SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Short for key generator creats software registration numbers and sometimes activation codes.
keygen
Transmission media
Storage Media
memory slots
2. Single chip with two or more processor cores.
File compression utility
device dependant
volatile memory
multi- core processor
3. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
cable modem
POP3
disk fragmenter
bugs
4. The number of bytes a storage medium can hold
RAID
capacity
supercomputer
Point of Sale terminals
5. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
connector
adware
wireless modem
IP address
6. Company that provides wireless internet access to computers
volatile memory
CERT/CC
Dedicated line
wireless Internet service provider
7. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
Drive Bay
shareware...
L2 cache
botnets
8. A special purpose computer that functions as a component in a larger product. Small with limited hardware
embedded computer
Memory Cache
multi- core processor
Operating system
9. Internet teephony- enables users to speak to other users over the internet
jack
spyware
Input
VoIP
10. Single inline memory module forms a single set of contacts
Fiber to the Premises
CU
compromised computer
SIMM
11. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
digital signature
DLP projector
adware
access time
12. A legal agreement that allows multiple users to access the software on the server simutaneously
density
network license
multifunction peripheral
access time
13. Software that helps groups of people work together on projects and share info over a network
Linux
bus
groupware...
CAPTCHA
14. Small program that tells the operating system how to communicate with a specific device
driver
mpeg
ISP
disk fragmenter
15. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
SMTP
wordwrap
DNS Server
access time
16. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
system software...
ISP
IM
spider
17. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
FireWire port
CERT/CC
utility programs
18. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
embedded computer
bit
Desktop Computer
chat client
19. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
solid state drive
digital forensics
software suite
online security service
20. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
node
sound card
token ring
OCR
21. Mathematical formula that generates a code from the contents of the message
hash
synthesizer
Dial up modems
firmware...
22. A type of system software that allows users to perform maintenence type tasks
Web Server
access time
terminal
utility program
23. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
synthesizer
EFT
streaming
OCR
24. Records in a file both successful and unsuccessful attempts.
audit trail
Dial- up access
http
RAM
25. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
Memory
network architecture
database
IM
26. Serves as the interface between the user - the app software - and the computers hardware
proprietary software...
digital forensics
system software...
ghosting
27. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
Mobile Device
hot plugging
VR
proprietary software...
28. Hypertext transfer protocol
Terminal
http
freeware...
IrDA Port
29. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
SRAM
video card
expansion bus
overvoltage
30. Moving pictures experts group is a popular video compression standard
DSL
hypermedia
mpeg
Software...
31. Media transmit multiple signals simutaneously. Download faster than upload
PNG
neural network
telemedicine
broadband
32. Most computers (on and off)
OSP
Dedicated line
noise
digital
33. Read only memory refers to memory chips storing permanent data and instructions (firmware)
access time
nonvolatile memory
access control
ROM
34. A set of programs that coordinates all of the activies among computer hardware devices.
freeware...
wireless modem
Operating system
File compression utility
35. A case that contains electronic components of the computer used to process data.
Firewall
DLP projector
bus width
system unit
36. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
Application software...
platter
USB hub
optical mouse
37. (laptop computer) portable personal computer often able to fit in your lap
disk cleanup
coaxial cable
Notebook Computer
BIOS
38. Is an online area in which isers have wrtten discussions about a particular subject.
dialog box
transistor
newsgroup
plaintext
39. Human speech is bc of its continous signal that vary in strength and quality
analog
IM
preemptive multitasking
chip
40. A real time internet communications service where you can talk to people online.
IM
streaming
script kiddie
wireless modem
41. Completely Automated Public Turing test to tell Computers and Humans Apart.
digital modem
ARPA
CAPTCHA
MICR
42. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Transmission media
bus network
gender changer
power supply
43. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
disk fragmenter
bus
driver
back door
44. They can execute more than one instruction per clock cycle
keygen
Application software...
power supply
superscalar
45. A collection of computers and devices connected together - via communications devices and transmissions media.
network
Software...
system on a chip
telemedicine
46. A program that hides in a computer and allows someone from a remote location to take control of the computer
Application software...
DNS Server
ergonomics
rootkit
47. Online service provider- has many members features along with internet access such as IM or Web browsers.
broadband
application software...
public- domain software...
OSP
48. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
MRAM
Transmission media
MAN
E- commerce
49. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
system clock
Intrusion detection software...
bugs
DVI
50. Any unwanted signal usually varying quickly
neural network
Noise
nonvolatile memory
Motherboard