SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Moving pictures experts group is a popular video compression standard
wireless Internet service provider
back door
CPU
mpeg
2. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
capacity
bus
air mouse
Laser printer
3. A number that uniquely identifies each computer or device connected to the internet (0-255)
adapter cards
fiber optic cable
hot spot
IP address
4. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
fault tolerant computer
traffic
digital modem
fiber optic cable
5. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
L2 cache
peer to peer network
message board
cold boot
6. A storage device that typically uses flash memory to store data instructions and information. Faster - use less power - last more than 5 years - higher failure rate - cost much more
FireWire port
solid state drive
telemedicine
MICR
7. Power on self test to check the various system components and the results are compared with data in a CMOS chip
microbrowser
POST
IP address
firmware...
8. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
parallel processing
e- learning
communications
spooling
9. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
sound card
Servers
program
ISP
10. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
application software...
touchpad
Mainframe
newsreader
11. Short for key generator creats software registration numbers and sometimes activation codes.
superscalar
hacker
virus signature
keygen
12. Contains many microscopic pathways capable of carrying an electrical current
power supply
Desktop Computer
business software...
integrated circuit
13. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
Trojan Horse
wireless access point
crimeware
disk cleanup
14. Internet teephony- enables users to speak to other users over the internet
virus signature
VoIP
commands
Servers
15. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
utility programs
animated Gif...
video card
16. The layout of the computers and devices ina cmonnunications network. Star - bus - ring.
network topology
port
Memory
expansion slot
17. A unique number that identifies the location of a byte in memory
Plug and Play
utility program
address
DRAM
18. Hides within or looks like a legitimate program such as a screen saver
Trojan Horse
chasis...
software suite
SIMM
19. A motion sensing mouse - allows you to control objects by moving the mouse in predetermined directions through air
network topology
air mouse
disk fragmenter
System Unit
20. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
Personal Computers
register
System Software...
OCR
21. Major carriers of network traffic
script kiddie
Internet Backbone
online security service
CU
22. Graphical User interface - interact with software using text - graphics - and icons
Point of Sale terminals
TLS
player
GUI
23. Desktop publishing software enables pro designers to create sophisticated docs that contain text graphics nd colors.
parallel processing
power supply
DTP
router
24. Universal serial bus port connects peripherals to the computer
USB port
multifunction peripheral
multi- core processor
Dial up modems
25. A family member on a computer
solid state drive
Home user
Dedicated line
spooling
26. Initiates an instruction to transmit data - instructions - or information.
streaming
streaming cam
sending device
Mobile Computer
27. Personal information manager is application software that includes features to help users organize personal info
PIM
Communications device
analog
System Unit
28. Continues to operate when one of its components fails - ensuring that no data is lost
player
token ring
fault tolerant computer
chasis...
29. Builds and maintains lists of words found on websites. Useful for search engines
spider
corporate spies
kernal
optical mouse
30. Dish shaped antenna for internet connection
keygen
utility program
fixed wireless
ALU
31. Retains existing application software and data files even if you can change computer models or vendors
Storage Media
download
touchpad
device independent
32. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Trojan Horse
download
noise
client
33. A server outside the organizations network that controls which communications pass into the organizations network. Screens incoming and outgoing messages
video card
device dependant
proxy server
memory slots
34. Company that provides wireless internet access to computers
program
dialog box
wireless Internet service provider
player
35. Enahnces the sound generating capabilites of a personal computer
POP3
superscalar
sound card
access control
36. Msot retail stores use POS to record purchases - process cards - and update inventory
IrDA Port
Point of Sale terminals
OSP
node
37. Loses its contents when power is turned off (RAM)
MRAM
TCP/IP
volatile memory
download
38. A series of network standards that specifies how two wireless devices communicate over the air with each other. MIMO
Motherboard
freeware...
chasis...
802.11
39. A communications device that enables a computer or device that does not have a built in networking capability to access a network
DIMM
network card
wireless Internet service provider
system on a chip
40. Integrates the functions of a processor - memory and a video card on a single chip.
client/server
system on a chip
solid state media
project management software...
41. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
rootkit
client
warm boot
communications channel
42. Copyrighted software that is distributed at no cost for a trial period
VAN
Web conference
sending device
shareware...
43. Encrypted data
newsgroup
chasis...
message board
ciphertext
44. A program that hides in a computer and allows someone from a remote location to take control of the computer
TLS
system bus
rootkit
audit trail
45. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
scanner
disk fragmenter
spyware
network topology
46. Translates the domain name to its associated IP address so that data and information can be routed to the correct computer.
DNS Server
streaming
ghosting
e- learning
47. Joins a cable and a port
utility program
connector
hard disk
Top level domain
48. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
disk fragmenter
spyware
DSL
business software...
49. Type of notebook comp that is smaller and less powerful than a normal notebook comp
superscalar
RFID
Netbook
RAID
50. Fetching - decoding - executing - storing
chip
machine cycle
Point of Sale terminals
device dependant