SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
thread
OSP
Denial of Service attack
utility program
2. Provids mobile users with a secure connection to the company server as if the user has a private line.
biometrics
density
virtual provate network
embedded operating system
3. Anopening inside the system unit in which you can install additional equipment. Different than a slot
UNIX
Mobile Device
Bay
DLP projector
4. A cable forms a closed loop with all computers. one direction
ring network
public- domain software...
Dial Up line
sound card
5. A computer that delivers requested web pages to your computer
communications channel
broadband
kernal
Web Server
6. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
IM
Storage Media
virus signature
noise
7. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
digital forensics
CPU
Software...
download
8. Cables - telephone lines - radio networks - satellites
protocol
defragmenting
RIMM
Transmission media
9. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
pipelining
MAN
POP3
FireWire port
10. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
Netbook
USB hub
MICR
hot plugging
11. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
CAD
fiber optic cable
Content Aggregator
system unit
12. A type of storage media that consists of flat disc and is written and read by a laser
optical disc
Hot spots
RFID
Terminal
13. Protective case for optical discs
chasis...
jewel box
ciphertext
virus
14. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
system unit
defragmenting
TLS
hot plugging
15. Small program that tells the operating system how to communicate with a specific device
plug- in
multifunction peripheral
driver
Laser printer
16. A small metal or plastic device that uses pressure instead of ink.
hard disk
IM
stylus
parallel processing
17. A case that contains electronic components of the computer used to process data.
product activation
site license
system unit
player
18. Contains 10 or fewer comps - with similar reponsibilities and capabilities
OMR
peer to peer network
wordwrap
system bus
19. The original article and all subsequent related replies
formatting
thread
download
terminal
20. CA resposible for giving out digital certificate
VoIP
fault tolerant computer
certificate authority
microbrowser
21. Smallest unit of data the computer can process
SMTP
sound card
bit
TCP/IP
22. Needed generally to participate in a newsgroup
bandwidth
System Unit
E- commerce
newsreader
23. Integrates the functions of a processor - memory and a video card on a single chip.
system on a chip
adware
EFT
thread
24. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
image processing
disk controller
turnaround document
MRAM
25. Obtains data directly at the location where the transaction or event takes place.
data collection device
Communications device
ASCII
bit
26. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
streaming
integrated circuit
RAM
27. Combines several GIF images ina single GIF file.
worm
spoofing
animated Gif...
bandwidth
28. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
Dial up modems
newsreader
access time
connector
29. Local area network- network tat connects computers and devices in a limited geographical area such as a home
Firewall
LAN
video card
MICR
30. Someone who accesses a computer or network illegally. Some say they hack to improve security
groupware...
sleep mode
System Software...
hacker
31. A type of always on connection that is established between two communications devices. better than dial up line
bus
USB port
bus network
Dedicated line
32. Uses fiber optic cable for internet connection.
spyware
byte
Fiber to the Premises
virus
33. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
Operating system
RTLS
CERT/CC
device independent
34. Two or more computers transfer data - instructions - and information.
plaintext
RAM
communications
RSS 2.0
35. Saves any open docs or programs to hardisk before removing power
Notebook Computer
sleep mode
firmware...
hibernate
36. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
Mainframe
ISP
NAS
VR
37. When businesses use the internet to sell products
E- retail
touchpad
spyware
turnaround document
38. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
Intrusion detection software...
DVI
defragmenting
streaming cam
39. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
hard disk
server
ethernet
VR world
40. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
unauthorized access
botnets
backside bus
ergonomics
41. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
botnets
TCP/IP
Servers
POST
42. Builds and maintains lists of words found on websites. Useful for search engines
spider
hacker
system clock
RAID
43. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
Software...
cyberterrorist
System Unit
RIMM
44. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
cyberterrorist
EDI
cracker
memory slots
45. Single inline memory module forms a single set of contacts
SIMM
Storage Media
animated Gif...
GPU
46. Case of the system unit to protect internal damage
Home user
Servers
chasis...
wireless Internet service provider
47. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
message board
router
Desktop Computer
plug- in
48. Loses its contents when power is turned off (RAM)
network standard
volatile memory
Memory
pretty good Privacy
49. A collection of data organized in a manner that allows access retrieval and use of that data
spyware
data collection device
cable modem
database
50. One or more computers on the network request services from the server. 10 or more computers
database
utility program
communications
client/server