SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Graphics processing unit controls the manipulation and display of graphics on the display device.
registrar
Personal Computers
bit
GPU
2. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
honeypot
air mouse
byte
IM
3. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
CAM
PIM
bit
Mobile Computer
4. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
CMOS
traffic
ciphertext
VR
5. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
virtual provate network
IM
liquid flow technology
animated Gif...
6. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
unethical employees
RAM
twisted pair cable
7. Copyrighted software that is distributed at no cost for a trial period
communications
shareware...
commands
System Unit
8. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
IM
hard disk
botnets
9. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
DNS Server
VR
Storage Media
newsgroup
10. Rambus inline memory module house RDRAM chips
RIMM
virus signature
broadband
memory module
11. A device that enables you to join a port and a connector that are both male or female
unauthorized access
gender changer
ciphertext
OCR
12. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
DTP
network architecture
Notebook Computer
terminal
13. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
cracker
peripheral
bandwidth
volatile memory
14. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
ALU
ciphertext
machine cycle
mpeg
15. Pressure sensitive eraser shaped pointing device
port
heat pipe
cloud storage
pointing stick
16. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
system bus
ergonomics
W3C
hypermedia
17. Internet connections using regular copper telephone lines.
protocol
optical reader
DSL
rootkit
18. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
W3C
E- commerce
Web Application
virus
19. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
spooling
sleep mode
Home user
parallel processing
20. Optical mark recognition reads hand drawn marks such as circles or rectangles.
scanner
digital modem
wordwrap
OMR
21. A collection of data organized in a manner that allows access retrieval and use of that data
freeware...
broadband internet service
database
Operating system
22. Graphic file (JPEG - GIF) slowly replacing GIF
virtual provate network
PNG
video card
IrDA Port
23. A legal agreement that permits users to install the software on multiple computers.
byte
site license
POP3
Transmission media
24. Perpetrator attempts to obtain your personal or financial info.
IM
phishing
SMTP
System Software...
25. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
device dependant
Firewall
network license
coaxial cable
26. A colection of individual programs available together as a unit. lower cost and ease of use
virus
streaming
software suite
hash
27. Sends digital data and info from a comp to a DSL line
Desktop Computer
DSL modem
bugs
sleep mode
28. Federally funded internet security research and development center
traffic
network topology
jack
CERT/CC
29. Unencrypted readable data
system clock
IrDA Port
plaintext
Denial of Service attack
30. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
Denial of Service attack
stylus
botnets
broadband
31. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
DVI
spider
cracker
downloading
32. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
telemedicine
ARPA
streaming
CMOS
33. When turning on a computer that has been turned off completly
Motherboard
cold boot
MAN
device dependant
34. Someone who accesses a computer or network illegally. Some say they hack to improve security
multifunction peripheral
star network
Bay
hacker
35. The code of acceptable behaviors users should follow while on the internet.
expansion slot
volatile memory
digital
Netiquette
36. The role of memory to store both data and programs
stored program concept
telesurgery
VAN
network standard
37. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
http
cyberextortionist
downloading
density
38. A vulnerable computer that is set up to entice an intruder to break into it.
adapter card
dialog box
E- retail
honeypot
39. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
hash
bit
Servers
disk controller
40. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
ciphertext
DSL
stylus
hot spot
41. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
air mouse
trackball
Mainframe
hash
42. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
utility programs
cyberterrorist
LAN
ergonomics
43. Random access memory- memory chips that can be read from and written to by the processor and other devices
player
SIMM
nonvolatile memory
RAM
44. A computer that delivers requested web pages to your computer
Web Server
MRAM
ARPA
IP address
45. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
bus network
address
Storage Media
virus
46. Device with a monitor - keyboard - and memory
PIM
synthesizer
MRAM
Terminal
47. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
DVI
crimeware
application software...
system unit
48. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
Memory Cache
newsreader
Linux
49. Two main parts are processor and memory.
Motherboard
router
Home user
nonvolatile memory
50. A small metal or plastic device that uses pressure instead of ink.
supercomputer
traffic
stylus
bandwidth