SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The discovery - collection adn analysis of evidence found on computers and networks
BIOS
freeware...
digital forensics
pretty good Privacy
2. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Dial- up access
hot spot
system clock
access time
3. Someone who accesses a computer or network illegally. Some say they hack to improve security
keygen
Memory Cache
hacker
RTLS
4. Software used by criminals
crimeware
client
rootkit
telemedicine
5. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
Internet Backbone
MMS
RTLS
broadband internet service
6. A communications device that enables a computer or device that does not have a built in networking capability to access a network
CAPTCHA
network card
solid state media
CAD
7. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
memory module
online security service
fiber optic cable
image processing
8. Contain permanently writeen data - instructions - and information
byte
player
firmware...
Domain name
9. Media transmit multiple signals simutaneously. Download faster than upload
utility programs
pretty good Privacy
Bay
broadband
10. All computers connected to central device. Hub or switch
star network
Dial- up access
solid state media
Netbook
11. Popular for LAN. single central cable.
router
Home user
turnaround document
bus network
12. Online service provider- has many members features along with internet access such as IM or Web browsers.
network license
OSP
macros
telesurgery
13. A cable forms a closed loop with all computers. one direction
ring network
parallel processing
Mobile Device
MRAM
14. Moving pictures experts group is a popular video compression standard
machine cycle
mpeg
Motherboard
Firewall
15. Encrypted data
Dial- up access
neural network
ciphertext
VR
16. Major carriers of network traffic
newsreader
Internet Backbone
program
transistor
17. A device that enables you to join a port and a connector that are both male or female
gender changer
Communications device
OSP
VR
18. Builds and maintains lists of words found on websites. Useful for search engines
proxy server
Application software...
spider
address
19. Serves as the interface between the user - the app software - and the computers hardware
system software...
E- retail
MMS
thread
20. A program that restricts access to certain material on the web
Laser printer
system software...
Domain name
web filter
21. Any unwanted signal usually varying quickly
Noise
access control
superscalar
document management software...
22. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
preemptive multitasking
registrar
image processing
twisted pair cable
23. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
superscalar
back door
Terminal
Point of Sale terminals
24. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
chasis...
Memory
bus network
jack
25. Other computers and mobile devices on the networ that rely on the server for its resources
Latency
capacity
client
project management software...
26. Reorganizing it so that the files are store in continous sectors
Content Aggregator
defragmenting
OSP
system bus
27. May break in to computer to exploit security weakness. financial gains - revenge.
http
unethical employees
streaming
jack
28. Smallest element in an electronic image
optical disc
freeware...
Laser printer
pixel
29. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
Domain name
SRAM
LAN
30. Donated for public use has no copyright restrictions
public- domain software...
expansion slot
multifunction peripheral
commands
31. A know specific pattern of virus code.
adapter cards
software suite
unauthorized access
virus signature
32. Program that euns only on a specific type or make of computer
downloading
Mobile Device
noise
device dependant
33. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
IM
solid state drive
chat client
Internet Backbone
34. A system that attempts to imitate the behavior of a human brain.
utility program
OSP
neural network
Firewall
35. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
Motherboard
digital
hypermedia
cyberextortionist
36. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
hypermedia
FireWire port
spyware
image processing
37. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
Servers
ethernet
hibernate
38. Federally funded internet security research and development center
CERT/CC
server
utility program
supercomputer
39. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Dial up modems
http
phishing
crimeware
40. World wide web consortium oversees research and sets standards for many areas of the internet
BIOS
power supply
token ring
W3C
41. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
optical mouse
DTP
Communications device
network standard
42. The use of computer or network with out permission
Bluetooth
honeypot
RTLS
unauthorized access
43. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
undervoltage
recieving device
turnaround document
Processor
44. Obtains data directly at the location where the transaction or event takes place.
disk controller
Netbook
data collection device
Mainframe
45. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
Memory
program
platter
script kiddie
46. Random access memory- memory chips that can be read from and written to by the processor and other devices
RAM
Storage Media
POST
communications channel
47. When turning on a computer that has been turned off completly
Mainframe
cold boot
fault tolerant computer
network architecture
48. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
heat pipe
Motherboard
device independent
MRAM
49. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
expansion slot
firmware...
EULA
VR
50. Pressure sensitive eraser shaped pointing device
Denial of Service attack
pointing stick
rootkit
Communications device