SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Started the internet as a networking project
Domain name
telesurgery
ARPA
scanner
2. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
utility program
IM
rootkit
3. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
UNIX
cyberterrorist
ciphertext
video card
4. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
botnets
IM
air mouse
broadband
5. Dual inline memory module forms two sets of contact
shareware...
ALU
gender changer
DIMM
6. A collection of computers and devices connected together - via communications devices and transmissions media.
network
ergonomics
bus width
Input
7. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
power supply
newsreader
jack
8. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
system on a chip
keygen
OMR
network
9. Software that helps groups of people work together on projects and share info over a network
groupware...
compromised computer
project management software...
bandwidth
10. A communications device that enables a computer or device that does not have a built in networking capability to access a network
network topology
network card
unethical employees
digital signature
11. Unencrypted readable data
plaintext
L1 cache
Operating system
public- domain software...
12. Consumer consumer e commerce.
nonvolatile memory
online auction
GUI
touchpad
13. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
adapter card
EULA
Latency
connector
14. Allows the processor to communicate with peripherals.
expansion bus
IP address
public- domain software...
System Unit
15. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
RAM
digital signature
virus
Memory
16. Graphical User interface - interact with software using text - graphics - and icons
GUI
network
optical mouse
Web Server
17. Cables - telephone lines - radio networks - satellites
L2 cache
ergonomics
telemedicine
Transmission media
18. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
router
IrDA Port
overvoltage
chip
19. CA resposible for giving out digital certificate
image processing
certificate authority
sending device
USB port
20. Hypertext transfer protocol
virus
token ring
server
http
21. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
synthesizer
hot spot
POP3
crimeware
22. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
register
preemptive multitasking
Denial of Service attack
RAID
23. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Denial of Service attack
DSL modem
ALU
cyberextortionist
24. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
kernal
Noise
terminal
synthesizer
25. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
FireWire port
POP3
hard disk
DSL
26. Software used by criminals
expansion slot
capacity
crimeware
disk cleanup
27. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
MICR
network license
Memory Cache
jack
28. Internet teephony- enables users to speak to other users over the internet
jewel box
scanner
VoIP
newsreader
29. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
spoofing
network topology
MRAM
communications
30. Encrypted data
public- domain software...
document management software...
ciphertext
address
31. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
802.11
ciphertext
download
BIOS
32. Latest version of Post office Protocol
Web Application
downloading
communications channel
POP3
33. On the motherboard hold memory modules
memory module
ROM
memory slots
Desktop Computer
34. Program is one that runs the same on multiple operating systems
optical mouse
client
cross - platform
RAM
35. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
coaxial cable
UNIX
wordwrap
RSS 2.0
36. Retains existing application software and data files even if you can change computer models or vendors
ring network
device independent
warm boot
spyware
37. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
mashup
transistor
peripheral
proprietary software...
38. One or more computers on the network request services from the server. 10 or more computers
client/server
Mainframe
hibernate
system software...
39. Used to gain competitive advantage
Noise
optical mouse
USB hub
corporate spies
40. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CAPTCHA
system on a chip
utility programs
CPU
41. Single chip with two or more processor cores.
power supply
ciphertext
multi- core processor
unethical employees
42. Provide Wi Fi to mobile computers or devices
Hot spots
compromised computer
chip
rootkit
43. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
star network
streaming
liquid flow technology
site license
44. Broadband modem- sends and recives digital data over the cable television
hash
cable modem
Operating system
script kiddie
45. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Netbook
Terminal
bugs
traffic
46. Any unwanted signal usually varying quickly
Noise
firmware...
Terminal
software suite
47. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
registrar
streaming
MICR
proprietary software...
48. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
DIMM
online auction
backside bus
49. Random access memory- memory chips that can be read from and written to by the processor and other devices
Operating system
animated Gif...
RAM
optical mouse
50. Accepts the transmission of data - instructions - or info
heat sink
recieving device
hibernate
plug- in