SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CA resposible for giving out digital certificate
Latency
ASCII
certificate authority
optical reader
2. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
hard disk
network license
Communications device
back door
3. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
IM
thread
access time
Notebook Computer
4. Acts as an electronic switch that opens or closes the circuit for electrical charges
transistor
CAD
communications channel
bus network
5. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
Application software...
rootkit
DSL
audit trail
6. Any data or instructions entered into the memory of the computer
Input
ISP
client/server
macros
7. May break in to computer to exploit security weakness. financial gains - revenge.
pipelining
unethical employees
online auction
VoIP
8. (laptop computer) portable personal computer often able to fit in your lap
mashup
parallel processing
Top level domain
Notebook Computer
9. Method that the internet uses to store domain names and their corressponding IP addresses
Memory
Domain name system
CMOS
pixel
10. Unencrypted readable data
IP address
supercomputer
plaintext
SRAM
11. Provides the user with a physcial response from the device
terminal
E- retail
tactile output
Dial Up line
12. Internet teephony- enables users to speak to other users over the internet
neural network
DSL
VoIP
drive bay
13. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
kernal
Denial of Service attack
Dial Up line
cable modem
14. Picure messaging can occur from mobile to mobile and mobile to email
image processing
ROM
memory module
MMS
15. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
Memory
nonvolatile memory
plaintext
program
16. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
online auction
Memory
802.11
17. A document that you return to the company that creates and sends it.
turnaround document
EFT
access control
OSP
18. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
VoIP
hot plugging
back door
Mainframe
19. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
buffer
Processor
Fiber to the Premises
Top level domain
20. A computer that delivers requested web pages to your computer
data collection device
ethernet
Web Server
Notebook Computer
21. Latest version of Post office Protocol
streaming cam
telesurgery
POP3
optical reader
22. Circuit boards tjay provide connections and functions not built into the motherboard
Netbook
adapter cards
CAD
disk controller
23. They can execute more than one instruction per clock cycle
802.11
superscalar
chat client
site license
24. When turning on a computer that has been turned off completly
transistor
W3C
cold boot
CMOS
25. Company that provides wireless internet access to computers
heat sink
device independent
Dial- up access
wireless Internet service provider
26. The process of dividing the disk into tracks and sectors
memory slots
CAM
dialog box
formatting
27. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Intrusion detection software...
spyware
Netbook
EFT
28. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
utility program
software suite
Operating system
application software...
29. The delivery of education via some electronic method such as the internet - networks - or optical disks.
disk fragmenter
e- learning
spyware
chip
30. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
MICR
Fiber to the Premises
Home user
E- commerce
31. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
adware
Memory Cache
NAS
system bus
32. Provids mobile users with a secure connection to the company server as if the user has a private line.
business software...
Notebook Computer
virtual provate network
motherboard
33. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
IrDA Port
multifunction peripheral
commands
VAN
34. Someone who accesses a computer or network illegally. Some say they hack to improve security
hacker
Intrusion detection software...
machine cycle
business software...
35. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
connector
groupware...
macros
shareware...
36. The amount of data - instructions - and information that can travel over communications channel
bandwidth
access control
Internet Backbone
Mainframe
37. A legal agreement that allows multiple users to access the software on the server simutaneously
network license
analog
SRAM
microbrowser
38. A device that enables you to join a port and a connector that are both male or female
gender changer
network standard
LAN
Memory
39. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
MAN
terminal
network
client/server
40. Continues to operate when one of its components fails - ensuring that no data is lost
Processor
ISP
virus
fault tolerant computer
41. Contain permanently writeen data - instructions - and information
Desktop Computer
scanner
firmware...
ASCII
42. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
embedded computer
mashup
Drive Bay
liquid flow technology
43. Software that helps groups of people work together on projects and share info over a network
bugs
groupware...
supercomputer
BIOS
44. Program that euns only on a specific type or make of computer
client/server
bandwidth
device dependant
terminal
45. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
virtual provate network
ethernet
OCR
certificate authority
46. Storage over an internet service
cloud storage
SMTP
token ring
Motherboard
47. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
Web Application
network
ring network
microbrowser
48. Privately owned and limited to a specific vendor or computer model.
Application software...
VR
fiber optic cable
proprietary software...
49. Hypertext transfer protocol
http
machine cycle
hash
ALU
50. Used to gain competitive advantage
corporate spies
peer to peer network
chasis...
macros