SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each computer or device on the network. often connected by cables
node
e- learning
system clock
Mobile Computer
2. The smallest unit of disk space that stores data and info
cross - platform
cluster
hibernate
message board
3. Someone who accesses a computer or network illegally. Some say they hack to improve security
site license
DSL
video card
hacker
4. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
ghosting
L1 cache
backside bus
5. Sends digital data and info from a comp to a DSL line
honeypot
SMTP
DSL modem
Notebook Computer
6. Universal serial bus port connects peripherals to the computer
worm
USB port
buffer
fiber optic cable
7. A web application that combines services from two or more sources creating a new application.
mashup
hypermedia
spyware
touchpad
8. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
disk fragmenter
Netbook
downloading
twisted pair cable
9. A program that restricts access to certain material on the web
Mobile Device
BIOS
web filter
Operating system
10. Provide Wi Fi to mobile computers or devices
PIM
RAID
EULA
Hot spots
11. Electrical supply drops.can cause data loss but generally not cause equipment damage
RIMM
system software...
802.11
undervoltage
12. Popular for LAN. single central cable.
OSP
data collection device
bus network
optical disc
13. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
L1 cache
Operating system
wireless modem
Memory
14. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
sending device
botnets
PIM
Dial up modems
15. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
network license
chat client
pointing stick
Dial- up access
16. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
Dial up modems
bus
adapter card
MICR
17. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
bugs
stylus
VR world
Memory
18. Saves any open docs or programs to hardisk before removing power
DRAM
rootkit
hibernate
address
19. Type of notebook comp that is smaller and less powerful than a normal notebook comp
utility program
proprietary software...
Netbook
chasis...
20. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Denial of Service attack
Personal Computers
DRAM
DNS Server
21. Has the illusion of moving images becuase it sends a continuos stream of images
newsgroup
SIMM
video card
streaming cam
22. Hardware - software - data - people - procedures
script kiddie
Information system
parallel processing
overvoltage
23. Surgeon performs operation by controlling robot when not in the same area as patient.
IP address
VoIP
telesurgery
formatting
24. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
DTP
Software...
USB port
Intrusion detection software...
25. The fastest most powerful computer
warm boot
Mobile Computer
System Software...
supercomputer
26. Dish shaped antenna for internet connection
fixed wireless
digital
memory slots
address
27. A collection of computers and devices connected together - via communications devices and transmissions media.
digital certificate
star network
downloading
network
28. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
microbrowser
cold boot
E- commerce
node
29. Media transmit multiple signals simutaneously. Download faster than upload
cross - platform
adware
broadband
Motherboard
30. An instruction that causes a program to perform a specific action.
VR world
commands
streaming cam
Dial up modems
31. Federally funded internet security research and development center
CERT/CC
CMOS
program
BIOS
32. The destructive event or prank the program intended to deliver
network
payload
kernal
memory module
33. Encrypted data
ciphertext
chasis...
virus signature
bit
34. Allows a user to plan schedule and track costs of a project
cluster
communications
project management software...
VoIP
35. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
CMOS
MMS
pixel
Linux
36. Provides the user with a physcial response from the device
volatile memory
tactile output
ISP
system bus
37. The number of bytes a storage medium can hold
bandwidth
integrated circuit
capacity
utility programs
38. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
CAD
optical reader
disk fragmenter
access time
39. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
Servers
Dial up modems
script kiddie
L2 cache
40. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
RFID
fault tolerant computer
Terminal
41. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
EULA
adapter card
Latency
defragmenting
42. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
network
DNS Server
proxy server
CU
43. Storage over an internet service
cloud storage
telemedicine
liquid flow technology
ISP
44. Transmission media on which the data - instructions - information travel.
digital forensics
client
POP3
communications channel
45. A small flat rectangular pointing device that is sensitive to pressure and motion.
power supply
cyberextortionist
machine cycle
touchpad
46. Special software to listen to audio
player
digital certificate
star network
unethical employees
47. Single chip with two or more processor cores.
Netbook
CAPTCHA
image processing
multi- core processor
48. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
Home user
peripheral
Operating system
RSS 2.0
49. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
back door
program
thread
backside bus
50. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
script kiddie
star network
pointing stick
adware