SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Processor
DIMM
Content Aggregator
system bus
2. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
pixel
register
Storage Device
network architecture
3. Optical mark recognition reads hand drawn marks such as circles or rectangles.
OMR
EULA
bus network
IP address
4. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
OCR
Storage Device
traffic
shareware...
5. Each computer or device on the network. often connected by cables
Home user
system clock
database
node
6. CA resposible for giving out digital certificate
ciphertext
certificate authority
hacker
hypermedia
7. The process if a computer or device recieveing info info from the server on the internet
certificate authority
downloading
bugs
platter
8. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
ring network
unauthorized access
Bluetooth
TCP/IP
9. Saves any open docs or programs to hardisk before removing power
hibernate
audit trail
RAM
embedded operating system
10. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
device independent
wireless modem
touchpad
pointing stick
11. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
File compression utility
ciphertext
virus
PNG
12. Msot retail stores use POS to record purchases - process cards - and update inventory
sleep mode
solid state drive
dot matrix printer
Point of Sale terminals
13. The technology of authenticating a persons identity by verifying a personal characteristic.
transistor
turnaround document
biometrics
database
14. Serves as the interface between the user - the app software - and the computers hardware
compromised computer
Memory
system software...
spider
15. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
RAID
MICR
OSP
Bay
16. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
hot spot
CU
dialog box
RSS 2.0
17. Combines several GIF images ina single GIF file.
VR world
wireless Internet service provider
animated Gif...
protocol
18. A socket in the motherboard that can hold an adapter card
Memory
synthesizer
expansion slot
analog
19. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
USB hub
density
scanner
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
20. Encrypted data
ciphertext
shareware...
jewel box
touchpad
21. A web application that combines services from two or more sources creating a new application.
mashup
Top level domain
stylus
DTP
22. The code of acceptable behaviors users should follow while on the internet.
access time
spyware
CAPTCHA
Netiquette
23. Hardware - software - data - people - procedures
system clock
MICR
driver
Information system
24. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
online auction
OSP
Notebook Computer
25. May break in to computer to exploit security weakness. financial gains - revenge.
database
unethical employees
bugs
CU
26. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
heat sink
spyware
peer to peer network
Storage Device
27. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
macros
POST
Notebook Computer
hash
28. Latest version of Post office Protocol
POP3
adapter cards
System Unit
communications
29. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
neural network
File compression utility
Noise
Dial- up access
30. Smaller than heat sink cools processors in notebook comps
Noise
proxy server
heat pipe
Point of Sale terminals
31. Determines the number of bits that can be transmitted at one time
bus width
router
heat pipe
platter
32. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
L1 cache
script kiddie
hard disk
GUI
33. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
Web conference
hard disk
CAD
RFID
34. A server that you connect to to start a chat session.
chat client
integrated circuit
optical mouse
Storage Device
35. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
scanner
IP address
preemptive multitasking
sleep mode
36. Internet teephony- enables users to speak to other users over the internet
VoIP
mashup
data collection device
worm
37. The fastest most powerful computer
supercomputer
firmware...
terminal
USB hub
38. A type of system software that allows users to perform maintenence type tasks
worm
http
microbrowser
utility program
39. Provids mobile users with a secure connection to the company server as if the user has a private line.
E- commerce
virtual provate network
bandwidth
script kiddie
40. ...
coaxial cable
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
multifunction peripheral
router
41. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
spooling
coaxial cable
online auction
capacity
42. Protective case for optical discs
utility programs
network architecture
biometrics
jewel box
43. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
Storage Media
fiber optic cable
Point of Sale terminals
parallel processing
44. The process of dividing the disk into tracks and sectors
formatting
power supply
USB hub
botnets
45. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
CU
hard disk
synthesizer
EULA
46. A collection of data organized in a manner that allows access retrieval and use of that data
database
noise
hibernate
digital forensics
47. Local area network- network tat connects computers and devices in a limited geographical area such as a home
Operating system
CAPTCHA
MRAM
LAN
48. Two main parts are processor and memory.
volatile memory
Motherboard
message board
formatting
49. All computers connected to central device. Hub or switch
hacker
star network
video card
memory module
50. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
Content Aggregator
Denial of Service attack
ARPA
registrar