SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Cse Computer Science Engineering
Start Test
Study First
Subjects
:
engineering
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Holds one or more disk drives
Trojan Horse
drive bay
sending device
CAM
2. Connects the processor to cache.
SIMM
backside bus
DTP
online security service
3. A number that uniquely identifies each computer or device connected to the internet (0-255)
defragmenting
IP address
PIM
fiber optic cable
4. The standard that outlines characteristics of how two network devices communicate
spoofing
IP address
CU
protocol
5. Media transmit multiple signals simutaneously. Download faster than upload
wireless Internet service provider
broadband
newsreader
MICR
6. Computer aided manufacturing refers ti the use of computers to assist with manufacturing process.
CAM
ghosting
online security service
public- domain software...
7. Transmits data via infared light waves.. Both computer and device must have the port for it to work
mpeg
POST
IrDA Port
payload
8. The fastest most powerful computer
adapter cards
database
sleep mode
supercomputer
9. Controls timing of all computer operations
LAN
Memory
Point of Sale terminals
system clock
10. A type of system software that allows users to perform maintenence type tasks
utility program
UNIX
hypermedia
Software...
11. The process if a computer or device recieveing info info from the server on the internet
Memory Cache
Intrusion detection software...
cyberextortionist
downloading
12. Saves any open documents and programs to RAM and places computer into a low power state
corporate spies
sleep mode
network license
BIOS
13. A family member on a computer
Home user
MRAM
Hot spots
L2 cache
14. (program) consists of related instructions that tells computer what tasks to perform and how to perform them
Software...
Firewall
access control
supercomputer
15. A business that gathers and organizes web content and then distributs the content to subscribers for free or a fee
Dial up modems
Content Aggregator
kernal
CERT/CC
16. Transmission media on which the data - instructions - information travel.
communications channel
bandwidth
pipelining
FireWire port
17. A collection of data organized in a manner that allows access retrieval and use of that data
database
RSS 2.0
platter
Point of Sale terminals
18. A device that plugs in a USB port on the system unit and contains multiple USB ports in which you plus cables from USB devices. Self- powered
proxy server
CAM
online security service
USB hub
19. All computers connected to central device. Hub or switch
SIMM
pointing stick
DLP projector
star network
20. Faster growing operating system that includes free programming languages and utility programs - multipurpose operating system
nonvolatile memory
Output
Linux
coaxial cable
21. A device that uses a light source toread characters - marks - codes - and converts them into digital data that a computer can process. Uses optical character recognition and optical mark recognition
audit trail
optical reader
pretty good Privacy
access time
22. Privately owned and limited to a specific vendor or computer model.
PIM
proprietary software...
OMR
bus width
23. Impact printer that uses tiny wire pins on a print head mechanism to stike an inked ribbon
dot matrix printer
FireWire port
server
fiber optic cable
24. Graphical User interface - interact with software using text - graphics - and icons
GUI
Netbook
Operating system
port
25. A computer with limited processing power that enables users to send data to and recieve info from a host computer. POS terminals - ATM - and DVD kiosks
transistor
PNG
terminal
defragmenting
26. Someone who accesses a computer or network illegally. Some say they hack to improve security
http
SIMM
Input
hacker
27. A unique number that identifies the location of a byte in memory
Desktop Computer
CAPTCHA
site license
address
28. Communications device that connects multiple computers or other routers together and transmits data to its correct destination on a network
router
corporate spies
disk fragmenter
SIMM
29. Major carriers of network traffic
kernal
Internet Backbone
capacity
spoofing
30. Graphics processing unit controls the manipulation and display of graphics on the display device.
sleep mode
system software...
formatting
GPU
31. Two main parts are processor and memory.
Dial Up line
DIMM
Motherboard
download
32. Saves any open docs or programs to hardisk before removing power
hibernate
network architecture
touchpad
rootkit
33. A set of programs that coordinates all of the activies among computer hardware devices.
Operating system
register
POST
embedded computer
34. Radio frequency identification is a technology that uses radio signals to communicate with a tag placed in or attached to an object. Can contain antenna and memory chips
communications channel
access time
TCP/IP
RFID
35. Random access memory- memory chips that can be read from and written to by the processor and other devices
disk fragmenter
payload
Content Aggregator
RAM
36. Does not require a newsreader - easier to use than a newsgroup
VAN
GUI
ergonomics
message board
37. Defines guidelines that specify the eay computers access the medium to which they are attached - types - speed of medium - and types of physical cable or witreless technology used
token ring
MICR
audit trail
network standard
38. Characteristics include capacity - platters - read/write heads - cylinders - sectors and tracks - rpm - transfer rate - and access time
adware
port
hard disk
L2 cache
39. Uses radio waves to transmit data between two devices.
GUI
Bluetooth
warm boot
multi- core processor
40. Internet connections using regular copper telephone lines.
DSL
fault tolerant computer
CPU
MICR
41. Optical disk drive - hard disk drive - usb flash drive - card reader/writer - memory cards - external hard disk.
Storage Device
adapter card
VR world
mpeg
42. Copies itself repeatedly in memory using up system resources and possibly shutting down the system
FireWire port
download
analog
worm
43. Business transaction that occurs over Internet business - consumer consumer- consumer business - business
plaintext
video card
spooling
E- commerce
44. Device with a monitor - keyboard - and memory
client
hot plugging
spoofing
Terminal
45. Where a computer keeps data - instructions - and information (flash drives - hard disks - optical disks - memory cards)
NAS
optical mouse
Storage Media
gender changer
46. Internet Service Provider- a regional or national access provider
disk cleanup
network license
ISP
CAPTCHA
47. Accepts the transmission of data - instructions - or info
expansion slot
database
broadband internet service
recieving device
48. A light sensing input device that reads printed text and graphics and translates the results into a form the computer can process.
driver
MAN
scanner
groupware...
49. Determines the number of bits that can be transmitted at one time
transistor
E- commerce
system unit
bus width
50. A know specific pattern of virus code.
virus signature
streaming cam
ghosting
network license