SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Dial up modems
ARPA
MAN
802.11
2. Fetching - decoding - executing - storing
parallel processing
CPU
pointing stick
machine cycle
3. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
system bus
Web Browser
Denial of Service attack
downloading
4. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
Dial up modems
L2 cache
hard disk
DSL
5. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
ISP
ASCII
digital forensics
Domain name
6. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
multifunction peripheral
Hot spots
warm boot
shareware...
7. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
spoofing
hibernate
register
8. Computer automatically can configure adapter cards and other peripherals as you install them
bus network
Plug and Play
stored program concept
preemptive multitasking
9. Dish shaped antenna for internet connection
multi- core processor
network topology
fixed wireless
cyberterrorist
10. Extends the capabilites of a browser.
integrated circuit
Memory
IM
plug- in
11. The amount of data - instructions - and information that can travel over communications channel
L2 cache
hash
microbrowser
bandwidth
12. A small flat rectangular pointing device that is sensitive to pressure and motion.
hypermedia
access control
DNS Server
touchpad
13. Initiates an instruction to transmit data - instructions - or information.
Personal Computers
client
sending device
downloading
14. Instead of port - jack is used to identify audio or video ports.
jack
biometrics
machine cycle
memory slots
15. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
Home user
proxy server
Servers
Top level domain
16. A legal agreement that allows multiple users to access the software on the server simutaneously
CAM
platter
utility program
network license
17. Saves any open docs or programs to hardisk before removing power
CPU
EDI
utility program
hibernate
18. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
ALU
download
TCP/IP
formatting
19. Communications activity. Handled by NSFnet.
streaming cam
traffic
DIMM
digital
20. Retains existing application software and data files even if you can change computer models or vendors
Storage Device
payload
device independent
hypermedia
21. Uses radio waves to transmit data between two devices.
overvoltage
Bluetooth
phishing
telesurgery
22. Can be peropheral or chip - creates sound from digital instructions.
cyberterrorist
twisted pair cable
synthesizer
video card
23. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
spoofing
access time
star network
UNIX
24. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
DSL modem
undervoltage
ciphertext
File compression utility
25. Type of notebook comp that is smaller and less powerful than a normal notebook comp
Drive Bay
Netbook
utility program
CMOS
26. A collection of computers and devices connected together - via communications devices and transmissions media.
pixel
byte
network card
network
27. Method that the internet uses to store domain names and their corressponding IP addresses
IM
Domain name system
product activation
Mobile Device
28. Each computer or device on the network. often connected by cables
download
L1 cache
cluster
node
29. A vulnerable computer that is set up to entice an intruder to break into it.
traffic
honeypot
hacker
drive bay
30. Smallest element in an electronic image
pixel
Notebook Computer
node
ROM
31. Protective case for optical discs
online security service
digital certificate
jewel box
wordwrap
32. Any data or instructions entered into the memory of the computer
Input
RAM
protocol
audit trail
33. Basic input/output systemis firmware that contains the computers startup instructions
superscalar
nonvolatile memory
BIOS
chasis...
34. The smallest unit of disk space that stores data and info
disk fragmenter
plug- in
cluster
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
35. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
botnets
Content Aggregator
scanner
Communications device
36. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
Point of Sale terminals
Output
cold boot
access time
37. Any unwanted signal usually varying quickly
Noise
system on a chip
MICR
CAPTCHA
38. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
system software...
USB hub
solid state drive
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
39. A computer that delivers requested web pages to your computer
node
UNIX
Web Server
MRAM
40. Popular for LAN. single central cable.
biometrics
L2 cache
bus network
buffer
41. World wide web consortium oversees research and sets standards for many areas of the internet
telemedicine
W3C
pretty good Privacy
Memory
42. A window that provides info - presents availabe options - or requests a response.
dialog box
Storage Device
gender changer
Storage Media
43. Smaller than heat sink cools processors in notebook comps
heat pipe
E- commerce
TLS
power supply
44. A system that attempts to imitate the behavior of a human brain.
neural network
Servers
SIMM
solid state media
45. Computer aided design software assists a professional user in creating designs
hot plugging
peer to peer network
CAD
memory slots
46. Text version of an IP address
supercomputer
multifunction peripheral
router
Domain name
47. Dynamic ram- chips must be re energized constantly or they lose their contents.
protocol
keygen
router
DRAM
48. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
machine cycle
MRAM
script kiddie
warm boot
49. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
nonvolatile memory
IrDA Port
RAID
parallel processing
50. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
ethernet
cross - platform
payload
network