SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
utility program
Top level domain
CAPTCHA
VAN
2. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
Software...
hibernate
address
warm boot
3. Internet connections using regular copper telephone lines.
DSL
document management software...
WAN
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
4. A communications device that sends and recieves data and info to and from digital line
MMS
Input
digital modem
LAN
5. Software used by criminals
rootkit
Memory Cache
thread
crimeware
6. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
DSL
Hot spots
platter
7. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
network
coaxial cable
jack
adapter cards
8. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
Personal Computers
tactile output
token ring
Domain name
9. Completely Automated Public Turing test to tell Computers and Humans Apart.
protocol
ethernet
DRAM
CAPTCHA
10. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
CAM
sending device
proxy server
online security service
11. A vulnerable computer that is set up to entice an intruder to break into it.
honeypot
OCR
DSL
online auction
12. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
spoofing
project management software...
ALU
13. Short for key generator creats software registration numbers and sometimes activation codes.
CAM
ring network
thread
keygen
14. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
Point of Sale terminals
bus width
hot spot
bit
15. A communications device that enables a computer or device that does not have a built in networking capability to access a network
network card
Personal Computers
document management software...
wireless Internet service provider
16. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
macros
virus
utility programs
Memory
17. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
expansion slot
CERT/CC
optical reader
solid state media
18. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
DVI
chip
wireless modem
gender changer
19. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
client/server
macros
digital modem
20. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
cluster
Bluetooth
Communications device
spyware
21. Pressure sensitive eraser shaped pointing device
network standard
system software...
pointing stick
machine cycle
22. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
EDI
Internet Backbone
compromised computer
cracker
23. Dish shaped antenna for internet connection
payload
RTLS
Internet Backbone
fixed wireless
24. Copyrighted software that is distributed at no cost for a trial period
touchpad
shareware...
USB hub
System Software...
25. Started the internet as a networking project
botnets
access control
ARPA
registrar
26. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
POP3
overvoltage
stored program concept
Home user
27. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
thread
Denial of Service attack
spooling
fiber optic cable
28. Joins a cable and a port
W3C
connector
web filter
density
29. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
cold boot
Plug and Play
Storage Device
broadband internet service
30. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
protocol
public- domain software...
Processor
virus signature
31. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
thread
network license
Mobile Computer
32. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
CMOS
cyberextortionist
optical disc
33. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
spooling
RSS 2.0
hard disk
OSP
34. Organization that sells and manages domain names
MMS
http
player
registrar
35. Consumer consumer e commerce.
Mainframe
online auction
bus width
http
36. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
registrar
network
warm boot
trackball
37. Provide Wi Fi to mobile computers or devices
WAN
device independent
DSL
Hot spots
38. Copyrighted software provided at no cost by company that retains all rights to software
device independent
freeware...
VAN
cable modem
39. Has the illusion of moving images becuase it sends a continuos stream of images
streaming cam
audit trail
back door
cyberterrorist
40. Uses radio waves to transmit data between two devices.
Bluetooth
virus signature
virtual provate network
peripheral
41. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
parallel processing
heat sink
honeypot
document management software...
42. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
Intrusion detection software...
EULA
ARPA
multi- core processor
43. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
terminal
Domain name system
RIMM
pretty good Privacy
44. Contains many microscopic pathways capable of carrying an electrical current
integrated circuit
spider
streaming cam
botnets
45. Extends the capabilites of a browser.
virus signature
Input
plug- in
DVI
46. A personal computer you can carry from place to place
VR
NAS
ciphertext
Mobile Computer
47. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
digital signature
payload
NAS
client
48. Sends digital data and info from a comp to a DSL line
preemptive multitasking
ALU
disk controller
DSL modem
49. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
Denial of Service attack
system unit
network topology
Dedicated line
50. Errors that can be recognized by automatic update
network license
bugs
Web conference
DSL modem