SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
microbrowser
Intrusion detection software...
Top level domain
e- learning
2. One or more computers on the network request services from the server. 10 or more computers
freeware...
buffer
optical reader
client/server
3. A collection of computers and devices connected together - via communications devices and transmissions media.
hibernate
network
Plug and Play
SMTP
4. Dish shaped antenna for internet connection
e- learning
fixed wireless
Fiber to the Premises
DSL
5. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
utility program
turnaround document
noise
VR
6. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
Operating system
disk controller
shareware...
Input
7. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
optical mouse
network
Software...
newsreader
8. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
TLS
USB hub
VR world
9. Consists of electronic components that store instructions waiting to be executed (On motherboard)
Memory
cold boot
WAN
rootkit
10. Read only memory refers to memory chips storing permanent data and instructions (firmware)
machine cycle
Output
ROM
multifunction peripheral
11. When businesses use the internet to sell products
E- retail
RAID
Point of Sale terminals
script kiddie
12. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
address
thread
wireless Internet service provider
program
13. Allows a user to plan schedule and track costs of a project
project management software...
Storage Device
solid state drive
fault tolerant computer
14. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
bandwidth
script kiddie
honeypot
bus width
15. Loses its contents when power is turned off (RAM)
hypertext
volatile memory
worm
wordwrap
16. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
RFID
optical reader
digital forensics
Bay
17. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
byte
IrDA Port
embedded operating system
image processing
18. A type of system software that allows users to perform maintenence type tasks
Operating system
DSL
server
utility program
19. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
OCR
BIOS
access control
Memory Cache
20. Method that the internet uses to store domain names and their corressponding IP addresses
Servers
DIMM
embedded operating system
Domain name system
21. A document that you return to the company that creates and sends it.
Mobile Computer
turnaround document
broadband
Communications device
22. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
MICR
Hot spots
backside bus
freeware...
23. Protective case for optical discs
ghosting
product activation
jewel box
wireless Internet service provider
24. The design of computers - devices - and media in the network
network architecture
hard disk
Point of Sale terminals
spooling
25. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
VAN
network
download
kernal
26. Determines the number of bits that can be transmitted at one time
Motherboard
bus width
honeypot
phishing
27. A system that attempts to imitate the behavior of a human brain.
OCR
analog
neural network
CERT/CC
28. Is an online area in which isers have wrtten discussions about a particular subject.
cross - platform
virus signature
DVI
newsgroup
29. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
embedded computer
application software...
File compression utility
drive bay
30. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
virus signature
Desktop Computer
VAN
back door
31. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
Denial of Service attack
embedded operating system
terminal
bus network
32. Uses fiber optic cable for internet connection.
Drive Bay
virus signature
http
Fiber to the Premises
33. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
Dedicated line
machine cycle
TCP/IP
MRAM
34. Saves any open documents and programs to RAM and places computer into a low power state
Storage Device
sleep mode
CMOS
Internet Backbone
35. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
bus network
sleep mode
wireless access point
digital certificate
36. Designed for mobile devices
driver
volatile memory
ALU
microbrowser
37. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
transistor
pointing stick
preemptive multitasking
GPU
38. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
microbrowser
audit trail
public- domain software...
SRAM
39. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
unethical employees
terminal
Memory
ASCII
40. Acts as an electronic switch that opens or closes the circuit for electrical charges
transistor
worm
rootkit
hibernate
41. Popular for LAN. single central cable.
driver
LAN
bus network
business software...
42. When online meetings take place on the web
ethernet
Storage Media
nonvolatile memory
Web conference
43. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Home user
Noise
liquid flow technology
Memory Cache
44. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
telesurgery
Web Application
DTP
network standard
45. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
Personal Computers
chip
script kiddie
formatting
46. Computer aided design software assists a professional user in creating designs
proxy server
Communications device
synthesizer
CAD
47. A set of programs that coordinates all of the activies among computer hardware devices.
Servers
application software...
Operating system
density
48. Obtains data directly at the location where the transaction or event takes place.
data collection device
broadband internet service
telesurgery
digital forensics
49. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
bit
network standard
hypermedia
digital certificate
50. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
scanner
hard disk
Latency
memory module