SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software used by criminals
neural network
crimeware
CPU
twisted pair cable
2. ...
thread
OMR
RAID
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
3. A special purpose computer that functions as a component in a larger product. Small with limited hardware
Domain name system
Top level domain
UNIX
embedded computer
4. Retains existing application software and data files even if you can change computer models or vendors
commands
public- domain software...
RFID
device independent
5. Other computers and mobile devices on the networ that rely on the server for its resources
product activation
pretty good Privacy
client
CAPTCHA
6. Data that has been processed in a useful form- text - graphics - audio - video
drive bay
biometrics
CAD
Output
7. Media transmit multiple signals simutaneously. Download faster than upload
utility program
broadband
warm boot
disk controller
8. Program is one that runs the same on multiple operating systems
corporate spies
wordwrap
Home user
cross - platform
9. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
IP address
DIMM
image processing
byte
10. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
USB hub
overvoltage
access time
port
11. Privately owned and limited to a specific vendor or computer model.
access control
proprietary software...
CPU
business software...
12. Local area network- network tat connects computers and devices in a limited geographical area such as a home
DLP projector
EULA
LAN
Point of Sale terminals
13. CA resposible for giving out digital certificate
Mainframe
sending device
certificate authority
POP3
14. Electrical supply drops.can cause data loss but generally not cause equipment damage
disk controller
expansion slot
compromised computer
undervoltage
15. Extends the capabilites of a browser.
plug- in
cold boot
streaming cam
OMR
16. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
density
optical reader
L2 cache
digital signature
17. An instruction that causes a program to perform a specific action.
worm
commands
message board
bus network
18. A colection of individual programs available together as a unit. lower cost and ease of use
IrDA Port
EDI
digital modem
software suite
19. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
script kiddie
Bay
pipelining
20. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
port
RFID
Storage Media
CAM
21. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
File compression utility
Web Application
cyberextortionist
DIMM
22. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
spyware
DSL
Netbook
system on a chip
23. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
Mobile Device
Top level domain
spoofing
DNS Server
24. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
OSP
Transmission media
Web Server
IM
25. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
Desktop Computer
rootkit
ROM
Linux
26. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
parallel processing
pipelining
wireless access point
driver
27. Dual inline memory module forms two sets of contact
adware
supercomputer
DIMM
disk cleanup
28. They can execute more than one instruction per clock cycle
ring network
proprietary software...
communications
superscalar
29. Joins a cable and a port
analog
drive bay
connector
backside bus
30. Mathematical formula that generates a code from the contents of the message
sending device
hash
fiber optic cable
transistor
31. Allows the processor to communicate with peripherals.
expansion bus
Content Aggregator
density
Input
32. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
optical reader
Trojan Horse
optical mouse
trackball
33. Dish shaped antenna for internet connection
fixed wireless
L1 cache
telemedicine
CERT/CC
34. Screen savors were made to prevent this - which etched images permanently onto the screen
overvoltage
ghosting
heat sink
payload
35. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Processor
utility programs
nonvolatile memory
neural network
36. Storage over an internet service
traffic
hibernate
Web Application
cloud storage
37. Contains many microscopic pathways capable of carrying an electrical current
integrated circuit
communications channel
Notebook Computer
ergonomics
38. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
router
expansion slot
ring network
Denial of Service attack
39. Used to track and identify the location of high risk or high value items.
botnets
RTLS
bus
MRAM
40. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
node
DRAM
undervoltage
buffer
41. A computer that delivers requested web pages to your computer
broadband
server
Web Server
compromised computer
42. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
Dial Up line
SMTP
CAPTCHA
hot spot
43. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
pipelining
coaxial cable
Web Browser
RFID
44. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
cluster
System Software...
MAN
45. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
optical mouse
NAS
DTP
traffic
46. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
jack
trackball
Domain name
virus
47. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
register
microbrowser
Web Server
48. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
E- commerce
server
device dependant
solid state media
49. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
digital signature
platter
ASCII
honeypot
50. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
spooling
CMOS
streaming
Point of Sale terminals