SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
Motherboard
system clock
registrar
dot matrix printer
2. Acts as an electronic switch that opens or closes the circuit for electrical charges
transistor
CAM
Transmission media
capacity
3. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
FireWire port
twisted pair cable
Storage Device
turnaround document
4. The number of bytes a storage medium can hold
rootkit
hypertext
telemedicine
capacity
5. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
image processing
cable modem
site license
network architecture
6. A family member on a computer
DLP projector
buffer
message board
Home user
7. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
CMOS
spider
hacker
token ring
8. Rambus inline memory module house RDRAM chips
RIMM
Mainframe
Bluetooth
disk controller
9. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
hibernate
ASCII
E- commerce
DNS Server
10. The technology of authenticating a persons identity by verifying a personal characteristic.
superscalar
Terminal
optical disc
biometrics
11. Controls timing of all computer operations
Firewall
expansion bus
PNG
system clock
12. Mathematical formula that generates a code from the contents of the message
NAS
L2 cache
hash
Linux
13. Graphical User interface - interact with software using text - graphics - and icons
GUI
Top level domain
POST
RAM
14. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
data collection device
EFT
Firewall
Mainframe
15. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
star network
802.11
Motherboard
video card
16. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
air mouse
ISP
DTP
Personal Computers
17. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
Intrusion detection software...
wireless modem
Software...
Operating system
18. Computing device small enough to hold in your hand
token ring
Mobile Device
botnets
pipelining
19. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
parallel processing
volatile memory
scanner
Web conference
20. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
memory slots
System Unit
solid state drive
bandwidth
21. A communications device that enables a computer or device that does not have a built in networking capability to access a network
network card
network
download
Linux
22. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
virtual provate network
hot plugging
memory slots
online auction
23. Instead of port - jack is used to identify audio or video ports.
ISP
crimeware
jack
fixed wireless
24. Errors that can be recognized by automatic update
Hot spots
bugs
audit trail
disk cleanup
25. Latest version of Post office Protocol
Laser printer
access control
online security service
POP3
26. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
Mainframe
Desktop Computer
DNS Server
chasis...
27. Unencrypted readable data
superscalar
connector
wireless Internet service provider
plaintext
28. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
DTP
virus
node
fixed wireless
29. Picure messaging can occur from mobile to mobile and mobile to email
Processor
CAM
MMS
unethical employees
30. The delivery of education via some electronic method such as the internet - networks - or optical disks.
hacker
e- learning
Servers
newsgroup
31. Graphic file (JPEG - GIF) slowly replacing GIF
disk fragmenter
network architecture
PNG
video card
32. Does not require a newsreader - easier to use than a newsgroup
Web Application
message board
crimeware
motherboard
33. Connects the processor to cache.
Hot spots
digital modem
backside bus
network card
34. Builds and maintains lists of words found on websites. Useful for search engines
E- commerce
expansion slot
multifunction peripheral
spider
35. A collection of data organized in a manner that allows access retrieval and use of that data
CAD
database
DLP projector
Transmission media
36. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
Intrusion detection software...
hot plugging
e- learning
coaxial cable
37. Privately owned and limited to a specific vendor or computer model.
proprietary software...
touchpad
audit trail
Bay
38. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
TCP/IP
Trojan Horse
certificate authority
39. A small metal or plastic device that uses pressure instead of ink.
network card
spooling
stylus
backside bus
40. Instant messaging - Mobile to mobile - mobile to personal computer - web to mobile
pipelining
web filter
groupware...
IM
41. Pressure sensitive eraser shaped pointing device
DNS Server
pointing stick
plug- in
Domain name system
42. Records in a file both successful and unsuccessful attempts.
ring network
Latency
audit trail
optical reader
43. Moving pictures experts group is a popular video compression standard
Linux
Domain name system
network
mpeg
44. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
integrated circuit
fiber optic cable
hot spot
star network
45. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
heat pipe
IP address
CPU
cluster
46. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
script kiddie
multifunction peripheral
jewel box
Laser printer
47. Saves any open documents and programs to RAM and places computer into a low power state
Noise
warm boot
sleep mode
hacker
48. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
undervoltage
application software...
ASCII
LAN
49. Retains existing application software and data files even if you can change computer models or vendors
RTLS
digital modem
device independent
Mobile Computer
50. A rectangular opeining that typically holds disk drives.
software suite
Drive Bay
dot matrix printer
Firewall