SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Copyrighted software that is distributed at no cost for a trial period
Processor
audit trail
Application software...
shareware...
2. Personal information manager is application software that includes features to help users organize personal info
Point of Sale terminals
PIM
Transmission media
Mobile Device
3. Instead of port - jack is used to identify audio or video ports.
Input
twisted pair cable
jack
Laser printer
4. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Denial of Service attack
Netbook
L1 cache
connector
5. Rambus inline memory module house RDRAM chips
document management software...
RIMM
MICR
wireless Internet service provider
6. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Memory
Dial up modems
digital
network
7. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
recieving device
pipelining
hard disk
8. The discovery - collection adn analysis of evidence found on computers and networks
application software...
bus
Home user
digital forensics
9. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Memory Cache
cyberterrorist
CMOS
multi- core processor
10. An electrical disturbance that can degrade communications
noise
Domain name
keygen
registrar
11. Sends digital data and info from a comp to a DSL line
digital signature
DSL modem
PIM
wireless access point
12. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
Firewall
online security service
streaming
13. A computer that delivers requested web pages to your computer
network standard
Web Server
E- retail
RTLS
14. A system that attempts to imitate the behavior of a human brain.
hard disk
neural network
Notebook Computer
online security service
15. A socket in the motherboard that can hold an adapter card
utility program
expansion slot
CPU
Web conference
16. Software used by criminals
optical mouse
payload
hypertext
crimeware
17. Circuit boards tjay provide connections and functions not built into the motherboard
coaxial cable
ciphertext
Plug and Play
adapter cards
18. Computer aided design software assists a professional user in creating designs
Domain name system
wireless access point
Output
CAD
19. May break in to computer to exploit security weakness. financial gains - revenge.
port
unethical employees
ghosting
embedded computer
20. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
Desktop Computer
Dedicated line
star network
router
21. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
tactile output
project management software...
chat client
Application software...
22. Acts as an electronic switch that opens or closes the circuit for electrical charges
peripheral
synthesizer
MICR
transistor
23. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
adapter card
power supply
DTP
multifunction peripheral
24. Pressure sensitive eraser shaped pointing device
TLS
recieving device
pointing stick
IP address
25. Small capacity built directly in the processor chip
L1 cache
POST
network license
ROM
26. Federally funded internet security research and development center
access time
ciphertext
hypertext
CERT/CC
27. A legal agreement that allows multiple users to access the software on the server simutaneously
RAM
driver
heat sink
network license
28. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
optical disc
TCP/IP
access control
chasis...
29. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
hot spot
bandwidth
CU
CAD
30. A type of system software that allows users to perform maintenence type tasks
Noise
Application software...
utility program
Latency
31. Storage over an internet service
buffer
cloud storage
Mobile Computer
cracker
32. A unique number that identifies the location of a byte in memory
address
EFT
terminal
CPU
33. The role of memory to store both data and programs
streaming
L1 cache
drive bay
stored program concept
34. Fetching - decoding - executing - storing
system on a chip
machine cycle
Web Application
memory module
35. Device with a monitor - keyboard - and memory
Terminal
software suite
bus width
OMR
36. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
Web Application
Netiquette
firmware...
Intrusion detection software...
37. A communications device that enables a computer or device that does not have a built in networking capability to access a network
Bay
network card
mashup
air mouse
38. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
virus signature
Storage Media
Dial- up access
wireless access point
39. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
system on a chip
heat pipe
CAM
port
40. The last section of the domain name
transistor
online security service
supercomputer
Top level domain
41. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
compromised computer
Memory
unethical employees
Trojan Horse
42. Dish shaped antenna for internet connection
traffic
fixed wireless
kernal
Fiber to the Premises
43. Major carriers of network traffic
hibernate
Internet Backbone
Web Application
multifunction peripheral
44. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
Dial Up line
gender changer
802.11
phishing
45. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
Storage Device
VAN
air mouse
NAS
46. Enahnces the sound generating capabilites of a personal computer
USB hub
sound card
ISP
Web Server
47. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
Intrusion detection software...
WAN
formatting
PNG
48. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
cyberextortionist
PIM
bit
VR
49. Media transmit multiple signals simutaneously. Download faster than upload
sending device
broadband
OCR
Firewall
50. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
spider
multi- core processor
Latency
DLP projector