SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Optical mark recognition reads hand drawn marks such as circles or rectangles.
GPU
turnaround document
Dial Up line
OMR
2. A set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
digital signature
Operating system
Desktop Computer
spyware
3. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
jack
utility programs
defragmenting
Home user
4. A document that you return to the company that creates and sends it.
unethical employees
turnaround document
noise
TLS
5. ...
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
project management software...
adapter cards
dot matrix printer
6. Reorganizing it so that the files are store in continous sectors
DSL
defragmenting
spooling
hacker
7. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
application software...
http
document management software...
chip
8. Occurs when the incoming electrical power increases. Can cause immediate and permanent damage to hardware
broadband
Memory Cache
overvoltage
registrar
9. Dynamic ram- chips must be re energized constantly or they lose their contents.
DRAM
hacker
wireless access point
phishing
10. Joins a cable and a port
cluster
Dial- up access
connector
utility programs
11. The amount of data - instructions - and information that can travel over communications channel
bandwidth
WAN
GUI
Bluetooth
12. Hides within or looks like a legitimate program such as a screen saver
bandwidth
thread
utility program
Trojan Horse
13. A digital code attached to an electronic message or document - which is unique and which can be used to authenticate the sender or owner. Most often used in electronic commerce.
kernal
phishing
server
digital signature
14. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
ARPA
project management software...
broadband internet service
chip
15. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
register
machine cycle
hibernate
VoIP
16. A unique number that identifies the location of a byte in memory
Processor
payload
IP address
address
17. When online meetings take place on the web
motherboard
video card
neural network
Web conference
18. Same intent as cracker but does not have technical skills and knowledge. Often use prewritten hacking
platter
mashup
Storage Media
script kiddie
19. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
Linux
IM
client/server
fiber optic cable
20. Human speech is bc of its continous signal that vary in strength and quality
Memory
freeware...
analog
solid state media
21. Perpetrator attempts to obtain your personal or financial info.
peer to peer network
Latency
phishing
freeware...
22. Cables - telephone lines - radio networks - satellites
PIM
EDI
nonvolatile memory
Transmission media
23. Protective case for optical discs
token ring
jewel box
audit trail
Dial Up line
24. zombie
compromised computer
digital modem
mpeg
heat pipe
25. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
Storage Media
macros
video card
pixel
26. Controls access to hardware - software - and other resources on the network and provides a central storage area for programs - data - and info.
server
adware
WAN
warm boot
27. Text version of an IP address
POST
WAN
synthesizer
Domain name
28. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hard disk
WAN
thread
undervoltage
29. Application software that allows users to access and view Web Pages (Intenet Explorer - Firefox - Safari)
Web Browser
commands
disk cleanup
motherboard
30. Used to gain competitive advantage
supercomputer
corporate spies
warm boot
Trojan Horse
31. Completely Automated Public Turing test to tell Computers and Humans Apart.
hypertext
CAPTCHA
groupware...
Personal Computers
32. Has the illusion of moving images becuase it sends a continuos stream of images
streaming cam
trackball
device dependant
digital modem
33. Simple mail transfer protocol is a communications protocol used by some outgoing mail servers.
Input
DTP
Web Browser
SMTP
34. Most computers (on and off)
application software...
token ring
product activation
digital
35. The core of the operating system that manages memory and devices - maintains the computer clock - starts programs - and assigns the computers resources such as devices and data. Memory resident
spyware
TLS
kernal
UNIX
36. Consists of capturing - sorting - analyzing - displaying - printing - and manipulating images.
cyberterrorist
network standard
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
image processing
37. A type of system software that allows users to perform maintenence type tasks
device independent
utility program
byte
fault tolerant computer
38. A small flat rectangular pointing device that is sensitive to pressure and motion.
freeware...
chasis...
touchpad
GPU
39. Surgeon performs operation by controlling robot when not in the same area as patient.
Processor
touchpad
multi- core processor
telesurgery
40. Hardware - software - data - people - procedures
Internet Backbone
volatile memory
System Software...
Information system
41. A stationary pointing devoce with a ball on its top or side with one or two buttons like a mouse.
Information system
pixel
trackball
stylus
42. Mathematical formula that generates a code from the contents of the message
MMS
hash
touchpad
Output
43. On software is infinitie space and depth for VR
buffer
VR world
utility program
utility program
44. On the motherboard hold memory modules
chasis...
solid state media
memory slots
digital forensics
45. Power on self test to check the various system components and the results are compared with data in a CMOS chip
telesurgery
image processing
chip
POST
46. A computer that can perform all of its input - processing - output - and storage activities by itself (PC - Apple)
PNG
access time
ethernet
Personal Computers
47. Loses its contents when power is turned off (RAM)
system clock
volatile memory
scanner
System Software...
48. Designed for mobile devices
digital modem
GPU
disk cleanup
microbrowser
49. The standard that outlines characteristics of how two network devices communicate
protocol
MAN
Denial of Service attack
motherboard
50. Personal information manager is application software that includes features to help users organize personal info
Operating system
ghosting
TLS
PIM