SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provids mobile users with a secure connection to the company server as if the user has a private line.
ALU
virtual provate network
dialog box
communications channel
2. Anopening inside the system unit in which you can install additional equipment. Different than a slot
Application software...
Mobile Device
Communications device
Bay
3. The number of bits in an area on a storage medium - Higher density means more storage capacity
Netiquette
POST
density
Intrusion detection software...
4. Screen savors were made to prevent this - which etched images permanently onto the screen
formatting
jewel box
ghosting
streaming cam
5. The process of dividing the disk into tracks and sectors
formatting
node
driver
cable modem
6. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
ethernet
buffer
SMTP
network standard
7. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
honeypot
EDI
Notebook Computer
memory module
8. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
Bluetooth
expansion bus
online auction
spyware
9. A small metal or plastic device that uses pressure instead of ink.
stylus
USB port
Noise
Content Aggregator
10. Can be peropheral or chip - creates sound from digital instructions.
site license
synthesizer
ghosting
formatting
11. When online meetings take place on the web
shareware...
Web conference
heat sink
pipelining
12. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
GUI
CERT/CC
integrated circuit
13. A legal agreement that allows multiple users to access the software on the server simutaneously
network license
Intrusion detection software...
Operating system
DSL
14. Internet teephony- enables users to speak to other users over the internet
embedded operating system
pointing stick
VoIP
CAPTCHA
15. They can execute more than one instruction per clock cycle
GUI
superscalar
image processing
driver
16. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
corporate spies
jack
backside bus
back door
17. Latest version of Post office Protocol
pipelining
corporate spies
streaming cam
POP3
18. Hypertext transfer protocol
Dial Up line
access control
unauthorized access
http
19. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
W3C
RIMM
video card
DNS Server
20. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
spoofing
cold boot
Firewall
spyware
21. The technology of authenticating a persons identity by verifying a personal characteristic.
biometrics
analog
network standard
wireless access point
22. Human speech is bc of its continous signal that vary in strength and quality
Point of Sale terminals
Web conference
cloud storage
analog
23. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
streaming cam
broadband
image processing
gender changer
24. Hides within or looks like a legitimate program such as a screen saver
Mobile Device
mashup
unethical employees
Trojan Horse
25. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
digital forensics
document management software...
CAPTCHA
RTLS
26. 8 bits grouped together. basic storage unit in memory. Each byte has an address
byte
fiber optic cable
newsreader
pointing stick
27. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
driver
FireWire port
heat sink
TCP/IP
28. A type of always on connection that is established between two communications devices. better than dial up line
DSL modem
Dedicated line
spooling
device independent
29. Used to gain competitive advantage
application software...
corporate spies
business software...
memory module
30. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
warm boot
DSL modem
Latency
Communications device
31. Unencrypted readable data
jewel box
plaintext
document management software...
dot matrix printer
32. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
freeware...
File compression utility
public- domain software...
image processing
33. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
register
optical reader
Terminal
network standard
34. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
RAM
program
network architecture
35. Graphic file (JPEG - GIF) slowly replacing GIF
Dial up modems
OSP
product activation
PNG
36. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
sound card
recieving device
E- retail
worm
37. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
SMTP
volatile memory
twisted pair cable
virus
38. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
IM
e- learning
chip
coaxial cable
39. Can connect multiple types of devices that require faster data transmission speeds.
Personal Computers
crimeware
Web Application
FireWire port
40. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Memory Cache
File compression utility
spider
Desktop Computer
41. Used to track and identify the location of high risk or high value items.
RTLS
botnets
online security service
Internet Backbone
42. Continues to operate when one of its components fails - ensuring that no data is lost
fault tolerant computer
L1 cache
adware
WAN
43. The process if a computer or device recieveing info info from the server on the internet
mashup
downloading
virtual provate network
digital forensics
44. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
Application software...
DSL modem
digital signature
memory module
45. An instruction that causes a program to perform a specific action.
port
commands
OCR
digital forensics
46. Determines the number of bits that can be transmitted at one time
kernal
embedded computer
bus width
microbrowser
47. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
multifunction peripheral
Desktop Computer
business software...
Terminal
48. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
virtual provate network
Fiber to the Premises
MICR
digital modem
49. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
ASCII
CPU
defragmenting
client
50. The code of acceptable behaviors users should follow while on the internet.
analog
node
Netiquette
cold boot