SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A cable forms a closed loop with all computers. one direction
ring network
Memory Cache
Firewall
GUI
2. Uses fiber optic cable for internet connection.
Fiber to the Premises
IP address
Plug and Play
newsreader
3. Amount of time it takes for the processor to read data - instructions - and information from memory. Directly affects processing data time.
air mouse
DSL
spoofing
access time
4. Transmission media on which the data - instructions - information travel.
back door
coaxial cable
server
communications channel
5. Surgeon performs operation by controlling robot when not in the same area as patient.
optical disc
access time
telesurgery
SRAM
6. Faster - higher quality than ink jet. Uses toner that sticks to the page from a combo of pressure and heat.
Laser printer
Storage Media
Plug and Play
player
7. Controls access to the hardware - software and other resources on a network and provides a centralized storage area for data - programs - and info
Servers
Dial up modems
L1 cache
power supply
8. Small- high speed storage locations that temporarily hold data and instructions. A part of the processor not memory
Linux
register
newsgroup
digital signature
9. Electronic funds transfer allows users connected to a network to transfer money from one bank account to another via transmission media
EFT
Dedicated line
capacity
memory slots
10. ...
adware
superscalar
single user/multitasking operating system allows a single user to work on two or more programs that reside in memory at the same time
Intrusion detection software...
11. Each computer or device on the network. often connected by cables
mashup
Servers
node
CAM
12. A unique number that identifies the location of a byte in memory
honeypot
address
client/server
UNIX
13. Two or more computers transfer data - instructions - and information.
groupware...
http
communications
Mainframe
14. A communications device that enables a computer or device that does not have a built in networking capability to access a network
network card
EDI
disk fragmenter
telesurgery
15. Single chip with two or more processor cores.
telesurgery
multi- core processor
SIMM
802.11
16. Consists of programs designed to make users more productive and assist them with personal tasks - makes business activites more efficient - to assist with graphics - to support home - personal - and educational tasks - to facilitate communications
MRAM
application software...
Web Server
LAN
17. A utility that reorgnizes the files and unused space on a computers hard disk so that the operating system accesses data quickly and programs run faster
backside bus
disk fragmenter
animated Gif...
nonvolatile memory
18. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
microbrowser
Denial of Service attack
network standard
DLP projector
19. Users prefer to download or transfer a copy of the images from the digital camera to the computers hard disk
ethernet
download
proxy server
network
20. Facilitates communications - shares hardware - sharing data and info - sharing software - trasnferring funds -
VoIP
network
utility programs
superscalar
21. Programs designed to make users more productive and assist them with personal tasks. (Web browser)
jewel box
CAD
Application software...
commands
22. Automatically analyzes all network traffic and notifies network administrators of suspicious behavior pattermsor system breaches
Intrusion detection software...
CU
token ring
virus
23. Standard specifies that computers and devices on the networl share or pass a special signal called a token in a unidirectional manner and in a preset order. only one token per network
EDI
MRAM
token ring
rootkit
24. Federally funded internet security research and development center
digital modem
client
CERT/CC
newsgroup
25. Consumer consumer e commerce.
System Software...
online auction
CPU
motherboard
26. Basic input/output systemis firmware that contains the computers startup instructions
BIOS
machine cycle
network standard
network
27. Holds one or more disk drives
project management software...
pixel
VR world
drive bay
28. Allows you to insert and remove flash memory and other devoces while the computer is running (flash memory)
dialog box
sending device
hot plugging
proxy server
29. Allows a user to plan schedule and track costs of a project
Top level domain
project management software...
terminal
virus signature
30. Donated for public use has no copyright restrictions
coaxial cable
heat sink
public- domain software...
freeware...
31. A system that attempts to imitate the behavior of a human brain.
neural network
cloud storage
bus network
access time
32. System board- is the main circuit board of the system unit.
multi- core processor
motherboard
cluster
disk cleanup
33. Computer aided design software assists a professional user in creating designs
connector
RAM
PIM
CAD
34. PGP an encryption program
EDI
utility program
SIMM
pretty good Privacy
35. On software is infinitie space and depth for VR
Mobile Computer
VR world
pretty good Privacy
bus width
36. (laptop computer) portable personal computer often able to fit in your lap
message board
spooling
public- domain software...
Notebook Computer
37. Operating system on mobile devices that generally resides on ROM
embedded operating system
SIMM
Bluetooth
broadband
38. Software used by criminals
downloading
GUI
crimeware
L1 cache
39. Computer designed so the system unit - input devices - output devices - and any other devices fit entirely on or under a desk or table.
online security service
Desktop Computer
plaintext
access time
40. A large expensive powerful computer that can handle hundreds or thousnads of connected users simutaneously
hypertext
telemedicine
Denial of Service attack
Mainframe
41. The delivery of education via some electronic method such as the internet - networks - or optical disks.
telesurgery
router
token ring
e- learning
42. Device that connects to the system unit and is controlled by the processor in the computer. (modem - disk drives - printers)
Storage Device
system clock
peripheral
RFID
43. A program that displays an online advertisement in a pop up. spyware can be hidden in adware
TCP/IP
RAID
adware
traffic
44. An expansion card - a circuit board that enhances functions of a component of the system unit or provides connections to peripherals.
adapter card
bugs
system bus
freeware...
45. A small metal or plastic device that uses pressure instead of ink.
bus
stylus
disk fragmenter
buffer
46. Programs that control or maintian the operations of the computer and its devices. Interface between user - application software - and computers software
System Software...
Denial of Service attack
Bluetooth
protocol
47. Unencrypted readable data
SIMM
hacker
plaintext
driver
48. The time it takes a signal to trvale from one location to another on a network Neg effect- distance - type of transmission media - and number of nodes data must travel through - bandwith high latency low for best performance
multi- core processor
Latency
CAM
bus width
49. Broadband modem- sends and recives digital data over the cable television
cable modem
document management software...
IrDA Port
transistor
50. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
POP3
digital
Content Aggregator
spyware