SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Contain permanently writeen data - instructions - and information
firmware...
wordwrap
fault tolerant computer
sleep mode
2. Broadband modem- sends and recives digital data over the cable television
Operating system
Dial- up access
VAN
cable modem
3. Contains 10 or fewer comps - with similar reponsibilities and capabilities
system clock
peer to peer network
IM
DSL modem
4. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
sending device
System Software...
DNS Server
IM
5. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
CU
density
worm
Information system
6. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
tactile output
keygen
Latency
Personal Computers
7. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
volatile memory
stylus
spyware
pipelining
8. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
Plug and Play
business software...
optical mouse
heat sink
9. The number of bits in an area on a storage medium - Higher density means more storage capacity
cross - platform
density
device independent
online auction
10. The design of computers - devices - and media in the network
network architecture
peer to peer network
application software...
E- commerce
11. Software that helps groups of people work together on projects and share info over a network
adapter cards
neural network
Plug and Play
groupware...
12. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
RSS 2.0
ethernet
disk controller
OCR
13. When online meetings take place on the web
web filter
unauthorized access
ring network
Web conference
14. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Processor
wireless access point
Dial- up access
EULA
15. Anopening inside the system unit in which you can install additional equipment. Different than a slot
Memory
network standard
Bay
ISP
16. Started the internet as a networking project
back door
image processing
network topology
ARPA
17. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
player
Web Application
message board
utility programs
18. 8 bits grouped together. basic storage unit in memory. Each byte has an address
back door
volatile memory
Motherboard
byte
19. Mathematical formula that generates a code from the contents of the message
hash
Hot spots
image processing
LAN
20. The process if a computer or device recieveing info info from the server on the internet
network topology
downloading
public- domain software...
Output
21. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
CAD
ethernet
cyberextortionist
hypertext
22. An instruction that causes a program to perform a specific action.
project management software...
traffic
OSP
commands
23. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
memory slots
audit trail
payload
liquid flow technology
24. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
heat sink
UNIX
Fiber to the Premises
Output
25. (laptop computer) portable personal computer often able to fit in your lap
optical mouse
client/server
Notebook Computer
spider
26. Does not require a newsreader - easier to use than a newsgroup
system on a chip
message board
tactile output
database
27. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
RFID
Latency
web filter
botnets
28. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
overvoltage
bugs
bus width
spoofing
29. A web application that combines services from two or more sources creating a new application.
ethernet
DSL modem
broadband
mashup
30. Errors that can be recognized by automatic update
digital forensics
L2 cache
bugs
ghosting
31. Dynamic ram- chips must be re energized constantly or they lose their contents.
DRAM
mpeg
Dial up modems
stored program concept
32. Allows users to keep typing without using enter at the end of each line
wordwrap
hacker
jack
proxy server
33. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
pretty good Privacy
terminal
Web Browser
phishing
34. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
E- commerce
image processing
Noise
IP address
35. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
downloading
cyberterrorist
wireless access point
Terminal
36. A personal computer you can carry from place to place
sending device
Mobile Computer
fiber optic cable
freeware...
37. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
digital forensics
MRAM
newsgroup
fixed wireless
38. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
fixed wireless
DRAM
solid state media
39. The use of computer or network with out permission
analog
L2 cache
product activation
unauthorized access
40. The number of bytes a storage medium can hold
capacity
Application software...
backside bus
DIMM
41. A unique number that identifies the location of a byte in memory
cyberterrorist
crimeware
address
GUI
42. Loses its contents when power is turned off (RAM)
document management software...
rootkit
volatile memory
tactile output
43. A number that uniquely identifies each computer or device connected to the internet (0-255)
IP address
superscalar
online security service
phishing
44. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
turnaround document
solid state drive
image processing
Bluetooth
45. Major carriers of network traffic
cable modem
platter
Internet Backbone
solid state media
46. World wide web consortium oversees research and sets standards for many areas of the internet
W3C
Web Browser
CAPTCHA
protocol
47. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Domain name
http
power supply
pointing stick
48. Electrical supply drops.can cause data loss but generally not cause equipment damage
machine cycle
spoofing
undervoltage
fault tolerant computer
49. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
crimeware
disk controller
TCP/IP
address
50. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
spoofing
Web Application
cluster
back door
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests