SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The role of memory to store both data and programs
stored program concept
disk controller
RAM
Web conference
2. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
token ring
Notebook Computer
hot spot
image processing
3. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
DSL
certificate authority
BIOS
EULA
4. ...
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
stored program concept
device dependant
spider
5. Provids mobile users with a secure connection to the company server as if the user has a private line.
virtual provate network
GPU
sound card
digital forensics
6. Broadband modem- sends and recives digital data over the cable television
cable modem
ARPA
ethernet
SMTP
7. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
overvoltage
TLS
touchpad
business software...
8. The process if a computer or device recieveing info info from the server on the internet
downloading
parallel processing
machine cycle
broadband
9. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
cyberextortionist
download
Mainframe
undervoltage
10. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Top level domain
utility program
Servers
Dial up modems
11. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
E- commerce
hibernate
Personal Computers
document management software...
12. CA resposible for giving out digital certificate
VR world
communications
downloading
certificate authority
13. Company that provides wireless internet access to computers
L2 cache
wireless Internet service provider
download
address
14. Contains 10 or fewer comps - with similar reponsibilities and capabilities
protocol
peer to peer network
hypertext
PIM
15. Copyrighted software that is distributed at no cost for a trial period
database
shareware...
VR world
certificate authority
16. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
File compression utility
adapter card
trackball
hot spot
17. Any unwanted signal usually varying quickly
corporate spies
Noise
network card
DSL
18. A rectangular opeining that typically holds disk drives.
Drive Bay
air mouse
bit
nonvolatile memory
19. Screen savors were made to prevent this - which etched images permanently onto the screen
Bluetooth
commands
digital certificate
ghosting
20. Short for key generator creats software registration numbers and sometimes activation codes.
bandwidth
online auction
plaintext
keygen
21. A vulnerable computer that is set up to entice an intruder to break into it.
Dial Up line
hibernate
streaming cam
honeypot
22. A program that restricts access to certain material on the web
Motherboard
web filter
memory module
shareware...
23. Used to gain competitive advantage
network standard
corporate spies
UNIX
synthesizer
24. Transmission media on which the data - instructions - information travel.
Top level domain
communications channel
fault tolerant computer
software suite
25. A temporary connection that uses one or more analog telphone lines for communications.
recieving device
botnets
Dial Up line
SIMM
26. Hypertext transfer protocol
microbrowser
http
MAN
e- learning
27. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
streaming
Terminal
NAS
28. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
communications
online security service
utility program
DVI
29. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
cloud storage
Latency
disk fragmenter
CPU
30. Dynamic ram- chips must be re energized constantly or they lose their contents.
Memory
DRAM
cracker
gender changer
31. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
plug- in
virus signature
Servers
Dial Up line
32. When businesses use the internet to sell products
Servers
mpeg
DSL
E- retail
33. Used to track and identify the location of high risk or high value items.
pixel
chat client
RTLS
EDI
34. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
Memory
IM
DVI
RAID
35. Uses devices that emit and sense light to detect the mouses movement
document management software...
Web conference
Storage Media
optical mouse
36. A computer that delivers requested web pages to your computer
SMTP
L2 cache
device independent
Web Server
37. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
proprietary software...
Operating system
digital
38. Cables - telephone lines - radio networks - satellites
Transmission media
stylus
network card
EFT
39. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
solid state drive
fault tolerant computer
Web Application
hacker
40. A small flat rectangular pointing device that is sensitive to pressure and motion.
Mobile Computer
Latency
access control
touchpad
41. A window that provides info - presents availabe options - or requests a response.
dialog box
http
bugs
network architecture
42. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
token ring
Dial up modems
System Unit
Content Aggregator
43. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
spyware
bugs
ethernet
ghosting
44. The discovery - collection adn analysis of evidence found on computers and networks
tactile output
Fiber to the Premises
neural network
digital forensics
45. Fetching - decoding - executing - storing
communications channel
neural network
Operating system
machine cycle
46. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
drive bay
cloud storage
USB port
back door
47. A socket in the motherboard that can hold an adapter card
http
CAPTCHA
expansion slot
DSL
48. The smallest unit of disk space that stores data and info
wordwrap
TLS
cluster
pixel
49. May break in to computer to exploit security weakness. financial gains - revenge.
dot matrix printer
cold boot
unethical employees
device dependant
50. All computers connected to central device. Hub or switch
E- commerce
Noise
star network
RAM