SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
back door
Linux
Transmission media
L2 cache
2. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
gender changer
WAN
telemedicine
RTLS
3. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
digital certificate
Memory Cache
Storage Media
payload
4. The number of bytes a storage medium can hold
message board
hot plugging
Trojan Horse
capacity
5. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
DSL
node
system software...
Operating system
6. Case of the system unit to protect internal damage
chasis...
USB hub
chip
access time
7. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
port
jewel box
unauthorized access
adapter card
8. Pressure sensitive eraser shaped pointing device
pointing stick
Plug and Play
ghosting
L1 cache
9. A program that hides in a computer and allows someone from a remote location to take control of the computer
communications channel
hacker
rootkit
Storage Media
10. A part of the motherboard and connects the processor to main memory
SMTP
Motherboard
Output
system bus
11. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
Netbook
buffer
Intrusion detection software...
LAN
12. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
RSS 2.0
disk cleanup
streaming
botnets
13. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
corporate spies
Web Browser
File compression utility
data collection device
14. The role of memory to store both data and programs
stored program concept
byte
cyberterrorist
Drive Bay
15. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
application software...
Transmission media
business software...
16. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
client
kernal
802.11
chasis...
17. Dish shaped antenna for internet connection
fixed wireless
online security service
system bus
Application software...
18. Uses radio waves to transmit data between two devices.
PIM
program
unethical employees
Bluetooth
19. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
access time
UNIX
driver
pixel
20. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
broadband internet service
POP3
online security service
Output
21. Is an online area in which isers have wrtten discussions about a particular subject.
client
ASCII
Drive Bay
newsgroup
22. Consumer consumer e commerce.
business software...
online auction
application software...
DTP
23. The destructive event or prank the program intended to deliver
RSS 2.0
payload
adapter card
analog
24. Transmission media on which the data - instructions - information travel.
fault tolerant computer
SRAM
communications channel
recieving device
25. Mathematical formula that generates a code from the contents of the message
hash
buffer
newsgroup
star network
26. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
kernal
parallel processing
E- commerce
tactile output
27. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
BIOS
rootkit
terminal
28. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
player
stylus
TCP/IP
hibernate
29. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
Personal Computers
system clock
jack
Netbook
30. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
RAID
star network
DIMM
W3C
31. Program that euns only on a specific type or make of computer
device dependant
byte
keygen
sleep mode
32. They consist entirely of electronic components and contain no moving parts.
solid state media
Output
CAM
database
33. The process of dividing the disk into tracks and sectors
defragmenting
ghosting
formatting
backside bus
34. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
network standard
network card
hacker
bus
35. The use of computer or network with out permission
unauthorized access
biometrics
firmware...
worm
36. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
SIMM
turnaround document
honeypot
access time
37. When turning on a computer that has been turned off completly
cold boot
Intrusion detection software...
machine cycle
communications
38. Computing device small enough to hold in your hand
TCP/IP
Mobile Device
bus
gender changer
39. Latest version of Post office Protocol
SIMM
Web Application
POP3
database
40. A personal computer you can carry from place to place
Mobile Computer
File compression utility
ALU
network
41. Electrical supply drops.can cause data loss but generally not cause equipment damage
data collection device
undervoltage
EFT
Drive Bay
42. Copyrighted software that is distributed at no cost for a trial period
shareware...
hypermedia
jewel box
Output
43. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
superscalar
embedded computer
cyberextortionist
digital
44. Screen savors were made to prevent this - which etched images permanently onto the screen
bus network
business software...
ghosting
MRAM
45. Small capacity built directly in the processor chip
GUI
digital
noise
L1 cache
46. Single chip with two or more processor cores.
multi- core processor
Input
bus network
hibernate
47. They can execute more than one instruction per clock cycle
E- commerce
wordwrap
Memory
superscalar
48. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
warm boot
server
dialog box
access control
49. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
POP3
streaming
Dedicated line
phishing
50. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
E- commerce
IP address
VAN
Top level domain