SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Contains 10 or fewer comps - with similar reponsibilities and capabilities
DNS Server
peer to peer network
E- commerce
access control
2. Small peice of semi- conducting material - usually silicon - on whoch integrated cicuits are etched.
OCR
chip
terminal
overvoltage
3. Special software to listen to audio
macros
Drive Bay
undervoltage
player
4. Searches for and removes unneccessary files
disk cleanup
project management software...
cross - platform
Internet Backbone
5. Really simple syndication is a specification that many content aggregatorsuse to distribute content to subscribers
freeware...
RSS 2.0
Bay
RAID
6. Universal serial bus port connects peripherals to the computer
certificate authority
ROM
star network
USB port
7. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
Latency
image processing
spyware
ghosting
8. A family member on a computer
DIMM
touchpad
biometrics
Home user
9. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
Desktop Computer
bit
digital
device dependant
10. Uses devices that emit and sense light to detect the mouses movement
expansion slot
optical mouse
FireWire port
hash
11. (laptop computer) portable personal computer often able to fit in your lap
hot plugging
Netbook
hypertext
Notebook Computer
12. CA resposible for giving out digital certificate
MRAM
cracker
LAN
certificate authority
13. A device that enables you to join a port and a connector that are both male or female
power supply
chasis...
gender changer
memory module
14. A vulnerable computer that is set up to entice an intruder to break into it.
honeypot
defragmenting
Laser printer
hibernate
15. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
network standard
Information system
streaming
chat client
16. Extends the capabilites of a browser.
online auction
bandwidth
plug- in
MRAM
17. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
VR world
VR
System Software...
mpeg
18. Circuit boards tjay provide connections and functions not built into the motherboard
communications channel
network card
adapter cards
embedded computer
19. Joins a cable and a port
network
IM
multifunction peripheral
connector
20. Virtual reality is the use of computers to simulate a real or imagines environment that appears in a 3d space.
VR
capacity
Trojan Horse
cracker
21. Consists of special purpose chip and electronic circuits that control the transfer of data - instructions - and information from a disk to and from the system bus and other parts of the computer.
backside bus
disk controller
Laser printer
shareware...
22. The fastest most powerful computer
newsgroup
solid state drive
Laser printer
supercomputer
23. Basic input/output systemis firmware that contains the computers startup instructions
MRAM
Content Aggregator
BIOS
microbrowser
24. Perpetrator attempts to obtain your personal or financial info.
phishing
business software...
Output
Top level domain
25. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
chasis...
register
Desktop Computer
hacker
26. Instead of port - jack is used to identify audio or video ports.
BIOS
POP3
jack
Storage Media
27. Is a hardware or software that protects a networks resources from intrusion by users on another such as the internet.
Netbook
ghosting
network card
Firewall
28. A colection of individual programs available together as a unit. lower cost and ease of use
CU
PNG
software suite
bus network
29. Wireless network that provides internet connections to mobile comouters and devices WiFi - WiMAX - Bluetooth
nonvolatile memory
network topology
ring network
hot spot
30. Started the internet as a networking project
ARPA
POST
honeypot
driver
31. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
hard disk
Bluetooth
client
buffer
32. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
CAM
supercomputer
MMS
cold boot
33. Latest version of Post office Protocol
virtual provate network
Home user
POP3
stylus
34. Uses fiber optic cable for internet connection.
bandwidth
hot spot
Processor
Fiber to the Premises
35. A personal computer you can carry from place to place
cloud storage
web filter
Mobile Computer
Software...
36. Connects the processor to cache.
OMR
ALU
heat pipe
backside bus
37. Completely Automated Public Turing test to tell Computers and Humans Apart.
certificate authority
CAPTCHA
stylus
hot plugging
38. Contains many microscopic pathways capable of carrying an electrical current
unethical employees
integrated circuit
drive bay
DVI
39. World wide web consortium oversees research and sets standards for many areas of the internet
W3C
hacker
sound card
system clock
40. A type of system software that assists users with controlling or maintaining the operation of a computer - its devices - or its software. Helpful in running of application software
Information system
utility programs
formatting
back door
41. Serves as the interface between the user - the app software - and the computers hardware
liquid flow technology
sleep mode
system software...
system unit
42. Computer automatically can configure adapter cards and other peripherals as you install them
Storage Media
Plug and Play
USB port
Netiquette
43. A small flat rectangular pointing device that is sensitive to pressure and motion.
touchpad
router
hot plugging
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
44. A segment in memory in which items are placed while waiting to be transferred from an input device or to an output device
RTLS
image processing
buffer
Laser printer
45. Method that the internet uses to store domain names and their corressponding IP addresses
transistor
streaming cam
Terminal
Domain name system
46. Redundant array of independant disks which is a group of to or more inegrated hard disks. An ideal storage system for users who must have data available when the access it
network architecture
hard disk
RAID
virus signature
47. May break in to computer to exploit security weakness. financial gains - revenge.
unethical employees
virus signature
ciphertext
telemedicine
48. Electronic data interchange which defines how data transmits across telephone lines or other means. Minimal peperwork for businesses
hypertext
EDI
botnets
Domain name
49. Smallest element in an electronic image
pixel
USB port
hot plugging
Web Application
50. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
bus
Intrusion detection software...
RSS 2.0
Input