SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A vulnerable computer that is set up to entice an intruder to break into it.
compromised computer
chip
Memory Cache
honeypot
2. A type of system software that allows users to perform maintenence type tasks
network card
utility program
undervoltage
optical disc
3. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
expansion slot
spooling
nonvolatile memory
SRAM
4. They can execute more than one instruction per clock cycle
CU
superscalar
ASCII
EFT
5. Circuit boards tjay provide connections and functions not built into the motherboard
VR world
protocol
adapter cards
supercomputer
6. Allows users to keep typing without using enter at the end of each line
back door
cross - platform
downloading
wordwrap
7. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Input
System Software...
pipelining
Firewall
8. Obtains data directly at the location where the transaction or event takes place.
data collection device
Denial of Service attack
undervoltage
port
9. A legal agreement that permits users to install the software on multiple computers.
communications channel
site license
TCP/IP
IP address
10. Contain permanently writeen data - instructions - and information
analog
firmware...
device dependant
mashup
11. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
product activation
Bluetooth
Latency
access time
12. They consist entirely of electronic components and contain no moving parts.
parallel processing
Transmission media
audit trail
solid state media
13. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
pixel
chasis...
Home user
14. Records in a file both successful and unsuccessful attempts.
hypermedia
audit trail
scanner
PNG
15. (laptop computer) portable personal computer often able to fit in your lap
digital forensics
stylus
Notebook Computer
hypermedia
16. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
EFT
platter
unauthorized access
bit
17. The use of computer or network with out permission
network topology
gender changer
unauthorized access
W3C
18. Smaller than heat sink cools processors in notebook comps
recieving device
heat pipe
wireless access point
hypermedia
19. Internet teephony- enables users to speak to other users over the internet
Input
heat pipe
VoIP
SIMM
20. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
Desktop Computer
Dial Up line
plaintext
cross - platform
21. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
warm boot
Intrusion detection software...
spider
spoofing
22. Processor begins to fetch a second instruction before it completes the full machine cycle
newsreader
compromised computer
pipelining
fault tolerant computer
23. Consumer consumer e commerce.
online auction
telemedicine
supercomputer
animated Gif...
24. A know specific pattern of virus code.
virus signature
Personal Computers
honeypot
NAS
25. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
Domain name system
Fiber to the Premises
WAN
Transmission media
26. CA resposible for giving out digital certificate
Web conference
protocol
certificate authority
project management software...
27. Uses devices that emit and sense light to detect the mouses movement
optical mouse
Hot spots
DNS Server
thread
28. Used to track and identify the location of high risk or high value items.
Operating system
RTLS
IP address
MICR
29. Controls timing of all computer operations
system clock
Netbook
streaming
Servers
30. The discovery - collection adn analysis of evidence found on computers and networks
digital forensics
chat client
worm
spooling
31. Anopening inside the system unit in which you can install additional equipment. Different than a slot
Bay
macros
device dependant
parallel processing
32. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
sending device
freeware...
tactile output
kernal
33. Holds one or more disk drives
preemptive multitasking
drive bay
system bus
File compression utility
34. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
utility program
spooling
USB hub
35. Can be peropheral or chip - creates sound from digital instructions.
synthesizer
network topology
Web Application
e- learning
36. Hides within or looks like a legitimate program such as a screen saver
bandwidth
Trojan Horse
Web Browser
wireless modem
37. Internet connections using regular copper telephone lines.
Memory
DSL
pixel
embedded computer
38. Surgeon performs operation by controlling robot when not in the same area as patient.
virtual provate network
telesurgery
connector
jewel box
39. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
Dial Up line
RFID
Web Application
802.11
40. Dynamic ram- chips must be re energized constantly or they lose their contents.
RAM
DRAM
System Unit
scanner
41. Graphics processing unit controls the manipulation and display of graphics on the display device.
GPU
worm
Home user
EULA
42. The role of memory to store both data and programs
stored program concept
digital
streaming
SIMM
43. Accepts the transmission of data - instructions - or info
recieving device
fiber optic cable
OMR
IM
44. Broadband modem- sends and recives digital data over the cable television
volatile memory
EDI
cable modem
server
45. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
FireWire port
heat sink
hot spot
message board
46. Uses radio waves to transmit data between two devices.
Bluetooth
SRAM
Fiber to the Premises
Memory Cache
47. The technology of authenticating a persons identity by verifying a personal characteristic.
Point of Sale terminals
biometrics
hypermedia
streaming
48. The process if a computer or device recieveing info info from the server on the internet
telesurgery
downloading
optical mouse
Trojan Horse
49. Computer automatically can configure adapter cards and other peripherals as you install them
jack
backside bus
Plug and Play
firmware...
50. The code of acceptable behaviors users should follow while on the internet.
Netiquette
ring network
site license
superscalar