SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
RIMM
disk controller
memory module
hash
2. A system that attempts to imitate the behavior of a human brain.
mashup
neural network
Web Application
Fiber to the Premises
3. One or more computers on the network request services from the server. 10 or more computers
pixel
project management software...
client/server
server
4. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
phishing
Web conference
proxy server
cross - platform
5. The fastest most powerful computer
supercomputer
Web Application
adware
CMOS
6. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
network card
formatting
Dial Up line
7. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
POP3
Fiber to the Premises
Bay
8. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
overvoltage
spyware
Terminal
back door
9. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
disk controller
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
digital signature
device independent
10. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
connector
virus signature
token ring
11. A notcie that guarantees a user or web site is legit. E- commerce use it often
E- retail
digital certificate
multifunction peripheral
public- domain software...
12. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
nonvolatile memory
MMS
commands
e- learning
13. An electrical disturbance that can degrade communications
dialog box
script kiddie
noise
ghosting
14. Controls timing of all computer operations
message board
system clock
optical reader
Desktop Computer
15. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
802.11
online security service
worm
rootkit
16. Allows users to keep typing without using enter at the end of each line
wordwrap
POP3
Dial- up access
project management software...
17. A know specific pattern of virus code.
spoofing
RIMM
virus signature
digital forensics
18. CA resposible for giving out digital certificate
certificate authority
Storage Device
cluster
virtual provate network
19. Operating system on mobile devices that generally resides on ROM
protocol
access control
newsreader
embedded operating system
20. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
bus
telesurgery
VoIP
tactile output
21. Other computers and mobile devices on the networ that rely on the server for its resources
ROM
client
rootkit
database
22. A computer that delivers requested web pages to your computer
shareware...
utility program
Web Server
RFID
23. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Servers
pretty good Privacy
router
Motherboard
24. A communications device that enables a computer or device that does not have a built in networking capability to access a network
registrar
network card
superscalar
digital modem
25. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
token ring
coaxial cable
VAN
solid state media
26. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
solid state drive
network card
system clock
spyware
27. Someone who uses internet to destroy or damage computers for political reasons.
driver
cyberterrorist
Point of Sale terminals
MICR
28. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
DLP projector
formatting
adapter card
29. The use of computer or network with out permission
unauthorized access
payload
Output
broadband
30. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
VAN
hypertext
Dial Up line
utility programs
31. The original article and all subsequent related replies
synthesizer
thread
System Software...
wireless access point
32. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
virtual provate network
macros
scanner
CMOS
33. Text version of an IP address
fault tolerant computer
Domain name
token ring
multifunction peripheral
34. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
spyware
Fiber to the Premises
Dial up modems
online auction
35. Data that has been processed in a useful form- text - graphics - audio - video
Output
plaintext
IP address
superscalar
36. A set of programs that coordinates all of the activies among computer hardware devices.
Operating system
Fiber to the Premises
groupware...
VAN
37. Personal information manager is application software that includes features to help users organize personal info
system unit
PIM
download
product activation
38. A rectangular opeining that typically holds disk drives.
cyberextortionist
Drive Bay
heat sink
plug- in
39. Case of the system unit to protect internal damage
memory module
utility programs
chasis...
e- learning
40. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
Information system
MAN
application software...
backside bus
41. A window that provides info - presents availabe options - or requests a response.
network standard
port
terminal
dialog box
42. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
MRAM
DTP
Servers
address
43. Device with a monitor - keyboard - and memory
ciphertext
spider
SIMM
Terminal
44. A cable forms a closed loop with all computers. one direction
ring network
ASCII
FireWire port
Home user
45. Internet teephony- enables users to speak to other users over the internet
hacker
capacity
spoofing
VoIP
46. Encrypted data
Communications device
traffic
ciphertext
plug- in
47. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
disk fragmenter
liquid flow technology
Processor
RSS 2.0
48. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
product activation
Firewall
MRAM
peripheral
49. The design of computers - devices - and media in the network
Fiber to the Premises
software suite
e- learning
network architecture
50. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
LAN
mashup
heat sink
OCR