SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
Input
player
air mouse
DVI
2. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
twisted pair cable
Bay
ghosting
public- domain software...
3. Initiates an instruction to transmit data - instructions - or information.
Firewall
sending device
pretty good Privacy
SIMM
4. Searches for and removes unneccessary files
802.11
MRAM
disk cleanup
wireless Internet service provider
5. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
pipelining
utility programs
network architecture
DNS Server
6. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
network architecture
router
business software...
defragmenting
7. Most computers (on and off)
digital
hypertext
Netiquette
IM
8. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
dot matrix printer
SMTP
density
nonvolatile memory
9. Company that provides wireless internet access to computers
wireless Internet service provider
digital modem
pipelining
Intrusion detection software...
10. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
mpeg
UNIX
twisted pair cable
Application software...
11. (laptop computer) portable personal computer often able to fit in your lap
MAN
hibernate
streaming cam
Notebook Computer
12. A system that attempts to imitate the behavior of a human brain.
hot spot
neural network
Memory
noise
13. Connects the processor to cache.
power supply
backside bus
hot spot
DIMM
14. Links in text based documents
POST
port
wireless Internet service provider
hypertext
15. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
CMOS
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
TCP/IP
groupware...
16. Acts as an electronic switch that opens or closes the circuit for electrical charges
system on a chip
transistor
cracker
ALU
17. Communications activity. Handled by NSFnet.
Dial- up access
Latency
Laser printer
traffic
18. Online service provider- has many members features along with internet access such as IM or Web browsers.
virus signature
OSP
touchpad
spider
19. The amount of data - instructions - and information that can travel over communications channel
bandwidth
cyberextortionist
terminal
Denial of Service attack
20. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
player
Firewall
bus width
CU
21. Fetching - decoding - executing - storing
machine cycle
Personal Computers
touchpad
ghosting
22. One or more computers on the network request services from the server. 10 or more computers
star network
VoIP
client/server
pretty good Privacy
23. Program that euns only on a specific type or make of computer
DIMM
wireless modem
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
device dependant
24. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
volatile memory
File compression utility
hacker
transistor
25. Processor begins to fetch a second instruction before it completes the full machine cycle
pipelining
sleep mode
fiber optic cable
RIMM
26. Transmission media on which the data - instructions - information travel.
crimeware
communications channel
router
Input
27. A program that hides in a computer and allows someone from a remote location to take control of the computer
rootkit
business software...
TLS
Bluetooth
28. Optical mark recognition reads hand drawn marks such as circles or rectangles.
Dial Up line
OMR
Memory
E- commerce
29. A colection of individual programs available together as a unit. lower cost and ease of use
software suite
turnaround document
defragmenting
certificate authority
30. The last section of the domain name
platter
Top level domain
defragmenting
application software...
31. Popular for LAN. single central cable.
web filter
bus network
GUI
PIM
32. Internet Service Provider- a regional or national access provider
CERT/CC
DTP
cyberextortionist
ISP
33. Universal serial bus port connects peripherals to the computer
client/server
heat sink
ARPA
USB port
34. System board- is the main circuit board of the system unit.
access control
integrated circuit
motherboard
utility programs
35. A part of the motherboard and connects the processor to main memory
communications channel
system bus
broadband
mashup
36. A case that contains electronic components of the computer used to process data.
TCP/IP
bus
GUI
system unit
37. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
unethical employees
firmware...
Web Application
Denial of Service attack
38. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
heat sink
twisted pair cable
transistor
worm
39. Someone who accesses a computer or network illegally. Some say they hack to improve security
recieving device
System Software...
hacker
L1 cache
40. Any unwanted signal usually varying quickly
Noise
W3C
groupware...
MICR
41. The role of memory to store both data and programs
gender changer
stored program concept
player
broadband internet service
42. Consumer consumer e commerce.
OSP
utility program
online auction
density
43. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
Operating system
honeypot
video card
twisted pair cable
44. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
ethernet
script kiddie
ISP
stored program concept
45. Provides the user with a physcial response from the device
corporate spies
hypertext
tactile output
ASCII
46. CA resposible for giving out digital certificate
Bay
certificate authority
digital
wireless Internet service provider
47. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
adware
dialog box
SMTP
Output
48. Uses fiber optic cable for internet connection.
CAD
Fiber to the Premises
digital
honeypot
49. Anopening inside the system unit in which you can install additional equipment. Different than a slot
RAID
Application software...
Bay
gender changer
50. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
e- learning
TLS
preemptive multitasking
UNIX