SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Obtains data directly at the location where the transaction or event takes place.
bugs
ring network
data collection device
pipelining
2. Started the internet as a networking project
chasis...
ARPA
NAS
fixed wireless
3. A window that provides info - presents availabe options - or requests a response.
dialog box
cracker
DSL
twisted pair cable
4. The original article and all subsequent related replies
Input
thread
database
noise
5. Two or more computers transfer data - instructions - and information.
communications
router
Information system
ROM
6. The role of memory to store both data and programs
fixed wireless
project management software...
touchpad
stored program concept
7. When businesses use the internet to sell products
Internet Backbone
E- retail
database
video card
8. A cable forms a closed loop with all computers. one direction
product activation
Dial Up line
Input
ring network
9. Type of system software that allows a user to perform maintenance- type tasks usually related to managing a computer - its devices - or its programs. (transfer photos to an optical disk.
back door
utility programs
utility program
RFID
10. Most computers (on and off)
Dial- up access
digital
Input
Transmission media
11. They consist entirely of electronic components and contain no moving parts.
solid state media
Denial of Service attack
Trojan Horse
downloading
12. Can connect multiple types of devices that require faster data transmission speeds.
undervoltage
Mainframe
FireWire port
Communications device
13. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
Servers
cyberextortionist
Latency
14. Read only memory refers to memory chips storing permanent data and instructions (firmware)
ROM
backside bus
Hot spots
FireWire port
15. Holds one or more disk drives
utility program
E- retail
drive bay
DTP
16. Graphical User interface - interact with software using text - graphics - and icons
warm boot
GUI
access control
trackball
17. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
communications channel
Desktop Computer
worm
driver
18. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
platter
chat client
spider
botnets
19. Special software to listen to audio
player
unauthorized access
digital signature
back door
20. A collection of data organized in a manner that allows access retrieval and use of that data
business software...
CU
MMS
database
21. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
digital
DTP
undervoltage
EDI
22. Builds and maintains lists of words found on websites. Useful for search engines
spider
cable modem
File compression utility
honeypot
23. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
Dial up modems
e- learning
RFID
system bus
24. Short for key generator creats software registration numbers and sometimes activation codes.
keygen
undervoltage
cloud storage
plaintext
25. A special purpose computer that functions as a component in a larger product. Small with limited hardware
overvoltage
spooling
adware
embedded computer
26. Company that provides wireless internet access to computers
online security service
wireless Internet service provider
analog
digital
27. On software is infinitie space and depth for VR
botnets
proxy server
VR world
node
28. Uses the cell phone network to connect to the internet wirelessly from a notebook computer - smart phone - or mobile device
volatile memory
byte
wireless modem
certificate authority
29. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
analog
RFID
pipelining
embedded computer
30. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Laser printer
air mouse
WAN
GPU
31. Provide Wi Fi to mobile computers or devices
Hot spots
adapter cards
SIMM
disk controller
32. Program is one that runs the same on multiple operating systems
cross - platform
ISP
E- commerce
software suite
33. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
OSP
hot plugging
address
USB hub
34. Storage over an internet service
stored program concept
cloud storage
Domain name system
L2 cache
35. A temporary connection that uses one or more analog telphone lines for communications.
Dial Up line
hacker
bus width
OSP
36. Processor begins to fetch a second instruction before it completes the full machine cycle
CMOS
pipelining
System Software...
overvoltage
37. The design of computers - devices - and media in the network
transistor
adware
network architecture
CERT/CC
38. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
software suite
cross - platform
CMOS
download
39. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
virtual provate network
spoofing
data collection device
MAN
40. Is an online area in which isers have wrtten discussions about a particular subject.
SMTP
device independent
utility program
newsgroup
41. The amount of data - instructions - and information that can travel over communications channel
streaming
formatting
EDI
bandwidth
42. (laptop computer) portable personal computer often able to fit in your lap
ALU
system unit
gender changer
Notebook Computer
43. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
density
VR
Desktop Computer
44. A type of storage media that consists of flat disc and is written and read by a laser
optical disc
telesurgery
buffer
fixed wireless
45. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
Processor
Mobile Computer
expansion slot
Desktop Computer
46. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
ALU
phishing
Motherboard
machine cycle
47. The operating system interrupts a program that is executing and passes control to another program waiting to be executed. Operating system regains control if one program stops operating properly
supercomputer
memory slots
preemptive multitasking
router
48. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
ghosting
access time
ISP
Laser printer
49. Moving pictures experts group is a popular video compression standard
adapter card
spoofing
fixed wireless
mpeg
50. Transmission control protocol is a netwrok standard that defines how data are routed from one end of a network to another - ensuring data arrives correctly. Packet switching
TCP/IP
USB hub
backside bus
ASCII