SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Where ram resides - a small circuit board (RIMM - SIMM - DIMM)
Point of Sale terminals
client/server
Bay
memory module
2. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
density
OMR
CERT/CC
program
3. Smaller than heat sink cools processors in notebook comps
USB hub
Internet Backbone
heat pipe
adapter cards
4. Data that has been processed in a useful form- text - graphics - audio - video
Denial of Service attack
Output
Dial- up access
Internet Backbone
5. Needed generally to participate in a newsgroup
newsreader
chasis...
access control
MRAM
6. Popular for LAN. single central cable.
bus network
image processing
System Software...
hibernate
7. Method that the internet uses to store domain names and their corressponding IP addresses
connector
digital
buffer
Domain name system
8. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
client/server
RAID
VR
compromised computer
9. Single chip with two or more processor cores.
CAM
multi- core processor
network
cyberterrorist
10. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
disk fragmenter
adapter card
program
registrar
11. Picure messaging can occur from mobile to mobile and mobile to email
ghosting
application software...
bugs
MMS
12. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
Netiquette
BIOS
chip
DIMM
13. When online meetings take place on the web
bus width
hard disk
formatting
Web conference
14. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Servers
CAD
database
formatting
15. They can execute more than one instruction per clock cycle
superscalar
TCP/IP
ethernet
spooling
16. Small capacity built directly in the processor chip
biometrics
L1 cache
system unit
web filter
17. Read only memory refers to memory chips storing permanent data and instructions (firmware)
ROM
transistor
touchpad
kernal
18. Consists of one or more twisted pair wires bundled together - Used for transmission media. Wires are twisted to reduce the noise
neural network
USB hub
twisted pair cable
defragmenting
19. The process of dividing the disk into tracks and sectors
streaming cam
sound card
formatting
payload
20. They consist entirely of electronic components and contain no moving parts.
DSL
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
document management software...
solid state media
21. Graphical User interface - interact with software using text - graphics - and icons
GUI
microbrowser
DRAM
VR world
22. Storage over an internet service
USB hub
firmware...
DNS Server
cloud storage
23. A know specific pattern of virus code.
Notebook Computer
jewel box
virus signature
application software...
24. Instead of port - jack is used to identify audio or video ports.
FireWire port
token ring
jack
Application software...
25. A program that hides in a computer and allows someone from a remote location to take control of the computer
rootkit
cyberterrorist
digital signature
dot matrix printer
26. MFP is a single devce that looks like a printer or copy machine but provides the functionality of a printer - copier - scanner - and fax
multifunction peripheral
memory slots
L2 cache
peripheral
27. Copyrighted software provided at no cost by company that retains all rights to software
virus
freeware...
twisted pair cable
Memory
28. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
online security service
Plug and Play
registrar
Personal Computers
29. ...
undervoltage
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Linux
SIMM
30. The role of memory to store both data and programs
system on a chip
stored program concept
token ring
address
31. Cables - telephone lines - radio networks - satellites
Storage Device
Transmission media
system software...
Input
32. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Firewall
RAM
wireless Internet service provider
stored program concept
33. Combines several GIF images ina single GIF file.
client
animated Gif...
firmware...
Software...
34. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
L2 cache
solid state media
IrDA Port
Mainframe
35. Broadband modem- sends and recives digital data over the cable television
CU
telemedicine
cable modem
ergonomics
36. Measures the amount of time it takes a storage device to locate an item on a storage medium and the time required to deliver an item from memory to the processor
access time
spooling
multifunction peripheral
rootkit
37. Case of the system unit to protect internal damage
Intrusion detection software...
cyberextortionist
Software...
chasis...
38. A small flat rectangular pointing device that is sensitive to pressure and motion.
VR world
TLS
touchpad
disk controller
39. Can be peropheral or chip - creates sound from digital instructions.
byte
synthesizer
adapter card
digital modem
40. Internet connections using regular copper telephone lines.
DSL
VR
backside bus
wordwrap
41. Connects the processor to cache.
parallel processing
backside bus
network
Operating system
42. Mad ef aluminum - glass - or ceramic and is coated with an alloy material that allows material to be recorded magnetically
platter
UNIX
EDI
pretty good Privacy
43. Magentic ink character recognition devices read text printed with magnetized ink. Readers read numbers at the bottom of the checks
hash
token ring
MICR
network standard
44. A real time internet communications service where you can talk to people online.
embedded computer
Transmission media
IM
traffic
45. A notcie that guarantees a user or web site is legit. E- commerce use it often
Noise
POST
communications
digital certificate
46. Network attached storage is a server connected to a network with the sole purpose of providing storage. often use RAID configuration
NAS
freeware...
EFT
microbrowser
47. A part of the motherboard and connects the processor to main memory
system bus
Web conference
Fiber to the Premises
online security service
48. Consumer consumer e commerce.
CPU
online auction
optical mouse
RTLS
49. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
Netiquette
BIOS
application software...
Top level domain
50. Perpetrator attempts to obtain your personal or financial info.
solid state media
phishing
synthesizer
chip