SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Internet connections using regular copper telephone lines.
wordwrap
Fiber to the Premises
touchpad
DSL
2. CA resposible for giving out digital certificate
certificate authority
utility program
spoofing
Input
3. Surgeon performs operation by controlling robot when not in the same area as patient.
wireless access point
telesurgery
BIOS
overvoltage
4. The smallest unit of disk space that stores data and info
digital modem
cluster
UNIX
microbrowser
5. A window that provides info - presents availabe options - or requests a response.
digital forensics
virus signature
density
dialog box
6. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
terminal
File compression utility
player
SIMM
7. Internet Service Provider- a regional or national access provider
PNG
honeypot
ISP
peer to peer network
8. Links in text based documents
bus width
database
hypertext
ethernet
9. Hypertext transfer protocol
Netbook
newsgroup
jack
http
10. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
system on a chip
image processing
cyberterrorist
virus
11. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
ghosting
broadband internet service
ergonomics
WAN
12. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
access time
POST
communications
nonvolatile memory
13. The process if a computer or device recieveing info info from the server on the internet
OSP
twisted pair cable
downloading
Memory
14. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
VR
touchpad
SMTP
system clock
15. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
stored program concept
Memory
Netbook
adapter card
16. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
optical disc
online security service
RAID
buffer
17. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
L1 cache
corporate spies
pretty good Privacy
MICR
18. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
hypermedia
program
network standard
turnaround document
19. A socket in the motherboard that can hold an adapter card
W3C
expansion slot
hard disk
utility program
20. Sends digital data and info from a comp to a DSL line
jack
online auction
port
DSL modem
21. Consists of electronic components that store instructions waiting to be executed (On motherboard)
IP address
Processor
Memory
VR world
22. The discovery - collection adn analysis of evidence found on computers and networks
fiber optic cable
Mainframe
multi- core processor
digital forensics
23. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
utility program
MICR
protocol
commands
24. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
Transmission media
product activation
air mouse
network topology
25. Media transmit multiple signals simutaneously. Download faster than upload
cross - platform
broadband
POP3
machine cycle
26. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
audit trail
cloud storage
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
warm boot
27. Software that helps groups of people work together on projects and share info over a network
CERT/CC
Bay
disk fragmenter
groupware...
28. A colection of individual programs available together as a unit. lower cost and ease of use
access time
software suite
bus width
access control
29. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
digital signature
Bay
access time
RAID
30. Two main parts are processor and memory.
freeware...
disk cleanup
disk fragmenter
Motherboard
31. Someone who accesses a computer or network illegally. Some say they hack to improve security
hacker
Internet Backbone
optical disc
Hot spots
32. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
WAN
PNG
synthesizer
Transmission media
33. Small program that tells the operating system how to communicate with a specific device
unethical employees
DLP projector
power supply
driver
34. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
ARPA
USB hub
hot spot
noise
35. Most computers (on and off)
spyware
digital
chat client
DSL modem
36. World wide web consortium oversees research and sets standards for many areas of the internet
W3C
hibernate
registrar
Fiber to the Premises
37. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
solid state media
Processor
streaming
CPU
38. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
public- domain software...
CERT/CC
Intrusion detection software...
program
39. Software used by criminals
embedded computer
spoofing
crimeware
Fiber to the Premises
40. May break in to computer to exploit security weakness. financial gains - revenge.
cracker
unethical employees
GUI
system bus
41. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
heat sink
Denial of Service attack
preemptive multitasking
Mainframe
42. Single chip with two or more processor cores.
multi- core processor
noise
utility program
scanner
43. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
heat sink
sending device
network card
supercomputer
44. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
density
802.11
Firewall
device independent
45. Computing device small enough to hold in your hand
E- retail
registrar
platter
Mobile Device
46. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
client
Mainframe
register
OSP
47. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
LAN
Fiber to the Premises
RTLS
port
48. A system that attempts to imitate the behavior of a human brain.
site license
spyware
neural network
script kiddie
49. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
noise
Mobile Device
Dial- up access
Memory
50. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
cracker
Internet Backbone
IM
port