SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Instead of port - jack is used to identify audio or video ports.
System Unit
Content Aggregator
registrar
jack
2. Reorganizing it so that the files are store in continous sectors
defragmenting
adware
groupware...
unethical employees
3. A computer that delivers requested web pages to your computer
Linux
Web Server
ghosting
streaming cam
4. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
Information system
VAN
ghosting
GPU
5. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
message board
IM
NAS
liquid flow technology
6. The original article and all subsequent related replies
honeypot
project management software...
thread
MRAM
7. When turning on a computer that has been turned off completly
cold boot
server
E- commerce
connector
8. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
system on a chip
digital modem
ethernet
cracker
9. CA resposible for giving out digital certificate
registrar
certificate authority
CMOS
Linux
10. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
dot matrix printer
hard disk
telemedicine
communications channel
11. On software is infinitie space and depth for VR
peripheral
VR world
e- learning
turnaround document
12. Is an online area in which isers have wrtten discussions about a particular subject.
Bay
hibernate
newsgroup
http
13. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
cyberextortionist
MICR
jack
streaming cam
14. A real time internet communications service where you can talk to people online.
database
IM
expansion slot
DSL modem
15. Builds and maintains lists of words found on websites. Useful for search engines
DNS Server
spider
UNIX
MRAM
16. A type of always on connection that is established between two communications devices. better than dial up line
utility program
Internet Backbone
Dedicated line
pixel
17. A personal computer you can carry from place to place
Mobile Computer
IM
groupware...
Web Browser
18. A vulnerable computer that is set up to entice an intruder to break into it.
Linux
honeypot
image processing
superscalar
19. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
backside bus
virus
peripheral
RIMM
20. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
shareware...
token ring
TCP/IP
Mobile Computer
21. Rambus inline memory module house RDRAM chips
RIMM
ethernet
proprietary software...
wireless access point
22. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
wireless modem
business software...
access time
honeypot
23. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
Domain name
ring network
Mainframe
defragmenting
24. May break in to computer to exploit security weakness. financial gains - revenge.
software suite
TLS
Operating system
unethical employees
25. Technique that some software manufacturers use to ensure the software is not installed on more computers than legally licensed
buffer
expansion slot
downloading
product activation
26. Uses radio waves to transmit data between two devices.
Bluetooth
Desktop Computer
thread
capacity
27. Cables - telephone lines - radio networks - satellites
EFT
Transmission media
MMS
image processing
28. Saves any open docs or programs to hardisk before removing power
CMOS
device dependant
memory slots
hibernate
29. Text version of an IP address
Domain name
pointing stick
scanner
dot matrix printer
30. Surgeon performs operation by controlling robot when not in the same area as patient.
telesurgery
system clock
IrDA Port
web filter
31. Hardware - software - data - people - procedures
analog
superscalar
registrar
Information system
32. Read only memory refers to memory chips storing permanent data and instructions (firmware)
Linux
formatting
recieving device
ROM
33. A part of the motherboard and connects the processor to main memory
system bus
register
Storage Device
network standard
34. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
RSS 2.0
digital modem
proxy server
system software...
35. Graphic file (JPEG - GIF) slowly replacing GIF
Trojan Horse
Dial up modems
PNG
CAPTCHA
36. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
DSL
platter
image processing
unethical employees
37. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
virus signature
Hot spots
OMR
Latency
38. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
buffer
Personal Computers
spider
capacity
39. All computers connected to central device. Hub or switch
Web Server
star network
Notebook Computer
video card
40. Retains existing application software and data files even if you can change computer models or vendors
pretty good Privacy
device independent
hypertext
GUI
41. The delivery of education via some electronic method such as the internet - networks - or optical disks.
E- commerce
e- learning
bit
sleep mode
42. A small flat rectangular pointing device that is sensitive to pressure and motion.
Communications device
touchpad
liquid flow technology
mpeg
43. Errors that can be recognized by automatic update
bugs
backside bus
traffic
hard disk
44. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
chasis...
Servers
proprietary software...
solid state drive
45. World wide web consortium oversees research and sets standards for many areas of the internet
hot spot
phishing
mpeg
W3C
46. A rectangular opeining that typically holds disk drives.
unethical employees
Drive Bay
downloading
adapter card
47. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
Personal Computers
Software...
TCP/IP
machine cycle
48. Extends the capabilites of a browser.
plug- in
scanner
port
biometrics
49. The number of bytes a storage medium can hold
Domain name system
Internet Backbone
capacity
adapter cards
50. Combines several GIF images ina single GIF file.
animated Gif...
machine cycle
network architecture
CAPTCHA