SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Other computers and mobile devices on the networ that rely on the server for its resources
client
utility programs
DNS Server
back door
2. A socket in the motherboard that can hold an adapter card
Memory Cache
utility programs
expansion slot
backside bus
3. Controls timing of all computer operations
telesurgery
downloading
fault tolerant computer
system clock
4. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
air mouse
port
video card
DTP
5. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
EFT
spyware
memory module
script kiddie
6. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
registrar
CPU
Web Server
digital modem
7. Encrypted data
ciphertext
SIMM
e- learning
system bus
8. Graphics processing unit controls the manipulation and display of graphics on the display device.
solid state drive
digital modem
GPU
Web Browser
9. A program that hides in a computer and allows someone from a remote location to take control of the computer
streaming
rootkit
communications channel
chat client
10. Needed generally to participate in a newsgroup
digital signature
Home user
newsreader
DSL
11. Has the illusion of moving images becuase it sends a continuos stream of images
streaming cam
bit
network topology
network license
12. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
application software...
memory module
Dedicated line
DIMM
13. Someone who uses internet to destroy or damage computers for political reasons.
keygen
solid state drive
adapter cards
cyberterrorist
14. Two main parts are processor and memory.
program
Motherboard
DSL modem
Home user
15. PGP an encryption program
defragmenting
heat sink
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
pretty good Privacy
16. Universal serial bus port connects peripherals to the computer
sound card
Content Aggregator
USB port
DSL
17. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
wireless modem
microbrowser
access time
ASCII
18. Electrical supply drops.can cause data loss but generally not cause equipment damage
tactile output
undervoltage
online security service
byte
19. Major carriers of network traffic
Internet Backbone
Transmission media
IM
web filter
20. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
scanner
project management software...
network
Memory
21. Small capacity built directly in the processor chip
Terminal
L1 cache
audit trail
RAID
22. A temporary connection that uses one or more analog telphone lines for communications.
Dial Up line
cyberextortionist
sending device
peer to peer network
23. A system that attempts to imitate the behavior of a human brain.
broadband
volatile memory
Terminal
neural network
24. Searches for and removes unneccessary files
disk cleanup
spooling
peer to peer network
tactile output
25. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
embedded computer
Personal Computers
IrDA Port
cold boot
26. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
streaming
RAID
router
script kiddie
27. Provids mobile users with a secure connection to the company server as if the user has a private line.
virtual provate network
access time
ROM
Linux
28. Donated for public use has no copyright restrictions
network license
online security service
public- domain software...
crimeware
29. Short for key generator creats software registration numbers and sometimes activation codes.
twisted pair cable
Servers
keygen
Bay
30. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
client
hibernate
Web Browser
register
31. Initiates an instruction to transmit data - instructions - or information.
Hot spots
plaintext
sending device
defragmenting
32. Personal information manager is application software that includes features to help users organize personal info
PIM
plaintext
DTP
digital signature
33. Msot retail stores use POS to record purchases - process cards - and update inventory
hard disk
cyberextortionist
Point of Sale terminals
compromised computer
34. Protective case for optical discs
jewel box
Noise
SIMM
back door
35. Computer automatically can configure adapter cards and other peripherals as you install them
data collection device
Plug and Play
Netbook
DTP
36. The smallest unit of disk space that stores data and info
access time
network topology
utility programs
cluster
37. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
hash
CPU
BIOS
hot spot
38. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
SRAM
node
parallel processing
Web Server
39. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Home user
Desktop Computer
SIMM
Dial- up access
40. When turning on a computer that has been turned off completly
cold boot
DVI
botnets
LAN
41. Does not require a newsreader - easier to use than a newsgroup
communications channel
plug- in
message board
MAN
42. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
token ring
bus
DVI
spoofing
43. Connects the processor to cache.
DRAM
player
Dial Up line
backside bus
44. One or more computers on the network request services from the server. 10 or more computers
jewel box
Fiber to the Premises
newsgroup
client/server
45. Anopening inside the system unit in which you can install additional equipment. Different than a slot
Bay
bus
token ring
cross - platform
46. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
pointing stick
digital signature
port
motherboard
47. Digital light processor uses tiny mirrors to reflect light
DLP projector
device dependant
E- retail
GUI
48. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
Web Server
Operating system
chip
VR world
49. Mathematical formula that generates a code from the contents of the message
EULA
Drive Bay
hash
virtual provate network
50. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
audit trail
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
macros
liquid flow technology