SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Copyrighted software provided at no cost by company that retains all rights to software
freeware...
spooling
L1 cache
superscalar
2. Connects the processor to cache.
network architecture
system unit
client
backside bus
3. A know specific pattern of virus code.
virus signature
chasis...
digital signature
PIM
4. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
macros
ergonomics
hibernate
solid state media
5. Company that provides wireless internet access to computers
shareware...
wireless Internet service provider
crimeware
integrated circuit
6. The destructive event or prank the program intended to deliver
air mouse
stored program concept
payload
worm
7. Reorganizing it so that the files are store in continous sectors
address
defragmenting
Domain name
disk controller
8. Can connect multiple types of devices that require faster data transmission speeds.
FireWire port
telemedicine
network
product activation
9. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
utility programs
cold boot
protocol
EDI
10. Obtains data directly at the location where the transaction or event takes place.
data collection device
RAM
virus
Denial of Service attack
11. A collection of data organized in a manner that allows access retrieval and use of that data
cyberextortionist
registrar
database
hacker
12. The discovery - collection adn analysis of evidence found on computers and networks
Home user
utility program
digital forensics
adapter cards
13. When online meetings take place on the web
MICR
Web conference
disk fragmenter
motherboard
14. A program that restricts access to certain material on the web
L2 cache
web filter
expansion bus
system software...
15. Internet Service Provider- a regional or national access provider
Web conference
unethical employees
ISP
IrDA Port
16. Read only memory refers to memory chips storing permanent data and instructions (firmware)
ROM
E- commerce
Linux
embedded computer
17. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
Latency
utility program
client
port
18. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
disk controller
device independent
Input
cracker
19. Unencrypted readable data
plaintext
DSL
optical reader
cyberextortionist
20. Personal information manager is application software that includes features to help users organize personal info
touchpad
RSS 2.0
PIM
wireless access point
21. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
unauthorized access
system software...
Web Browser
Hot spots
22. A type of system software that allows users to perform maintenence type tasks
utility program
cross - platform
Content Aggregator
jack
23. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
LAN
wireless access point
business software...
backside bus
24. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
platter
network architecture
pipelining
EFT
25. A small metal or plastic device that uses pressure instead of ink.
scanner
stylus
site license
heat pipe
26. The fastest most powerful computer
System Unit
unauthorized access
supercomputer
utility program
27. Computer automatically can configure adapter cards and other peripherals as you install them
access control
expansion bus
groupware...
Plug and Play
28. Other computers and mobile devices on the networ that rely on the server for its resources
client
UNIX
Denial of Service attack
Fiber to the Premises
29. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
volatile memory
wireless access point
Firewall
Terminal
30. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
ALU
buffer
script kiddie
ethernet
31. Case of the system unit to protect internal damage
twisted pair cable
Trojan Horse
chasis...
rootkit
32. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
fixed wireless
back door
ring network
newsreader
33. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
cyberextortionist
image processing
pointing stick
spooling
34. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
fault tolerant computer
optical reader
RSS 2.0
recieving device
35. Privately owned and limited to a specific vendor or computer model.
noise
EFT
analog
proprietary software...
36. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
streaming
parallel processing
W3C
expansion bus
37. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
kernal
noise
cloud storage
project management software...
38. Holds one or more disk drives
plug- in
formatting
touchpad
drive bay
39. Records in a file both successful and unsuccessful attempts.
DTP
adware
hibernate
audit trail
40. Broadband modem- sends and recives digital data over the cable television
cable modem
botnets
Software...
Motherboard
41. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
Dial Up line
embedded operating system
L2 cache
network
42. On software is infinitie space and depth for VR
port
traffic
network architecture
VR world
43. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
stylus
LAN
Servers
access time
44. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
connector
Domain name system
application software...
DSL
45. Small program that tells the operating system how to communicate with a specific device
driver
chip
OSP
device independent
46. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Dial up modems
communications
spoofing
wordwrap
47. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
Mobile Device
turnaround document
phishing
adapter card
48. Storage over an internet service
802.11
Laser printer
system clock
cloud storage
49. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
e- learning
Communications device
DRAM
server
50. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Trojan Horse
Processor
script kiddie
system clock