SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
liquid flow technology
Desktop Computer
unethical employees
memory slots
2. Donated for public use has no copyright restrictions
public- domain software...
Processor
application software...
CAM
3. A socket in the motherboard that can hold an adapter card
payload
heat pipe
analog
expansion slot
4. Online service provider- has many members features along with internet access such as IM or Web browsers.
OSP
system software...
star network
device independent
5. Communications activity. Handled by NSFnet.
Linux
traffic
RIMM
register
6. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
E- commerce
formatting
sending device
VAN
7. Storage over an internet service
cloud storage
public- domain software...
preemptive multitasking
Processor
8. Health care professions conduct live conferences on the computer
telemedicine
project management software...
ALU
router
9. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
802.11
VR
telemedicine
VAN
10. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
Operating system
cracker
stored program concept
ASCII
11. Continues to operate when one of its components fails - ensuring that no data is lost
disk controller
fault tolerant computer
memory slots
System Unit
12. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Latency
server
broadband internet service
superscalar
13. Searches for and removes unneccessary files
RFID
CERT/CC
disk cleanup
device independent
14. A rectangular opeining that typically holds disk drives.
Drive Bay
telemedicine
defragmenting
SMTP
15. Builds and maintains lists of words found on websites. Useful for search engines
VoIP
pipelining
spider
access time
16. Human speech is bc of its continous signal that vary in strength and quality
access control
analog
stored program concept
optical disc
17. Needed generally to participate in a newsgroup
solid state media
database
newsreader
Memory
18. Can connect multiple types of devices that require faster data transmission speeds.
digital signature
FireWire port
worm
commands
19. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
plaintext
Denial of Service attack
port
hypermedia
20. Text version of an IP address
driver
access time
Domain name
software suite
21. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
network
spyware
hard disk
network license
22. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
unauthorized access
EDI
hypertext
broadband internet service
23. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
NAS
port
OSP
MRAM
24. A special purpose computer that functions as a component in a larger product. Small with limited hardware
RAM
embedded computer
OCR
PNG
25. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
Netiquette
backside bus
Bluetooth
Content Aggregator
26. The last section of the domain name
Top level domain
system software...
Storage Device
http
27. Extends the capabilites of a browser.
ghosting
plug- in
web filter
network
28. A know specific pattern of virus code.
DVI
system unit
virus signature
WAN
29. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
worm
Domain name
document management software...
network topology
30. A collection of networked computers that have been compromised by malware operating in a collected cohesive fashion - (coordinated by a controller computer). Can leverage the combined computing power of their botnets to launch targeted denial of serv
botnets
cluster
peer to peer network
dot matrix printer
31. A case that contains electronic components of the computer used to process data.
system unit
TCP/IP
message board
volatile memory
32. Designed for mobile devices
microbrowser
utility program
tactile output
bugs
33. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
Netbook
keygen
mashup
hot spot
34. 8 bits grouped together. basic storage unit in memory. Each byte has an address
online auction
byte
wireless Internet service provider
machine cycle
35. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
streaming
disk fragmenter
telemedicine
EULA
36. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
Top level domain
network standard
cyberextortionist
CMOS
37. Picure messaging can occur from mobile to mobile and mobile to email
MMS
system software...
PIM
driver
38. Any data or instructions entered into the memory of the computer
communications
Terminal
Input
capacity
39. A server that you connect to to start a chat session.
Storage Device
adware
chat client
node
40. Broadband modem- sends and recives digital data over the cable television
optical mouse
digital signature
cable modem
proprietary software...
41. Optical mark recognition reads hand drawn marks such as circles or rectangles.
IrDA Port
defragmenting
MICR
OMR
42. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
system bus
macros
certificate authority
USB hub
43. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
digital signature
TCP/IP
network license
RFID
44. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
tactile output
Noise
Software...
cyberterrorist
45. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
video card
System Software...
sleep mode
gender changer
46. A legal agreement that allows multiple users to access the software on the server simutaneously
network license
driver
Bay
Notebook Computer
47. When businesses use the internet to sell products
E- retail
traffic
VAN
network
48. Smallest unit of data the computer can process
bit
optical reader
Domain name system
Software...
49. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
bit
wireless access point
WAN
DSL modem
50. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
digital forensics
player
telemedicine