SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small program that tells the operating system how to communicate with a specific device
microbrowser
spoofing
driver
RSS 2.0
2. Computing device small enough to hold in your hand
Mobile Device
Personal Computers
RIMM
cable modem
3. A vulnerable computer that is set up to entice an intruder to break into it.
token ring
honeypot
IrDA Port
streaming cam
4. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
web filter
USB port
Storage Media
Dedicated line
5. A rectangular opeining that typically holds disk drives.
Drive Bay
CMOS
online security service
RIMM
6. Optical mark recognition reads hand drawn marks such as circles or rectangles.
router
OMR
Fiber to the Premises
ISP
7. Special software to listen to audio
Domain name
Operating system
CU
player
8. Any unwanted signal usually varying quickly
Noise
Web conference
GPU
cracker
9. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
network standard
Web Browser
bandwidth
USB hub
10. Single chip with two or more processor cores.
overvoltage
system unit
e- learning
multi- core processor
11. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
connector
recieving device
spoofing
air mouse
12. Serves as the interface between the user - the app software - and the computers hardware
firmware...
system software...
wordwrap
Fiber to the Premises
13. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
traffic
network topology
TCP/IP
chat client
14. Started the internet as a networking project
ARPA
broadband
communications channel
Mobile Device
15. Donated for public use has no copyright restrictions
byte
public- domain software...
application software...
parallel processing
16. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
Web Server
back door
nonvolatile memory
MICR
17. Mathematical formula that generates a code from the contents of the message
hash
USB port
solid state drive
CPU
18. ...
Software...
Memory
bus width
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
19. Uses radio waves to transmit data between two devices.
EDI
solid state drive
Bluetooth
cracker
20. Records in a file both successful and unsuccessful attempts.
audit trail
802.11
PNG
message board
21. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
expansion slot
unethical employees
Web Server
22. May break in to computer to exploit security weakness. financial gains - revenge.
air mouse
Web Browser
honeypot
unethical employees
23. Federally funded internet security research and development center
DIMM
MRAM
Storage Media
CERT/CC
24. On the motherboard hold memory modules
noise
Laser printer
CAPTCHA
memory slots
25. A special purpose computer that functions as a component in a larger product. Small with limited hardware
CU
ISP
embedded computer
DSL
26. When turning on a computer that has been turned off completly
Denial of Service attack
cold boot
CMOS
IM
27. Obtains data directly at the location where the transaction or event takes place.
data collection device
animated Gif...
Dial Up line
Output
28. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Denial of Service attack
wireless modem
access time
hacker
29. Searches for and removes unneccessary files
disk cleanup
optical mouse
registrar
virus signature
30. They can execute more than one instruction per clock cycle
Denial of Service attack
superscalar
pretty good Privacy
Drive Bay
31. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
MMS
cyberextortionist
downloading
Top level domain
32. The smallest unit of disk space that stores data and info
cluster
CERT/CC
http
RAID
33. Instead of port - jack is used to identify audio or video ports.
jack
VAN
VoIP
L2 cache
34. When online meetings take place on the web
Notebook Computer
Web conference
capacity
virus
35. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
bandwidth
cyberextortionist
DSL
streaming
36. Joins a cable and a port
corporate spies
Linux
connector
wordwrap
37. zombie
network architecture
cluster
OSP
compromised computer
38. A case that contains electronic components of the computer used to process data.
system unit
driver
DIMM
cross - platform
39. Dynamic ram- chips must be re energized constantly or they lose their contents.
digital
Internet Backbone
memory slots
DRAM
40. Saves any open docs or programs to hardisk before removing power
RTLS
gender changer
E- retail
hibernate
41. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
WAN
thread
Servers
42. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
embedded operating system
preemptive multitasking
VR
online auction
43. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
network card
density
TCP/IP
ghosting
44. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
project management software...
network
Internet Backbone
SRAM
45. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
ROM
warm boot
CERT/CC
OSP
46. Text version of an IP address
traffic
jack
Domain name
cyberextortionist
47. A program that restricts access to certain material on the web
groupware...
Servers
MRAM
web filter
48. 8 bits grouped together. basic storage unit in memory. Each byte has an address
RFID
byte
device independent
audit trail
49. An electrical disturbance that can degrade communications
Hot spots
noise
site license
corporate spies
50. Small capacity built directly in the processor chip
CU
driver
communications
L1 cache