SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone who accesses a computer or network illegally. Some say they hack to improve security
business software...
access time
optical mouse
hacker
2. Single chip with two or more processor cores.
multi- core processor
system bus
Domain name system
Firewall
3. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
image processing
network license
RSS 2.0
parallel processing
4. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
superscalar
DRAM
system on a chip
5. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
nonvolatile memory
disk controller
air mouse
EDI
6. The code of acceptable behaviors users should follow while on the internet.
overvoltage
Top level domain
Netiquette
machine cycle
7. Determines the number of bits that can be transmitted at one time
digital
bus width
ARPA
cloud storage
8. Cables - telephone lines - radio networks - satellites
CERT/CC
Transmission media
unauthorized access
certificate authority
9. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Firewall
coaxial cable
cross - platform
telesurgery
10. Company that provides wireless internet access to computers
power supply
IrDA Port
wireless Internet service provider
Top level domain
11. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
TLS
traffic
Trojan Horse
undervoltage
12. Program that euns only on a specific type or make of computer
Transmission media
DRAM
device dependant
system clock
13. Broadband modem- sends and recives digital data over the cable television
cable modem
VR
defragmenting
RSS 2.0
14. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
router
Drive Bay
density
hibernate
15. Local area network- network tat connects computers and devices in a limited geographical area such as a home
compromised computer
EDI
DSL
LAN
16. Needed generally to participate in a newsgroup
newsreader
cracker
chip
corporate spies
17. PGP an encryption program
pretty good Privacy
mpeg
bus width
port
18. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
broadband
Dial- up access
image processing
19. Optical mark recognition reads hand drawn marks such as circles or rectangles.
OMR
broadband
CMOS
online security service
20. Serves as the interface between the user - the app software - and the computers hardware
disk controller
system on a chip
system software...
unethical employees
21. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Storage Media
Operating system
DLP projector
download
22. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
video card
MAN
scanner
newsreader
23. Computer aided design software assists a professional user in creating designs
CAD
Content Aggregator
hibernate
Motherboard
24. Instead of port - jack is used to identify audio or video ports.
honeypot
digital signature
jack
tactile output
25. May break in to computer to exploit security weakness. financial gains - revenge.
web filter
PNG
unethical employees
registrar
26. A web application that combines services from two or more sources creating a new application.
mpeg
parallel processing
EFT
mashup
27. Special software to listen to audio
player
Servers
system bus
parallel processing
28. A window that provides info - presents availabe options - or requests a response.
phishing
wordwrap
cyberterrorist
dialog box
29. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
protocol
disk fragmenter
ring network
DNS Server
30. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
Point of Sale terminals
nonvolatile memory
adware
server
31. Integrates the functions of a processor - memory and a video card on a single chip.
hash
Bay
system on a chip
preemptive multitasking
32. A type of always on connection that is established between two communications devices. better than dial up line
star network
supercomputer
Dedicated line
drive bay
33. Retains existing application software and data files even if you can change computer models or vendors
connector
CERT/CC
device independent
MMS
34. Power on self test to check the various system components and the results are compared with data in a CMOS chip
unethical employees
POST
access time
MMS
35. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
system software...
coaxial cable
star network
sleep mode
36. They consist entirely of electronic components and contain no moving parts.
fixed wireless
solid state media
network standard
Storage Device
37. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
worm
IM
Denial of Service attack
power supply
38. Fetching - decoding - executing - storing
machine cycle
Netiquette
database
PNG
39. The role of memory to store both data and programs
RFID
digital forensics
L1 cache
stored program concept
40. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
virus
VAN
PIM
backside bus
41. A document that you return to the company that creates and sends it.
turnaround document
sleep mode
DSL modem
video card
42. A notcie that guarantees a user or web site is legit. E- commerce use it often
digital certificate
cluster
superscalar
LAN
43. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
capacity
worm
bus
http
44. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
Intrusion detection software...
Laser printer
application software...
digital signature
45. The amount of data - instructions - and information that can travel over communications channel
expansion bus
twisted pair cable
bandwidth
gender changer
46. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
Web Browser
nonvolatile memory
Top level domain
Bluetooth
47. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
hot plugging
power supply
parallel processing
Mobile Computer
48. A communications device that sends and recieves data and info to and from digital line
digital modem
business software...
jack
tactile output
49. Combines several GIF images ina single GIF file.
ROM
port
animated Gif...
GPU
50. An instruction that causes a program to perform a specific action.
jewel box
commands
utility programs
system unit