SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Processor begins to fetch a second instruction before it completes the full machine cycle
OSP
cracker
USB port
pipelining
2. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
ethernet
twisted pair cable
OMR
MMS
3. Major carriers of network traffic
DNS Server
Internet Backbone
power supply
script kiddie
4. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
http
System Software...
site license
botnets
5. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
network
warm boot
TCP/IP
system bus
6. Continues to operate when one of its components fails - ensuring that no data is lost
fault tolerant computer
sending device
http
CU
7. Case of the system unit to protect internal damage
pipelining
chasis...
spyware
Operating system
8. Small capacity built directly in the processor chip
Noise
digital
L1 cache
Netiquette
9. Two main parts are processor and memory.
defragmenting
Motherboard
communications
hard disk
10. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
defragmenting
spoofing
Software...
ergonomics
11. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
optical disc
memory module
Bay
Top level domain
12. Used to track and identify the location of high risk or high value items.
RTLS
DTP
E- retail
data collection device
13. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
player
E- commerce
DSL modem
virus signature
14. Program is one that runs the same on multiple operating systems
macros
freeware...
terminal
cross - platform
15. Msot retail stores use POS to record purchases - process cards - and update inventory
Point of Sale terminals
node
bus width
utility program
16. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
telemedicine
jack
DTP
17. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
groupware...
adapter card
BIOS
web filter
18. Someone who accesses a computer or network illegally. Some say they hack to improve security
driver
register
VR
hacker
19. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
GUI
solid state drive
disk controller
Storage Media
20. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
CERT/CC
player
token ring
project management software...
21. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
business software...
download
SMTP
CMOS
22. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Software...
Denial of Service attack
streaming cam
ciphertext
23. A device that enables you to join a port and a connector that are both male or female
volatile memory
Fiber to the Premises
gender changer
preemptive multitasking
24. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
defragmenting
cloud storage
database
scanner
25. Random access memory- memory chips that can be read from and written to by the processor and other devices
RAM
node
proxy server
Denial of Service attack
26. A small flat rectangular pointing device that is sensitive to pressure and motion.
touchpad
Laser printer
Denial of Service attack
turnaround document
27. Smallest unit of data the computer can process
bit
data collection device
ASCII
ciphertext
28. The process if a computer or device recieveing info info from the server on the internet
optical reader
phishing
downloading
firmware...
29. Loses its contents when power is turned off (RAM)
RAM
heat pipe
Notebook Computer
volatile memory
30. Instead of port - jack is used to identify audio or video ports.
wireless Internet service provider
jack
proxy server
groupware...
31. A know specific pattern of virus code.
tactile output
EDI
virus signature
client/server
32. Organization that sells and manages domain names
jewel box
Bluetooth
registrar
Laser printer
33. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
tactile output
message board
VR
groupware...
34. Donated for public use has no copyright restrictions
public- domain software...
message board
VR world
Operating system
35. Records in a file both successful and unsuccessful attempts.
Memory Cache
Servers
audit trail
Noise
36. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
bus
IM
device dependant
expansion bus
37. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
video card
Memory
hypertext
spooling
38. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
sending device
Content Aggregator
volatile memory
Netiquette
39. A communications device that sends and recieves data and info to and from digital line
Top level domain
mpeg
digital modem
cracker
40. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
kernal
platter
Software...
Fiber to the Premises
41. Contains 10 or fewer comps - with similar reponsibilities and capabilities
peer to peer network
EULA
network standard
adapter card
42. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
platter
hypermedia
formatting
e- learning
43. Saves any open docs or programs to hardisk before removing power
motherboard
Dedicated line
hibernate
digital
44. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
IrDA Port
payload
DRAM
access time
45. Optical mark recognition reads hand drawn marks such as circles or rectangles.
stylus
wireless modem
CPU
OMR
46. Connects the processor to cache.
recieving device
backside bus
hacker
dot matrix printer
47. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
application software...
Web Browser
formatting
Noise
48. Mathematical formula that generates a code from the contents of the message
System Software...
optical disc
hash
DLP projector
49. The design of computers - devices - and media in the network
Drive Bay
network architecture
volatile memory
shareware...
50. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
POP3
register
bit
Storage Media