SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
product activation
POP3
hypertext
proxy server
2. A number that uniquely identifies each computer or device connected to the internet (0-255)
Personal Computers
CU
worm
IP address
3. CA resposible for giving out digital certificate
solid state media
commands
wireless Internet service provider
certificate authority
4. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
hot spot
worm
LAN
supercomputer
5. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
adware
registrar
register
6. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
embedded operating system
VoIP
system clock
7. A vulnerable computer that is set up to entice an intruder to break into it.
honeypot
Noise
VR world
optical reader
8. Special software to listen to audio
bugs
SRAM
CAPTCHA
player
9. Transmission media on which the data - instructions - information travel.
communications channel
honeypot
Terminal
embedded computer
10. The last section of the domain name
Mobile Device
bus network
turnaround document
Top level domain
11. Someone who accesses a computer or network illegally. Some say they hack to improve security
registrar
recieving device
hacker
DLP projector
12. Single chip with two or more processor cores.
embedded computer
multi- core processor
streaming
hard disk
13. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
overvoltage
Operating system
preemptive multitasking
download
14. The standard that outlines characteristics of how two network devices communicate
protocol
macros
ring network
gender changer
15. A personal computer you can carry from place to place
Mobile Computer
LAN
Storage Device
Content Aggregator
16. Pressure sensitive eraser shaped pointing device
rootkit
system clock
capacity
pointing stick
17. A temporary connection that uses one or more analog telphone lines for communications.
CPU
LAN
Dial Up line
embedded operating system
18. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
system bus
solid state drive
CU
air mouse
19. Popular for LAN. single central cable.
BIOS
public- domain software...
telesurgery
bus network
20. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
streaming
heat sink
worm
hypermedia
21. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
terminal
Mobile Computer
analog
pretty good Privacy
22. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
EULA
worm
backside bus
23. Personal information manager is application software that includes features to help users organize personal info
Netbook
PIM
Web Server
802.11
24. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
Firewall
Domain name system
online security service
hypertext
25. A legal agreement that allows multiple users to access the software on the server simutaneously
Operating system
certificate authority
honeypot
network license
26. A communications device that sends and recieves data and info to and from digital line
disk cleanup
MMS
digital modem
Desktop Computer
27. A set of programs that coordinates all of the activies among computer hardware devices.
cyberextortionist
MAN
Operating system
volatile memory
28. Used to track and identify the location of high risk or high value items.
expansion bus
RTLS
multifunction peripheral
stylus
29. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
address
botnets
EFT
CAPTCHA
30. Contain permanently writeen data - instructions - and information
OMR
registrar
machine cycle
firmware...
31. Unencrypted readable data
Application software...
liquid flow technology
bit
plaintext
32. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
utility program
DTP
register
business software...
33. Universal serial bus port connects peripherals to the computer
unauthorized access
USB port
Intrusion detection software...
Firewall
34. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
warm boot
heat sink
MICR
RFID
35. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
digital forensics
DTP
macros
36. Data that has been processed in a useful form- text - graphics - audio - video
Output
online auction
ROM
sound card
37. A communications device that enables a computer or device that does not have a built in networking capability to access a network
pixel
Storage Media
router
network card
38. Uses devices that emit and sense light to detect the mouses movement
product activation
802.11
Desktop Computer
optical mouse
39. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
public- domain software...
Intrusion detection software...
proxy server
network
40. Processor begins to fetch a second instruction before it completes the full machine cycle
CAD
pointing stick
optical reader
pipelining
41. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
IM
pixel
botnets
kernal
42. Does not require a newsreader - easier to use than a newsgroup
RIMM
video card
message board
neural network
43. Short for key generator creats software registration numbers and sometimes activation codes.
keygen
botnets
utility program
optical mouse
44. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
Denial of Service attack
System Software...
embedded computer
utility program
45. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
E- retail
Latency
overvoltage
bus network
46. The process of dividing the disk into tracks and sectors
formatting
Bay
stored program concept
mpeg
47. Computer automatically can configure adapter cards and other peripherals as you install them
Plug and Play
digital certificate
LAN
payload
48. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
access control
stored program concept
protocol
virus
49. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
telemedicine
Bluetooth
project management software...
overvoltage
50. When turning on a computer that has been turned off completly
broadband
Home user
cold boot
optical mouse