SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. On the motherboard hold memory modules
802.11
adware
memory slots
coaxial cable
2. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
RFID
DLP projector
Web Server
3. Contains many microscopic pathways capable of carrying an electrical current
SIMM
integrated circuit
UNIX
PIM
4. A cable forms a closed loop with all computers. one direction
recieving device
superscalar
ring network
ethernet
5. Used to gain competitive advantage
corporate spies
wordwrap
touchpad
DVI
6. A communications device that sends and recieves data and info to and from digital line
air mouse
CAPTCHA
digital modem
NAS
7. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
sound card
utility program
Transmission media
VAN
8. Broadband modem- sends and recives digital data over the cable television
cable modem
communications channel
Latency
hypermedia
9. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
terminal
Servers
plug- in
port
10. Provides the user with a physcial response from the device
register
virtual provate network
tactile output
hibernate
11. Company that provides wireless internet access to computers
System Unit
Processor
wireless Internet service provider
air mouse
12. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
certificate authority
VR world
utility program
OCR
13. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
network architecture
CAM
sending device
14. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
dot matrix printer
Desktop Computer
buffer
Firewall
15. Circuit boards tjay provide connections and functions not built into the motherboard
adapter cards
payload
coaxial cable
DSL
16. Perpetrator attempts to obtain your personal or financial info.
bandwidth
unethical employees
phishing
crimeware
17. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
e- learning
Internet Backbone
thread
E- commerce
18. Contain permanently writeen data - instructions - and information
density
firmware...
port
botnets
19. Allows users to keep typing without using enter at the end of each line
wordwrap
Dedicated line
player
CMOS
20. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
driver
address
spoofing
air mouse
21. Smaller than heat sink cools processors in notebook comps
VR world
spyware
heat pipe
CMOS
22. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
CAD
parallel processing
Firewall
23. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
cold boot
scanner
disk controller
24. The code of acceptable behaviors users should follow while on the internet.
Netiquette
connector
traffic
cross - platform
25. Software used by criminals
adapter cards
site license
crimeware
hash
26. Connects the processor to cache.
DIMM
Fiber to the Premises
trackball
backside bus
27. System board- is the main circuit board of the system unit.
WAN
motherboard
database
terminal
28. Uses devices that emit and sense light to detect the mouses movement
CAM
optical mouse
CPU
buffer
29. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
parallel processing
server
MAN
stored program concept
30. Latest version of Post office Protocol
POP3
Notebook Computer
platter
RIMM
31. A set of programs that coordinates all of the activies among computer hardware devices.
Web Browser
Operating system
MICR
CERT/CC
32. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
GUI
virus
product activation
DSL
33. Any data or instructions entered into the memory of the computer
synthesizer
wireless Internet service provider
system software...
Input
34. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
virus signature
unethical employees
cloud storage
EFT
35. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
USB port
network standard
cracker
CAPTCHA
36. The discovery - collection adn analysis of evidence found on computers and networks
digital forensics
CAM
Plug and Play
system bus
37. The technology of authenticating a persons identity by verifying a personal characteristic.
peripheral
biometrics
system bus
EULA
38. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
player
bus network
Web Application
sending device
39. Builds and maintains lists of words found on websites. Useful for search engines
spider
commands
pointing stick
OMR
40. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
RSS 2.0
ethernet
density
spoofing
41. Mathematical formula that generates a code from the contents of the message
system clock
hash
wireless modem
jewel box
42. A real time internet communications service where you can talk to people online.
peer to peer network
thread
capacity
IM
43. Communications activity. Handled by NSFnet.
Trojan Horse
CAM
traffic
ring network
44. May break in to computer to exploit security weakness. financial gains - revenge.
DIMM
unethical employees
network standard
heat sink
45. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
broadband
scanner
Mainframe
EDI
46. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
GPU
CAD
online security service
Web conference
47. The original article and all subsequent related replies
bugs
wireless modem
thread
UNIX
48. The process if a computer or device recieveing info info from the server on the internet
Storage Media
fiber optic cable
downloading
Content Aggregator
49. The role of memory to store both data and programs
PNG
stored program concept
hibernate
pixel
50. Combines several GIF images ina single GIF file.
POST
EDI
animated Gif...
UNIX