SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Uses a continous flow of fluids in a process that transfers the heated fluid away from the processor
Processor
Bluetooth
port
liquid flow technology
2. Company that provides wireless internet access to computers
gender changer
terminal
wireless Internet service provider
RIMM
3. A single user license agreement typically includes many of the following conditions that specify a users responsibility upon acceptance of the agreement
EULA
player
data collection device
expansion slot
4. Any data or instructions entered into the memory of the computer
hash
SMTP
Input
Servers
5. A case that contains electronic components of the computer used to process data.
DRAM
system unit
stylus
botnets
6. The process if a computer or device recieveing info info from the server on the internet
downloading
Content Aggregator
Output
trackball
7. Dynamic ram- chips must be re energized constantly or they lose their contents.
DRAM
CAD
unethical employees
touchpad
8. Records in a file both successful and unsuccessful attempts.
Home user
POST
audit trail
Mainframe
9. A unique number that identifies the location of a byte in memory
rootkit
802.11
address
Dial- up access
10. Links in text based documents
script kiddie
sleep mode
bus width
hypertext
11. CA resposible for giving out digital certificate
certificate authority
Communications device
Storage Media
MICR
12. Hides within or looks like a legitimate program such as a screen saver
Input
rootkit
Trojan Horse
cold boot
13. Single chip with two or more processor cores.
utility program
multi- core processor
pointing stick
broadband internet service
14. A small metal or plastic device that uses pressure instead of ink.
cloud storage
IM
stylus
compromised computer
15. They can execute more than one instruction per clock cycle
Domain name
superscalar
unethical employees
Bay
16. Uses devices that emit and sense light to detect the mouses movement
commands
WAN
spyware
optical mouse
17. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
warm boot
optical reader
botnets
Laser printer
18. Screen savors were made to prevent this - which etched images permanently onto the screen
network
Firewall
protocol
ghosting
19. Digital light processor uses tiny mirrors to reflect light
DLP projector
macros
DRAM
optical disc
20. The standard that outlines characteristics of how two network devices communicate
protocol
jack
multifunction peripheral
twisted pair cable
21. Two main parts are processor and memory.
Motherboard
Dedicated line
Point of Sale terminals
newsgroup
22. Anopening inside the system unit in which you can install additional equipment. Different than a slot
system on a chip
spyware
Bay
undervoltage
23. Saves any open docs or programs to hardisk before removing power
Operating system
fixed wireless
hibernate
solid state media
24. Hardware componenet that enables a computer to transmit and recieve data - instructions - and info to and from computers.
Communications device
phishing
network
virus
25. Latest version of Post office Protocol
compromised computer
hash
Memory
POP3
26. A program that restricts access to certain material on the web
client
web filter
VoIP
Storage Media
27. Extends the capabilites of a browser.
router
ergonomics
plug- in
network
28. Transmission media on which the data - instructions - information travel.
corporate spies
communications channel
embedded computer
video card
29. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
Mainframe
touchpad
virus
hash
30. A collection of data organized in a manner that allows access retrieval and use of that data
Web Application
register
database
Domain name system
31. Sends digital data and info from a comp to a DSL line
DSL
multifunction peripheral
DIMM
DSL modem
32. Circuit boards tjay provide connections and functions not built into the motherboard
worm
superscalar
adapter cards
device independent
33. Broadband modem- sends and recives digital data over the cable television
worm
cable modem
L2 cache
commands
34. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
server
adapter cards
Bay
VoIP
35. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
script kiddie
virus signature
video card
plug- in
36. Digital video intefaceenables digital signals to translate directly to the LCD monitor.
pretty good Privacy
DVI
Application software...
machine cycle
37. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hard disk
embedded computer
ghosting
rootkit
38. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
OCR
streaming
Mobile Device
access time
39. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
Bay
Firewall
platter
utility programs
40. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
protocol
DVI
trackball
Intrusion detection software...
41. Media transmit multiple signals simutaneously. Download faster than upload
Mobile Computer
hard disk
animated Gif...
broadband
42. Transport layer security provides encryption of all data that passes between a client and an internet server - Requires client to have digital certif
POP3
utility programs
TLS
hacker
43. An instruction that causes a program to perform a specific action.
client/server
multi- core processor
commands
adapter card
44. A communications device that sends and recieves data and info to and from digital line
Operating system
pointing stick
Top level domain
digital modem
45. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
telesurgery
Personal Computers
ALU
Input
46. Amercian Standad code for information interchange - is the most widely used coding scheme to represent data
ASCII
system clock
ergonomics
corporate spies
47. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
Linux
fiber optic cable
Servers
neural network
48. Contain permanently writeen data - instructions - and information
rootkit
fiber optic cable
network
firmware...
49. Used to track and identify the location of high risk or high value items.
stylus
superscalar
RTLS
kernal
50. When businesses use the internet to sell products
video card
client/server
hash
E- retail
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests