SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
backside bus
disk controller
network
Bluetooth
2. Anopening inside the system unit in which you can install additional equipment. Different than a slot
CPU
plug- in
warm boot
Bay
3. Consists of electronic components that store instructions waiting to be executed (On motherboard)
trackball
Memory
power supply
TCP/IP
4. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
Trojan Horse
neural network
capacity
server
5. The design of computers - devices - and media in the network
warm boot
RIMM
network architecture
CAPTCHA
6. Random access memory- memory chips that can be read from and written to by the processor and other devices
wireless Internet service provider
Mainframe
Storage Media
RAM
7. Smaller than heat sink cools processors in notebook comps
CMOS
heat pipe
virus signature
business software...
8. Magnetoresistive ram- stores data using magnetic charges not electrical. Retains contents after power is out
chasis...
Dial up modems
Input
MRAM
9. A communications device that can convert digital signals to analog signals and analog signals to digital signals so data can travel along an analog telephone line. In the form of an adapter card you insert in an expansion slot on motherboard.
player
ASCII
Dial up modems
byte
10. A rectangular opeining that typically holds disk drives.
Drive Bay
optical disc
Communications device
pretty good Privacy
11. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
RFID
application software...
Content Aggregator
supercomputer
12. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
drive bay
Operating system
UNIX
wireless access point
13. Internet connections using regular copper telephone lines.
register
player
DSL
bandwidth
14. Moving pictures experts group is a popular video compression standard
peer to peer network
mpeg
802.11
network
15. A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. email spoofing. IP spoofing
LAN
digital
spoofing
cloud storage
16. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
Input
optical reader
peripheral
17. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
CMOS
business software...
platter
volatile memory
18. Company that provides wireless internet access to computers
wireless Internet service provider
ghosting
System Unit
liquid flow technology
19. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
adware
digital certificate
register
GUI
20. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
tactile output
RSS 2.0
E- commerce
wireless Internet service provider
21. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
microbrowser
Information system
Domain name system
Intrusion detection software...
22. The smallest unit of disk space that stores data and info
DIMM
biometrics
cluster
dialog box
23. Short for key generator creats software registration numbers and sometimes activation codes.
access control
keygen
adware
Transmission media
24. The original article and all subsequent related replies
thread
network
embedded operating system
hard disk
25. Local area network- network tat connects computers and devices in a limited geographical area such as a home
worm
Domain name
Application software...
LAN
26. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
twisted pair cable
platter
density
pixel
27. Storage over an internet service
microbrowser
botnets
sleep mode
cloud storage
28. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
network license
server
E- commerce
gender changer
29. Contains 10 or fewer comps - with similar reponsibilities and capabilities
peer to peer network
sound card
Information system
hard disk
30. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
biometrics
ghosting
bit
optical reader
31. Circuit boards tjay provide connections and functions not built into the motherboard
virtual provate network
integrated circuit
telemedicine
adapter cards
32. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
dialog box
player
DIMM
33. When businesses use the internet to sell products
DSL
cloud storage
IM
E- retail
34. The destructive event or prank the program intended to deliver
payload
Top level domain
spider
Firewall
35. Computer is usually connected to the internet the entire time it is turned on (cable - DSL - fiber - radio signals - satellite)
Web Application
power supply
broadband internet service
message board
36. Errors that can be recognized by automatic update
expansion bus
VAN
bugs
digital forensics
37. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
SMTP
optical disc
hot plugging
device dependant
38. Completely Automated Public Turing test to tell Computers and Humans Apart.
CAPTCHA
system unit
firmware...
solid state drive
39. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
DSL
Laser printer
expansion slot
E- commerce
40. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
Input
router
heat sink
Web Application
41. Dual inline memory module forms two sets of contact
undervoltage
DIMM
dialog box
CAD
42. A case that contains the electronic components of the computer that are used to process data. (connected to motherboard)
System Unit
Netiquette
Dial- up access
CU
43. Someone who uses internet to destroy or damage computers for political reasons.
cyberterrorist
CAM
communications channel
volatile memory
44. Cables - telephone lines - radio networks - satellites
Laser printer
ROM
heat pipe
Transmission media
45. Text version of an IP address
SIMM
Domain name
disk fragmenter
bugs
46. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Home user
IM
Software...
preemptive multitasking
47. A temporary connection that uses one or more analog telphone lines for communications.
GPU
terminal
Dial Up line
RAM
48. Processor begins to fetch a second instruction before it completes the full machine cycle
Point of Sale terminals
disk fragmenter
spyware
pipelining
49. Connects the processor to cache.
recieving device
DTP
hypertext
backside bus
50. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
unethical employees
twisted pair cable
Firewall
spyware