SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. On the motherboard hold memory modules
solid state drive
stored program concept
Drive Bay
memory slots
2. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
payload
L1 cache
digital forensics
Intrusion detection software...
3. Software that helps groups of people work together on projects and share info over a network
groupware...
Netbook
bandwidth
telesurgery
4. Health care professions conduct live conferences on the computer
telemedicine
superscalar
jewel box
address
5. Perpetrator attempts to obtain your personal or financial info.
phishing
virtual provate network
air mouse
bugs
6. A case that contains electronic components of the computer used to process data.
communications channel
system unit
fixed wireless
message board
7. A cable forms a closed loop with all computers. one direction
motherboard
system on a chip
ring network
OSP
8. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
hypermedia
parallel processing
RAM
Trojan Horse
9. Transmission media on which the data - instructions - information travel.
hypertext
DRAM
communications channel
system clock
10. A colection of individual programs available together as a unit. lower cost and ease of use
software suite
client/server
utility program
noise
11. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
tactile output
audit trail
trackball
script kiddie
12. 8 bits grouped together. basic storage unit in memory. Each byte has an address
Noise
adapter card
byte
node
13. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
node
cracker
macros
DSL
14. Used to gain competitive advantage
hypermedia
byte
corporate spies
System Software...
15. The process of dividing the disk into tracks and sectors
virus
terminal
Memory
formatting
16. Internet connections using regular copper telephone lines.
adapter cards
system on a chip
MMS
DSL
17. Has the illusion of moving images becuase it sends a continuos stream of images
access time
Mobile Computer
OSP
streaming cam
18. Media transmit multiple signals simutaneously. Download faster than upload
digital forensics
proprietary software...
utility program
broadband
19. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
newsreader
EDI
telesurgery
Firewall
20. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
tactile output
expansion bus
overvoltage
VR
21. Does not require a newsreader - easier to use than a newsgroup
USB hub
thread
Operating system
message board
22. Read only memory refers to memory chips storing permanent data and instructions (firmware)
ROM
System Unit
Application software...
client/server
23. The fastest most powerful computer
register
OCR
database
supercomputer
24. Personal information manager is application software that includes features to help users organize personal info
public- domain software...
adware
PIM
USB hub
25. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
Intrusion detection software...
RSS 2.0
spoofing
token ring
26. Used to track and identify the location of high risk or high value items.
EULA
shareware...
RTLS
communications
27. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
POP3
OCR
utility programs
access control
28. The standard that outlines characteristics of how two network devices communicate
program
software suite
protocol
formatting
29. A web application that combines services from two or more sources creating a new application.
mashup
client
pretty good Privacy
spooling
30. Smallest unit of data the computer can process
DSL modem
E- commerce
traffic
bit
31. Computing device small enough to hold in your hand
Mobile Device
CAD
Desktop Computer
device independent
32. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
OCR
digital certificate
cyberterrorist
hot spot
33. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
cloud storage
CU
bandwidth
kernal
34. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
disk fragmenter
Laser printer
RTLS
VAN
35. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
Dial Up line
network topology
sound card
bandwidth
36. May break in to computer to exploit security weakness. financial gains - revenge.
unethical employees
System Unit
communications
L1 cache
37. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
audit trail
EULA
superscalar
hibernate
38. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
System Unit
hard disk
Bluetooth
CPU
39. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
IM
WAN
program
software suite
40. A real time internet communications service where you can talk to people online.
expansion bus
device dependant
IM
twisted pair cable
41. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
warm boot
SIMM
hard disk
chat client
42. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
player
node
router
Netbook
43. Obtains data directly at the location where the transaction or event takes place.
disk cleanup
File compression utility
undervoltage
data collection device
44. Cables - telephone lines - radio networks - satellites
power supply
Mobile Device
transistor
Transmission media
45. When businesses use the internet to sell products
Memory Cache
formatting
E- retail
Motherboard
46. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
backside bus
multifunction peripheral
hard disk
sleep mode
47. Connects the processor to cache.
streaming
network
Processor
backside bus
48. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
Hot spots
TCP/IP
telemedicine
Linux
49. Links in text based documents
server
digital forensics
CU
hypertext
50. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Memory
register
W3C
server