache
telemedicine
46. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
nonvolatile memory
TLS
ASCII
fiber optic cable
47. Consists of electronic components that store instructions waiting to be executed (On motherboard)
system clock
online security service
Memory
token ring
48. Controls timing of all computer operations
hard disk
adware
system clock
Dedicated line
49. Small program that tells the operating system how to communicate with a specific device
capacity
pretty good Privacy
driver
USB port
50. Saves any open documents and programs to RAM and places computer into a low power state
sleep mode
pretty good Privacy
register
video card