SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
multifunction peripheral
bandwidth
preemptive multitasking
Memory
2. One or more computers on the network request services from the server. 10 or more computers
PNG
unauthorized access
client/server
trackball
3. A type of always on connection that is established between two communications devices. better than dial up line
undervoltage
motherboard
spooling
Dedicated line
4. Program is one that runs the same on multiple operating systems
cross - platform
Bluetooth
CERT/CC
phishing
5. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
ring network
honeypot
VAN
register
6. Contain permanently writeen data - instructions - and information
firmware...
optical reader
DRAM
DSL
7. Circuit boards tjay provide connections and functions not built into the motherboard
peripheral
Operating system
volatile memory
adapter cards
8. Has the illusion of moving images becuase it sends a continuos stream of images
BIOS
streaming cam
integrated circuit
Bluetooth
9. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
solid state drive
Firewall
IM
embedded operating system
10. Broadband modem- sends and recives digital data over the cable television
system software...
cable modem
solid state drive
Transmission media
11. A system that attempts to imitate the behavior of a human brain.
neural network
sleep mode
IM
bus width
12. Joins a cable and a port
connector
device independent
proxy server
plaintext
13. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
commands
noise
adapter cards
hot spot
14. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
NAS
IM
program
heat pipe
15. Msot retail stores use POS to record purchases - process cards - and update inventory
Point of Sale terminals
phishing
POST
USB port
16. PGP an encryption program
sleep mode
File compression utility
freeware...
pretty good Privacy
17. Does not require a newsreader - easier to use than a newsgroup
network topology
proxy server
online security service
message board
18. On the motherboard hold memory modules
memory slots
worm
spoofing
online auction
19. A collection of data organized in a manner that allows access retrieval and use of that data
IrDA Port
twisted pair cable
database
chip
20. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
Content Aggregator
CERT/CC
IM
DNS Server
21. Universal serial bus port connects peripherals to the computer
spoofing
USB port
application software...
plaintext
22. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
Top level domain
script kiddie
sending device
stored program concept
23. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
volatile memory
OSP
DSL
24. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
thread
telesurgery
wordwrap
network topology
25. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
access control
turnaround document
firmware...
document management software...
26. Software that helps groups of people work together on projects and share info over a network
groupware...
MMS
star network
tactile output
27. Software used by criminals
worm
crimeware
digital forensics
E- retail
28. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
solid state drive
register
web filter
Linux
29. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
rootkit
communications channel
cold boot
streaming
30. Storage over an internet service
DLP projector
hypermedia
TCP/IP
cloud storage
31. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
IP address
scanner
node
proprietary software...
32. Provides the user with a physcial response from the device
tactile output
coaxial cable
multifunction peripheral
EFT
33. Needed generally to participate in a newsgroup
newsreader
newsgroup
Bay
public- domain software...
34. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
virtual provate network
Linux
TLS
Content Aggregator
35. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
shareware...
disk controller
honeypot
fixed wireless
36. The process of dividing the disk into tracks and sectors
digital
Plug and Play
hypertext
formatting
37. Is a security measure that defines who can access it and what actions they can take while acessing the computer
formatting
access control
access time
hypertext
38. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
Application software...
public- domain software...
virtual provate network
ring network
39. Type of notebook comp that is smaller and less powerful than a normal notebook comp
network license
virus
Netbook
program
40. Most computers (on and off)
digital
Drive Bay
digital forensics
newsreader
41. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
MAN
port
fault tolerant computer
Terminal
42. A program that restricts access to certain material on the web
chasis...
Mainframe
web filter
RFID
43. Continues to operate when one of its components fails - ensuring that no data is lost
telemedicine
fault tolerant computer
server
cross - platform
44. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
recieving device
DSL
CAM
registrar
45. Initiates an instruction to transmit data - instructions - or information.
gender changer
hacker
server
sending device
46. A colection of individual programs available together as a unit. lower cost and ease of use
Software...
software suite
shareware...
Memory
47. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
back door
adware
PIM
byte
48. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
fixed wireless
DTP
peripheral
kernal
49. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
server
system on a chip
pretty good Privacy
jewel box
50. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
RAID
worm
wireless modem
adapter cards