SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Errors that can be recognized by automatic update
volatile memory
rootkit
bugs
communications
2. A collection of data organized in a manner that allows access retrieval and use of that data
hot spot
hypermedia
database
broadband
3. Latest version of Post office Protocol
DVI
pretty good Privacy
POP3
Motherboard
4. Communications activity. Handled by NSFnet.
hibernate
buffer
traffic
Latency
5. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
Domain name system
download
Netbook
chip
6. A window that provides info - presents availabe options - or requests a response.
Storage Media
dialog box
tactile output
E- commerce
7. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
unauthorized access
system unit
air mouse
RSS 2.0
8. Software that helps groups of people work together on projects and share info over a network
Memory
groupware...
digital signature
RAM
9. Is an online area in which isers have wrtten discussions about a particular subject.
newsgroup
system clock
Memory Cache
MMS
10. The role of memory to store both data and programs
Domain name
Terminal
stored program concept
virtual provate network
11. Cables - telephone lines - radio networks - satellites
Point of Sale terminals
FireWire port
http
Transmission media
12. Controls timing of all computer operations
Mainframe
cyberextortionist
system clock
trackball
13. Two or more computers transfer data - instructions - and information.
device independent
CERT/CC
Dial Up line
communications
14. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
EULA
parallel processing
Laser printer
OMR
15. Computing device small enough to hold in your hand
tactile output
broadband internet service
IM
Mobile Device
16. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
trackball
ethernet
wordwrap
wireless access point
17. Online service provider- has many members features along with internet access such as IM or Web browsers.
liquid flow technology
OSP
spyware
hash
18. Uses devices that emit and sense light to detect the mouses movement
optical mouse
RAID
network license
mashup
19. They can execute more than one instruction per clock cycle
tactile output
optical mouse
superscalar
Trojan Horse
20. Allows the processor to communicate with peripherals.
ISP
http
expansion bus
back door
21. A type of storage media that consists of flat disc and is written and read by a laser
address
solid state drive
traffic
optical disc
22. They consist entirely of electronic components and contain no moving parts.
solid state media
OSP
device independent
memory slots
23. Dozens or hundreds of thin strands of glass or plastic that use light to transmit signal. Carries more signals - faster - less noise - better security - smaller size
Bluetooth
fiber optic cable
thread
shareware...
24. Slightly slower than L1 cache but has higher capacity. (advanced transfer cache)
ergonomics
Trojan Horse
Application software...
L2 cache
25. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
peripheral
USB hub
database
Servers
26. Allows a user to plan schedule and track costs of a project
access control
virtual provate network
project management software...
warm boot
27. Obtains data directly at the location where the transaction or event takes place.
bugs
RSS 2.0
data collection device
air mouse
28. A cable forms a closed loop with all computers. one direction
registrar
synthesizer
Web Application
ring network
29. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
tactile output
application software...
cluster
DIMM
30. The amount of data - instructions - and information that can travel over communications channel
peripheral
access time
ergonomics
bandwidth
31. Any unwanted signal usually varying quickly
Operating system
Operating system
digital certificate
Noise
32. Case of the system unit to protect internal damage
chasis...
stylus
liquid flow technology
byte
33. Single chip with two or more processor cores.
DSL
communications
crimeware
multi- core processor
34. Sends digital data and info from a comp to a DSL line
network
newsgroup
DSL modem
EDI
35. Electrical supply drops.can cause data loss but generally not cause equipment damage
undervoltage
system on a chip
hard disk
DSL modem
36. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
File compression utility
Application software...
message board
Storage Media
37. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
coaxial cable
MRAM
DTP
broadband internet service
38. A real time internet communications service where you can talk to people online.
Bluetooth
IM
transistor
message board
39. Is a security measure that defines who can access it and what actions they can take while acessing the computer
phishing
CMOS
access control
cable modem
40. PGP an encryption program
honeypot
pretty good Privacy
sleep mode
Operating system
41. A small metal or plastic device that uses pressure instead of ink.
stylus
NAS
unauthorized access
TLS
42. A notcie that guarantees a user or web site is legit. E- commerce use it often
digital certificate
ergonomics
Application software...
embedded operating system
43. Loses its contents when power is turned off (RAM)
RIMM
cracker
SMTP
volatile memory
44. The last section of the domain name
Top level domain
USB port
Output
DSL
45. Needed generally to participate in a newsgroup
solid state drive
expansion bus
protocol
newsreader
46. Extends the capabilites of a browser.
plug- in
unauthorized access
DSL
PIM
47. Static ram- faster and more reliable. Dont need to be re energized as often and are more expensive
SRAM
virus
document management software...
streaming
48. A computer that delivers requested web pages to your computer
Web Server
fault tolerant computer
client
EDI
49. When online meetings take place on the web
optical disc
downloading
bugs
Web conference
50. Dynamic ram- chips must be re energized constantly or they lose their contents.
DRAM
fault tolerant computer
hot plugging
capacity