SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
firmware...
message board
network
OCR
2. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
ethernet
System Unit
machine cycle
turnaround document
3. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
RAM
disk cleanup
Memory
kernal
4. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
optical reader
fixed wireless
microbrowser
unauthorized access
5. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
unethical employees
program
RAM
Software...
6. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
port
product activation
OCR
peripheral
7. All computers connected to central device. Hub or switch
pointing stick
project management software...
star network
WAN
8. Internet Service Provider- a regional or national access provider
ARPA
Personal Computers
E- retail
ISP
9. A type of storage media that consists of flat disc and is written and read by a laser
neural network
USB hub
optical disc
VAN
10. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
TLS
hard disk
EFT
Memory Cache
11. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
IM
plug- in
preemptive multitasking
token ring
12. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
shareware...
disk controller
peer to peer network
disk cleanup
13. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
image processing
digital modem
ROM
http
14. Storage over an internet service
cloud storage
ALU
spyware
Storage Device
15. Company that provides wireless internet access to computers
fault tolerant computer
audit trail
wireless Internet service provider
MAN
16. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
port
DSL
ergonomics
Latency
17. Hides within or looks like a legitimate program such as a screen saver
CERT/CC
L1 cache
Trojan Horse
commands
18. The destructive event or prank the program intended to deliver
payload
TCP/IP
digital forensics
machine cycle
19. Media transmit multiple signals simutaneously. Download faster than upload
data collection device
commands
broadband
peer to peer network
20. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
site license
solid state drive
mpeg
Information system
21. A family member on a computer
video card
Home user
Point of Sale terminals
payload
22. The amount of data - instructions - and information that can travel over communications channel
bandwidth
MICR
802.11
image processing
23. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
online auction
SRAM
virus
memory slots
24. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
integrated circuit
USB hub
DNS Server
SMTP
25. Uses devices that emit and sense light to detect the mouses movement
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
dot matrix printer
optical mouse
solid state media
26. Perpetrator attempts to obtain your personal or financial info.
rootkit
client/server
phishing
Dial Up line
27. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
access time
newsreader
keygen
stylus
28. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
commands
http
defragmenting
hot spot
29. A type of system software that allows users to perform maintenence type tasks
noise
cloud storage
utility program
freeware...
30. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
video card
preemptive multitasking
IM
heat sink
31. Most computers (on and off)
network standard
back door
peer to peer network
digital
32. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
heat sink
biometrics
web filter
Web Application
33. Builds and maintains lists of words found on websites. Useful for search engines
spider
Software...
DVI
port
34. A web application that combines services from two or more sources creating a new application.
image processing
disk fragmenter
RIMM
mashup
35. Retains existing application software and data files even if you can change computer models or vendors
File compression utility
router
device independent
cross - platform
36. Single inline memory module forms a single set of contacts
Mobile Computer
DLP projector
SIMM
W3C
37. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
heat pipe
traffic
TCP/IP
network card
38. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
DIMM
terminal
message board
application software...
39. Joins a cable and a port
CAD
ISP
connector
Domain name system
40. Contains 10 or fewer comps - with similar reponsibilities and capabilities
gender changer
peer to peer network
ARPA
protocol
41. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
CAPTCHA
IM
Denial of Service attack
Desktop Computer
42. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
OSP
air mouse
disk fragmenter
Storage Device
43. Enahnces the sound generating capabilites of a personal computer
Drive Bay
Operating system
L2 cache
sound card
44. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
business software...
kernal
trackball
ethernet
45. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
data collection device
GPU
network topology
certificate authority
46. A system that attempts to imitate the behavior of a human brain.
biometrics
Bay
hypertext
neural network
47. The use of computer or network with out permission
sending device
Application software...
unauthorized access
VoIP
48. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
multi- core processor
crimeware
Intrusion detection software...
adware
49. A program that hides in a computer and allows someone from a remote location to take control of the computer
capacity
rootkit
expansion bus
ARPA
50. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
Application software...
cyberterrorist
SMTP
token ring