SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
supercomputer
spoofing
microbrowser
heat pipe
2. Internet Service Provider- a regional or national access provider
DSL modem
firmware...
Domain name system
ISP
3. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
adapter card
digital certificate
download
Home user
4. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Software...
hypertext
spider
program
5. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
PNG
network
Memory
nonvolatile memory
6. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
device independent
warm boot
Dedicated line
density
7. Contain permanently writeen data - instructions - and information
Operating system
firmware...
unauthorized access
wordwrap
8. Controls timing of all computer operations
IM
Communications device
connector
system clock
9. Online service provider- has many members features along with internet access such as IM or Web browsers.
node
OSP
analog
air mouse
10. Optical mark recognition reads hand drawn marks such as circles or rectangles.
OMR
Operating system
plug- in
bit
11. Serves as the interface between the user - the app software - and the computers hardware
client/server
system software...
wireless modem
pixel
12. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
access time
Web Application
worm
macros
13. Searches for and removes unneccessary files
system software...
Top level domain
disk cleanup
Domain name
14. Moving pictures experts group is a popular video compression standard
client
Fiber to the Premises
gender changer
mpeg
15. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
online security service
ARPA
microbrowser
disk fragmenter
16. Encrypted data
ciphertext
groupware...
File compression utility
video card
17. A device that enables you to join a port and a connector that are both male or female
bit
cluster
solid state drive
gender changer
18. A vulnerable computer that is set up to entice an intruder to break into it.
streaming cam
plaintext
EDI
honeypot
19. Hides within or looks like a legitimate program such as a screen saver
newsgroup
network
Trojan Horse
token ring
20. A collection of computers and devices connected together - via communications devices and transmissions media.
terminal
broadband
network
machine cycle
21. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
ciphertext
thread
cable modem
22. Circuit boards tjay provide connections and functions not built into the motherboard
document management software...
RFID
Home user
adapter cards
23. Single chip with two or more processor cores.
telemedicine
multi- core processor
PIM
bugs
24. A system that attempts to imitate the behavior of a human brain.
analog
byte
bus network
neural network
25. A socket in the motherboard that can hold an adapter card
expansion slot
animated Gif...
ergonomics
MICR
26. Is a security measure that defines who can access it and what actions they can take while acessing the computer
Home user
proxy server
liquid flow technology
access control
27. A web application that combines services from two or more sources creating a new application.
Memory
E- commerce
mashup
peer to peer network
28. Picure messaging can occur from mobile to mobile and mobile to email
router
MMS
OSP
proxy server
29. A number that uniquely identifies each computer or device connected to the internet (0-255)
digital
IP address
http
chip
30. Computer automatically can configure adapter cards and other peripherals as you install them
Information system
Plug and Play
ring network
Top level domain
31. A family member on a computer
Web Server
CAD
heat sink
Home user
32. Cables - telephone lines - radio networks - satellites
Transmission media
bus network
Bay
Personal Computers
33. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
Netiquette
EULA
Memory
software suite
34. Perpetrator attempts to obtain your personal or financial info.
ciphertext
EFT
embedded computer
phishing
35. Continues to operate when one of its components fails - ensuring that no data is lost
network license
formatting
fault tolerant computer
Firewall
36. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
disk cleanup
system on a chip
TCP/IP
network card
37. Reorganizing it so that the files are store in continous sectors
defragmenting
CAM
Notebook Computer
ghosting
38. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
buffer
network
ergonomics
Operating system
39. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
Linux
broadband
business software...
certificate authority
40. Transmits data via infared light waves.. Both computer and device must have the port for it to work
player
Mainframe
system on a chip
IrDA Port
41. Copyrighted software that is distributed at no cost for a trial period
shareware...
kernal
IM
bandwidth
42. Small capacity built directly in the processor chip
L1 cache
Noise
Point of Sale terminals
system clock
43. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
L1 cache
protocol
terminal
optical reader
44. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
preemptive multitasking
video card
Communications device
formatting
45. Company that provides wireless internet access to computers
IP address
wireless Internet service provider
network topology
crimeware
46. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
video card
registrar
bus width
47. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
Bay
communications channel
jewel box
48. Mathematical formula that generates a code from the contents of the message
defragmenting
hash
chat client
MAN
49. Computer aided design software assists a professional user in creating designs
utility programs
CAD
worm
FireWire port
50. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
POP3
defragmenting
Dial- up access
cold boot