SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Screen savors were made to prevent this - which etched images permanently onto the screen
MAN
ergonomics
jewel box
ghosting
2. The process of using the operating system to restart a computer. Properly closes programs but doesnt save work
warm boot
SMTP
streaming
audit trail
3. A system that attempts to imitate the behavior of a human brain.
neural network
back door
ISP
BIOS
4. Complementary metal oxide semiconductor provides high speeds and consumes little power. Used by RAM - flash memory - and other memory chips. USes battery power
optical mouse
Content Aggregator
CMOS
fault tolerant computer
5. Computing device small enough to hold in your hand
cyberextortionist
Mobile Device
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Netbook
6. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
disk cleanup
wireless access point
ROM
DVI
7. Method that the internet uses to store domain names and their corressponding IP addresses
integrated circuit
network standard
E- commerce
Domain name system
8. A network standard that specifies no central computer or device on the network should control when data is being transmitted. Msot popular in LAN
broadband
expansion slot
touchpad
ethernet
9. Many scanners have this optical character recognition software which can read and convert text documents into electronic files. Includes a small optical scanner for reading characters
Home user
audit trail
network architecture
OCR
10. Uses devices that emit and sense light to detect the mouses movement
system unit
optical mouse
hash
hypertext
11. Digital light processor uses tiny mirrors to reflect light
DLP projector
sleep mode
telemedicine
rootkit
12. Saves any open documents and programs to RAM and places computer into a low power state
video card
chip
wordwrap
sleep mode
13. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
scanner
Memory Cache
keygen
OMR
14. Health care professions conduct live conferences on the computer
TLS
site license
Mobile Computer
telemedicine
15. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
broadband internet service
Latency
DSL
IM
16. Internet Service Provider- a regional or national access provider
hard disk
L2 cache
ISP
virus signature
17. Transmits data via infared light waves.. Both computer and device must have the port for it to work
IrDA Port
system software...
Content Aggregator
undervoltage
18. Has the illusion of moving images becuase it sends a continuos stream of images
streaming cam
biometrics
MICR
formatting
19. Donated for public use has no copyright restrictions
DSL modem
memory slots
public- domain software...
adapter cards
20. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
image processing
embedded operating system
network license
Dial- up access
21. Joins a cable and a port
solid state drive
connector
honeypot
touchpad
22. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
image processing
gender changer
adware
Operating system
23. A program placed on a computer without the users knowledge that secretly collects info about the user often related to web browsing habits.
drive bay
spyware
defragmenting
telemedicine
24. Controls timing of all computer operations
image processing
system clock
microbrowser
keygen
25. A program that hides in a computer and allows someone from a remote location to take control of the computer
phishing
site license
peer to peer network
rootkit
26. The destructive event or prank the program intended to deliver
system bus
hash
synthesizer
payload
27. Media transmit multiple signals simutaneously. Download faster than upload
analog
telemedicine
cloud storage
broadband
28. Hides within or looks like a legitimate program such as a screen saver
Trojan Horse
chasis...
spider
memory slots
29. A program that restricts access to certain material on the web
trackball
Denial of Service attack
newsreader
web filter
30. Used to track and identify the location of high risk or high value items.
DSL
RTLS
disk fragmenter
Drive Bay
31. The combination of text - numbers - graphics - animation - sound effects - music - and other media in hyperlinked documents.
Application software...
chasis...
hypermedia
http
32. Software that helps groups of people work together on projects and share info over a network
buffer
GUI
solid state drive
groupware...
33. The standard that outlines characteristics of how two network devices communicate
corporate spies
transistor
CU
protocol
34. A type of system software that allows users to perform maintenence type tasks
Software...
utility program
IrDA Port
cold boot
35. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
Software...
memory module
Trojan Horse
digital signature
36. Contains many microscopic pathways capable of carrying an electrical current
peer to peer network
integrated circuit
ROM
Mobile Device
37. Picure messaging can occur from mobile to mobile and mobile to email
Drive Bay
solid state media
MMS
device independent
38. Does not require a newsreader - easier to use than a newsgroup
Netbook
message board
bus width
EDI
39. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
machine cycle
thread
utility programs
SMTP
40. Software used by criminals
token ring
message board
DNS Server
crimeware
41. When turning on a computer that has been turned off completly
cold boot
digital signature
unauthorized access
twisted pair cable
42. Does not lose its contents when power is turned off (permanent - ROM - flash memory - CMOS)
nonvolatile memory
IP address
system clock
Noise
43. When businesses use the internet to sell products
honeypot
E- retail
terminal
POP3
44. Broadband modem- sends and recives digital data over the cable television
cable modem
ghosting
token ring
EDI
45. They can execute more than one instruction per clock cycle
kernal
script kiddie
http
superscalar
46. Determines the number of bits that can be transmitted at one time
bus width
hot plugging
SRAM
network license
47. Needed generally to participate in a newsgroup
newsreader
connector
network license
pipelining
48. Any unwanted signal usually varying quickly
Noise
commands
Dedicated line
streaming
49. Dish shaped antenna for internet connection
fixed wireless
CAD
digital forensics
DLP projector
50. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Laser printer
MRAM
RAM
OCR