SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any data or instructions entered into the memory of the computer
downloading
Input
virus
certificate authority
2. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
defragmenting
liquid flow technology
web filter
broadband internet service
3. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
business software...
Processor
register
expansion bus
4. A web application that combines services from two or more sources creating a new application.
WAN
bus network
RAM
mashup
5. Joins a cable and a port
Web Browser
connector
Denial of Service attack
adapter card
6. When online meetings take place on the web
Web conference
VoIP
unethical employees
fiber optic cable
7. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
network
compromised computer
Fiber to the Premises
ARPA
8. Perpetrator attempts to obtain your personal or financial info.
Netbook
phishing
analog
utility program
9. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
online auction
port
virus signature
10. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
ghosting
cracker
turnaround document
coaxial cable
11. Does not require a newsreader - easier to use than a newsgroup
corporate spies
message board
Input
mashup
12. Federally funded internet security research and development center
peripheral
bus network
CERT/CC
preemptive multitasking
13. Program is one that runs the same on multiple operating systems
Fiber to the Premises
cross - platform
mpeg
MICR
14. A unique number that identifies the location of a byte in memory
phishing
address
traffic
PIM
15. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
parallel processing
MAN
bus network
Operating system
16. A rectangular opeining that typically holds disk drives.
EULA
digital forensics
GPU
Drive Bay
17. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
ciphertext
downloading
IP address
botnets
18. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
MICR
E- commerce
business software...
SRAM
19. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
Bay
TCP/IP
EDI
Storage Device
20. Initiates an instruction to transmit data - instructions - or information.
digital signature
Application software...
optical reader
sending device
21. Small program that tells the operating system how to communicate with a specific device
ring network
Point of Sale terminals
pipelining
driver
22. Anopening inside the system unit in which you can install additional equipment. Different than a slot
drive bay
traffic
pointing stick
Bay
23. A program that restricts access to certain material on the web
adapter card
hash
web filter
download
24. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
formatting
peripheral
air mouse
Internet Backbone
25. Single inline memory module forms a single set of contacts
drive bay
jewel box
SIMM
network topology
26. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
Application software...
TCP/IP
L2 cache
GUI
27. Someone who uses internet to destroy or damage computers for political reasons.
Mobile Device
firmware...
hot spot
cyberterrorist
28. 8 bits grouped together. basic storage unit in memory. Each byte has an address
business software...
Plug and Play
byte
sending device
29. PGP an encryption program
spider
newsreader
fault tolerant computer
pretty good Privacy
30. Rambus inline memory module house RDRAM chips
Trojan Horse
phishing
DRAM
RIMM
31. A type of storage media that consists of flat disc and is written and read by a laser
machine cycle
cluster
optical disc
DIMM
32. Smallest unit of data the computer can process
bit
E- retail
parallel processing
peer to peer network
33. The process if a computer or device recieveing info info from the server on the internet
DNS Server
downloading
communications channel
Software...
34. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
CMOS
node
MRAM
device dependant
35. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
Storage Device
application software...
fixed wireless
ASCII
36. Is a security measure that defines who can access it and what actions they can take while acessing the computer
wordwrap
access control
ergonomics
embedded computer
37. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
adapter card
unauthorized access
wireless modem
port
38. A type of system software that allows users to perform maintenence type tasks
data collection device
honeypot
hypertext
utility program
39. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
touchpad
Mainframe
RFID
sound card
40. A document that you return to the company that creates and sends it.
turnaround document
expansion bus
access time
pointing stick
41. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Fiber to the Premises
Processor
supercomputer
ISP
42. CA resposible for giving out digital certificate
certificate authority
communications channel
cyberterrorist
system software...
43. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
wireless modem
server
coaxial cable
Intrusion detection software...
44. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
software suite
virus
streaming
hacker
45. Needed generally to participate in a newsgroup
newsreader
SIMM
PNG
ROM
46. Builds and maintains lists of words found on websites. Useful for search engines
L1 cache
spider
superscalar
animated Gif...
47. A special purpose computer that functions as a component in a larger product. Small with limited hardware
embedded computer
analog
IM
adware
48. Mathematical formula that generates a code from the contents of the message
SMTP
utility programs
Servers
hash
49. Small capacity built directly in the processor chip
spoofing
GPU
Memory Cache
L1 cache
50. On the motherboard hold memory modules
web filter
crimeware
memory slots
Personal Computers