SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. zombie
plaintext
transistor
EFT
compromised computer
2. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
MAN
Noise
Dial Up line
multifunction peripheral
3. Copyrighted software that is distributed at no cost for a trial period
nonvolatile memory
UNIX
shareware...
access control
4. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
digital signature
noise
platter
E- commerce
5. Started the internet as a networking project
Notebook Computer
system bus
hash
ARPA
6. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
jewel box
nonvolatile memory
hibernate
PIM
7. A socket in the motherboard that can hold an adapter card
POP3
token ring
Web Server
expansion slot
8. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
analog
back door
registrar
hot spot
9. Contain permanently writeen data - instructions - and information
Desktop Computer
firmware...
peripheral
virus signature
10. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
freeware...
Content Aggregator
node
unethical employees
11. Uses devices that emit and sense light to detect the mouses movement
node
site license
optical mouse
Linux
12. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
defragmenting
script kiddie
wireless Internet service provider
Bay
13. Graphical User interface - interact with software using text - graphics - and icons
virus signature
GUI
mashup
CAD
14. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
Laser printer
proprietary software...
phishing
broadband internet service
15. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
nonvolatile memory
Motherboard
scanner
GPU
16. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
OCR
memory slots
Operating system
CAPTCHA
17. Power on self test to check the various system components and the results are compared with data in a CMOS chip
cyberterrorist
POP3
OSP
POST
18. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
RSS 2.0
Web Server
coaxial cable
drive bay
19. Any data or instructions entered into the memory of the computer
software suite
Input
device independent
Internet Backbone
20. Obtains data directly at the location where the transaction or event takes place.
data collection device
token ring
download
broadband
21. Used to gain competitive advantage
DNS Server
corporate spies
digital signature
PNG
22. Hides within or looks like a legitimate program such as a screen saver
Memory
SMTP
optical mouse
Trojan Horse
23. Popular for LAN. single central cable.
touchpad
ghosting
stylus
bus network
24. All computers connected to central device. Hub or switch
solid state drive
star network
ethernet
traffic
25. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
RAID
stylus
LAN
digital
26. 8 bits grouped together. basic storage unit in memory. Each byte has an address
byte
overvoltage
MICR
project management software...
27. Program is one that runs the same on multiple operating systems
token ring
IM
CERT/CC
cross - platform
28. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
cross - platform
streaming
Storage Media
Application software...
29. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
recieving device
video card
optical reader
Bay
30. A program that hides in a computer and allows someone from a remote location to take control of the computer
CMOS
adware
utility program
rootkit
31. Is a security measure that defines who can access it and what actions they can take while acessing the computer
hard disk
fiber optic cable
Output
access control
32. Retains existing application software and data files even if you can change computer models or vendors
hot plugging
device independent
DLP projector
firmware...
33. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
network standard
ergonomics
spoofing
coaxial cable
34. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
token ring
hard disk
capacity
network architecture
35. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
embedded computer
video card
web filter
Latency
36. Hypertext transfer protocol
http
macros
freeware...
access time
37. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
memory slots
platter
WAN
digital
38. Instead of port - jack is used to identify audio or video ports.
jack
broadband
Information system
online security service
39. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
warm boot
Content Aggregator
machine cycle
VR world
40. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
pretty good Privacy
CAD
UNIX
touchpad
41. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
ghosting
site license
proprietary software...
42. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
W3C
player
GUI
buffer
43. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
online security service
bus network
Drive Bay
superscalar
44. An instruction that causes a program to perform a specific action.
commands
peer to peer network
wireless Internet service provider
heat pipe
45. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
solid state media
virus
chip
utility program
46. A notcie that guarantees a user or web site is legit. E- commerce use it often
proxy server
hash
digital certificate
Storage Device
47. A colection of individual programs available together as a unit. lower cost and ease of use
TCP/IP
bus width
software suite
Storage Device
48. Computer automatically can configure adapter cards and other peripherals as you install them
Drive Bay
Plug and Play
byte
Linux
49. Provids mobile users with a secure connection to the company server as if the user has a private line.
freeware...
virtual provate network
CERT/CC
PNG
50. A cable forms a closed loop with all computers. one direction
SRAM
ring network
System Unit
capacity