SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The number of bytes a storage medium can hold
capacity
synthesizer
ROM
adware
2. A window that provides info - presents availabe options - or requests a response.
dialog box
NAS
system unit
machine cycle
3. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
Storage Device
kernal
RFID
Domain name system
4. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
newsreader
chip
Firewall
memory slots
5. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
document management software...
ethernet
power supply
adapter cards
6. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
disk cleanup
L1 cache
CAM
spyware
7. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
synthesizer
Input
System Software...
cyberextortionist
8. Enahnces the sound generating capabilites of a personal computer
image processing
sound card
fixed wireless
Firewall
9. Moving pictures experts group is a popular video compression standard
adware
DIMM
mpeg
http
10. Privately owned and limited to a specific vendor or computer model.
POP3
proprietary software...
Processor
SRAM
11. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
IM
bus network
hot spot
Information system
12. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
integrated circuit
TLS
DNS Server
L2 cache
13. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
adapter cards
CPU
Mainframe
cracker
14. A rectangular opeining that typically holds disk drives.
FireWire port
telemedicine
server
Drive Bay
15. Extends the capabilites of a browser.
hard disk
digital forensics
plug- in
hacker
16. Dish shaped antenna for internet connection
fixed wireless
CU
rootkit
ciphertext
17. Used to gain competitive advantage
broadband
cross - platform
corporate spies
spoofing
18. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
SRAM
downloading
Hot spots
proprietary software...
19. The delivery of education via some electronic method such as the internet - networks - or optical disks.
e- learning
fixed wireless
Mobile Device
spyware
20. Latest version of Post office Protocol
RAID
POP3
device dependant
digital signature
21. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
register
jewel box
Memory
spoofing
22. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Desktop Computer
multi- core processor
compromised computer
server
23. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
Web Server
power supply
Internet Backbone
UNIX
24. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
pipelining
cluster
System Unit
25. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
RSS 2.0
memory slots
MAN
transistor
26. Perpetrator attempts to obtain your personal or financial info.
phishing
cable modem
back door
message board
27. Can connect multiple types of devices that require faster data transmission speeds.
image processing
FireWire port
DSL
Bluetooth
28. Is an online area in which isers have wrtten discussions about a particular subject.
macros
system bus
system software...
newsgroup
29. Human speech is bc of its continous signal that vary in strength and quality
spoofing
RTLS
analog
player
30. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
network standard
program
http
TLS
31. Mathematical formula that generates a code from the contents of the message
hash
Input
terminal
client
32. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
virtual provate network
Netbook
CAM
network topology
33. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
adapter cards
defragmenting
coaxial cable
DVI
34. A socket in the motherboard that can hold an adapter card
turnaround document
802.11
expansion slot
Web Application
35. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
web filter
OCR
Trojan Horse
VR world
36. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
recieving device
USB hub
EULA
VAN
37. On the motherboard hold memory modules
DSL modem
memory slots
IM
USB hub
38. A know specific pattern of virus code.
Netiquette
virus signature
shareware...
System Unit
39. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
solid state drive
Storage Device
player
corporate spies
40. Does not require a newsreader - easier to use than a newsgroup
network card
message board
shareware...
protocol
41. Allows users to keep typing without using enter at the end of each line
Home user
pipelining
wordwrap
system clock
42. Connects the processor to cache.
backside bus
memory module
telemedicine
player
43. Rambus inline memory module house RDRAM chips
sleep mode
bus width
RIMM
Information system
44. Text version of an IP address
turnaround document
Domain name
IrDA Port
EFT
45. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Memory Cache
site license
e- learning
Mobile Computer
46. Screen savors were made to prevent this - which etched images permanently onto the screen
network license
L1 cache
ghosting
Transmission media
47. Organization that sells and manages domain names
bus width
dot matrix printer
DLP projector
registrar
48. Online service provider- has many members features along with internet access such as IM or Web browsers.
hot spot
OSP
Storage Device
SRAM
49. Dual inline memory module forms two sets of contact
proxy server
newsgroup
access time
DIMM
50. Used to track and identify the location of high risk or high value items.
RTLS
hash
LAN
wireless Internet service provider