SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
power supply
rootkit
System Unit
SMTP
2. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
rootkit
system on a chip
proxy server
botnets
3. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
botnets
Home user
recieving device
4. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
IP address
solid state drive
CAM
USB hub
5. Graphical User interface - interact with software using text - graphics - and icons
IM
GUI
http
CERT/CC
6. Controls timing of all computer operations
DSL modem
system clock
SIMM
OMR
7. Dual inline memory module forms two sets of contact
DIMM
hacker
sound card
message board
8. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
system on a chip
DLP projector
OSP
9. Graphic file (JPEG - GIF) slowly replacing GIF
streaming cam
PNG
wireless access point
Operating system
10. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
audit trail
DSL modem
DSL
MAN
11. A know specific pattern of virus code.
register
E- commerce
virus signature
Point of Sale terminals
12. All computers connected to central device. Hub or switch
client/server
virtual provate network
CAD
star network
13. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
SIMM
Web Server
download
wireless access point
14. Human speech is bc of its continous signal that vary in strength and quality
digital certificate
kernal
Web conference
analog
15. The process of dividing the disk into tracks and sectors
formatting
site license
ergonomics
RTLS
16. Short for key generator creats software registration numbers and sometimes activation codes.
OMR
protocol
broadband internet service
keygen
17. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
Drive Bay
video card
GUI
fault tolerant computer
18. Rambus inline memory module house RDRAM chips
Transmission media
RIMM
Netiquette
IM
19. Company that provides wireless internet access to computers
phishing
overvoltage
hypermedia
wireless Internet service provider
20. A communications device that sends and recieves data and info to and from digital line
CPU
jack
wireless Internet service provider
digital modem
21. A real time internet communications service where you can talk to people online.
Noise
OCR
twisted pair cable
IM
22. Searches for and removes unneccessary files
biometrics
disk cleanup
dot matrix printer
bugs
23. Uses devices that emit and sense light to detect the mouses movement
VR world
audit trail
optical mouse
Motherboard
24. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
LAN
nonvolatile memory
spoofing
DIMM
25. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
certificate authority
downloading
DSL
26. When businesses use the internet to sell products
Top level domain
corporate spies
Processor
E- retail
27. Circuit boards tjay provide connections and functions not built into the motherboard
digital certificate
adapter cards
RAID
VAN
28. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
RAM
video card
hot spot
29. Designed for mobile devices
microbrowser
analog
defragmenting
data collection device
30. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
VR
animated Gif...
twisted pair cable
web filter
31. Accepts the transmission of data - instructions - or info
recieving device
Web conference
integrated circuit
Operating system
32. Encrypted data
spooling
stored program concept
embedded computer
ciphertext
33. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
communications channel
hot plugging
device independent
network standard
34. Transmission media on which the data - instructions - information travel.
Mobile Device
document management software...
access control
communications channel
35. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
RAM
chip
noise
Mobile Computer
36. A small metal or plastic device that uses pressure instead of ink.
FireWire port
stylus
Dial Up line
dialog box
37. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
parallel processing
project management software...
capacity
38. A system that attempts to imitate the behavior of a human brain.
http
neural network
Web Server
Application software...
39. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
DTP
port
Intrusion detection software...
hypermedia
40. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
Web Server
Linux
kernal
hypermedia
41. Hardware - software - data - people - procedures
Information system
Content Aggregator
Fiber to the Premises
network
42. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
802.11
optical reader
dot matrix printer
OCR
43. A communications device that enables a computer or device that does not have a built in networking capability to access a network
OSP
network topology
MAN
network card
44. A personal computer you can carry from place to place
pipelining
video card
traffic
Mobile Computer
45. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
tactile output
server
botnets
plug- in
46. Loses its contents when power is turned off (RAM)
plaintext
volatile memory
IM
system on a chip
47. An electrical disturbance that can degrade communications
mpeg
TLS
disk controller
noise
48. Smallest element in an electronic image
pixel
Domain name system
analog
cross - platform
49. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
kernal
streaming
utility program
Web Browser
50. Holds one or more disk drives
DVI
web filter
Storage Device
drive bay