SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A know specific pattern of virus code.
optical reader
liquid flow technology
virus signature
CAPTCHA
2. A unique number that identifies the location of a byte in memory
warm boot
utility program
Denial of Service attack
address
3. A part of the motherboard and connects the processor to main memory
Web conference
shareware...
air mouse
system bus
4. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
rootkit
Memory Cache
overvoltage
business software...
5. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
liquid flow technology
E- commerce
RFID
air mouse
6. Internet connections using regular copper telephone lines.
CAD
system unit
DSL
DNS Server
7. Storage over an internet service
dot matrix printer
online auction
pointing stick
cloud storage
8. Anopening inside the system unit in which you can install additional equipment. Different than a slot
e- learning
Bay
mashup
unethical employees
9. Holds one or more disk drives
Denial of Service attack
scanner
drive bay
jewel box
10. PGP an encryption program
connector
protocol
pretty good Privacy
disk controller
11. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
ethernet
chat client
Web conference
RFID
12. Electrical supply drops.can cause data loss but generally not cause equipment damage
client
undervoltage
neural network
freeware...
13. Someone who accesses a computer or network illegally. Some say they hack to improve security
chasis...
Personal Computers
hacker
Web Server
14. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
virus
Content Aggregator
IrDA Port
UNIX
15. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
port
Information system
bit
streaming
16. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
honeypot
script kiddie
802.11
17. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
ring network
IM
spoofing
Bluetooth
18. A window that provides info - presents availabe options - or requests a response.
document management software...
ghosting
dialog box
digital forensics
19. Computer automatically can configure adapter cards and other peripherals as you install them
Plug and Play
L1 cache
system on a chip
RSS 2.0
20. The role of memory to store both data and programs
Desktop Computer
stored program concept
DRAM
CAM
21. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
video card
Servers
USB hub
Input
22. Connects the processor to cache.
CMOS
backside bus
platter
back door
23. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
utility program
video card
thread
digital signature
24. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
Application software...
MICR
nonvolatile memory
VR
25. Any unwanted signal usually varying quickly
Fiber to the Premises
Noise
CU
Netbook
26. Searches for and removes unneccessary files
telemedicine
Laser printer
machine cycle
disk cleanup
27. A type of storage media that consists of flat disc and is written and read by a laser
optical disc
scanner
broadband
FireWire port
28. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
integrated circuit
utility program
hot plugging
File compression utility
29. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
system clock
adapter card
platter
ISP
30. A web application that combines services from two or more sources creating a new application.
solid state drive
mashup
capacity
Intrusion detection software...
31. Program that euns only on a specific type or make of computer
cluster
address
device dependant
spider
32. On software is infinitie space and depth for VR
Web conference
VAN
VR world
cyberterrorist
33. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
nonvolatile memory
trackball
Intrusion detection software...
Plug and Play
34. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
hibernate
CAM
USB hub
newsgroup
35. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
Communications device
System Unit
certificate authority
peer to peer network
36. Rambus inline memory module house RDRAM chips
DSL modem
scanner
RIMM
Operating system
37. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
device independent
Laser printer
spyware
Trojan Horse
38. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
preemptive multitasking
VoIP
Servers
L2 cache
39. Errors that can be recognized by automatic update
bugs
chasis...
OCR
video card
40. Picure messaging can occur from mobile to mobile and mobile to email
hot plugging
solid state drive
MMS
superscalar
41. Provids mobile users with a secure connection to the company server as if the user has a private line.
drive bay
virtual provate network
CERT/CC
Domain name
42. Special software to listen to audio
EFT
player
virtual provate network
communications
43. Privately owned and limited to a specific vendor or computer model.
backside bus
disk controller
proprietary software...
bugs
44. Computer aided design software assists a professional user in creating designs
Mainframe
CAD
Web Browser
digital signature
45. Links in text based documents
hypertext
drive bay
Trojan Horse
File compression utility
46. Cables - telephone lines - radio networks - satellites
system unit
address
Transmission media
hacker
47. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
Laser printer
wireless modem
UNIX
disk fragmenter
48. Single inline memory module forms a single set of contacts
shareware...
Trojan Horse
port
SIMM
49. Small program that tells the operating system how to communicate with a specific device
driver
digital certificate
spider
newsreader
50. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
application software...
SIMM
client
bus