SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Federally funded internet security research and development center
CERT/CC
MRAM
VoIP
disk controller
2. A personal computer you can carry from place to place
Mobile Computer
multi- core processor
solid state media
chat client
3. They consist entirely of electronic components and contain no moving parts.
microbrowser
solid state media
stored program concept
motherboard
4. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
optical reader
bus
project management software...
peripheral
5. Dual inline memory module forms two sets of contact
air mouse
Bay
DIMM
biometrics
6. Power on self test to check the various system components and the results are compared with data in a CMOS chip
Software...
port
POST
parallel processing
7. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
network topology
CAD
bus network
broadband internet service
8. Program is one that runs the same on multiple operating systems
bandwidth
UNIX
cross - platform
TLS
9. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
payload
business software...
Processor
TCP/IP
10. Protective case for optical discs
database
spoofing
client/server
jewel box
11. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
VAN
Laser printer
Memory
cracker
12. Is an online area in which isers have wrtten discussions about a particular subject.
disk fragmenter
DRAM
newsgroup
network architecture
13. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
ghosting
GUI
TLS
NAS
14. Each computer or device on the network. often connected by cables
CMOS
payload
Noise
node
15. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
newsreader
message board
synthesizer
16. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
Communications device
memory slots
fiber optic cable
solid state drive
17. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
MICR
access time
RSS 2.0
Communications device
18. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
port
ROM
communications channel
Motherboard
19. Computer automatically can configure adapter cards and other peripherals as you install them
node
synthesizer
stored program concept
Plug and Play
20. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
buffer
DSL modem
Dial up modems
compromised computer
21. The delivery of education via some electronic method such as the internet - networks - or optical disks.
spider
Hot spots
e- learning
cloud storage
22. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
power supply
cluster
Web Application
TLS
23. A server that you connect to to start a chat session.
File compression utility
Personal Computers
chat client
VR
24. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
SRAM
Drive Bay
TCP/IP
ring network
25. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
EULA
Storage Device
Mobile Device
communications
26. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
CMOS
Web Server
embedded computer
VAN
27. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
public- domain software...
access time
registrar
Dial Up line
28. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
site license
token ring
motherboard
29. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
machine cycle
Personal Computers
ARPA
MICR
30. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
BIOS
E- commerce
macros
communications channel
31. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
Top level domain
capacity
air mouse
hypertext
32. Used to gain competitive advantage
IM
Dial Up line
CAM
corporate spies
33. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
corporate spies
plug- in
VAN
digital signature
34. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
http
hypertext
hypermedia
download
35. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
twisted pair cable
ethernet
turnaround document
DSL
36. Copyrighted software provided at no cost by company that retains all rights to software
broadband internet service
spyware
noise
freeware...
37. Digital light processor uses tiny mirrors to reflect light
warm boot
optical reader
Web Server
DLP projector
38. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
address
File compression utility
mashup
Notebook Computer
39. Copyrighted software that is distributed at no cost for a trial period
Web Browser
access control
disk cleanup
shareware...
40. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
ring network
trackball
fiber optic cable
RAM
41. Two main parts are processor and memory.
dialog box
bandwidth
Motherboard
audit trail
42. Operating system on mobile devices that generally resides on ROM
public- domain software...
IP address
embedded operating system
bugs
43. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
GUI
turnaround document
kernal
utility program
44. Cables - telephone lines - radio networks - satellites
crimeware
Transmission media
product activation
MICR
45. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
Communications device
SMTP
hypermedia
mashup
46. May break in to computer to exploit security weakness. financial gains - revenge.
unethical employees
proxy server
CPU
worm
47. Is a security measure that defines who can access it and what actions they can take while acessing the computer
connector
commands
access control
CAM
48. Latest version of Post office Protocol
peripheral
buffer
audit trail
POP3
49. The number of bytes a storage medium can hold
capacity
warm boot
ALU
utility programs
50. Graphic file (JPEG - GIF) slowly replacing GIF
stylus
PNG
jack
volatile memory