SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
Application software...
spooling
optical reader
DSL modem
2. Consumer consumer e commerce.
online auction
system unit
noise
hypermedia
3. The discovery - collection adn analysis of evidence found on computers and networks
solid state media
digital forensics
digital certificate
register
4. Personal information manager is application software that includes features to help users organize personal info
sound card
PIM
MAN
GPU
5. Federally funded internet security research and development center
e- learning
Domain name
CERT/CC
botnets
6. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
player
RTLS
USB hub
Internet Backbone
7. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
Linux
OCR
DNS Server
digital modem
8. Is a security measure that defines who can access it and what actions they can take while acessing the computer
air mouse
Application software...
heat sink
access control
9. Special software to listen to audio
system clock
business software...
cyberextortionist
player
10. They can execute more than one instruction per clock cycle
superscalar
disk cleanup
cyberterrorist
access control
11. The design of computers - devices - and media in the network
Servers
System Unit
DSL modem
network architecture
12. The number of bits in an area on a storage medium - Higher density means more storage capacity
unauthorized access
W3C
RSS 2.0
density
13. A legal agreement that permits users to install the software on multiple computers.
Bay
site license
buffer
MMS
14. A unique number that identifies the location of a byte in memory
address
port
drive bay
program
15. A device that enables you to join a port and a connector that are both male or female
Noise
gender changer
terminal
Drive Bay
16. Internet teephony- enables users to speak to other users over the internet
VoIP
Memory
utility program
cold boot
17. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
address
undervoltage
Denial of Service attack
CU
18. Pressure sensitive eraser shaped pointing device
botnets
broadband
Bluetooth
pointing stick
19. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
digital signature
NAS
plug- in
chasis...
20. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
sleep mode
ethernet
cracker
certificate authority
21. Used to track and identify the location of high risk or high value items.
crimeware
Domain name system
phishing
RTLS
22. CA resposible for giving out digital certificate
certificate authority
public- domain software...
SRAM
Top level domain
23. A communications device that sends and recieves data and info to and from digital line
pointing stick
pretty good Privacy
animated Gif...
digital modem
24. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
CAPTCHA
fiber optic cable
chasis...
power supply
25. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
animated Gif...
coaxial cable
network standard
superscalar
26. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
volatile memory
honeypot
cyberextortionist
bugs
27. On the motherboard hold memory modules
Internet Backbone
memory slots
ring network
ergonomics
28. Computer automatically can configure adapter cards and other peripherals as you install them
broadband
hypertext
Plug and Play
DIMM
29. Case of the system unit to protect internal damage
DTP
thread
Memory
chasis...
30. Uses fiber optic cable for internet connection.
Fiber to the Premises
GUI
Desktop Computer
chat client
31. Determines the number of bits that can be transmitted at one time
network
Bay
USB hub
bus width
32. A set of programs that coordinates all of the activies among computer hardware devices.
multi- core processor
Operating system
tactile output
cyberextortionist
33. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
digital forensics
twisted pair cable
document management software...
VR world
34. A temporary connection that uses one or more analog telphone lines for communications.
IM
Operating system
Dial Up line
chat client
35. Transmission media on which the data - instructions - information travel.
OCR
virus signature
communications channel
broadband
36. The number of bytes a storage medium can hold
image processing
capacity
sleep mode
liquid flow technology
37. The smallest unit of disk space that stores data and info
ALU
RTLS
platter
cluster
38. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
router
memory module
kernal
scanner
39. Copyrighted software provided at no cost by company that retains all rights to software
web filter
recieving device
freeware...
Point of Sale terminals
40. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
wireless modem
download
jewel box
fiber optic cable
41. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
IM
OSP
cross - platform
buffer
42. Contains 10 or fewer comps - with similar reponsibilities and capabilities
peer to peer network
newsgroup
CPU
biometrics
43. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
SRAM
W3C
OCR
hot plugging
44. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
streaming
E- commerce
WAN
Operating system
45. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
OSP
TCP/IP
DVI
web filter
46. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Drive Bay
Storage Media
hot plugging
audit trail
47. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
tactile output
access time
bus width
telemedicine
48. The amount of data - instructions - and information that can travel over communications channel
bandwidth
byte
Home user
PNG
49. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
backside bus
multifunction peripheral
ethernet
biometrics
50. Other computers and mobile devices on the networ that rely on the server for its resources
client
Dial Up line
mashup
Mobile Computer