SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
cracker
peer to peer network
backside bus
Dial- up access
2. Copyrighted software that is distributed at no cost for a trial period
CMOS
shareware...
density
RSS 2.0
3. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
RSS 2.0
preemptive multitasking
DTP
digital modem
4. (laptop computer) portable personal computer often able to fit in your lap
Notebook Computer
client/server
disk controller
drive bay
5. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
UNIX
device independent
RTLS
EDI
6. Allows the processor to communicate with peripherals.
CERT/CC
expansion bus
hash
L1 cache
7. Used to gain competitive advantage
tactile output
corporate spies
LAN
network card
8. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
Application software...
RTLS
utility programs
bus
9. A small flat rectangular pointing device that is sensitive to pressure and motion.
Motherboard
touchpad
chip
L1 cache
10. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
virtual provate network
noise
recieving device
register
11. Broadband modem- sends and recives digital data over the cable television
backside bus
MMS
OCR
cable modem
12. Any data or instructions entered into the memory of the computer
Input
hot spot
supercomputer
Mainframe
13. Provides the user with a physcial response from the device
Netiquette
tactile output
Mainframe
EDI
14. Internet access that takes place when the modem in your computer connects to the Internet via a standard telephone line that transmits data and information using an analog (continuous wave pattern) signal.
L1 cache
broadband
stored program concept
Dial- up access
15. Dual inline memory module forms two sets of contact
Memory
system software...
byte
DIMM
16. Determines the number of bits that can be transmitted at one time
CPU
bus width
software suite
CAPTCHA
17. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
ethernet
solid state drive
GUI
RAID
18. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Laser printer
System Software...
utility program
ISP
19. Uses fiber optic cable for internet connection.
Fiber to the Premises
bit
plaintext
multi- core processor
20. When online meetings take place on the web
Web conference
Software...
PNG
shareware...
21. Initiates an instruction to transmit data - instructions - or information.
TLS
expansion slot
memory slots
sending device
22. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
Point of Sale terminals
virtual provate network
EDI
23. Has the illusion of moving images becuase it sends a continuos stream of images
liquid flow technology
pipelining
ciphertext
streaming cam
24. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
backside bus
rootkit
image processing
Plug and Play
25. Allows users to keep typing without using enter at the end of each line
streaming cam
virus signature
application software...
wordwrap
26. Allows a user to plan schedule and track costs of a project
groupware...
project management software...
formatting
OCR
27. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
recieving device
Web Server
Netiquette
dot matrix printer
28. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
digital certificate
Processor
ASCII
firmware...
29. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
optical mouse
terminal
network standard
ARPA
30. Graphics processing unit controls the manipulation and display of graphics on the display device.
Intrusion detection software...
optical reader
File compression utility
GPU
31. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
digital signature
Memory Cache
virtual provate network
MICR
32. Popular for LAN. single central cable.
bus network
hot plugging
pointing stick
WAN
33. A personal computer you can carry from place to place
Trojan Horse
Mobile Computer
volatile memory
mpeg
34. Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
Web Application
air mouse
peripheral
defragmenting
35. PGP an encryption program
pretty good Privacy
Servers
Point of Sale terminals
newsreader
36. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
warm boot
ethernet
network card
Memory
37. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
worm
ethernet
keygen
Dial- up access
38. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
System Unit
L2 cache
CAPTCHA
e- learning
39. Consumer consumer e commerce.
Web conference
online auction
preemptive multitasking
Noise
40. The fastest most powerful computer
Hot spots
token ring
Storage Media
supercomputer
41. Perpetrator attempts to obtain your personal or financial info.
cross - platform
phishing
newsreader
Firewall
42. A legal agreement that allows multiple users to access the software on the server simutaneously
network license
optical disc
streaming cam
ring network
43. Provids mobile users with a secure connection to the company server as if the user has a private line.
peripheral
pixel
virtual provate network
ghosting
44. Can be peropheral or chip - creates sound from digital instructions.
sleep mode
adapter cards
EDI
synthesizer
45. A know specific pattern of virus code.
network topology
CPU
Netiquette
virus signature
46. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
adware
System Unit
VR
Software...
47. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
corporate spies
Web Server
token ring
honeypot
48. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
system on a chip
Motherboard
bus width
wireless access point
49. Controls timing of all computer operations
system clock
Servers
wordwrap
Firewall
50. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
document management software...
TLS
CU
machine cycle