SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Saves any open documents and programs to RAM and places computer into a low power state
ghosting
streaming cam
sleep mode
animated Gif...
2. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
Intrusion detection software...
web filter
sound card
DVI
3. Links in text based documents
wireless modem
fault tolerant computer
hypertext
spooling
4. Can be peropheral or chip - creates sound from digital instructions.
botnets
proxy server
synthesizer
touchpad
5. Electrical supply drops.can cause data loss but generally not cause equipment damage
communications
player
GPU
undervoltage
6. The design of computers - devices - and media in the network
worm
sound card
product activation
network architecture
7. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
parallel processing
fiber optic cable
CPU
fixed wireless
8. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
broadband internet service
Netbook
Web Browser
solid state drive
9. Circuit boards tjay provide connections and functions not built into the motherboard
Dial up modems
adapter cards
motherboard
certificate authority
10. Other computers and mobile devices on the networ that rely on the server for its resources
client
freeware...
DVI
Personal Computers
11. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
thread
TLS
hacker
twisted pair cable
12. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
Personal Computers
WAN
network topology
fault tolerant computer
13. The discovery - collection adn analysis of evidence found on computers and networks
IM
digital forensics
product activation
client/server
14. A unique number that identifies the location of a byte in memory
Desktop Computer
terminal
ISP
address
15. Is a security measure that defines who can access it and what actions they can take while acessing the computer
cyberextortionist
network standard
LAN
access control
16. Reorganizing it so that the files are store in continous sectors
Operating system
liquid flow technology
defragmenting
fault tolerant computer
17. The amount of data - instructions - and information that can travel over communications channel
script kiddie
RIMM
bandwidth
virus
18. The role of memory to store both data and programs
Bluetooth
OMR
Internet Backbone
stored program concept
19. Loses its contents when power is turned off (RAM)
volatile memory
network architecture
DIMM
heat sink
20. Provide Wi Fi to mobile computers or devices
Mainframe
DTP
Hot spots
Operating system
21. A colection of individual programs available together as a unit. lower cost and ease of use
software suite
power supply
disk controller
message board
22. Searches for and removes unneccessary files
Top level domain
port
disk cleanup
biometrics
23. Someone who uses internet to destroy or damage computers for political reasons.
motherboard
WAN
Operating system
cyberterrorist
24. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
streaming cam
disk controller
botnets
twisted pair cable
25. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
OSP
jewel box
Memory Cache
SMTP
26. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
streaming
back door
digital modem
fixed wireless
27. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
cyberextortionist
communications
System Unit
Laser printer
28. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
parallel processing
newsreader
traffic
Memory
29. They can execute more than one instruction per clock cycle
system clock
superscalar
Memory
Noise
30. Type of notebook comp that is smaller and less powerful than a normal notebook comp
nonvolatile memory
digital
Netbook
Netiquette
31. A family member on a computer
tactile output
network standard
Home user
hot plugging
32. Donated for public use has no copyright restrictions
pointing stick
network topology
cold boot
public- domain software...
33. A number that uniquely identifies each computer or device connected to the internet (0-255)
neural network
E- retail
IP address
IrDA Port
34. The destructive event or prank the program intended to deliver
Information system
System Software...
payload
noise
35. Wide area network is a network that covers a large geographic area such as a city - country - or world. The internet is the biggest
Information system
corporate spies
WAN
multifunction peripheral
36. Federally funded internet security research and development center
CERT/CC
Processor
fixed wireless
802.11
37. Optical mark recognition reads hand drawn marks such as circles or rectangles.
OMR
machine cycle
MRAM
bus network
38. Perpetrator attempts to obtain your personal or financial info.
bugs
phishing
online security service
Hot spots
39. Privately owned and limited to a specific vendor or computer model.
proprietary software...
VoIP
spider
protocol
40. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
802.11
byte
network topology
CAM
41. Graphic file (JPEG - GIF) slowly replacing GIF
Home user
site license
UNIX
PNG
42. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
chasis...
bus
product activation
web filter
43. Graphical User interface - interact with software using text - graphics - and icons
chat client
GUI
Laser printer
address
44. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
Operating system
SRAM
IP address
PNG
45. Acts as an electronic switch that opens or closes the circuit for electrical charges
newsreader
IM
transistor
spooling
46. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Servers
client
server
Domain name
47. Internet Service Provider- a regional or national access provider
client
utility programs
ISP
backside bus
48. The use of computer or network with out permission
unauthorized access
ROM
capacity
spooling
49. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
site license
heat sink
spoofing
memory slots
50. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
connector
NAS
analog
MAN