SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software used by criminals
wordwrap
freeware...
proxy server
crimeware
2. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
microbrowser
Processor
VAN
utility program
3. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
EDI
Memory Cache
Bay
peripheral
4. Encrypted data
OSP
LAN
ciphertext
solid state media
5. Internet connections using regular copper telephone lines.
disk cleanup
hot spot
DSL
recieving device
6. Contains 10 or fewer comps - with similar reponsibilities and capabilities
shareware...
digital forensics
peer to peer network
memory slots
7. Perpetrator attempts to obtain your personal or financial info.
phishing
registrar
Noise
sending device
8. A rectangular opeining that typically holds disk drives.
RSS 2.0
Trojan Horse
Drive Bay
Application software...
9. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
ISP
Mainframe
network
byte
10. Designed for mobile devices
client
adapter cards
online security service
microbrowser
11. The role of memory to store both data and programs
stored program concept
e- learning
plug- in
warm boot
12. Integrates the functions of a processor - memory and a video card on a single chip.
bandwidth
traffic
system on a chip
Laser printer
13. Computer automatically can configure adapter cards and other peripherals as you install them
optical disc
device independent
chat client
Plug and Play
14. Someone who accesses a computer or network illegally. Some say they hack to improve security
VoIP
DVI
hacker
chasis...
15. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
DSL modem
Servers
program
system clock
16. Online service provider- has many members features along with internet access such as IM or Web browsers.
system unit
crimeware
IM
OSP
17. Other computers and mobile devices on the networ that rely on the server for its resources
W3C
cracker
client
Web conference
18. Each computer or device on the network. often connected by cables
NAS
GPU
node
ROM
19. Uses fiber optic cable for internet connection.
bus
communications channel
Fiber to the Premises
network standard
20. Can connect multiple types of devices that require faster data transmission speeds.
http
RAM
FireWire port
utility program
21. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
system on a chip
multifunction peripheral
Application software...
wordwrap
22. The design of computers - devices - and media in the network
network architecture
integrated circuit
cluster
power supply
23. A part of the motherboard and connects the processor to main memory
protocol
Software...
CMOS
system bus
24. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
connector
buffer
multi- core processor
L1 cache
25. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
Point of Sale terminals
buffer
recieving device
memory module
26. The process of dividing the disk into tracks and sectors
client/server
GPU
formatting
RTLS
27. Helps speed he processes of the comp bc it stores frequently used instructions and data (L1 - L2 cache) cache speeds up the processing time bc it stores frequently used instructions and data.
Memory Cache
RSS 2.0
trackball
peer to peer network
28. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
DRAM
IP address
overvoltage
bus network
29. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
IM
data collection device
network standard
pipelining
30. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Intrusion detection software...
Laser printer
device independent
embedded operating system
31. Consists of electronic components that store instrcuctions waiting to be executed by the processor - data needed by those instructions - and the results of processing data. Consist of one or more chips on the motherboard or some other circuit board o
defragmenting
crimeware
Memory
chasis...
32. Protective case for optical discs
superscalar
MAN
jewel box
Notebook Computer
33. A server that you connect to to start a chat session.
document management software...
chat client
byte
access time
34. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
firmware...
fault tolerant computer
plaintext
35. Serves as the interface between the user - the app software - and the computers hardware
system software...
Fiber to the Premises
embedded computer
proprietary software...
36. Communications activity. Handled by NSFnet.
shareware...
System Software...
traffic
Intrusion detection software...
37. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
E- commerce
Dial Up line
Netbook
OCR
38. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
OCR
registrar
embedded operating system
sound card
39. Used to track and identify the location of high risk or high value items.
drive bay
RTLS
802.11
capacity
40. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
RFID
digital
CAD
corporate spies
41. A type of system software that allows users to perform maintenence type tasks
communications
bus width
device dependant
utility program
42. Saves any open documents and programs to RAM and places computer into a low power state
protocol
Storage Media
sleep mode
system bus
43. Retains existing application software and data files even if you can change computer models or vendors
corporate spies
device independent
kernal
network
44. Graphics processing unit controls the manipulation and display of graphics on the display device.
Denial of Service attack
RAID
GPU
data collection device
45. A computer that delivers requested web pages to your computer
Internet Backbone
driver
Web Server
groupware...
46. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
802.11
player
Dial up modems
proprietary software...
47. A special purpose computer that functions as a component in a larger product. Small with limited hardware
embedded computer
Web conference
wireless Internet service provider
Netbook
48. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
download
kernal
stylus
cracker
49. Msot retail stores use POS to record purchases - process cards - and update inventory
access time
Internet Backbone
Point of Sale terminals
warm boot
50. A notcie that guarantees a user or web site is legit. E- commerce use it often
digital certificate
utility programs
Memory
data collection device