SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
GPU
utility program
system bus
botnets
2. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
chat client
Linux
embedded operating system
VR
3. Method that the internet uses to store domain names and their corressponding IP addresses
sending device
crimeware
Domain name system
SMTP
4. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
DSL
adapter cards
Top level domain
5. Internet teephony- enables users to speak to other users over the internet
Top level domain
communications channel
VoIP
client
6. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
spooling
image processing
token ring
peer to peer network
7. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
ARPA
hacker
freeware...
memory module
8. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
network topology
spoofing
project management software...
adware
9. Can be peropheral or chip - creates sound from digital instructions.
streaming cam
synthesizer
CPU
spooling
10. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
player
Input
utility programs
chasis...
11. Digital light processor uses tiny mirrors to reflect light
DLP projector
air mouse
gender changer
Mobile Device
12. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
router
port
access time
compromised computer
13. A small metal or plastic device that uses pressure instead of ink.
stylus
Content Aggregator
Motherboard
Input
14. Short for key generator creats software registration numbers and sometimes activation codes.
cross - platform
driver
volatile memory
keygen
15. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
Operating system
volatile memory
online auction
shareware...
16. Accepts the transmission of data - instructions - or info
recieving device
scanner
Domain name
MMS
17. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
ciphertext
expansion slot
cluster
port
18. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
hibernate
hypermedia
overvoltage
optical disc
19. Circuit boards tjay provide connections and functions not built into the motherboard
machine cycle
adapter cards
GUI
pixel
20. Joins a cable and a port
CMOS
trackball
connector
Operating system
21. A personal computer you can carry from place to place
Mobile Computer
port
terminal
compromised computer
22. Other computers and mobile devices on the networ that rely on the server for its resources
Dial up modems
system software...
connector
client
23. Cables - telephone lines - radio networks - satellites
Transmission media
Operating system
botnets
Trojan Horse
24. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
adapter cards
firmware...
RTLS
hypermedia
25. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
MICR
RFID
plaintext
Operating system
26. Graphic file (JPEG - GIF) slowly replacing GIF
kernal
PNG
hot plugging
proprietary software...
27. Designed for mobile devices
image processing
IP address
microbrowser
Home user
28. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
e- learning
optical reader
scanner
kernal
29. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
CPU
multifunction peripheral
Operating system
30. Contains many microscopic pathways capable of carrying an electrical current
CAPTCHA
integrated circuit
adware
plaintext
31. Provids mobile users with a secure connection to the company server as if the user has a private line.
Web conference
virtual provate network
downloading
plaintext
32. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
DSL modem
DSL
VAN
VR
33. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
project management software...
digital signature
Communications device
mpeg
34. Program that euns only on a specific type or make of computer
device dependant
MAN
Motherboard
shareware...
35. Any data or instructions entered into the memory of the computer
Motherboard
star network
Input
preemptive multitasking
36. Enahnces the sound generating capabilites of a personal computer
system bus
trackball
sound card
IrDA Port
37. Communications activity. Handled by NSFnet.
unethical employees
traffic
network card
groupware...
38. A rectangular opeining that typically holds disk drives.
Mobile Device
Drive Bay
W3C
cyberextortionist
39. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
digital
liquid flow technology
microbrowser
BIOS
40. An instruction that causes a program to perform a specific action.
commands
DNS Server
plug- in
wireless modem
41. Is a security measure that defines who can access it and what actions they can take while acessing the computer
fixed wireless
access control
DNS Server
stored program concept
42. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
VR world
Mobile Device
peripheral
43. Software used by criminals
EFT
Web conference
Internet Backbone
crimeware
44. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
RSS 2.0
expansion bus
MRAM
fiber optic cable
45. May break in to computer to exploit security weakness. financial gains - revenge.
proprietary software...
motherboard
tactile output
unethical employees
46. System board- is the main circuit board of the system unit.
MAN
motherboard
bus network
capacity
47. Screen savors were made to prevent this - which etched images permanently onto the screen
spyware
ghosting
business software...
site license
48. A collection of computers and devices connected together - via communications devices and transmissions media.
CERT/CC
Notebook Computer
BIOS
network
49. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
stylus
mpeg
Memory
biometrics
50. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
port
wireless modem
heat sink
worm