SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A socket in the motherboard that can hold an adapter card
buffer
expansion slot
VAN
E- commerce
2. The discovery - collection adn analysis of evidence found on computers and networks
CU
site license
digital forensics
Memory
3. The technology of authenticating a persons identity by verifying a personal characteristic.
wordwrap
database
biometrics
payload
4. A collection of data organized in a manner that allows access retrieval and use of that data
communications
bugs
database
embedded operating system
5. Small program that tells the operating system how to communicate with a specific device
IM
driver
Firewall
PNG
6. All computers connected to central device. Hub or switch
image processing
star network
PIM
ethernet
7. One or more computers on the network request services from the server. 10 or more computers
client/server
communications channel
peer to peer network
payload
8. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
CERT/CC
power supply
PIM
macros
9. A document that you return to the company that creates and sends it.
overvoltage
keygen
turnaround document
software suite
10. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
network topology
cloud storage
network
solid state drive
11. Used to track and identify the location of high risk or high value items.
superscalar
microbrowser
broadband internet service
RTLS
12. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Dial- up access
DRAM
bugs
telesurgery
13. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
overvoltage
MAN
IM
utility programs
14. A device that enables you to join a port and a connector that are both male or female
gender changer
Domain name system
digital signature
fixed wireless
15. Controls timing of all computer operations
freeware...
system clock
CU
Trojan Horse
16. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
connector
Denial of Service attack
telesurgery
buffer
17. Provides the user with a physcial response from the device
groupware...
tactile output
firmware...
freeware...
18. A real time internet communications service where you can talk to people online.
cyberextortionist
Netiquette
IM
device dependant
19. Extends the capabilites of a browser.
plaintext
proxy server
plug- in
bus
20. World wide web consortium oversees research and sets standards for many areas of the internet
chat client
disk fragmenter
Mobile Computer
W3C
21. The standard that outlines characteristics of how two network devices communicate
Fiber to the Premises
Denial of Service attack
protocol
Intrusion detection software...
22. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
audit trail
groupware...
CU
density
23. A rectangular opeining that typically holds disk drives.
DTP
chip
Drive Bay
message board
24. Accepts the transmission of data - instructions - or info
Linux
Domain name
recieving device
spoofing
25. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
jack
Mobile Computer
hot plugging
26. Software used by criminals
crimeware
kernal
certificate authority
network
27. Computer automatically can configure adapter cards and other peripherals as you install them
Plug and Play
scanner
RSS 2.0
RAID
28. The last section of the domain name
byte
Top level domain
MICR
rootkit
29. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
Storage Device
token ring
Memory Cache
adware
30. Holds one or more disk drives
bandwidth
back door
ciphertext
drive bay
31. Needed generally to participate in a newsgroup
newsreader
traffic
VR world
trackball
32. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
Laser printer
SMTP
volatile memory
token ring
33. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
network
Desktop Computer
E- retail
backside bus
34. Msot retail stores use POS to record purchases - process cards - and update inventory
register
Web conference
server
Point of Sale terminals
35. Copyrighted software that is distributed at no cost for a trial period
cyberterrorist
Domain name
utility programs
shareware...
36. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
synthesizer
superscalar
streaming
recieving device
37. A type of storage media that consists of flat disc and is written and read by a laser
IM
optical disc
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
twisted pair cable
38. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Top level domain
Servers
Processor
star network
39. Internet teephony- enables users to speak to other users over the internet
Bay
VoIP
stylus
jewel box
40. Records in a file both successful and unsuccessful attempts.
mpeg
audit trail
drive bay
proprietary software...
41. Acts as an electronic switch that opens or closes the circuit for electrical charges
pixel
fiber optic cable
network
transistor
42. Basic input/output systemis firmware that contains the computers startup instructions
DSL modem
sending device
BIOS
streaming
43. Hides within or looks like a legitimate program such as a screen saver
Trojan Horse
CU
back door
commands
44. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
mpeg
power supply
keygen
server
45. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
certificate authority
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Desktop Computer
digital certificate
46. A family member on a computer
parallel processing
Home user
ring network
system on a chip
47. Has the illusion of moving images becuase it sends a continuos stream of images
Application software...
streaming cam
USB hub
gender changer
48. Transmission media on which the data - instructions - information travel.
client/server
communications channel
DTP
recieving device
49. Smaller than heat sink cools processors in notebook comps
heat pipe
memory module
public- domain software...
byte
50. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Software...
Communications device
bandwidth
network topology