SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any data or instructions entered into the memory of the computer
Input
virus signature
dialog box
GPU
2. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
online security service
network standard
utility program
Web Application
3. Sends documents to be printed to a buffer instead of sending them immediately to the printer.
spooling
transistor
SRAM
TLS
4. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
ASCII
cyberextortionist
dot matrix printer
CAPTCHA
5. Graphical User interface - interact with software using text - graphics - and icons
GUI
token ring
groupware...
FireWire port
6. Cables - telephone lines - radio networks - satellites
bus width
Transmission media
system bus
back door
7. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
TLS
database
shareware...
hard disk
8. Computer automatically can configure adapter cards and other peripherals as you install them
bandwidth
telemedicine
Plug and Play
hypermedia
9. Device with a monitor - keyboard - and memory
wireless Internet service provider
Application software...
Terminal
RTLS
10. Mathematical formula that generates a code from the contents of the message
device dependant
hash
kernal
client/server
11. Power on self test to check the various system components and the results are compared with data in a CMOS chip
Dial Up line
POST
expansion slot
site license
12. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
proxy server
hypermedia
multifunction peripheral
machine cycle
13. The technology of authenticating a persons identity by verifying a personal characteristic.
biometrics
multifunction peripheral
Point of Sale terminals
Mobile Device
14. A window that provides info - presents availabe options - or requests a response.
stored program concept
broadband internet service
dialog box
cyberterrorist
15. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
wireless access point
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
ergonomics
heat sink
16. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
scanner
embedded computer
wireless Internet service provider
sleep mode
17. Allows a user to plan schedule and track costs of a project
project management software...
application software...
Home user
adware
18. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
digital modem
commands
access control
memory module
19. Provides the user with a physcial response from the device
disk controller
tactile output
register
Laser printer
20. The destructive event or prank the program intended to deliver
L1 cache
neural network
registrar
payload
21. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
solid state drive
ethernet
TCP/IP
hot spot
22. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
http
analog
disk controller
USB hub
23. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
cold boot
spyware
BIOS
EULA
24. Joins a cable and a port
integrated circuit
DLP projector
CU
connector
25. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
peripheral
GPU
Home user
system unit
26. A personal computer you can carry from place to place
Mobile Computer
fixed wireless
SMTP
Web Application
27. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
Noise
Web Browser
Application software...
trackball
28. A small metal or plastic device that uses pressure instead of ink.
cross - platform
device independent
stylus
Linux
29. Major carriers of network traffic
jewel box
Internet Backbone
network license
access control
30. Provide Wi Fi to mobile computers or devices
Hot spots
bit
ergonomics
UNIX
31. Rambus inline memory module house RDRAM chips
pointing stick
http
system software...
RIMM
32. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
server
Home user
DVI
image processing
33. Surgeon performs operation by controlling robot when not in the same area as patient.
hacker
telesurgery
USB hub
SRAM
34. Other computers and mobile devices on the networ that rely on the server for its resources
bus
SRAM
motherboard
client
35. Connects the processor to cache.
system unit
bus network
backside bus
system software...
36. Msot retail stores use POS to record purchases - process cards - and update inventory
Point of Sale terminals
noise
RTLS
network card
37. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
keygen
RAID
hypermedia
botnets
38. Two or more computers transfer data - instructions - and information.
Memory
node
rootkit
communications
39. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Web conference
communications channel
download
CAPTCHA
40. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
multi- core processor
VAN
network topology
dot matrix printer
41. Case of the system unit to protect internal damage
digital signature
chasis...
registrar
dialog box
42. The amount of data - instructions - and information that can travel over communications channel
bandwidth
volatile memory
Notebook Computer
application software...
43. Completely Automated Public Turing test to tell Computers and Humans Apart.
noise
USB port
CAPTCHA
SRAM
44. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
client/server
network topology
motherboard
analog
45. Personal information manager is application software that includes features to help users organize personal info
PIM
Home user
superscalar
Dedicated line
46. Integrates the functions of a processor - memory and a video card on a single chip.
site license
VR world
system on a chip
adapter card
47. The last section of the domain name
Top level domain
Servers
star network
ROM
48. The fastest most powerful computer
system software...
proxy server
Storage Device
supercomputer
49. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
device dependant
ALU
access time
overvoltage
50. Storage over an internet service
cloud storage
Home user
sound card
Bluetooth