SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
Latency
pipelining
crimeware
L2 cache
2. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
rootkit
DSL
parallel processing
System Software...
3. Some viruses are hidden in it - which are instructions saved in software such as word processing or spreadsheet program
project management software...
ROM
adapter card
macros
4. Mathematical formula that generates a code from the contents of the message
software suite
hash
spoofing
formatting
5. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
Internet Backbone
DTP
buffer
DNS Server
6. Power on self test to check the various system components and the results are compared with data in a CMOS chip
VR world
EDI
POST
GPU
7. Uses devices that emit and sense light to detect the mouses movement
L1 cache
VAN
optical mouse
platter
8. They can execute more than one instruction per clock cycle
twisted pair cable
shareware...
proxy server
superscalar
9. Does not require a newsreader - easier to use than a newsgroup
heat pipe
certificate authority
ROM
message board
10. Privately owned and limited to a specific vendor or computer model.
Internet Backbone
proprietary software...
mashup
FireWire port
11. A device that enables you to join a port and a connector that are both male or female
Web Application
expansion bus
botnets
gender changer
12. Completely Automated Public Turing test to tell Computers and Humans Apart.
download
File compression utility
Plug and Play
CAPTCHA
13. A collection of computers and devices connected together - via communications devices and transmissions media.
IM
fiber optic cable
network
site license
14. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
coaxial cable
pipelining
protocol
token ring
15. Electrical supply drops.can cause data loss but generally not cause equipment damage
ciphertext
plug- in
unauthorized access
undervoltage
16. Hypertext transfer protocol
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Plug and Play
Bluetooth
http
17. Each computer or device on the network. often connected by cables
node
downloading
expansion bus
warm boot
18. Hides within or looks like a legitimate program such as a screen saver
Trojan Horse
hypertext
machine cycle
hot plugging
19. Dish shaped antenna for internet connection
access time
neural network
fixed wireless
Netbook
20. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
document management software...
Firewall
warm boot
gender changer
21. System board- is the main circuit board of the system unit.
hibernate
motherboard
virus
Netiquette
22. The smallest unit of disk space that stores data and info
cluster
warm boot
system clock
jack
23. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
Operating system
Trojan Horse
access time
chasis...
24. On software is infinitie space and depth for VR
cyberextortionist
EULA
VR world
player
25. Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as the processor
heat sink
ghosting
certificate authority
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
26. Organization that sells and manages domain names
RIMM
Content Aggregator
nonvolatile memory
registrar
27. Uses fiber optic cable for internet connection.
Motherboard
back door
Fiber to the Premises
digital signature
28. Acts as an electronic switch that opens or closes the circuit for electrical charges
Domain name
motherboard
site license
transistor
29. The destructive event or prank the program intended to deliver
Denial of Service attack
OMR
Storage Media
payload
30. An electrical disturbance that can degrade communications
hacker
noise
wireless Internet service provider
terminal
31. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
MRAM
bus width
MAN
RFID
32. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
Firewall
certificate authority
digital signature
virtual provate network
33. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
image processing
pretty good Privacy
spyware
cable modem
34. Circuit boards tjay provide connections and functions not built into the motherboard
synthesizer
FireWire port
adapter cards
rootkit
35. zombie
compromised computer
proxy server
animated Gif...
ghosting
36. Controls timing of all computer operations
PIM
DLP projector
system clock
Linux
37. Shrinks file sizes - lossy-you will be able to restore the file to its exact original state - lossless - compressed file can be returned to its original state
stylus
hibernate
File compression utility
Latency
38. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
token ring
cold boot
nonvolatile memory
online auction
39. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Dial up modems
fiber optic cable
Desktop Computer
L1 cache
40. Fetching - decoding - executing - storing
machine cycle
spoofing
fault tolerant computer
Mobile Device
41. A legal agreement that permits users to install the software on multiple computers.
connector
touchpad
site license
Noise
42. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
Output
proxy server
keygen
EULA
43. Human speech is bc of its continous signal that vary in strength and quality
USB port
Content Aggregator
analog
sleep mode
44. A communications device that enables a computer or device that does not have a built in networking capability to access a network
POST
multi- core processor
network card
Motherboard
45. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
online security service
jack
Laser printer
Software...
46. Reorganizing it so that the files are store in continous sectors
product activation
network
wordwrap
defragmenting
47. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
streaming
solid state drive
application software...
Bluetooth
48. Converst computer output into a video signal that travels through a cable through the monitor which displays image on the screen
EDI
script kiddie
FireWire port
video card
49. A set of programs that coordinates all of the activies among computer hardware devices.
liquid flow technology
Operating system
Web conference
thread
50. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
chip
Linux
hot spot
VAN