SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
player
Trojan Horse
worm
system bus
2. A type of system software that allows users to perform maintenence type tasks
traffic
Netbook
UNIX
utility program
3. Broadband modem- sends and recives digital data over the cable television
cable modem
Processor
OSP
keygen
4. Saves any open documents and programs to RAM and places computer into a low power state
shareware...
Personal Computers
sleep mode
USB hub
5. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
L1 cache
System Unit
proprietary software...
product activation
6. When businesses use the internet to sell products
E- retail
application software...
http
ethernet
7. Company that provides wireless internet access to computers
wireless Internet service provider
supercomputer
address
digital signature
8. Graphic file (JPEG - GIF) slowly replacing GIF
PNG
NAS
POP3
tactile output
9. (laptop computer) portable personal computer often able to fit in your lap
animated Gif...
Transmission media
Notebook Computer
twisted pair cable
10. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
Dial- up access
System Unit
IrDA Port
online security service
11. An instruction that causes a program to perform a specific action.
commands
token ring
hard disk
peripheral
12. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
noise
system clock
plaintext
CPU
13. Type of notebook comp that is smaller and less powerful than a normal notebook comp
system unit
broadband
Netbook
system software...
14. Anopening inside the system unit in which you can install additional equipment. Different than a slot
ARPA
RAID
Bay
EFT
15. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
wordwrap
RFID
Intrusion detection software...
utility program
16. Continues to operate when one of its components fails - ensuring that no data is lost
Operating system
fault tolerant computer
cross - platform
driver
17. Allows a user to plan schedule and track costs of a project
proxy server
IM
formatting
project management software...
18. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
RAID
Storage Media
buffer
phishing
19. Provids mobile users with a secure connection to the company server as if the user has a private line.
registrar
virtual provate network
access time
POP3
20. Popular for LAN. single central cable.
EFT
Noise
bus network
worm
21. A know specific pattern of virus code.
Firewall
Storage Media
virus signature
bus width
22. A system that attempts to imitate the behavior of a human brain.
neural network
OMR
digital certificate
memory slots
23. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
node
hypermedia
terminal
spooling
24. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
router
wireless Internet service provider
IrDA Port
EFT
25. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
disk controller
GPU
botnets
node
26. Optical mark recognition reads hand drawn marks such as circles or rectangles.
RFID
OMR
digital signature
DRAM
27. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
cross - platform
solid state drive
broadband internet service
virtual provate network
28. Dual inline memory module forms two sets of contact
solid state media
protocol
Terminal
DIMM
29. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
volatile memory
sound card
trackball
Internet Backbone
30. Someone who accesses a computer or network illegally. Some say they hack to improve security
Firewall
Home user
Drive Bay
hacker
31. The amount of data - instructions - and information that can travel over communications channel
bandwidth
DVI
star network
TCP/IP
32. Universal serial bus port connects peripherals to the computer
USB port
Bay
RAID
integrated circuit
33. A cable forms a closed loop with all computers. one direction
digital certificate
terminal
ring network
OSP
34. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
RSS 2.0
W3C
hacker
peripheral
35. Designed for mobile devices
sending device
microbrowser
optical mouse
ROM
36. A device that enables you to join a port and a connector that are both male or female
drive bay
http
thread
gender changer
37. A real time internet communications service where you can talk to people online.
EULA
CU
IM
IP address
38. A document that you return to the company that creates and sends it.
connector
OSP
back door
turnaround document
39. Media transmit multiple signals simutaneously. Download faster than upload
coaxial cable
unauthorized access
broadband
buffer
40. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Servers
Dedicated line
mashup
analog
41. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
Personal Computers
supercomputer
client
digital forensics
42. Fetching - decoding - executing - storing
bit
bugs
machine cycle
LAN
43. Msot retail stores use POS to record purchases - process cards - and update inventory
worm
DTP
Point of Sale terminals
Memory Cache
44. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
nonvolatile memory
chip
MAN
multi- core processor
45. The process if a computer or device recieveing info info from the server on the internet
RSS 2.0
dialog box
downloading
multifunction peripheral
46. Contains many microscopic pathways capable of carrying an electrical current
VoIP
program
Dedicated line
integrated circuit
47. The number of bits in an area on a storage medium - Higher density means more storage capacity
density
cyberterrorist
GUI
USB hub
48. A communications device that sends and recieves data and info to and from digital line
VoIP
http
botnets
digital modem
49. A type of storage media that consists of flat disc and is written and read by a laser
machine cycle
Dial Up line
optical disc
Denial of Service attack
50. Digital light processor uses tiny mirrors to reflect light
DLP projector
pretty good Privacy
IM
CAM