SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
cracker
802.11
DSL
undervoltage
2. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
superscalar
botnets
ARPA
Operating system
3. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
DSL
spyware
video card
Dedicated line
4. Most computers (on and off)
OMR
digital
optical mouse
POP3
5. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
Dial- up access
site license
Top level domain
turnaround document
6. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
MAN
mpeg
802.11
MICR
7. Any data or instructions entered into the memory of the computer
Input
audit trail
motherboard
touchpad
8. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
parallel processing
Input
SMTP
adware
9. 8 bits grouped together. basic storage unit in memory. Each byte has an address
DIMM
compromised computer
TLS
byte
10. Two main parts are processor and memory.
byte
Motherboard
VR world
botnets
11. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
overvoltage
Desktop Computer
commands
Memory
12. Transmission media on which the data - instructions - information travel.
dialog box
communications channel
ROM
density
13. Privately owned and limited to a specific vendor or computer model.
DRAM
Dial- up access
communications
proprietary software...
14. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
virus
document management software...
hard disk
analog
15. Dish shaped antenna for internet connection
system software...
fixed wireless
Memory
Input
16. Provids mobile users with a secure connection to the company server as if the user has a private line.
ROM
Web Application
phishing
virtual provate network
17. Holds one or more disk drives
Netbook
System Software...
drive bay
hypermedia
18. A system that attempts to imitate the behavior of a human brain.
address
CU
neural network
Netbook
19. Dual inline memory module forms two sets of contact
bugs
dot matrix printer
DIMM
peer to peer network
20. Software used by criminals
network topology
VoIP
crimeware
virus
21. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
firmware...
image processing
chasis...
fiber optic cable
22. When turning on a computer that has been turned off completly
CERT/CC
cold boot
hibernate
memory slots
23. A personal computer you can carry from place to place
Mobile Computer
program
transistor
digital signature
24. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
Fiber to the Premises
Denial of Service attack
Content Aggregator
DTP
25. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
IM
VR world
product activation
PNG
26. Graphics processing unit controls the manipulation and display of graphics on the display device.
cloud storage
Output
hard disk
GPU
27. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
hypertext
hacker
DNS Server
telemedicine
28. May break in to computer to exploit security weakness. financial gains - revenge.
twisted pair cable
Storage Media
traffic
unethical employees
29. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
sending device
MAN
EULA
mashup
30. A type of always on connection that is established between two communications devices. better than dial up line
database
Dedicated line
PIM
disk cleanup
31. A case that contains electronic components of the computer used to process data.
corporate spies
system unit
optical reader
drive bay
32. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Firewall
hibernate
dialog box
coaxial cable
33. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
ergonomics
WAN
address
gender changer
34. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
memory slots
protocol
peripheral
payload
35. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
communications channel
NAS
platter
multifunction peripheral
36. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
heat pipe
mpeg
cluster
Content Aggregator
37. PGP an encryption program
chip
pretty good Privacy
USB port
air mouse
38. A rectangular opeining that typically holds disk drives.
Processor
Drive Bay
proprietary software...
cracker
39. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
DTP
system software...
density
40. Builds and maintains lists of words found on websites. Useful for search engines
spider
E- retail
Memory
USB hub
41. Someone who accesses a computer or network illegally. Some say they hack to improve security
server
hacker
stylus
Desktop Computer
42. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
hypertext
program
dot matrix printer
script kiddie
43. CA resposible for giving out digital certificate
certificate authority
bus
commands
pixel
44. Small program that tells the operating system how to communicate with a specific device
Noise
driver
UNIX
Linux
45. World wide web consortium oversees research and sets standards for many areas of the internet
Web conference
W3C
terminal
supercomputer
46. Does not require a newsreader - easier to use than a newsgroup
cracker
Linux
cross - platform
message board
47. Obtains data directly at the location where the transaction or event takes place.
proprietary software...
RSS 2.0
data collection device
network license
48. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
DSL
access time
http
e- learning
49. Instead of port - jack is used to identify audio or video ports.
undervoltage
jack
web filter
tactile output
50. Broadband modem- sends and recives digital data over the cable television
machine cycle
cable modem
site license
dialog box