SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
bugs
project management software...
microbrowser
token ring
2. Device with a monitor - keyboard - and memory
Terminal
digital certificate
EULA
noise
3. Internet connections using regular copper telephone lines.
DSL
shareware...
site license
CU
4. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
recieving device
superscalar
cracker
UNIX
5. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
adware
MRAM
telemedicine
wireless modem
6. Pressure sensitive eraser shaped pointing device
transistor
network architecture
Operating system
pointing stick
7. Program is one that runs the same on multiple operating systems
CERT/CC
gender changer
certificate authority
cross - platform
8. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
image processing
firmware...
Laser printer
9. Accepts the transmission of data - instructions - or info
drive bay
recieving device
video card
disk controller
10. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
ASCII
spoofing
EULA
hypermedia
11. A special purpose computer that functions as a component in a larger product. Small with limited hardware
heat pipe
MRAM
DSL
embedded computer
12. Enahnces the sound generating capabilites of a personal computer
Web Browser
communications channel
sound card
OSP
13. Any data or instructions entered into the memory of the computer
public- domain software...
Memory Cache
hacker
Input
14. Contain permanently writeen data - instructions - and information
site license
streaming cam
firmware...
File compression utility
15. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
File compression utility
ethernet
cyberextortionist
device independent
16. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
document management software...
chip
peripheral
traffic
17. Initiates an instruction to transmit data - instructions - or information.
network license
Bay
sending device
Content Aggregator
18. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
cold boot
e- learning
MICR
CPU
19. A system that attempts to imitate the behavior of a human brain.
utility program
freeware...
E- commerce
neural network
20. A collection of computers and devices connected together - via communications devices and transmissions media.
Dial- up access
network
broadband
thread
21. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
client
Dial up modems
Input
System Unit
22. Each computer or device on the network. often connected by cables
VAN
DVI
Laser printer
node
23. Smallest unit of data the computer can process
telesurgery
Intrusion detection software...
POST
bit
24. Allows the processor to communicate with peripherals.
tactile output
site license
expansion bus
EFT
25. A collection of data organized in a manner that allows access retrieval and use of that data
multi- core processor
peer to peer network
Web conference
database
26. A type of always on connection that is established between two communications devices. better than dial up line
TCP/IP
spooling
Dedicated line
network license
27. Integrates the functions of a processor - memory and a video card on a single chip.
GUI
system on a chip
Memory Cache
solid state media
28. Errors that can be recognized by automatic update
bugs
Information system
wireless Internet service provider
ISP
29. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
Mainframe
byte
hot spot
RAM
30. Started the internet as a networking project
product activation
cable modem
ARPA
corporate spies
31. Random access memory- memory chips that can be read from and written to by the processor and other devices
Noise
plaintext
RAM
plug- in
32. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
Dial- up access
message board
Linux
disk fragmenter
33. CA resposible for giving out digital certificate
player
newsreader
Web Server
certificate authority
34. Internet Service Provider- a regional or national access provider
ISP
streaming cam
Bay
player
35. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
ring network
FireWire port
software suite
spoofing
36. A case that contains electronic components of the computer used to process data.
spyware
audit trail
Denial of Service attack
system unit
37. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
site license
port
Content Aggregator
utility programs
38. Computing device small enough to hold in your hand
RAID
application software...
Mobile Device
worm
39. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
buffer
Domain name
audit trail
preemptive multitasking
40. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
Mobile Device
botnets
DTP
adware
41. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
telemedicine
access time
trackball
worm
42. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
supercomputer
IM
virus
utility program
43. Universal serial bus port connects peripherals to the computer
MICR
USB port
hypermedia
wireless modem
44. Records in a file both successful and unsuccessful attempts.
GPU
audit trail
L1 cache
communications channel
45. Multitasking operating system sold by Sun and IBM. stand alone and server operating system
UNIX
network license
GPU
Bay
46. Can connect multiple types of devices that require faster data transmission speeds.
TCP/IP
IrDA Port
FireWire port
bus network
47. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
crimeware
USB hub
heat pipe
DTP
48. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
expansion bus
DVI
terminal
hot plugging
49. Consists of electronic components that store instructions waiting to be executed (On motherboard)
DIMM
corporate spies
Operating system
Memory
50. Surgeon performs operation by controlling robot when not in the same area as patient.
telesurgery
phishing
cracker
Output