SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. They consist entirely of electronic components and contain no moving parts.
solid state media
unethical employees
IP address
overvoltage
2. Searches for and removes unneccessary files
SRAM
CPU
Laser printer
disk cleanup
3. PGP an encryption program
RIMM
pretty good Privacy
streaming
Personal Computers
4. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
system clock
motherboard
digital signature
kernal
5. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
access control
Desktop Computer
SRAM
streaming
6. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
protocol
CMOS
EFT
Servers
7. Needed generally to participate in a newsgroup
memory slots
UNIX
newsreader
hot spot
8. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
image processing
Communications device
Operating system
VoIP
9. Organization that sells and manages domain names
registrar
biometrics
audit trail
spider
10. Completely Automated Public Turing test to tell Computers and Humans Apart.
Home user
system clock
thread
CAPTCHA
11. Cables - telephone lines - radio networks - satellites
system on a chip
corporate spies
System Unit
Transmission media
12. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
Latency
sending device
streaming
disk controller
13. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Intrusion detection software...
Processor
Servers
pretty good Privacy
14. The last section of the domain name
Output
Top level domain
embedded computer
unauthorized access
15. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
nonvolatile memory
802.11
application software...
disk controller
16. A family member on a computer
system software...
heat sink
Home user
PIM
17. A cable forms a closed loop with all computers. one direction
system unit
ring network
newsgroup
Communications device
18. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
peripheral
ghosting
VR
File compression utility
19. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
Dial- up access
Web Application
chip
cyberterrorist
20. Two or more computers transfer data - instructions - and information.
Web Application
communications
project management software...
IP address
21. A collection of computers and devices connected together - via communications devices and transmissions media.
network
undervoltage
system software...
coaxial cable
22. Data that has been processed in a useful form- text - graphics - audio - video
kernal
disk controller
hot spot
Output
23. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
ethernet
overvoltage
cracker
spoofing
24. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
DTP
product activation
data collection device
density
25. Encrypted data
stylus
ciphertext
capacity
video card
26. Basic input/output systemis firmware that contains the computers startup instructions
cracker
integrated circuit
CERT/CC
BIOS
27. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
groupware...
script kiddie
NAS
28. The process of dividing the disk into tracks and sectors
DRAM
ROM
formatting
access control
29. Does not require a newsreader - easier to use than a newsgroup
port
EULA
online security service
message board
30. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
IM
BIOS
register
OCR
31. Online service provider- has many members features along with internet access such as IM or Web browsers.
optical disc
802.11
hypermedia
OSP
32. Other computers and mobile devices on the networ that rely on the server for its resources
phishing
ciphertext
client
Information system
33. A unique number that identifies the location of a byte in memory
Dial up modems
trackball
address
DLP projector
34. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
router
macros
cable modem
35. Records in a file both successful and unsuccessful attempts.
File compression utility
token ring
SRAM
audit trail
36. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CPU
business software...
capacity
device dependant
37. Transmission media on which the data - instructions - information travel.
communications channel
System Unit
digital certificate
multifunction peripheral
38. Holds one or more disk drives
defragmenting
W3C
pretty good Privacy
drive bay
39. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
RAID
Web Application
SIMM
online auction
40. Software used by criminals
ASCII
crimeware
Terminal
project management software...
41. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
client
device dependant
multifunction peripheral
machine cycle
42. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
backside bus
web filter
CAM
utility programs
43. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
Memory Cache
adware
chip
downloading
44. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
virtual provate network
cluster
system unit
Dial- up access
45. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
wireless modem
L2 cache
heat sink
telesurgery
46. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
hacker
cluster
ciphertext
network topology
47. Continues to operate when one of its components fails - ensuring that no data is lost
nonvolatile memory
embedded computer
heat sink
fault tolerant computer
48. Dual inline memory module forms two sets of contact
USB port
DIMM
CAPTCHA
cloud storage
49. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
Web Browser
DNS Server
star network
50. Accepts the transmission of data - instructions - or info
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
ergonomics
W3C
recieving device