SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
heat sink
machine cycle
peripheral
EDI
2. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
pipelining
spoofing
Operating system
drive bay
3. A type of system software that allows users to perform maintenence type tasks
cracker
hacker
capacity
utility program
4. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
W3C
Mainframe
Memory Cache
nonvolatile memory
5. Can connect multiple types of devices that require faster data transmission speeds.
FireWire port
File compression utility
compromised computer
cyberextortionist
6. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
supercomputer
bandwidth
terminal
7. Smaller than heat sink cools processors in notebook comps
EULA
heat pipe
crimeware
formatting
8. Two main parts are processor and memory.
Motherboard
commands
connector
plaintext
9. Personal information manager is application software that includes features to help users organize personal info
Drive Bay
Desktop Computer
analog
PIM
10. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
RFID
Communications device
DIMM
broadband
11. One or more computers on the network request services from the server. 10 or more computers
adapter card
client/server
Bay
hot plugging
12. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
mpeg
keygen
defragmenting
back door
13. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
register
RIMM
hard disk
Intrusion detection software...
14. Used to track and identify the location of high risk or high value items.
Mainframe
NAS
RTLS
Netiquette
15. A part of the motherboard and connects the processor to main memory
CAM
access control
system bus
virus signature
16. Online service provider- has many members features along with internet access such as IM or Web browsers.
OSP
MAN
compromised computer
hot spot
17. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
Netiquette
E- commerce
certificate authority
SMTP
18. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
Communications device
hypermedia
spoofing
SMTP
19. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
thread
pretty good Privacy
IrDA Port
digital signature
20. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
E- retail
virus
L2 cache
Denial of Service attack
21. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
program
DTP
video card
digital
22. Any data or instructions entered into the memory of the computer
Plug and Play
Input
network card
script kiddie
23. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
heat sink
jack
Software...
24. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
coaxial cable
ciphertext
router
OCR
25. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
MICR
software suite
client/server
star network
26. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
turnaround document
pixel
machine cycle
27. A device that enables you to join a port and a connector that are both male or female
gender changer
newsgroup
pretty good Privacy
Linux
28. zombie
compromised computer
DSL
Intrusion detection software...
newsreader
29. The technology of authenticating a persons identity by verifying a personal characteristic.
chip
DVI
MICR
biometrics
30. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
Drive Bay
disk fragmenter
client/server
USB port
31. Smallest element in an electronic image
multi- core processor
access time
pixel
expansion slot
32. Consists of electronic components that store instructions waiting to be executed (On motherboard)
Domain name system
Memory
ring network
Firewall
33. The delivery of education via some electronic method such as the internet - networks - or optical disks.
access time
synthesizer
e- learning
Web conference
34. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
WAN
digital signature
firmware...
bandwidth
35. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
broadband internet service
Servers
Personal Computers
Storage Device
36. A small metal or plastic device that uses pressure instead of ink.
GUI
stylus
overvoltage
disk controller
37. When turning on a computer that has been turned off completly
cold boot
EDI
Mainframe
ALU
38. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
cracker
device dependant
product activation
POP3
39. Donated for public use has no copyright restrictions
capacity
CMOS
shareware...
public- domain software...
40. Media transmit multiple signals simutaneously. Download faster than upload
e- learning
broadband
Latency
adapter cards
41. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
system bus
GPU
L2 cache
noise
42. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
CPU
hypermedia
CMOS
fiber optic cable
43. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
bugs
network standard
token ring
microbrowser
44. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
IM
hash
Laser printer
sending device
45. Internet connections using regular copper telephone lines.
firmware...
database
DSL
Dial up modems
46. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
Internet Backbone
802.11
microbrowser
47. Extends the capabilites of a browser.
message board
multi- core processor
OCR
plug- in
48. Anopening inside the system unit in which you can install additional equipment. Different than a slot
USB hub
download
EDI
Bay
49. A program that restricts access to certain material on the web
web filter
integrated circuit
CMOS
video card
50. The use of computer or network with out permission
unauthorized access
OMR
system clock
UNIX
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests