SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
wordwrap
E- commerce
nonvolatile memory
streaming
2. Computing device small enough to hold in your hand
OMR
device independent
Domain name
Mobile Device
3. Method that the internet uses to store domain names and their corressponding IP addresses
DRAM
Domain name system
access control
UNIX
4. Rambus inline memory module house RDRAM chips
sleep mode
peer to peer network
RIMM
broadband internet service
5. Instead of port - jack is used to identify audio or video ports.
ROM
jack
network license
E- retail
6. Msot retail stores use POS to record purchases - process cards - and update inventory
script kiddie
Point of Sale terminals
hash
GUI
7. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
Application software...
Communications device
optical mouse
Mainframe
8. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
DVI
disk controller
transistor
communications channel
9. Transmission media on which the data - instructions - information travel.
Web conference
worm
Servers
communications channel
10. A case that contains electronic components of the computer used to process data.
player
shareware...
undervoltage
system unit
11. ...
ring network
Top level domain
network architecture
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
12. A cable forms a closed loop with all computers. one direction
Motherboard
plug- in
hypermedia
ring network
13. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
bus network
EFT
Domain name system
pixel
14. Saves any open docs or programs to hardisk before removing power
digital certificate
ALU
bus
hibernate
15. A vulnerable computer that is set up to entice an intruder to break into it.
Output
honeypot
capacity
System Unit
16. Storage over an internet service
Communications device
Plug and Play
cloud storage
IM
17. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
communications channel
cable modem
application software...
bit
18. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
pipelining
spooling
preemptive multitasking
19. Internet teephony- enables users to speak to other users over the internet
Top level domain
VoIP
RFID
USB hub
20. Consists of electronic components that store instructions waiting to be executed (On motherboard)
online auction
cable modem
Memory
rootkit
21. Used to gain competitive advantage
UNIX
Processor
corporate spies
virus
22. A colection of individual programs available together as a unit. lower cost and ease of use
E- retail
peer to peer network
software suite
bugs
23. Health care professions conduct live conferences on the computer
message board
ciphertext
telemedicine
hacker
24. They can execute more than one instruction per clock cycle
register
superscalar
project management software...
VAN
25. Data that has been processed in a useful form- text - graphics - audio - video
digital
solid state drive
Output
POP3
26. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
MAN
System Software...
preemptive multitasking
sending device
27. Pressure sensitive eraser shaped pointing device
business software...
commands
pointing stick
sending device
28. The fastest most powerful computer
air mouse
cyberextortionist
application software...
supercomputer
29. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
program
Firewall
adware
platter
30. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
pixel
Laser printer
access time
adware
31. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
download
DVI
network topology
recieving device
32. (laptop computer) portable personal computer often able to fit in your lap
jack
broadband internet service
shareware...
Notebook Computer
33. One or more computers on the network request services from the server. 10 or more computers
client/server
sleep mode
client
trackball
34. Allows users to keep typing without using enter at the end of each line
POP3
chasis...
utility program
wordwrap
35. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
Web conference
network
noise
OCR
36. Any unwanted signal usually varying quickly
Noise
TLS
EULA
Denial of Service attack
37. The number of bits in an area on a storage medium - Higher density means more storage capacity
density
digital signature
phishing
audit trail
38. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
Denial of Service attack
buffer
hard disk
thread
39. Serves as the interface between the user - the app software - and the computers hardware
system software...
touchpad
Transmission media
superscalar
40. DoS attack is an assult whose purpose is to disrupt computer access to an Internet service such as the Web or email
volatile memory
honeypot
hypermedia
Denial of Service attack
41. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
cloud storage
VAN
terminal
USB hub
42. Can be peropheral or chip - creates sound from digital instructions.
newsgroup
Dial- up access
synthesizer
MAN
43. Screen savors were made to prevent this - which etched images permanently onto the screen
Storage Device
ghosting
product activation
density
44. A number that uniquely identifies each computer or device connected to the internet (0-255)
IP address
worm
adapter card
access time
45. Dual inline memory module forms two sets of contact
volatile memory
TCP/IP
DIMM
ALU
46. System board- is the main circuit board of the system unit.
telemedicine
Bay
certificate authority
motherboard
47. Major carriers of network traffic
Internet Backbone
Personal Computers
document management software...
nonvolatile memory
48. Started the internet as a networking project
virus
streaming cam
access control
ARPA
49. A program or set of instructions in a program that allow users to bypass security controls when accessing a program - computer - or network. A rootkit can be a back door
UNIX
back door
online security service
L1 cache
50. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
corporate spies
pipelining
Dial- up access
parallel processing