SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Surgeon performs operation by controlling robot when not in the same area as patient.
Firewall
MAN
telesurgery
NAS
2. A unique number that identifies the location of a byte in memory
address
Servers
integrated circuit
system software...
3. The number of bits in an area on a storage medium - Higher density means more storage capacity
superscalar
communications channel
proprietary software...
density
4. Communications activity. Handled by NSFnet.
Noise
traffic
L2 cache
cloud storage
5. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
Web Server
Memory Cache
Software...
streaming
6. Universal serial bus port connects peripherals to the computer
broadband
heat sink
bus network
USB port
7. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Domain name system
CERT/CC
Software...
communications
8. A web site that evaluates your comouter to check for internet and e mail vulnerabilities
system unit
pipelining
online security service
adware
9. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Servers
device independent
EDI
embedded operating system
10. Written by virus author that can damage computer by infecting a computer negatively by altering the way computer works without the users knowledge knowledge or permission.
MAN
virus
Transmission media
RIMM
11. Digital light processor uses tiny mirrors to reflect light
POP3
DLP projector
Dial- up access
SMTP
12. Any unwanted signal usually varying quickly
Noise
POST
register
MMS
13. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
biometrics
device dependant
EFT
defragmenting
14. On software is infinitie space and depth for VR
http
disk controller
VR world
client
15. A series of related instructions that tells a computer what tasks to perform and how to perform them. They respond to commands
program
touchpad
access time
protocol
16. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
hypermedia
telesurgery
chip
Processor
17. A special purpose computer that functions as a component in a larger product. Small with limited hardware
Memory
CPU
embedded computer
video card
18. Most computers (on and off)
fixed wireless
digital
PIM
802.11
19. Single chip with two or more processor cores.
multi- core processor
RSS 2.0
ASCII
disk controller
20. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
jewel box
DSL
DRAM
star network
21. Joins a cable and a port
connector
mashup
web filter
RAID
22. A server that you connect to to start a chat session.
chat client
Hot spots
EDI
botnets
23. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
overvoltage
coaxial cable
terminal
DRAM
24. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
DVI
OCR
fiber optic cable
supercomputer
25. A metropolitan area network is a high speed netwrok that connects local area networks. contains LANs
terminal
IP address
MAN
multi- core processor
26. Device with a monitor - keyboard - and memory
W3C
Terminal
virus signature
drive bay
27. Central processing unit- processor- interprets and carries out the basic instructions that operate the computer.
CPU
system bus
Latency
telesurgery
28. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
System Software...
turnaround document
Domain name
29. Arithmetic logic unit- a component of the processor - performs arithmetric - comparison - and operations.
wireless access point
ALU
machine cycle
Content Aggregator
30. Copyrighted software that is distributed at no cost for a trial period
gender changer
shareware...
crimeware
VR world
31. Links in text based documents
VoIP
wireless modem
nonvolatile memory
hypertext
32. The last section of the domain name
Desktop Computer
Top level domain
traffic
Notebook Computer
33. Type of notebook comp that is smaller and less powerful than a normal notebook comp
system clock
twisted pair cable
fixed wireless
Netbook
34. Organization that sells and manages domain names
bus network
application software...
registrar
disk fragmenter
35. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
spooling
density
EDI
USB hub
36. Component of the system unit that converts AC to DC power. Have built in fans to keep it cool.
power supply
bus network
ROM
device independent
37. Text version of an IP address
Domain name
memory slots
Memory
SMTP
38. Is a security measure that defines who can access it and what actions they can take while acessing the computer
access control
L1 cache
heat sink
cluster
39. Major carriers of network traffic
DTP
Internet Backbone
wireless Internet service provider
Web Application
40. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
image processing
cyberextortionist
online auction
video card
41. Screen savors were made to prevent this - which etched images permanently onto the screen
ghosting
traffic
cable modem
cloud storage
42. Accesses a computer or network illegally but has the intent of destroying data - stealing info - or other malicious actions.
solid state media
Mobile Device
cracker
downloading
43. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
network
microbrowser
client/server
Operating system
44. Graphics processing unit controls the manipulation and display of graphics on the display device.
Hot spots
GPU
air mouse
embedded operating system
45. One or more computers on the network request services from the server. 10 or more computers
registrar
client/server
plaintext
Mobile Computer
46. CPU. Interprets and carries out basic instructions that operate the computer. (On motherboard)
streaming
application software...
Processor
worm
47. A single copper wire surrounded by at least three layers - insulting material - woven material - plastic outer coating - often used by cable television
disk fragmenter
coaxial cable
optical disc
data collection device
48. Instead of port - jack is used to identify audio or video ports.
bus
RSS 2.0
hash
jack
49. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
fiber optic cable
register
compromised computer
trackball
50. The code of acceptable behaviors users should follow while on the internet.
scanner
Netiquette
Memory Cache
POST