SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who uses internet to destroy or damage computers for political reasons.
cyberextortionist
web filter
Memory
cyberterrorist
2. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
DIMM
product activation
Software...
downloading
3. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
payload
WAN
video card
dot matrix printer
4. Consists of electronic components that store instructions waiting to be executed (On motherboard)
peer to peer network
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
compromised computer
Memory
5. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
SMTP
Mainframe
RFID
token ring
6. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
adapter cards
VoIP
peer to peer network
7. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
Linux
MAN
ethernet
Web conference
8. A program that hides in a computer and allows someone from a remote location to take control of the computer
rootkit
Operating system
Storage Device
proxy server
9. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
device independent
gender changer
image processing
capacity
10. The design of computers - devices - and media in the network
IM
formatting
document management software...
network architecture
11. Provide Wi Fi to mobile computers or devices
Hot spots
cross - platform
superscalar
VR
12. Human speech is bc of its continous signal that vary in strength and quality
worm
analog
kernal
Dial Up line
13. Serves as the interface between the user - the app software - and the computers hardware
bugs
bus width
VR world
system software...
14. Rambus inline memory module house RDRAM chips
RIMM
bus width
server
system on a chip
15. Combines several GIF images ina single GIF file.
device independent
animated Gif...
OCR
expansion slot
16. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
firmware...
Noise
kernal
Desktop Computer
17. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
IrDA Port
cyberextortionist
software suite
DIMM
18. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
expansion slot
script kiddie
disk controller
Content Aggregator
19. The delivery of education via some electronic method such as the internet - networks - or optical disks.
e- learning
peripheral
program
SMTP
20. Transmission media on which the data - instructions - information travel.
communications channel
http
botnets
unauthorized access
21. Can be peropheral or chip - creates sound from digital instructions.
mashup
synthesizer
DRAM
port
22. Internet connections using regular copper telephone lines.
hard disk
DSL
digital signature
E- commerce
23. Operating system on mobile devices that generally resides on ROM
optical reader
embedded operating system
communications channel
player
24. Smaller than heat sink cools processors in notebook comps
OSP
Operating system
heat pipe
video card
25. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
supercomputer
VR world
freeware...
hypermedia
26. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
warm boot
VAN
CERT/CC
access control
27. One or more computers on the network request services from the server. 10 or more computers
heat sink
unauthorized access
client/server
ethernet
28. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
RSS 2.0
wireless modem
network license
VR world
29. Major carriers of network traffic
Internet Backbone
sending device
worm
utility program
30. The use of computer or network with out permission
e- learning
Motherboard
unauthorized access
Output
31. Sends digital data and info from a comp to a DSL line
DSL modem
POST
document management software...
motherboard
32. Graphical User interface - interact with software using text - graphics - and icons
GUI
drive bay
Software...
Processor
33. Single chip with two or more processor cores.
network card
product activation
multi- core processor
sleep mode
34. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
network standard
utility program
analog
ARPA
35. Privately owned and limited to a specific vendor or computer model.
sleep mode
proprietary software...
MAN
System Software...
36. Transmits data via infared light waves.. Both computer and device must have the port for it to work
VAN
system unit
shareware...
IrDA Port
37. Internet Service Provider- a regional or national access provider
rootkit
ISP
hard disk
adware
38. Screen savors were made to prevent this - which etched images permanently onto the screen
ghosting
mashup
pointing stick
dot matrix printer
39. Obtains data directly at the location where the transaction or event takes place.
Bluetooth
cluster
terminal
data collection device
40. Holds one or more disk drives
downloading
drive bay
sending device
FireWire port
41. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
ARPA
network
CPU
terminal
42. Copyrighted software provided at no cost by company that retains all rights to software
client
TCP/IP
freeware...
expansion bus
43. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
air mouse
Communications device
POST
IM
44. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
download
connector
IM
proxy server
45. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
solid state drive
recieving device
IM
macros
46. Enahnces the sound generating capabilites of a personal computer
disk fragmenter
register
online security service
sound card
47. Any data or instructions entered into the memory of the computer
Trojan Horse
cross - platform
Domain name
Input
48. Small capacity built directly in the processor chip
spider
L1 cache
Intrusion detection software...
supercomputer
49. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
digital forensics
hacker
utility programs
communications channel
50. Processor begins to fetch a second instruction before it completes the full machine cycle
GPU
botnets
pipelining
firmware...