SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
File compression utility
802.11
shareware...
2. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
CERT/CC
cold boot
TLS
peripheral
3. World wide web consortium oversees research and sets standards for many areas of the internet
unethical employees
Mobile Device
hibernate
W3C
4. They consist entirely of electronic components and contain no moving parts.
solid state media
node
LAN
capacity
5. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
platter
spider
commands
adapter cards
6. A program that restricts access to certain material on the web
web filter
hibernate
SIMM
fiber optic cable
7. The number of bytes a storage medium can hold
capacity
site license
ARPA
newsgroup
8. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
System Unit
Transmission media
bugs
application software...
9. Saves any open docs or programs to hardisk before removing power
pretty good Privacy
hibernate
disk controller
payload
10. Computer automatically can configure adapter cards and other peripherals as you install them
microbrowser
supercomputer
Plug and Play
CERT/CC
11. Device with a monitor - keyboard - and memory
E- retail
business software...
client
Terminal
12. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
multifunction peripheral
network
wireless modem
document management software...
13. The code of acceptable behaviors users should follow while on the internet.
Domain name
Netiquette
Transmission media
integrated circuit
14. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
player
Bluetooth
bus
15. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
sending device
DLP projector
Storage Media
telesurgery
16. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
business software...
communications channel
CAPTCHA
multifunction peripheral
17. Type of notebook comp that is smaller and less powerful than a normal notebook comp
payload
Netbook
Hot spots
unauthorized access
18. Transmits data via infared light waves.. Both computer and device must have the port for it to work
Dedicated line
IrDA Port
star network
node
19. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
honeypot
digital forensics
Intrusion detection software...
access time
20. Local area network- network tat connects computers and devices in a limited geographical area such as a home
optical mouse
LAN
motherboard
communications channel
21. Two or more computers transfer data - instructions - and information.
project management software...
communications
rootkit
utility program
22. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
virus
cyberextortionist
multi- core processor
Communications device
23. The discovery - collection adn analysis of evidence found on computers and networks
digital forensics
superscalar
digital certificate
ethernet
24. Computing device small enough to hold in your hand
Mobile Device
pipelining
proprietary software...
Top level domain
25. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
drive bay
phishing
data collection device
26. The destructive event or prank the program intended to deliver
payload
system software...
Web Browser
DSL modem
27. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
hypermedia
cracker
adware
peer to peer network
28. Builds and maintains lists of words found on websites. Useful for search engines
platter
Transmission media
spider
project management software...
29. Online service provider- has many members features along with internet access such as IM or Web browsers.
adware
OSP
pretty good Privacy
application software...
30. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
Mobile Computer
nonvolatile memory
back door
EDI
31. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
kernal
preemptive multitasking
VAN
hypermedia
32. 8 bits grouped together. basic storage unit in memory. Each byte has an address
online security service
VAN
byte
pretty good Privacy
33. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
Netbook
wireless modem
turnaround document
ergonomics
34. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
router
program
download
coaxial cable
35. A socket in the motherboard that can hold an adapter card
register
Memory Cache
expansion slot
plug- in
36. Protective case for optical discs
telesurgery
jewel box
worm
RTLS
37. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
driver
online auction
Personal Computers
warm boot
38. Initiates an instruction to transmit data - instructions - or information.
superscalar
UNIX
sending device
player
39. A window that provides info - presents availabe options - or requests a response.
spyware
drive bay
adware
dialog box
40. Controls timing of all computer operations
system clock
streaming cam
peer to peer network
IP address
41. An instruction that causes a program to perform a specific action.
unethical employees
twisted pair cable
commands
capacity
42. Consumer consumer e commerce.
drive bay
online auction
Application software...
pretty good Privacy
43. Can be peropheral or chip - creates sound from digital instructions.
DIMM
synthesizer
CAPTCHA
DSL modem
44. Any unwanted signal usually varying quickly
cross - platform
Noise
script kiddie
formatting
45. Retains existing application software and data files even if you can change computer models or vendors
device independent
Memory Cache
SRAM
DSL
46. Storage over an internet service
cloud storage
Trojan Horse
MICR
botnets
47. All computers connected to central device. Hub or switch
newsgroup
star network
Mobile Computer
worm
48. Has the illusion of moving images becuase it sends a continuos stream of images
unethical employees
GPU
RIMM
streaming cam
49. Searches for and removes unneccessary files
Point of Sale terminals
disk cleanup
IM
UNIX
50. Uses devices that emit and sense light to detect the mouses movement
optical mouse
address
access time
Dial Up line