SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
macros
cross - platform
Output
Domain name system
2. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
Mainframe
digital certificate
animated Gif...
digital signature
3. A number that uniquely identifies each computer or device connected to the internet (0-255)
IP address
Trojan Horse
online auction
hot plugging
4. Program is one that runs the same on multiple operating systems
cross - platform
Netbook
worm
Information system
5. The standard that outlines characteristics of how two network devices communicate
protocol
Bluetooth
system clock
VAN
6. Graphics processing unit controls the manipulation and display of graphics on the display device.
Memory Cache
Domain name
GPU
SRAM
7. Personal information manager is application software that includes features to help users organize personal info
DSL modem
telesurgery
WAN
PIM
8. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
business software...
Bay
pixel
Laser printer
9. Uses radio waves to transmit data between two devices.
TCP/IP
MICR
Bluetooth
public- domain software...
10. Contains many microscopic pathways capable of carrying an electrical current
streaming cam
integrated circuit
RSS 2.0
stylus
11. A special purpose computer that functions as a component in a larger product. Small with limited hardware
proprietary software...
sleep mode
embedded computer
protocol
12. A temporary connection that uses one or more analog telphone lines for communications.
synthesizer
Web Browser
microbrowser
Dial Up line
13. A set of programs that coordinates all of the activies among computer hardware devices.
Operating system
network standard
crimeware
WAN
14. Major carriers of network traffic
Internet Backbone
jack
CAM
wireless modem
15. Builds and maintains lists of words found on websites. Useful for search engines
Web Server
ROM
server
spider
16. Internet Service Provider- a regional or national access provider
RAID
system on a chip
byte
ISP
17. The destructive event or prank the program intended to deliver
ISP
payload
ciphertext
fixed wireless
18. Computer automatically can configure adapter cards and other peripherals as you install them
EULA
Dial- up access
Plug and Play
Home user
19. A personal computer you can carry from place to place
Firewall
noise
Mobile Computer
shareware...
20. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
bit
dot matrix printer
botnets
21. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
network standard
node
fixed wireless
proprietary software...
22. A legal agreement that permits users to install the software on multiple computers.
network
site license
wordwrap
worm
23. Electrical supply drops.can cause data loss but generally not cause equipment damage
Motherboard
software suite
undervoltage
wordwrap
24. Company that provides wireless internet access to computers
IM
wireless Internet service provider
thread
trackball
25. A communications device that sends and recieves data and info to and from digital line
hibernate
digital modem
density
platter
26. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
multifunction peripheral
connector
buffer
touchpad
27. A program that hides in a computer and allows someone from a remote location to take control of the computer
embedded operating system
USB hub
expansion bus
rootkit
28. Basic input/output systemis firmware that contains the computers startup instructions
crimeware
backside bus
BIOS
Memory
29. Read only memory refers to memory chips storing permanent data and instructions (firmware)
client/server
USB port
ROM
multifunction peripheral
30. The technology of authenticating a persons identity by verifying a personal characteristic.
Internet Backbone
heat pipe
cracker
biometrics
31. Dynamic ram- chips must be re energized constantly or they lose their contents.
biometrics
DRAM
device dependant
Motherboard
32. CA resposible for giving out digital certificate
system on a chip
certificate authority
optical disc
device independent
33. Reorganizing it so that the files are store in continous sectors
drive bay
power supply
sleep mode
defragmenting
34. A cable forms a closed loop with all computers. one direction
address
video card
ring network
CERT/CC
35. Single inline memory module forms a single set of contacts
wireless Internet service provider
SIMM
Motherboard
biometrics
36. Communications activity. Handled by NSFnet.
E- retail
traffic
EULA
Storage Device
37. Privately owned and limited to a specific vendor or computer model.
client/server
ghosting
proprietary software...
Application software...
38. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
chasis...
corporate spies
Servers
39. A communications device that enables a computer or device that does not have a built in networking capability to access a network
public- domain software...
broadband internet service
System Unit
network card
40. Fetching - decoding - executing - storing
public- domain software...
POST
machine cycle
MRAM
41. A type of storage media that consists of flat disc and is written and read by a laser
client/server
Hot spots
superscalar
optical disc
42. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
SMTP
digital forensics
kernal
EULA
43. Latest version of Post office Protocol
POP3
streaming cam
Dedicated line
fiber optic cable
44. The fastest most powerful computer
supercomputer
RSS 2.0
USB hub
Drive Bay
45. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
Mainframe
Web conference
POST
back door
46. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
system clock
utility programs
noise
node
47. Allows users to keep typing without using enter at the end of each line
wordwrap
product activation
Information system
VAN
48. A program that restricts access to certain material on the web
web filter
ciphertext
star network
commands
49. Federally funded internet security research and development center
audit trail
digital forensics
RSS 2.0
CERT/CC
50. Initiates an instruction to transmit data - instructions - or information.
optical mouse
adapter card
macros
sending device