SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Instead of port - jack is used to identify audio or video ports.
bandwidth
IP address
CERT/CC
jack
2. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
ISP
ALU
volatile memory
port
3. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
spider
application software...
audit trail
pixel
4. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
bugs
token ring
memory module
cyberextortionist
5. An electrical disturbance that can degrade communications
noise
optical reader
CERT/CC
animated Gif...
6. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
Latency
chat client
bus width
streaming
7. Accepts the transmission of data - instructions - or info
protocol
Hot spots
recieving device
formatting
8. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
Operating system
File compression utility
network architecture
hard disk
9. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
parallel processing
Internet Backbone
NAS
CAPTCHA
10. Builds and maintains lists of words found on websites. Useful for search engines
spider
shareware...
Output
UNIX
11. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
embedded computer
Motherboard
server
12. Federally funded internet security research and development center
star network
DRAM
IrDA Port
CERT/CC
13. Health care professions conduct live conferences on the computer
access time
telemedicine
Top level domain
project management software...
14. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
bit
PNG
VAN
memory module
15. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
DNS Server
image processing
802.11
TLS
16. Records in a file both successful and unsuccessful attempts.
RAM
audit trail
VoIP
commands
17. Latest version of Post office Protocol
supercomputer
memory slots
Mainframe
POP3
18. Program that euns only on a specific type or make of computer
device dependant
disk fragmenter
broadband internet service
VR
19. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
cable modem
network standard
http
Netbook
20. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
Top level domain
unauthorized access
digital signature
cyberterrorist
21. Screen savors were made to prevent this - which etched images permanently onto the screen
L1 cache
mpeg
ghosting
compromised computer
22. Text version of an IP address
network
drive bay
Domain name
stylus
23. Is an online area in which isers have wrtten discussions about a particular subject.
freeware...
newsgroup
neural network
EULA
24. Software used by criminals
jewel box
crimeware
ARPA
utility program
25. A communications device that enables a computer or device that does not have a built in networking capability to access a network
network card
optical disc
Domain name
defragmenting
26. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
RAID
download
RSS 2.0
audit trail
27. Combines several GIF images ina single GIF file.
Denial of Service attack
virtual provate network
animated Gif...
RAM
28. Dish shaped antenna for internet connection
traffic
fixed wireless
newsreader
backside bus
29. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
access time
Processor
script kiddie
scanner
30. Computer automatically can configure adapter cards and other peripherals as you install them
device dependant
Plug and Play
microbrowser
unethical employees
31. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Dial- up access
unauthorized access
Processor
hypermedia
32. Case of the system unit to protect internal damage
pipelining
chasis...
system software...
server
33. Copyrighted software provided at no cost by company that retains all rights to software
virus
freeware...
Information system
GPU
34. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
virus
streaming
cracker
35. Circuit boards tjay provide connections and functions not built into the motherboard
macros
ASCII
adapter cards
address
36. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
adapter card
pretty good Privacy
Domain name
Terminal
37. When businesses use the internet to sell products
E- retail
RFID
System Software...
OCR
38. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
LAN
commands
SMTP
parallel processing
39. Msot retail stores use POS to record purchases - process cards - and update inventory
wireless Internet service provider
ALU
Internet Backbone
Point of Sale terminals
40. Transmission media on which the data - instructions - information travel.
communications channel
terminal
message board
firmware...
41. Graphical User interface - interact with software using text - graphics - and icons
macros
GUI
client
fixed wireless
42. Smallest unit of data the computer can process
EULA
video card
bit
jack
43. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
Processor
bugs
RFID
system software...
44. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
E- retail
streaming
Bay
video card
45. Provides the user with a physcial response from the device
Linux
cyberextortionist
tactile output
Web Application
46. Uses fiber optic cable for internet connection.
gender changer
program
Fiber to the Premises
address
47. The technology of authenticating a persons identity by verifying a personal characteristic.
air mouse
biometrics
network architecture
cloud storage
48. The original article and all subsequent related replies
e- learning
SMTP
thread
sleep mode
49. They can execute more than one instruction per clock cycle
proprietary software...
cyberextortionist
superscalar
digital certificate
50. Storage over an internet service
BIOS
UNIX
cloud storage
client/server