SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that hides in a computer and allows someone from a remote location to take control of the computer
memory module
DNS Server
rootkit
Information system
2. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
synthesizer
Desktop Computer
CAD
TCP/IP
3. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
connector
Web Browser
capacity
Memory
4. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
Motherboard
pretty good Privacy
registrar
Latency
5. A cable forms a closed loop with all computers. one direction
drive bay
streaming
ring network
synthesizer
6. Circuit boards tjay provide connections and functions not built into the motherboard
solid state media
adapter cards
USB port
sending device
7. Builds and maintains lists of words found on websites. Useful for search engines
MMS
cyberextortionist
broadband
spider
8. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
CERT/CC
sound card
address
botnets
9. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
CMOS
Servers
Hot spots
RTLS
10. Initiates an instruction to transmit data - instructions - or information.
IrDA Port
Personal Computers
sending device
EDI
11. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
ethernet
pointing stick
network topology
pretty good Privacy
12. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
Operating system
Netbook
LAN
peripheral
13. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
hash
MRAM
Internet Backbone
server
14. Sends digital data and info from a comp to a DSL line
fixed wireless
PIM
Firewall
DSL modem
15. A part of the motherboard and connects the processor to main memory
recieving device
chat client
software suite
system bus
16. Determines the number of bits that can be transmitted at one time
access time
bus width
System Unit
port
17. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
defragmenting
client/server
undervoltage
cracker
18. Copyrighted software provided at no cost by company that retains all rights to software
freeware...
disk cleanup
802.11
RSS 2.0
19. Serves as the interface between the user - the app software - and the computers hardware
digital
bus width
system software...
optical mouse
20. Small program that tells the operating system how to communicate with a specific device
Motherboard
chasis...
pointing stick
driver
21. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
Netbook
System Unit
corporate spies
access time
22. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
network license
bus
USB port
star network
23. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
network card
node
air mouse
solid state media
24. An electrical disturbance that can degrade communications
DNS Server
coaxial cable
noise
hot plugging
25. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
fault tolerant computer
pixel
commands
buffer
26. Latest version of Post office Protocol
bus width
POP3
system software...
disk fragmenter
27. Connects the processor to cache.
phishing
cable modem
ASCII
backside bus
28. Smaller than heat sink cools processors in notebook comps
disk fragmenter
heat pipe
Memory Cache
optical mouse
29. Dynamic ram- chips must be re energized constantly or they lose their contents.
unauthorized access
DRAM
data collection device
download
30. Msot retail stores use POS to record purchases - process cards - and update inventory
router
sound card
TCP/IP
Point of Sale terminals
31. Enahnces the sound generating capabilites of a personal computer
Domain name system
capacity
sound card
system software...
32. Electrical supply drops.can cause data loss but generally not cause equipment damage
video card
undervoltage
thread
firmware...
33. The process if a computer or device recieveing info info from the server on the internet
connector
downloading
drive bay
stored program concept
34. Special software to listen to audio
network standard
EDI
player
Servers
35. A window that provides info - presents availabe options - or requests a response.
dialog box
hash
Web Server
solid state media
36. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
registrar
synthesizer
program
defragmenting
37. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
network architecture
scanner
CAD
OSP
38. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
sleep mode
communications
cyberextortionist
groupware...
39. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
server
Dial Up line
audit trail
nonvolatile memory
40. Contains 10 or fewer comps - with similar reponsibilities and capabilities
superscalar
dot matrix printer
peer to peer network
hypertext
41. A small metal or plastic device that uses pressure instead of ink.
utility program
wordwrap
bugs
stylus
42. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
hacker
MMS
Content Aggregator
application software...
43. A communications device that sends and recieves data and info to and from digital line
digital modem
Storage Device
Software...
Top level domain
44. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
Memory
platter
defragmenting
network
45. CA resposible for giving out digital certificate
Web Browser
capacity
certificate authority
Web conference
46. Power on self test to check the various system components and the results are compared with data in a CMOS chip
expansion slot
Output
POST
system software...
47. Online service provider- has many members features along with internet access such as IM or Web browsers.
wordwrap
virtual provate network
OSP
Web Server
48. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
RAM
fiber optic cable
supercomputer
spider
49. Software used by criminals
crimeware
digital
E- commerce
online auction
50. Storage over an internet service
IP address
PNG
cloud storage
TLS