SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. On software is infinitie space and depth for VR
Dial- up access
utility programs
recieving device
VR world
2. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
proprietary software...
FireWire port
NAS
twisted pair cable
3. Media transmit multiple signals simutaneously. Download faster than upload
buffer
groupware...
broadband
cross - platform
4. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
client
rootkit
Intrusion detection software...
network card
5. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
pipelining
E- retail
botnets
6. Saves any open docs or programs to hardisk before removing power
animated Gif...
hibernate
ethernet
synthesizer
7. Device with a monitor - keyboard - and memory
liquid flow technology
Terminal
RFID
microbrowser
8. Hardware - software - data - people - procedures
OMR
Information system
chasis...
token ring
9. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Storage Media
digital certificate
server
address
10. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
memory slots
Memory Cache
embedded computer
access time
11. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
Noise
Point of Sale terminals
Web Browser
air mouse
12. Other computers and mobile devices on the networ that rely on the server for its resources
CPU
Mainframe
client
disk fragmenter
13. A computer that delivers requested web pages to your computer
Web Server
Domain name system
MMS
nonvolatile memory
14. Records in a file both successful and unsuccessful attempts.
VR
audit trail
BIOS
bus width
15. A type of always on connection that is established between two communications devices. better than dial up line
ghosting
Domain name
Dedicated line
pixel
16. Needed generally to participate in a newsgroup
Trojan Horse
certificate authority
newsreader
E- commerce
17. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
multifunction peripheral
broadband internet service
freeware...
worm
18. On the motherboard hold memory modules
virtual provate network
dialog box
network topology
memory slots
19. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
software suite
online security service
driver
virus
20. Optical mark recognition reads hand drawn marks such as circles or rectangles.
CMOS
DSL
OMR
bus
21. Combines several GIF images ina single GIF file.
http
CAM
RFID
animated Gif...
22. Joins a cable and a port
broadband
DSL modem
connector
program
23. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
802.11
system on a chip
OCR
fiber optic cable
24. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
crimeware
overvoltage
mpeg
Motherboard
25. Digital light processor uses tiny mirrors to reflect light
Netbook
IM
digital certificate
DLP projector
26. Application software that assists oeioke in becoming more effective and efficient while performing their daily business activities.
bandwidth
ISP
business software...
Laser printer
27. Sends digital data and info from a comp to a DSL line
botnets
Memory
disk cleanup
DSL modem
28. Value added network is a third party busniess that provides networking services such as secure data and information transfer - storage and email.
expansion slot
virtual provate network
VAN
noise
29. Contains 10 or fewer comps - with similar reponsibilities and capabilities
undervoltage
Trojan Horse
peer to peer network
defragmenting
30. Used to gain competitive advantage
corporate spies
ASCII
Operating system
payload
31. Copyrighted software that is distributed at no cost for a trial period
motherboard
Netiquette
Bay
shareware...
32. The study of workplace equipment design or how to arrange and design devices - machines - or workspace so that people and things interact safely and most efficiently.
Operating system
ergonomics
adware
transistor
33. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
RFID
machine cycle
Servers
DSL
34. Provides the user with a physcial response from the device
hypermedia
corporate spies
Home user
tactile output
35. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
online auction
Servers
touchpad
sleep mode
36. Electrical supply drops.can cause data loss but generally not cause equipment damage
system bus
cyberextortionist
undervoltage
SIMM
37. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
wireless Internet service provider
online auction
warm boot
38. The fastest most powerful computer
worm
stored program concept
plaintext
supercomputer
39. Single chip with two or more processor cores.
Web Server
multi- core processor
device independent
access time
40. Operating system on mobile devices that generally resides on ROM
embedded operating system
Trojan Horse
unauthorized access
access control
41. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
Transmission media
MAN
system clock
plug- in
42. Online service provider- has many members features along with internet access such as IM or Web browsers.
Software...
OSP
DVI
groupware...
43. A rectangular opeining that typically holds disk drives.
Drive Bay
unethical employees
access time
Mainframe
44. Control unit- part of the processor that directs and coordinates most of the operations on the computer.
Terminal
Personal Computers
digital
CU
45. Most computers (on and off)
digital
Web Application
RAM
undervoltage
46. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
Motherboard
analog
hot plugging
embedded computer
47. Obtains data directly at the location where the transaction or event takes place.
data collection device
image processing
POP3
IM
48. Internet connections using regular copper telephone lines.
DSL
fixed wireless
register
unauthorized access
49. A know specific pattern of virus code.
virus signature
drive bay
connector
Plug and Play
50. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
wireless access point
EULA
DRAM
CU