SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. May break in to computer to exploit security weakness. financial gains - revenge.
unethical employees
multi- core processor
PIM
fiber optic cable
2. Searches for and removes unneccessary files
PNG
disk cleanup
Netiquette
OSP
3. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
Web conference
air mouse
Latency
motherboard
4. A computer that delivers requested web pages to your computer
Trojan Horse
Web Server
EULA
http
5. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
ALU
adapter card
power supply
hacker
6. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
Storage Device
sound card
dot matrix printer
DSL modem
7. Each computer or device on the network. often connected by cables
node
GPU
macros
network card
8. Software used by criminals
web filter
ASCII
animated Gif...
crimeware
9. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
Dial- up access
cross - platform
system software...
token ring
10. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
system software...
online security service
node
BIOS
11. An instruction that causes a program to perform a specific action.
port
ASCII
commands
Drive Bay
12. Someone who accesses a computer or network illegally. Some say they hack to improve security
liquid flow technology
pixel
backside bus
hacker
13. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
terminal
spoofing
digital certificate
CPU
14. Sends digital data and info from a comp to a DSL line
system unit
sound card
DSL modem
virus signature
15. Started the internet as a networking project
system unit
TLS
ARPA
Intrusion detection software...
16. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
ARPA
MRAM
overvoltage
machine cycle
17. A collection of data organized in a manner that allows access retrieval and use of that data
OSP
hash
database
public- domain software...
18. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
registrar
Domain name
power supply
POST
19. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
hot plugging
Transmission media
plaintext
site license
20. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
cyberextortionist
cross - platform
CMOS
CAPTCHA
21. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
virus
jack
Motherboard
access control
22. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
cyberterrorist
register
mashup
VoIP
23. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
video card
network architecture
EFT
utility program
24. Storage over an internet service
Content Aggregator
Communications device
cloud storage
shareware...
25. Circuit boards tjay provide connections and functions not built into the motherboard
machine cycle
coaxial cable
Bay
adapter cards
26. A small metal or plastic device that uses pressure instead of ink.
stylus
Domain name system
fault tolerant computer
preemptive multitasking
27. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
Intrusion detection software...
Motherboard
optical reader
IM
28. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
access time
USB port
WAN
Domain name system
29. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
DSL
formatting
terminal
noise
30. Unencrypted readable data
plaintext
groupware...
system on a chip
ARPA
31. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
buffer
system clock
platter
Plug and Play
32. Dual inline memory module forms two sets of contact
DIMM
payload
client
VR world
33. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
product activation
microbrowser
OSP
Trojan Horse
34. Major carriers of network traffic
network topology
Internet Backbone
pretty good Privacy
plug- in
35. On software is infinitie space and depth for VR
ARPA
script kiddie
NAS
VR world
36. Digital light processor uses tiny mirrors to reflect light
e- learning
TLS
DLP projector
Desktop Computer
37. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
server
overvoltage
cloud storage
fault tolerant computer
38. Smallest element in an electronic image
pixel
phishing
dialog box
TCP/IP
39. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
synthesizer
Linux
port
density
40. Connects the processor to cache.
plaintext
system bus
Software...
backside bus
41. Broadband modem- sends and recives digital data over the cable television
L1 cache
download
cable modem
preemptive multitasking
42. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
E- commerce
W3C
cracker
thread
43. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
RFID
proxy server
utility programs
ARPA
44. They consist entirely of electronic components and contain no moving parts.
solid state media
spoofing
jewel box
worm
45. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
warm boot
heat sink
embedded operating system
memory module
46. On the motherboard hold memory modules
communications channel
memory slots
adapter card
NAS
47. Special software to listen to audio
player
certificate authority
PNG
plug- in
48. A system that attempts to imitate the behavior of a human brain.
unethical employees
neural network
drive bay
data collection device
49. The role of memory to store both data and programs
script kiddie
802.11
stored program concept
CAPTCHA
50. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
MAN
EDI
DTP
drive bay