SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
worm
Desktop Computer
optical disc
OCR
2. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
connector
pixel
ROM
token ring
3. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
adware
product activation
Netbook
formatting
4. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
wordwrap
hot spot
pretty good Privacy
ghosting
5. The role of memory to store both data and programs
client
stored program concept
ciphertext
DLP projector
6. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
chasis...
Servers
Storage Device
freeware...
7. Someone who uses internet to destroy or damage computers for political reasons.
cyberterrorist
bandwidth
firmware...
VAN
8. Consists of electronic components that store instructions waiting to be executed (On motherboard)
Memory
USB hub
pipelining
Bluetooth
9. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
cyberterrorist
Mobile Device
IM
Dial Up line
10. Device with a monitor - keyboard - and memory
Laser printer
Fiber to the Premises
Terminal
access time
11. Short for key generator creats software registration numbers and sometimes activation codes.
streaming
keygen
ASCII
Operating system
12. Small program that tells the operating system how to communicate with a specific device
Linux
hypermedia
ASCII
driver
13. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
download
machine cycle
fiber optic cable
14. Popular for LAN. single central cable.
traffic
bus network
Mobile Device
coaxial cable
15. Picure messaging can occur from mobile to mobile and mobile to email
MMS
MRAM
spyware
ring network
16. A temporary connection that uses one or more analog telphone lines for communications.
ergonomics
Dial Up line
digital signature
spyware
17. zombie
POP3
Plug and Play
compromised computer
expansion bus
18. Computer aided design software assists a professional user in creating designs
message board
bugs
CAD
client/server
19. Media transmit multiple signals simutaneously. Download faster than upload
VR world
virus
cloud storage
broadband
20. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
communications
drive bay
Storage Device
worm
21. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
cracker
VAN
Netbook
ghosting
22. Processor begins to fetch a second instruction before it completes the full machine cycle
DRAM
hacker
pipelining
CAM
23. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
MICR
EFT
RSS 2.0
stored program concept
24. Can connect multiple types of devices that require faster data transmission speeds.
network topology
FireWire port
Output
Netiquette
25. Searches for and removes unneccessary files
disk cleanup
player
hibernate
dialog box
26. Software used by criminals
DRAM
crimeware
microbrowser
L1 cache
27. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
scanner
undervoltage
hypertext
buffer
28. Pressure sensitive eraser shaped pointing device
proprietary software...
pointing stick
Trojan Horse
OSP
29. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
transistor
network
DNS Server
overvoltage
30. Smallest element in an electronic image
USB hub
Web Server
Noise
pixel
31. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
chip
script kiddie
Hot spots
back door
32. Completely Automated Public Turing test to tell Computers and Humans Apart.
NAS
unauthorized access
nonvolatile memory
CAPTCHA
33. Loses its contents when power is turned off (RAM)
volatile memory
broadband
pixel
IM
34. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
chasis...
animated Gif...
air mouse
IM
35. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
adapter cards
chip
Hot spots
density
36. Smallest unit of data the computer can process
Web conference
hibernate
bit
Memory
37. A computer that delivers requested web pages to your computer
optical disc
stylus
Web Server
disk fragmenter
38. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
cross - platform
http
EDI
Memory Cache
39. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
peripheral
UNIX
power supply
System Software...
40. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
payload
hypermedia
cracker
broadband internet service
41. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
tactile output
public- domain software...
L2 cache
bus
42. Encrypted data
scanner
ciphertext
Content Aggregator
RSS 2.0
43. Used to gain competitive advantage
DNS Server
corporate spies
power supply
MRAM
44. Copyrighted software that is distributed at no cost for a trial period
shareware...
keygen
ROM
Storage Media
45. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
recieving device
Output
CU
chasis...
46. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
Storage Device
botnets
POST
database
47. Controls timing of all computer operations
density
POP3
Bluetooth
system clock
48. Perpetrator attempts to obtain your personal or financial info.
cloud storage
ALU
phishing
Web conference
49. When turning on a computer that has been turned off completly
cold boot
cross - platform
communications channel
VAN
50. Dual inline memory module forms two sets of contact
platter
disk cleanup
DIMM
File compression utility