SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
cracker
CAD
E- retail
pixel
2. Allows a user to plan schedule and track costs of a project
disk cleanup
project management software...
digital forensics
digital modem
3. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
nonvolatile memory
IM
disk cleanup
utility program
4. Connects the processor to cache.
ring network
backside bus
Terminal
Storage Media
5. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
proxy server
volatile memory
register
DSL
6. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Software...
e- learning
ARPA
parallel processing
7. Digital light processor uses tiny mirrors to reflect light
DLP projector
recieving device
ethernet
Operating system
8. Allows the processor to communicate with peripherals.
CERT/CC
expansion bus
system on a chip
SRAM
9. A program that restricts access to certain material on the web
Information system
digital certificate
multifunction peripheral
web filter
10. A type of always on connection that is established between two communications devices. better than dial up line
Dedicated line
stylus
Top level domain
project management software...
11. The standard that outlines characteristics of how two network devices communicate
protocol
Netiquette
defragmenting
Dedicated line
12. All computers connected to central device. Hub or switch
network card
ghosting
Operating system
star network
13. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
spyware
Hot spots
Mobile Computer
fiber optic cable
14. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
dialog box
web filter
Motherboard
15. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
application software...
E- commerce
density
bus network
16. Continues to operate when one of its components fails - ensuring that no data is lost
fault tolerant computer
power supply
freeware...
Storage Media
17. Privately owned and limited to a specific vendor or computer model.
http
terminal
proprietary software...
rootkit
18. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
802.11
site license
proprietary software...
solid state drive
19. Obtains data directly at the location where the transaction or event takes place.
online security service
microbrowser
data collection device
terminal
20. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
tactile output
peripheral
product activation
CAD
21. Anopening inside the system unit in which you can install additional equipment. Different than a slot
register
Bay
Information system
web filter
22. The destructive event or prank the program intended to deliver
payload
IM
Notebook Computer
ciphertext
23. Online service provider- has many members features along with internet access such as IM or Web browsers.
OSP
utility programs
E- retail
pointing stick
24. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Domain name
disk fragmenter
DSL
Servers
25. The role of memory to store both data and programs
DNS Server
Hot spots
stored program concept
Web conference
26. On software is infinitie space and depth for VR
phishing
recieving device
VR world
air mouse
27. Program that euns only on a specific type or make of computer
plaintext
Domain name
motherboard
device dependant
28. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
VoIP
air mouse
IrDA Port
scanner
29. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
IrDA Port
OMR
touchpad
E- commerce
30. Perpetrator attempts to obtain your personal or financial info.
phishing
DIMM
ASCII
OMR
31. The technology of authenticating a persons identity by verifying a personal characteristic.
cross - platform
chip
BIOS
biometrics
32. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
access time
hacker
disk controller
Internet Backbone
33. A personal computer you can carry from place to place
pipelining
twisted pair cable
trackball
Mobile Computer
34. Local area network- network tat connects computers and devices in a limited geographical area such as a home
synthesizer
hash
LAN
Communications device
35. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
ALU
dot matrix printer
device independent
undervoltage
36. zombie
SIMM
compromised computer
Laser printer
EULA
37. Has the illusion of moving images becuase it sends a continuos stream of images
protocol
system unit
macros
streaming cam
38. Msot retail stores use POS to record purchases - process cards - and update inventory
EULA
multi- core processor
Point of Sale terminals
Firewall
39. Provids mobile users with a secure connection to the company server as if the user has a private line.
mpeg
virtual provate network
online security service
fiber optic cable
40. PGP an encryption program
online auction
ergonomics
pretty good Privacy
digital modem
41. They can execute more than one instruction per clock cycle
CERT/CC
Denial of Service attack
L2 cache
superscalar
42. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
supercomputer
IM
recieving device
port
43. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
bus network
E- commerce
scanner
Linux
44. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
software suite
File compression utility
rootkit
worm
45. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
Processor
memory slots
Internet Backbone
46. Health care professions conduct live conferences on the computer
communications
telemedicine
macros
hibernate
47. Processor begins to fetch a second instruction before it completes the full machine cycle
utility program
Mainframe
pipelining
download
48. Initiates an instruction to transmit data - instructions - or information.
preemptive multitasking
communications channel
hot plugging
sending device
49. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Servers
Netbook
thread
IM
50. A number that uniquely identifies each computer or device connected to the internet (0-255)
IP address
POST
virus
utility program