SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
plaintext
trackball
VR world
WAN
2. Initiates an instruction to transmit data - instructions - or information.
sending device
bandwidth
Memory
buffer
3. Processor begins to fetch a second instruction before it completes the full machine cycle
VR world
pipelining
Internet Backbone
USB hub
4. Surgeon performs operation by controlling robot when not in the same area as patient.
embedded operating system
CAM
telesurgery
solid state media
5. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
digital
kernal
Web Server
VR world
6. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hard disk
ISP
honeypot
wireless modem
7. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
solid state drive
CU
SIMM
DSL
8. The number of bytes a storage medium can hold
sleep mode
address
Hot spots
capacity
9. Organization that sells and manages domain names
sending device
system bus
network card
registrar
10. Computing device small enough to hold in your hand
Mobile Device
noise
embedded operating system
ASCII
11. PGP an encryption program
pretty good Privacy
fixed wireless
Dial Up line
biometrics
12. Hardware - software - data - people - procedures
Information system
stored program concept
Memory
fixed wireless
13. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
preemptive multitasking
device independent
digital
client
14. System board- is the main circuit board of the system unit.
ring network
motherboard
ISP
digital signature
15. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
streaming
spyware
spoofing
Input
16. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
heat sink
L2 cache
noise
Firewall
17. The technology of authenticating a persons identity by verifying a personal characteristic.
biometrics
ISP
streaming
Linux
18. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
commands
MICR
USB port
19. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
register
network
Content Aggregator
synthesizer
20. The process of dividing the disk into tracks and sectors
VR world
formatting
touchpad
Processor
21. Privately owned and limited to a specific vendor or computer model.
ergonomics
proprietary software...
kernal
data collection device
22. ...
network standard
mpeg
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
disk cleanup
23. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
Output
solid state drive
Mobile Computer
Intrusion detection software...
24. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
address
Bay
Firewall
bus
25. Errors that can be recognized by automatic update
wireless access point
bugs
IM
pipelining
26. Small capacity built directly in the processor chip
formatting
W3C
thread
L1 cache
27. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
parallel processing
solid state media
ISP
28. Used to track and identify the location of high risk or high value items.
rootkit
telemedicine
OMR
RTLS
29. A family member on a computer
Operating system
EFT
player
Home user
30. Electrical supply drops.can cause data loss but generally not cause equipment damage
backside bus
Plug and Play
downloading
undervoltage
31. Connects the processor to cache.
Transmission media
UNIX
Memory
backside bus
32. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
cracker
L2 cache
stylus
33. A communications device that enables a computer or device that does not have a built in networking capability to access a network
network card
Mobile Computer
mashup
SMTP
34. Holds one or more disk drives
RSS 2.0
drive bay
worm
router
35. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
network
multifunction peripheral
Notebook Computer
communications
36. Company that provides wireless internet access to computers
bit
ISP
Bluetooth
wireless Internet service provider
37. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
macros
CAM
utility program
GUI
38. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
dot matrix printer
cross - platform
DTP
air mouse
39. Searches for and removes unneccessary files
adapter card
Drive Bay
disk cleanup
network topology
40. Two or more computers transfer data - instructions - and information.
communications
DSL modem
Input
VR world
41. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
scanner
Motherboard
Memory Cache
overvoltage
42. Determines the number of bits that can be transmitted at one time
compromised computer
bus width
rootkit
parallel processing
43. Graphic file (JPEG - GIF) slowly replacing GIF
connector
air mouse
RAM
PNG
44. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
Fiber to the Premises
Denial of Service attack
VR
RAID
45. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
Laser printer
communications
unethical employees
ergonomics
46. The code of acceptable behaviors users should follow while on the internet.
address
CERT/CC
pipelining
Netiquette
47. Latest version of Post office Protocol
Hot spots
machine cycle
utility program
POP3
48. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
IM
motherboard
hard disk
optical reader
49. Uses email as a vehicle for extortion. Threaten users if they are not paid a sum of money
WAN
audit trail
cyberextortionist
Software...
50. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
ciphertext
sending device
digital signature
Software...