SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
Content Aggregator
neural network
Operating system
traffic
2. Someone who uses internet to destroy or damage computers for political reasons.
unauthorized access
cyberterrorist
ethernet
EULA
3. A part of the motherboard and connects the processor to main memory
utility programs
utility program
802.11
system bus
4. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
virus
groupware...
Processor
ergonomics
5. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
optical mouse
worm
stylus
Firewall
6. Instead of port - jack is used to identify audio or video ports.
jack
proxy server
site license
bit
7. ...
CAD
server
disk cleanup
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
8. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
utility programs
network standard
peripheral
payload
9. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
IP address
Web Browser
CU
digital certificate
10. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
WAN
heat sink
disk fragmenter
system software...
11. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
System Software...
UNIX
hypermedia
warm boot
12. 8 bits grouped together. basic storage unit in memory. Each byte has an address
byte
ergonomics
device independent
OSP
13. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
Laser printer
Communications device
power supply
fiber optic cable
14. The destructive event or prank the program intended to deliver
traffic
broadband internet service
address
payload
15. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
bus
wireless modem
Netbook
Application software...
16. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
virtual provate network
Top level domain
scanner
telemedicine
17. The technology of authenticating a persons identity by verifying a personal characteristic.
message board
biometrics
embedded computer
MAN
18. Links in text based documents
Dedicated line
hypertext
RTLS
neural network
19. A family member on a computer
Home user
port
ROM
database
20. A vulnerable computer that is set up to entice an intruder to break into it.
cluster
honeypot
preemptive multitasking
online security service
21. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
token ring
device independent
capacity
virus
22. Has the illusion of moving images becuase it sends a continuos stream of images
pointing stick
ciphertext
streaming cam
IM
23. Provids mobile users with a secure connection to the company server as if the user has a private line.
warm boot
virtual provate network
ASCII
hash
24. zombie
MRAM
compromised computer
Top level domain
hash
25. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
crimeware
USB port
Intrusion detection software...
message board
26. When online meetings take place on the web
WAN
optical disc
Web conference
Netiquette
27. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
WAN
payload
mashup
OCR
28. The use of computer or network with out permission
unauthorized access
cluster
MICR
web filter
29. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
fixed wireless
OSP
Communications device
CAM
30. Donated for public use has no copyright restrictions
WAN
BIOS
VR
public- domain software...
31. Smallest element in an electronic image
Bay
pixel
Web Server
DNS Server
32. Extends the capabilites of a browser.
plug- in
freeware...
Netiquette
client/server
33. Contain permanently writeen data - instructions - and information
optical reader
peer to peer network
firmware...
unethical employees
34. Contains 10 or fewer comps - with similar reponsibilities and capabilities
bus network
peer to peer network
ROM
wireless modem
35. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
Trojan Horse
broadband internet service
System Software...
disk controller
36. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
Internet Backbone
Dial up modems
network topology
WAN
37. A collection of computers and devices connected together - via communications devices and transmissions media.
cracker
bandwidth
network
animated Gif...
38. Text version of an IP address
Domain name
POP3
802.11
analog
39. Communications activity. Handled by NSFnet.
fixed wireless
unauthorized access
traffic
streaming cam
40. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
Memory
CERT/CC
System Software...
terminal
41. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
volatile memory
EFT
Dedicated line
cyberterrorist
42. Federally funded internet security research and development center
Personal Computers
spoofing
Netbook
CERT/CC
43. A type of always on connection that is established between two communications devices. better than dial up line
digital modem
program
Dedicated line
formatting
44. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
dialog box
TCP/IP
Terminal
dot matrix printer
45. Human speech is bc of its continous signal that vary in strength and quality
analog
ROM
connector
SRAM
46. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
nonvolatile memory
ARPA
CU
spyware
47. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
image processing
audit trail
dot matrix printer
DLP projector
48. Searches for and removes unneccessary files
disk cleanup
PNG
POST
cold boot
49. Internet connections using regular copper telephone lines.
public- domain software...
Servers
virtual provate network
DSL
50. A web application that combines services from two or more sources creating a new application.
mashup
disk cleanup
spyware
system software...