SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provide Wi Fi to mobile computers or devices
heat pipe
multifunction peripheral
driver
Hot spots
2. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
CAD
Operating system
OSP
botnets
3. A socket in the motherboard that can hold an adapter card
CPU
SMTP
expansion slot
proprietary software...
4. Hides within or looks like a legitimate program such as a screen saver
freeware...
Web Server
Trojan Horse
http
5. Company that provides wireless internet access to computers
DNS Server
driver
CERT/CC
wireless Internet service provider
6. Internet teephony- enables users to speak to other users over the internet
wireless modem
groupware...
application software...
VoIP
7. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
Trojan Horse
transistor
neural network
8. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
drive bay
turnaround document
CAM
heat pipe
9. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
multi- core processor
drive bay
EDI
disk controller
10. Transmission media on which the data - instructions - information travel.
undervoltage
proprietary software...
stored program concept
communications channel
11. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
image processing
ARPA
SRAM
L2 cache
12. Retains existing application software and data files even if you can change computer models or vendors
EDI
device independent
MAN
SRAM
13. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
SIMM
spoofing
Transmission media
BIOS
14. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
Netiquette
network standard
Application software...
access time
15. The amount of data - instructions - and information that can travel over communications channel
proprietary software...
bandwidth
cluster
parallel processing
16. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
coaxial cable
Noise
Operating system
biometrics
17. Dish shaped antenna for internet connection
Fiber to the Premises
RAM
fixed wireless
CMOS
18. The last section of the domain name
802.11
Top level domain
VR
Netbook
19. Program is one that runs the same on multiple operating systems
supercomputer
cross - platform
SRAM
wireless modem
20. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
memory module
proxy server
IP address
Information system
21. May break in to computer to exploit security weakness. financial gains - revenge.
disk controller
unethical employees
http
motherboard
22. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
IM
nonvolatile memory
USB hub
node
23. Extends the capabilites of a browser.
plug- in
CPU
solid state media
spoofing
24. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
UNIX
Firewall
memory slots
25. Pressure sensitive eraser shaped pointing device
pointing stick
sending device
cross - platform
recieving device
26. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
Plug and Play
product activation
e- learning
dot matrix printer
27. Continues to operate when one of its components fails - ensuring that no data is lost
volatile memory
keygen
heat sink
fault tolerant computer
28. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
bit
CPU
network standard
Storage Device
29. Smallest element in an electronic image
mashup
heat sink
pixel
CAPTCHA
30. A legal agreement that allows multiple users to access the software on the server simutaneously
network license
ciphertext
OSP
software suite
31. The original article and all subsequent related replies
thread
Desktop Computer
plaintext
document management software...
32. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
crimeware
warm boot
VAN
Plug and Play
33. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
overvoltage
ergonomics
hacker
proprietary software...
34. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
defragmenting
SRAM
capacity
utility programs
35. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
disk controller
MRAM
capacity
wireless access point
36. Hardware - software - data - people - procedures
software suite
Information system
Application software...
trackball
37. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
Communications device
rootkit
CAPTCHA
virus
38. Uses radio waves to transmit data between two devices.
CU
Bluetooth
communications
DSL
39. Power on self test to check the various system components and the results are compared with data in a CMOS chip
Trojan Horse
communications channel
POST
traffic
40. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Memory Cache
system software...
unauthorized access
online auction
41. Hypertext transfer protocol
http
volatile memory
BIOS
Transmission media
42. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
address
liquid flow technology
USB port
GPU
43. Single inline memory module forms a single set of contacts
SIMM
firmware...
wireless access point
RFID
44. On software is infinitie space and depth for VR
script kiddie
chat client
VR world
unauthorized access
45. Smaller than heat sink cools processors in notebook comps
heat pipe
audit trail
registrar
multi- core processor
46. A type of storage media that consists of flat disc and is written and read by a laser
File compression utility
solid state drive
optical disc
Laser printer
47. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
SRAM
DSL
Memory Cache
thread
48. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
tactile output
preemptive multitasking
streaming
streaming cam
49. A real time internet communications service where you can talk to people online.
spyware
neural network
IM
Application software...
50. Major carriers of network traffic
message board
Internet Backbone
client
machine cycle