SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
cluster
project management software...
adapter cards
twisted pair cable
2. A case that contains electronic components of the computer used to process data.
File compression utility
system unit
software suite
Web Browser
3. Read only memory refers to memory chips storing permanent data and instructions (firmware)
ROM
TLS
spider
parallel processing
4. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
System Software...
Storage Media
Processor
overvoltage
5. Is a security measure that defines who can access it and what actions they can take while acessing the computer
system on a chip
peripheral
E- retail
access control
6. Any unwanted signal usually varying quickly
Dedicated line
Noise
cross - platform
node
7. Picure messaging can occur from mobile to mobile and mobile to email
CMOS
USB hub
MMS
audit trail
8. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
undervoltage
fixed wireless
cracker
9. Fetching - decoding - executing - storing
bit
Netiquette
Output
machine cycle
10. Major carriers of network traffic
phishing
CERT/CC
Internet Backbone
Web conference
11. The amount of data - instructions - and information that can travel over communications channel
firmware...
Noise
bandwidth
spyware
12. Case of the system unit to protect internal damage
Terminal
wireless modem
chasis...
message board
13. Retains existing application software and data files even if you can change computer models or vendors
File compression utility
tactile output
device independent
sleep mode
14. Used to gain competitive advantage
corporate spies
Memory
backside bus
Dedicated line
15. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
motherboard
hypertext
CMOS
downloading
16. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
network topology
MMS
ethernet
stylus
17. Saves any open docs or programs to hardisk before removing power
hibernate
proprietary software...
nonvolatile memory
cloud storage
18. A legal agreement that allows multiple users to access the software on the server simutaneously
Memory
honeypot
gender changer
network license
19. Short for key generator creats software registration numbers and sometimes activation codes.
keygen
Content Aggregator
communications channel
unethical employees
20. Basic input/output systemis firmware that contains the computers startup instructions
PNG
BIOS
Memory
broadband internet service
21. A set of programs that coordinates all of the activies among computer hardware devices.
freeware...
Personal Computers
trackball
Operating system
22. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
neural network
Input
ethernet
turnaround document
23. Integrates the functions of a processor - memory and a video card on a single chip.
embedded computer
transistor
Memory Cache
system on a chip
24. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
corporate spies
fixed wireless
network standard
Web Browser
25. Allows the various devices both inside and attached to the system unit to communicate with each other. Bits travel on a bus from input to memory to processor to output. Data Bus. Address Bus.
VR
unethical employees
USB hub
bus
26. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
Dial- up access
L2 cache
kernal
ASCII
27. Unencrypted readable data
botnets
animated Gif...
volatile memory
plaintext
28. Graphics processing unit controls the manipulation and display of graphics on the display device.
sending device
GPU
Storage Device
Memory
29. Cables - telephone lines - radio networks - satellites
tactile output
WAN
network license
Transmission media
30. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
system on a chip
optical mouse
Transmission media
nonvolatile memory
31. Transmission media on which the data - instructions - information travel.
noise
communications channel
Content Aggregator
plaintext
32. Allows users to keep typing without using enter at the end of each line
network card
wordwrap
mashup
adware
33. The number of bits in an area on a storage medium - Higher density means more storage capacity
payload
density
Storage Device
MMS
34. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
IM
cyberextortionist
back door
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
35. A communications device that enables a computer or device that does not have a built in networking capability to access a network
hacker
network card
Netiquette
web filter
36. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
business software...
RFID
mpeg
CMOS
37. A program that restricts access to certain material on the web
network
web filter
network
bugs
38. A small metal or plastic device that uses pressure instead of ink.
device independent
byte
PNG
stylus
39. Electrical supply drops.can cause data loss but generally not cause equipment damage
MMS
CU
optical disc
undervoltage
40. The smallest unit of disk space that stores data and info
cluster
software suite
compromised computer
adware
41. Graphical User interface - interact with software using text - graphics - and icons
access control
GUI
L2 cache
fault tolerant computer
42. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
synthesizer
Processor
sleep mode
spyware
43. Small program that tells the operating system how to communicate with a specific device
protocol
driver
ghosting
disk fragmenter
44. Instead of port - jack is used to identify audio or video ports.
Hot spots
jack
cyberextortionist
recieving device
45. Rambus inline memory module house RDRAM chips
biometrics
thread
RIMM
TCP/IP
46. Single chip with two or more processor cores.
script kiddie
mpeg
multi- core processor
virtual provate network
47. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
network standard
bus network
digital
RSS 2.0
48. A window that provides info - presents availabe options - or requests a response.
dialog box
RTLS
honeypot
E- commerce
49. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
hacker
adapter card
biometrics
hot spot
50. The number of bytes a storage medium can hold
bugs
capacity
TLS
ISP