SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Searches for and removes unneccessary files
ARPA
download
disk cleanup
application software...
2. Each computer or device on the network. often connected by cables
ciphertext
formatting
node
machine cycle
3. A part of the motherboard and connects the processor to main memory
system bus
video card
plaintext
data collection device
4. A popular digital line alternative for the small business or home user. Transmits at fast speeds on existing standard copper telephone wiring.
DSL
CMOS
Transmission media
POST
5. A small flat rectangular pointing device that is sensitive to pressure and motion.
groupware...
touchpad
VR world
Latency
6. A notcie that guarantees a user or web site is legit. E- commerce use it often
Application software...
digital certificate
fault tolerant computer
Memory Cache
7. Provides a means of sharing distributing and searching through documents by converting them unti a format that can be viewed by any user.
access time
access time
fixed wireless
document management software...
8. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
network
hot spot
multi- core processor
telesurgery
9. Someone who uses internet to destroy or damage computers for political reasons.
disk cleanup
cyberterrorist
neural network
Memory Cache
10. Case of the system unit to protect internal damage
RAID
chasis...
recieving device
VAN
11. The point at which a peripheral attahes to or communicates with a system unit so that the peripheral can send data or recive info from the computer
LAN
port
unethical employees
online security service
12. They consist entirely of electronic components and contain no moving parts.
solid state media
system software...
cold boot
bandwidth
13. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
liquid flow technology
Mainframe
audit trail
IrDA Port
14. System board- is the main circuit board of the system unit.
ergonomics
motherboard
L2 cache
ISP
15. Latest version of Post office Protocol
cracker
broadband internet service
POP3
virus
16. Media transmit multiple signals simutaneously. Download faster than upload
System Software...
heat sink
ergonomics
broadband
17. A window that provides info - presents availabe options - or requests a response.
Bay
Laser printer
dialog box
GPU
18. Method that the internet uses to store domain names and their corressponding IP addresses
DRAM
Domain name system
ROM
motherboard
19. On software is infinitie space and depth for VR
system software...
SRAM
broadband internet service
VR world
20. A type of system software that allows users to perform maintenence type tasks
Web conference
DSL
Application software...
utility program
21. Has the illusion of moving images becuase it sends a continuos stream of images
system software...
cold boot
streaming cam
Servers
22. Serves as the interface between the user - the app software - and the computers hardware
Point of Sale terminals
system software...
LAN
network standard
23. Saves any open documents and programs to RAM and places computer into a low power state
warm boot
solid state media
digital forensics
sleep mode
24. Consists of electronic components that store instructions waiting to be executed (On motherboard)
backside bus
communications
Memory
Memory Cache
25. Someone who accesses a computer or network illegally. Some say they hack to improve security
Domain name system
hacker
macros
Memory
26. Errors that can be recognized by automatic update
bugs
hibernate
turnaround document
proxy server
27. Used to track and identify the location of high risk or high value items.
LAN
disk controller
network card
RTLS
28. Cables - telephone lines - radio networks - satellites
Transmission media
network
analog
tactile output
29. Central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
fault tolerant computer
Dial up modems
wireless access point
Motherboard
30. Method that uses multiple processors to execute a single program or task requires special software that recognizes how to divide the problemand bring results back together
capacity
parallel processing
CAPTCHA
wireless modem
31. May break in to computer to exploit security weakness. financial gains - revenge.
TLS
client
unethical employees
virtual provate network
32. Hypertext transfer protocol
http
project management software...
MICR
virus signature
33. Initiates an instruction to transmit data - instructions - or information.
hash
e- learning
sending device
IM
34. Operating system on mobile devices that generally resides on ROM
embedded operating system
address
ROM
download
35. (laptop computer) portable personal computer often able to fit in your lap
UNIX
Notebook Computer
wireless access point
dialog box
36. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
DIMM
IrDA Port
RIMM
Web Browser
37. An instruction that causes a program to perform a specific action.
commands
business software...
volatile memory
program
38. Any unwanted signal usually varying quickly
OMR
Noise
W3C
Notebook Computer
39. The process of transferring data in a continous and even flow which allows users to access a file while it is transmitting
streaming
touchpad
token ring
pretty good Privacy
40. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
ciphertext
Application software...
newsreader
token ring
41. Sends digital data and info from a comp to a DSL line
CPU
plaintext
DSL modem
CAD
42. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
hacker
chip
sound card
WAN
43. PGP an encryption program
SRAM
pretty good Privacy
RSS 2.0
client/server
44. CA resposible for giving out digital certificate
botnets
network
certificate authority
USB hub
45. Reorganizing it so that the files are store in continous sectors
digital signature
defragmenting
Communications device
terminal
46. Company that provides wireless internet access to computers
preemptive multitasking
wireless Internet service provider
pretty good Privacy
unethical employees
47. An electrical disturbance that can degrade communications
noise
Processor
wordwrap
UNIX
48. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
PNG
Notebook Computer
System Software...
embedded operating system
49. Donated for public use has no copyright restrictions
Operating system
pretty good Privacy
communications
public- domain software...
50. Screen savors were made to prevent this - which etched images permanently onto the screen
optical mouse
DVI
ghosting
LAN